The papers contained in this volume were presented at the 19th Annual S- posium on Combinatorial Pattern Matching (CPM 2008) held at the University of Pisa, Italy, June 18-20, 2008.
We present in this volume the collection of finally accepted papers for the ninth e- tion of the IWANN conference ("e;International Work-Conference on Artificial Neural Networks"e;).
This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in June 2008.
Welcome to the proceedings of the 2008 International Conference on Grid and Pervasive Computing (GPC 2008) which was held in Kunming, Yunnan, China, May 25-28, 2008.
VI realm between distributed computing and networking, namely, Modeling Biological Networks, Network Security, Algorithmic Issues in Wireless Sensor Networks, and Optical Networking.
Welcome to the proceedings of the 4th International Symposium on Parallel and Distributed Processing and Applications (ISPA 2006), which was held in Sorrento, Italy, December, 4-6 2006.
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Computer Processing of Oriental Languages, ICCPOL 2006, held in Singapore in December 2006, colocated with ISCSLP 2006, the 5th International Symposium on Chinese Spoken Language Processing.
It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4-7, 2006.
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
Swarm robotics is the study of how large numbers of relatively simple physically embodied agentscanbe designedsuchthat a desiredcollectivebehavioremerges from the local interactions among agents and between the agents and the en- ronment.
ItwasourpleasuretoholdtheInternationalWorkshoponSecurity2006(IWSEC 2006) this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series.
The LNCS Journal on Data Semantics is devoted to the presentation of notable work that, in one way or another, addresses research and development on issues related to data semantics.
This volume contains the papers presented at the 13th International Symposium on String Processing and Information Retrieval (SPIRE), held October 11-13, 2006, in Glasgow, Scotland.
The two premier annual European conferences in the areas of machine learning anddatamining havebeencollocatedeversincethejointconferenceinFreiburg, Germany,2001.
This volume contains revised versions of the papers submitted to the workshop by the participants and accepted by the program committee after a thorough reviewing process.