There are many applications that require parallel and distributed processing to allow complicated engineering, business and research problems to be solved in a reasonable time.
We present in this volume the collection of finally accepted papers of the eighth edition of the "e;IWANN"e; conference ("e;International Work-Conference on Artificial Neural Networks"e;).
Swarm robotics can be defined as the study of how a swarm of relatively simple physically embodied agents can be constructed to collectively accomplish tasks that are beyond the capabilities of a single one.
This volume contains the proceedings of the 15th Annual International Sym- sium on Algorithms and Computation (ISAAC 2004), held in Hong Kong, 20-22 December, 2004.
This volume presents the proceedings of the 10th International Workshop on Combinatorial Image Analysis, held December 1-3, 2004, in Auckland, New Zealand.
This volume of Lecture Notes in Computer Science contains the revised versions of the papers presented at the 9th International Conference on Implemen- tion and Application of Automata, CIAA 2004.
This volume contains a subset of the papers presented at the 10th Panhellenic Conference in Informatics (PCI 2005), which took place at the City of Volos, Greece, during November 11-13, 2005.
On February 26-27, 2004, the 3rd International Workshop on Peer-to-Peer S- tems (IPTPS 2004) brought researchers and practitioners together to discuss the latest developments in peer-to-peer technologies, applications, and systems.
During the last 30 years, face recognition and related problems such as face detection/tracking and facial expression recognition have attracted researchers from both the engineering and psychology communities.
This book contains 30 articles and three abstracts of invited talks presented at The Second International Workshop on Biologically Inspired Approaches for Advanced Information Technology (Bio-ADIT 2006) held at Senri Life Science Center, Osaka, Japan, on January 26-27, 2006.
This volume contains the papers presented at the 9th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2005), which was held in Cambridge, Massachusetts, on May 14-18, 2005.
This volume contains the Proceedings of the 13th International Conference on Image Analysis and Processing (ICIAP 2005), held in Cagliari, Italy, at the conference centre "e;Centro della Cultura e dei Congressi"e;, on September 6-8, 2005.
It was a pleasure to take part in the 2005 European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005), held on July 13-14 in Visegrad (Hungary) in conjunction with the First International Conference on Wireless Internet (WICON) .
DEXA 2005, the 16th International Conference on Database and Expert Systems Applications, was held at the Copenhagen Business School, Copenhagen, Denmark, from August 22 to 26, 2005.
Welcometotheproceedingsofthe2ndInternationalSymposiumonParalleland Distributed Processing and Applications (ISPA2004) which was held in Hong Kong, China, 13-15 December, 2004.
This book constitutes the proceedings of the 25th International Conference, The Inclusive Web: Realizing Safe, Accessible, Inclusive, and Sustainable Web Engineering, ICWE 2025, held in Delft, The Netherlands, during June 30–July 3, 2025.
This book constitutes the proceedings of the 25th International Conference, The Inclusive Web: Realizing Safe, Accessible, Inclusive, and Sustainable Web Engineering, ICWE 2025, held in Delft, The Netherlands, during June 30–July 3, 2025.
This book constitutes the proceedings of the satellite events held at the XXX Semantic Web Conference, ESWC 2025, held in Portoroz, Slovenia, during June 1–2, 2025.
Among the group of physics honors students huddled in 1957 on a Colorado mountain watching Sputnik bisect the heavens, one young scientist was destined, three short years later, to become a key player in America's own top-secret spy satellite program.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Personal Satellite Services, PSATS 2010, held in Rome, Italy, Februray 2010.
Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants.
This book constitutes revised selected papers from the 42nd International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2016, held in Istanbul, Turkey, in June 2016.
This book constitutes the proceedings of the satellite events held at the XXX Semantic Web Conference, ESWC 2025, held in Portoroz, Slovenia, during June 1–2, 2025.
This book constitutes short papers, Doctoral Consortium and workshop papers which were presented at the 29th European Conference on New Trends in Databases and Information Systems, ADBIS 2025, which took place in Tampere, Finland, during September 23-26, 2025.
This book constitutes short papers, Doctoral Consortium and workshop papers which were presented at the 29th European Conference on New Trends in Databases and Information Systems, ADBIS 2025, which took place in Tampere, Finland, during September 23-26, 2025.
Tiny Machine Learning Techniques for Constrained Devices explores the cutting-edge field of Tiny Machine Learning (TinyML), enabling intelligent machine learning on highly resource-limited devices such as microcontrollers and edge Internet of Things (IoT) nodes.