Ad hoc networks refer to the wireless networking paradigm that covers a variety of network forms for specific purposes, such as mobile ad hoc networks, sensor n- works, vehicular networks, underwater networks, underground networks, personal area networks, and home networks.
The volume includes a set of selected papers extended and revised from the I2009 Pacific-Asia Conference on Knowledge Engineering and Software Engineering (KESE 2009) was held on December 19~ 20, 2009, Shenzhen, China.
The past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security.
Welcome to the Second International IFIP Entertainment Computing Symposium on st Cultural Computing (ECS 2010), which was part of the 21 IFIP World Computer Congress, held in Brisbane, Australia during September 21-23, 2010.
Prostatic adenocarcinoma (CAP) is the second most common malignancy with an estimated 190,000 new cases in the USA in 2010 (Source: American Cancer Society), and is the most frequently diagnosed cancer among men.
The first International Workshop on Machine Learning in Medical Imaging, MLMI 2010, was held at the China National Convention Center, Beijing, China on Sept- ber 20, 2010 in conjunction with the International Conference on Medical Image Computing and Computer Assisted Intervention (MICCAI) 2010.
th This volume contains the papers selected for the 13 FIRA Robot World Congress, held at Amrita Vishwa Vidyapeetham Bangalore, India, September 15-17, 2010.
The International Conference on Computational Processing of Portuguese-PROPOR -is the main event in the area of natural language processing that is focused on Portuguese and the theoretical and technological issues related to this language.
With the rapid growth of the Internet as well as the increasing demand for broadband services, access networks have been receiving growing investments in recent years.
It gives us greatpleasureto presentthe proceedings of the 9th Asian Conference on Computer Vision (ACCV 2009), held in Xi'an, China, in September 2009.
The 2009 International Conference on High-Performance Networking, Computing and Communication Systems and the 2009 International Conference on Theoretical and Mathematical Foundations of Computer Science (ICHCC -ICTMF 2009) were held during December 13-14, 2009, in Sanya, Hainan Island, China.
The International Conference on Intelligent Computing (ICIC) was formed to provide an annual forum dedicated to the emerging and challenging topics in artificial intel- gence, machine learning, pattern recognition, image processing, bioinformatics, and computational biology.
This book constitutes the refereed proceedings of the 5th International Conference on High Performance Embedded Architectures and Compilers, HiPEAC 2010, held in Pisa, Italy, in January 2010.
This volume contains the proceedings of the Third International DMTF Academic Alliance Workshop on Systems and Virtualization Management: Standards and the Cloud (SVM 2009) held in Wuhan, China, during September 22-23, 2009.
This book constitutes the refereed proceedings of the 13th International Conference on Principles of Distributed Systems, OPODIS 2009, held in Nimes, France, in December 2009.
This book constitutes the thoroughly refereed post-workshop proceedings of the 4th Workshop on Theory of Quantum Computation, Communication, and Cryptography, TQC 2009, held in Waterloo, Canada, in May 2009.
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others.
This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009.
This book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing and Networking, ICDCN 2010, held in Kolkata, India, during January 3-6, 2010.
The Second International Conference on Networks and Communications (NeCoM 2010), the Second International Conference on Wireless and Mobile Networks (WiMoN 2010), and the Second International Conference on Web and Semantic Technology (WeST 2010) were held in Chennai, India, during July 23-25, 2010.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Information Theoretic Security, ICITS 2007, held in Madrid, Spain, in May 2007.
As communication and networking (CN) become specialized and fragmented, it is easy to lose sight that many topics in CN have common threads and because of this, advances in one sub-discipline may transmit to another.