This six-volume set, LNAI 15387-15392, constitutes the refereed proceedings of the 20th International Conference on Advanced Data Mining and Applications, ADMA 2024, held in Sydney, New South Wales, Australia, during December 3-5, 2024.
This eleven-volume set LNCS 14815 - 14825 constitutes the refereed workshop proceedings of the 24th International Conference on Computational Science and Its Applications, ICCSA 2024, held at Hanoi, Vietnam, during July 1-4, 2024.
This book constitutes the refereed proceedings of the 20th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2024, held in Rome, Italy, during September 26-27, 2024.
This four-volume set constitutes the post-conference proceedings of the 7th EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2023, held in Harbin, China, during September 22-24, 2023.
This four-volume set constitutes the post-conference proceedings of the 7th EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2023, held in Harbin, China, during September 22-24, 2023.
This four-volume set constitutes the post-conference proceedings of the 7th EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2023, held in Harbin, China, during September 22-24, 2023.
The two-volume set LNCS 14634 and 14635 constitutes the refereed proceedings of the 27th European Conference on Applications of Evolutionary Computation, EvoApplications 2024, held as part of EvoStar 2024, in Aberystwyth, UK, April 3-5, 2024, and co-located with the EvoStar events, EvoCOP, EvoMUSART, and EuroGP.
This six-volume set, LNAI 15387-15392, constitutes the refereed proceedings of the 20th International Conference on Advanced Data Mining and Applications, ADMA 2024, held in Sydney, New South Wales, Australia, during December 3-5, 2024.
This two-volume set volume constitutes the papers of ten workshops which were held in conjunction with the 22nd International Conference on Service-Oriented Computing, ICSOC 2024.
This two-volume set of HCIBGO 2025 constitutes the refereed proceedings of the 12th International Conference on HCI in Business, Government and Organizations, held as part of the 27th International Conference, HCI International 2025, which took place in Gothenburg, Sweden, during June 22–27, 2025.
Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems and in deriving countermeasures to these attacks.
This book describes the landscape of cloud computing from first principles, leading the reader step-by-step through the process of building and configuring a cloud environment.
Haptics technology is being used more and more in different applications, such as in computer games for increased immersion, in surgical simulators to create a realistic environment for training of surgeons, in surgical robotics due to safety issues and in mobile phones to provide feedback from user action.
The 1989 Workshop on the Assessment of Formal Methods for Trustworthy Com- puter Systems (FM89} was an invitational workshop that brought together repre- sentatives from the research, commercial and governmental spheres of Canada, the United Kingdom, and the United States.
Correct Systems looks at the whole process of building a business process model, capturing that in a formal requirements statement and developing a precise specification.
Practical Usage of MVS REXX provides a concise and complete source of information for the development of applications using the REXX language - IBM's systems application architecture procedural language.
0 e This is the proceedings of the first annual symposium of the Safety-critical Systems Club (The Watershed Media Centre, Bristol, 9-11 February 1993), which provided a forum for exploring and discussing ways of achieving safety in computer systems to be used in safety-critical industrial applications.
One of the most significant developments in computing over the last ten years has been the growth of interest in computer based support for people working together.
Service provisioning in ad hoc networks is challenging given the difficulties of communicating over a wireless channel and the potential heterogeneity and mobility of the devices that form the network.
Classes of socio-technical hazards allow a characterization of the risk in technology innovation and clarify the mechanisms underpinning emergent technological risk.
As computer systems evolve, the volume of data to be processed increases significantly, either as a consequence of the expanding amount of available information, or due to the possibility of performing highly complex operations that were not feasible in the past.
The programme for the Second Safety-critical Systems Symposium was planned to examine the various aspects of technology currently employed in the design of safety-critical systems, as well as to emphasise the importance of safety and risk management in their design and operation.
Practical Usage of ISPF Dialog Manager is a concise and comprehensive source of information for the development of applications using IBM's Dialog Management package.
The Quality Special Interest Group of the British Computer Society presents the edited proceedings of their sixth International Conference on Software Quality Management (SQM'98) held in April 1998 in Amsterdam.
This book developed from an IFIP workshop which brought together methods and architecture researchers in Human Computer Interaction and Software Engineering.
The safe and secure operation ofcomputer systems continues to be the major issue in many applications where there is a threat to people, the environment, investment or goodwill.
Dependability has always been an vital attribute of operational systems, regardless of whether they are highly-specialised (like electricity generating plants) or more general-purpose (like domestic appliances).
SAFECOMP '96 contains papers presented at the 15th International Conference on Computer Safety, Reliability and Security held in Vienna, Austria, 23-25 October 1996.
With the continuing success of Local Area Networks (IANs), there is an increasing demand to extend their capabilities towards higher data rates and wider areas.
Each year the Safety-critical Systems Symposium brings together practitioners and researchers in a quest to inculcate a higher degree of safety engineering into the development and operation of critical software-based systems.
This is a book about multi-threaded programming - it could well be subtitled 'How to write computer programs tllat do lots of different tlrings all at once'.