Since knowledge was recognized as a crucial part of intelligent systems in the 1970s and early 1980s, the problem of the systematic and efficient acquisition of knowledge was an important research problem.
Information technology is a rapidly changing field in which researchers and developers must continuously set their vision on the next generation of technologies and the systems that they enable.
This volume contains the proceeding of the 5th International Conference on - age and Video Retrieval (CIVR), July 13-15, 2006, Arizona State University, Tempe, AZ, USA: http://www.
The Turkish Artificial Intelligence and Neural Network Symposium (TAINN) is an annual meeting where scientists present their new ideas and algorithms on artificial intelligence and neural networks with either oral or poster presentation.
Today, PKIs have come of age and they support the security of several large networked systems, such as company-wide document management systems,- governmentapplicationsandsecureVPN.
The International Conference on Asian Digital Libraries (ICADL) was born in Hong Kongin 1998and hosted in Taipei (1999),Seoul(2000),Bangalore(2001), Singapore (2002), Kuala Lumpur (2003), Shanghai (2004) and Bangkok (2005).
In the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development and use of advanced information te- nologies and systems for national and international security-related applications, has experienced tremendous growth and attracted substantial interest from academic - searchers in related fields as well as practitioners from both government agencies and industry.
This volume, LNCS 3961, contains the papers selected from those presented at the International Conference on Information Networking 2006 (ICOIN 2006), held in Sendai, Japan.
Since 1993, PROPOR Workshops have become an important forum for - searchers involved in the Computational Processing of Portuguese,both written and spoken.
This volume contains the papers and posters selected for presentation at the First European Conference on Smart Sensing and Context (EuroSSC 2006) in Enschede, The Netherlands.
th This volume presents the proceedings of the 6 IEEE International Workshop on IP Operations and Management (IPOM 2006), which was held as part of Manweek 2006 rd th in Dublin, Ireland from October 23 to 25 , 2006.
Delegates and friends, we are very pleased to extend to you the sincerest of welcomes to this, the 10th International Conference on Knowledge Based and Intelligent Information and Engineering Systems at the Bournemouth International Centre in Bournemouth, UK, brought to you by KES International.
Delegates and friends, we are very pleased to extend to you the sincerest of welcomes to this, the 10th International Conference on Knowledge Based and Intelligent Information and Engineering Systems at the Bournemouth International Centre in Bournemouth, UK, brought to you by KES International.
TheWebisaliveenvironmentthatmanagesanddrivesawidespectrumofapp- cations in which a user may interact with a company, a governmental authority, a non-governmental organization or other non-pro?
This volume of Lecture Notes in Computer Science contains all accepted papers th of the 5 International Conference on Innovative Internet Community Systems 2 (I CS), which was held at the Sorbonne in Paris, from June 20-22, 2005.
In recent years applied cryptography has developed considerably to satisfy the - creasing security requirements of various information technology disciplines, such as telecommunications, networking, database systems, mobile applications and others.
The autonomic communication paradigm has been defined mainly through the Autonomic Communications Forum (ACF) and particularly as follows: Autonomic communication is centered on selfware - an innovative approach to perform known and emerging tasks of a network control plane, both end-to-end and middle box communication-based.