The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2011, held in Lisbon, Portugal, in September 2011.
The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2011, held in Lisbon, Portugal, in September 2011.
The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2011, held in Lisbon, Portugal, in September 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, held in Shanghai, China, in November 2010.
This book constitutes the refereed proceedings of the 8th International Conference on Ubiquitous Intelligence and Computing, UIC 2010, held in Banff, Canada, September 2011.
This book constitutes the joint thoroughly refereed post-proceedings of The Modeling Social Media Workshop, MSM 2010 held in Toronto, Canada in June 2010 and the International Workshop on Mining Ubiquitous and Social Environments, MUSE 2010, held in Barcelona, Spain in September 2010.
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference, eHealth 2010, held in Casablanca, Morocco, in December 2010.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Sensor Systems and Software, S-Cube 2010, held in Miami, Florida, USA, in December 2010.
This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle,WA, USA in September 2, 2011 as a satellite workshop of the VLDB 2011 Conference .
This book constitutes the refereed proceedings of the 13th International Conference on Data Warehousing and Knowledge Discovery, DaWak 2011 held in Toulouse, France in August/September 2011.
This book constitutes the refereed proceedings of the Third International Conference on Electronic Participation, ePart 2011, held in Delft, The Netherlands, in August/September 2011.
This four-volume-set (CCIS 208, 209, 210, 211) constitutes the refereed proceedings of the International Symposium on Applied Economics, Business and Development, ISAEBD 2011, held in Dalian, China, in August 2011.
This four-volume-set (CCIS 208, 209, 210, 211) constitutes the refereed proceedings of the International Symposium on Applied Economics, Business and Development, ISAEBD 2011, held in Dalian, China, in August 2011.
This four-volume-set (CCIS 208, 209, 210, 211) constitutes the refereed proceedings of the International Symposium on Applied Economics, Business and Development, ISAEBD 2011, held in Dalian, China, in August 2011.
This book constitutes the refereed proceedings of the 6th International Workshop on Haptic and Audio Interaction Design, HAID 2011 held in Kusatsu, Japan, in August 2011.
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011, held in Toulouse, France, in August/September 2011 in conjunction with DEXA 2011.
This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in Athens, Greece, in September 2010.
This book constitutes the refereed proceedings of the 5th KES International Conference on Agent and Multi-Agent Systems, KES-AMSTA 2011, held in Manchester, UK, in June/July 2011.
This book constitutes the refereed proceedings of the 12 International Conference on Product-Focused Software Process Improvement, PROFES 2011, held in Torre Canne, Italy, in June 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010.
This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011.
This book constitutes the refereed proceedings of the 16th International Conference on Applications of Natural Language to Information Systems, held in Alicante, Spain, in June 2011.
This book constitutes the thoroughly refereed post-conferenceproceedings of the first two international workshops on computationalmodels of collaboration in distributed systems: CARE 2009, held assatellite event of the 22nd Australasian Joint Conference on ArtificialIntelligence AI09 in Melbourne, Australia, in December 2009 and CARE2010, held in conjunction with the International Conference onIntelligent Agent Technology (IAT) in Toronto, Canada, in August 2010.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2011, held in Beijing, China, in July 2011.
This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010.
This book constitutes the refereed proceedings of the Third International Workshop on Ambient Assisted Living, IWAAL 2011, held in Torremolinos-Malaga, Spain, in June 2011 as a satellite event of IWANN 2011, the International Work-Conference on Artificial and Natural Neural Networks.
This book constitutes the refereed proceedings of the International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning, PSDML 2010, held in Barcelona, Spain, in September 2010.
This book constitutes the refereed proceedings of the 11th International Conference on Software Process Improvement and Capability Determination, SPICE 2011, held in Dublin, Ireland, in May/June 2011.
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
This book constitutes the thoroughly refereed post-workshop proceedingsof the 9th International Conference on Web-Based Learning, ICWL 2010,held in Shanghai, China, in December 2010.
This book constitutes the refereed proceedings of the 17th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2011, held in Essen, Germany, in March 2011.
This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security, held in Amsterdam, The Netherlands, in May 2011.
This book constitutes the refereed proceedings of the InternationalConference on Advances in Information Technology and MobileCommunication, AIM 2011, held at Nagpur, India, in April 2011.
This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Wireless and Mobile Communication in Healthcare, MobiHealth 2010, held in Ayia Napa, Cyprus, in October 2010.
This book constitutes the reviewed post-proceedings of the 5th International ICST Conference on Access Networks, AccessNets 2010, and of the satellite event , the First International ICST Workshop on Autonomic Networking and Self-Management in Access Networks, SELFMAGICNETS 2010, held jointly in Budapest, Hungary in November 2010.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010.
This book constitutes the refereed proceedings of the 4th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, held in College Park, MD, USA, March 29-31, 2011.
This book constitutes the refereed proceedings of the 12th International Conference on Passive and Active Measurement, PAM 2011, held in Atlanta, GA, USA, in March 2011.
This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2010, held October 4-6, 2010 in Abu Dhabi, United Arab Emirates.
This book constitutes the refereed proceedings of the First International Workshop on Human-Computer Interaction, Tourism and Cultural Heritage, HCITOCH 2010, held in Brescello, Italy, in September 2010.