This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for Computer Network - curity (MMM-ACNS 2005) held in St.
This volume contains the proceedings of the Third International Conference on Service-Oriented Computing (ICSOC 2005), that took place in Amsterdam, The Netherlands, December 12-15, 2005.
This book constitutes the refereed proceedings of the 5th International Conference on Audio- and Video-Based Biometric Person Authentication, AVBPA 2005, held in Hilton Rye Town, NY, USA, in July 2005.
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA).
Welcome to the proceedings of the 2005 IFIP International Conference on - bedded and Ubiquitous Computing (EUC 2005), which was held in Nagasaki, Japan, December 6-9, 2005.
The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica from February 28 to March 3, 2005.
We will be, sooner or later, not only handling personal computers but also mul- purpose cellular phones, complex personal digital assistants, devices that will be context-aware, and even wearable computers stitched to our clothes.
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach.
This volume contains the proceedings of the 3rd International Conference on Business Process Management (BPM 2005), organized by LORIA in Nancy, France, September 5-8, 2005.
The International Conference on Networking (ICN 2005) was the fourth conf- ence in its series aimed at stimulating technical exchange in the emerging and important ?
As its name suggests, the EHCI-DSVIS conference has been a special event, merging two different, although overlapping, research communities: EHCI (Engineering for Human-Computer Interaction) is a conference organized by the IFIP 2.
Digital cities constitutes a multidisciplinary field of research and development, where researchers, designers and developers of communityware interact and collaborate with social scientists studying the use and effects of these kinds of infrastructures and systems in their local application context.
This volume contains papers selected for presentation at the 7th Asia Pacific Conference on Web Technology (APWeb 2005), which was held in Shanghai, China during March 29-April 1, 2005.
On behalf of the Program Committee, it is our pleasure to present the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took place in Seattle, Washington, USA, September 7-9, 2005.
Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005.
On behalf of the PROFES Organizing Committee we are proud to present to you the proceedings of the 6th International Conference on Product Focused Software Process Improvement (PROFES 2005), held in Oulu, Finland.
Peer-to-peer (P2P) computing is attracting enormous media attention, spurred by the popularity of file sharing systems such as Napster, Gnutella, and Morpheus.
The Industrial Conference on Data Mining ICDM-Leipzig was the fourth meeting in a series of annual events which started in 2000, organized by the Institute of Computer Vision and Applied Computer Sciences (IBaI) in Leipzig.
This book provides a multi-disciplinary understanding of pathways into and out of youth cybercrime, and evidence-led ways to tackle the cybercrime epidemic, drawing on theoretical perspectives and insights from the largest European H2020 study of youth cybercrime undertaken to date.
This book provides a multi-disciplinary understanding of pathways into and out of youth cybercrime, and evidence-led ways to tackle the cybercrime epidemic, drawing on theoretical perspectives and insights from the largest European H2020 study of youth cybercrime undertaken to date.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Global Security, Safety, and Sustainability (ICDS3), and of the 4th e-Democracy Joint Conferences (e-Democracy 2011) which were held in Thessaloniki in August 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Personal Satellite Services, PSATS 2010, held in Rome, Italy, Februray 2010.
Collaborative Networks for a Sustainable World Aiming to reach a sustainable world calls for a wider collaboration among multiple stakeholders from different origins, as the changes needed for sustainability exceed the capacity and capability of any individual actor.
This book constitutes the joint thoroughly refereed post-proceedings of the Second International Workshop on Modeling Social Media, MSM 2011, held in Boston, MA, USA, in October 2011, and the Second International Workshop on Mining Ubiquitous and Social Environments, MUSE 2011, held in Athens, Greece, in September 2011.
This book constitutes the refereed proceedings of the Second IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-Eur Asia 2014, with the collocation of Asia ARES 2014 as a special track on Availability, Reliability and Security, held in Bali, Indonesia, in April 2014.
This is the first of a two-volume set (CCIS 373 and CCIS 374) that constitutes the extended abstracts of the posters presented during the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA, in July 2013, jointly with 12 other thematically similar conferences.
In einer Welt, in der immer mehr Fake News verbreitet werden, wird es zunehmend schwieriger, Wahrheit und Lüge, Wissen und Meinung auseinanderzuhalten.
In einer Welt, in der immer mehr Fake News verbreitet werden, wird es zunehmend schwieriger, Wahrheit und Lüge, Wissen und Meinung auseinanderzuhalten.
This book constitutes revised selected papers from the two International Workshops on Artificial Intelligence Approaches to the Complexity of Legal Systems, AICOL IV and AICOL V, held in 2013.