This book constitutes the refereed proceedings of the 12th International Conference on Passive and Active Measurement, PAM 2011, held in Atlanta, GA, USA, in March 2011.
This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2010, held October 4-6, 2010 in Abu Dhabi, United Arab Emirates.
This book constitutes the refereed proceedings of the First International Workshop on Human-Computer Interaction, Tourism and Cultural Heritage, HCITOCH 2010, held in Brescello, Italy, in September 2010.
This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010.
This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007.
The 7 revised full papers, 11 revised medium-length papers, 6 revised short, and 7 demo papers presented together with 10 poster/abstract papers describing late-breaking work were carefully reviewed and selected from numerous submissions.
Ubiquitous sensors, devices, networks and information are paving the way toward a smart world in which computational intelligence is distributed throughout the physical environment to provide reliable and relevant services to people.
The International Conference on E-business Technology & Strategy (CETS) provides a peer-reviewed forum for researchers from across the globe to share contemporary research on developments in the fields of e-business, information technology and business strategy.
It is a great pleasure to share with you the Springer CCIS 111 proceedings of the Third World Summit on the Knowledge Society--WSKS 2010--that was organized by the International Scientific Council for the Knowledge Society, and supported by the Open Research Society, NGO, (http://www.
In a world supported by Ambient Intelligence (AmI), various devices embedded in the environment collectively use the distributed information and the intelligence inherent in this interconnected environment.
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010.
This book presents the proceedings of the 7th International Conference on Trust, P- vacy and Security in Digital Business (TrustBus 2010), held in Bilbao, Spain during August 30-31, 2010.
The papers in this volume were the fruitful scientific results of the Second International Conference on Social Robotics (ICSR), held during November 23-24, 2010 in Singapore, which was jointly organized by the Social Robotics Laboratory (SRL), Interactive Digital Media Institute (IDMI), the National University of Singapore and 2 Human Language Technology Department, the Institute for Infocomm Research (I R), A*STAR, Singapore.
On behalf of the PROFES Organizing Committee we are proud to present the proce- th ings of the 11 International Conference on Product-Focused Software Process Improvement (PROFES 2010), held in Limerick, Ireland.
This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST), held at the Ritz-Carlton hotel in Berlin, Germany, June 21-23, 2010.
It is a great pleasure to share with you the Springer CCIS 112 proceedings of the Third World Summit on the Knowledge Society--WSKS 2010--that was organized by the International Scientific Council for the Knowledge Society, and supported by the Open Research Society, NGO, (http://www.
th I3E 2010 marked the 10 anniversary of the IFIP Conference on e-Business, e- Services, and e-Society, continuing a tradition that was invented in 1998 during the International Conference on Trends in Electronic Commerce, TrEC 1998, in Hamburg (Germany).
th The 15 International Conference on Applications of Natural Language to Information Systems (NLDB 2010) took place during June 23-25 in Cardiff (UK).
IBWAS 2009, the Iberic Conference on Web Applications Security, was the first international conference organized by both the OWASP Portuguese and Spanish ch- ters in order to join the international Web application security academic and industry communities to present and discuss the major aspects of Web applications security.
Computers and microprocessors are indispensable in modern technical systems, their deployment spanning the domains automotive, railway, aerospace, and transportation, security, energy supply, telecommunication, critical infrastructures and process ind- tries.
The past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security.
Recent developments in information and communication technology (ICT) have paved the way for a world of advanced communication, intelligent information processing and ubiquitous access to information and services.