Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications.
SEAFOOD for Thought Headline-grabbing though it may be, the software industry's large-scale allo- tion of work to developing countries has not so far generated much technical analysis.
The Ubiquitous Computing conference series provides the premier forum in which to present original research results in all areas relating to the design, implementation, app- cation and evaluation of ubiquitous computing technologies.
This book constitutes the refereed proceedings of the 5th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2008, held in Trondheim, Norway, in June 2008.
On behalf of the PROFES Organizing Committee, we are proud to present to you the proceedings of the 9th International Conference on Product-Focused Software Process Improvement (PROFES 2008) held in Frascati - Monteporzio Catone, Rome, Italy.
This volume contains the proceedings of UIC 2008, the 5th International C- ference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces.
The Eight International Conference on Product-Focused Software Process Impro- ment (PROFES 2007) brought together researchers and industrial practitioners to report new research results and exchange experiences and findings in the area of process and product improvement.
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008.
This book constitutes the refereed proceedings of the 6th International Conference on Human Haptic Sensing and Touch Enabled Computer Applications, EuroHaptics 2008, held in Madrid, Spain, in June 2008.
This volume contains the proceedings of the 4th International Conference on Service- Oriented Computing (ICSOC 2006), which took place in Chicago, USA, December 4-7, 2006.
As the variety and complexity of interactive systems increase, understanding how a system can dynamically capture relevant user needs and traits, and - tomatically adapting its interaction to this information, has become critical for devising e?
It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4-7, 2006.
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences.
With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
The 2007 NSF BioSurveillance Workshop (BioSurveillance 2007) was built on the success of the first NSF BioSurveillance Workshop, hosted by the University of Arizona's NSF BioPortal Center in March 2006.
The papers in this volume were presented at TMRA 2006, the International Conference on Topic Maps Research and Applications, held October 11-12, 2006, in Leipzig, Germany.
Delegates and friends, we are very pleased to extend to you the sincerest of welcomes to this, the 10th International Conference on Knowledge Based and Intelligent Information and Engineering Systems at the Bournemouth International Centre in Bournemouth, UK, brought to you by KES International.
ItwasourpleasuretoholdtheInternationalWorkshoponSecurity2006(IWSEC 2006) this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series.
th This volume presents the proceedings of the 17 IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM 2006), which was held rd th in Dublin, Ireland during October 23 to 25 , 2006.
th We are delighted to present the proceedings of the 9 Asia-Pacific Network Operations and Management Symposium (APNOM S2006) which was held in Busan, Korea, on September 27-29, 2006.