The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense.
This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012.
This book constitutes the refereed proceedings of the 4th International Conference on Social Robotics, ICSR 2012, held in Chengdu, China, in October 2012.
This book constitutes the refereed proceedings of the Third International Symposium on Information Management in a Changing World, IMCW 2012, held in Ankara, Turkey, in September 2012.
This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012.
This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St.
This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012.
This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, held in Amsterdam, The Netherlands, in September 2012.
This book constitutes the refereed proceedings of the 5th International Symposium on Algorithmic Game Theory, SAGT 2012, held in Barcelona, Spain, in October 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, February 27-March 1, 2012.
This book constitutes the refereed proceedings of the 7th International Conference on Haptic and Audio Interaction Design, HAID 2012, held in Lund, Sweden, in August 2012.
This book constitutes the refereed proceedings of the 12 th International Symposium on Privacy Enhancing Technologies, PET 2012, held in Vigo, Spain, in July 2012.
The two-volume set LNCS 7382 and 7383 constiutes the refereed proceedings of the 13th International Conference on Computers Helping People with Special Needs, ICCHP 2012, held in Linz, Austria, in July 2012.
The two-volume set LNCS 7382 and 7383 constiutes the refereed proceedings of the 13th International Conference on Computers Helping People with Special Needs, ICCHP 2012, held in Linz, Austria, in July 2012.
This book constitutes the refereed proceedings of the 6th KES International Conference on Agent and Multi-Agent Systems, KES-AMSTA 2012, held in Dubrovnik, Croatia, in June 2012.
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012.
This book constitutes the thoroughly refereed proceedings of the First International Workshop on the Theory and Applications of Formal Argumentation, TAFA 2011, held in Barcelona, Spain, in Juli 2011, as a workshop at IJCAI 2011, the 22nd International Joint Conference on Artificial Intelligence.
This book comprises selected papers of the International Conferences, SecTech 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011.
The two-volume set LNCS 7031 and 7032 constitutes the proceedings of the 10th International Semantic Web Conference, ISWC 2011, held in Bonn, Germany, in October 2011.
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense.
The two-volume set LNCS 7031 and LNCS 7032 constitutes the proceedings of the 10th International Semantic Web Conference, ISWC 2011, held in Bonn, Germany, in October 2011.
This book constitutes the refereed proceedings of the Fourth International Symposium on Algorithmic Game Theory, SAGT 2011, held in Amalfi, Italy, in October 2011.
This book constitutes the refereed proceedings of the 16th European Symposium on Computer Security, ESORICS 2011, held in Leuven, Belgium, in September 2011.
This book constitutes the refereed proceedings of the 10th International Conference, EGOV 2011, held in Delft, The Netherlands, in August/September 2011.
This book constitutes the refereed proceedings of the 4th International Conference on Online Communities and Social Computing, OCSC 2011, held in Orlando, FL, USA in July 2011 in the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011 with 10 other thematically similar conferences.
The two-volume set LNCS 6769 + LNCS 6770 constitutes the proceedings of the First International Conference on Design, User Experience, and Usability, DUXU 2011, held in Orlando, FL, USA in July 2011 in the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011, incorporating 12 thematically similar conferences.
The two-volume set LNCS 6769 + LNCS 6770 constitutes the proceedings of the First International Conference on Design, User Experience, and Usability, DUXU 2011, held in Orlando, FL, USA in July 2011 in the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011, incorporating 12 thematically similar conferences.
This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switzerland, in June 2011.
This book constitutes the thoroughly reviewed joint postprocessings of two international workshops on Coordination, Organization, Institutions and Norms in Agent Systems, COIN@AAMAS 2010, held in Toronto, Canada in May 2010 and COIN@MALLOW 2010, held in Lyon, France in August 2010.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010.
This book constitutes the postproceedings of the First International Conference on Energy-Efficient Computing and Networking, E-Energy, held in Passau, Germany in April 2010.
The two-volume set LNCS 6496 and 6497 constitutes the refereed proceedings of the 9th International Semantic Web Conference, ISWC 2010, held in Shanghai, China, during November 7-11, 2010.
Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) - two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010).
BlogTalk, the International Conference on Social Software, brings together different groups of people using and advancing the Internet and its usage: technical and conceptual developers, researchers with interdisciplinary backgrounds, and practitioners alike.
The annual International Conference on Global Security, Safety and Sustainability (ICGS3) is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between acad- ics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe.