This book constitutes the proceedings of the 18th Collaboration Researchers' International Working Group Conference on Collaboration and Technology, held in Raesfeld, Germany, in September 2012.
This book constitutes the revised selected papers of the 4th International Provenance and Annotation Workshop, IPAW 2012, held in Santa Barbara, CA, USA, in June 2012.
This book constitutes the proceedings of the 12th International Conference on Transport Systems Telematics, TST 2012, held in Katowice-Ustron, Poland, in October 2012.
The three volume set LNAI 7506, LNAI 7507 and LNAI 7508 constitutes the refereed proceedings of the 5th International Conference on Intelligent Robotics and Applications, ICIRA 2012, held in Montreal, Canada, in October 2012.
This book constitutes the refereed proceedings of the Joint Conference of the Interdisciplinary Research Group on Technology, Education, Communication, and the Scientific Network on Critical and Flexible Thinking, held in Ghent, Belgium, in October 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Workshop on Energy Efficient Data Centers (E2DC 2012) held in Madrid, Spain, in May 2012.
This book constitutes the refereed proceedings of the 31st International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2012, held in Magdeburg, Germany, in September 2012.
This book constitutes the refereed proceedings of 5 workshops co-located with SAFECOMP 2012, the 31st International Conference on Computer Safety, Reliability, and Security, held in Magdeburg, Germany, in September 2012.
This book constitutes the refereed proceedings of the 3rd International Conference on Serious Games Development and Applications, SGDA 2012, held in Bremen, Germany in September 2012.
The three volume set LNAI 7506, LNAI 7507 and LNAI 7508 constitutes the refereed proceedings of the 5th International Conference on Intelligent Robotics and Applications, ICIRA 2012, held in Montreal, Canada, in October 2012.
This book constitutes the refereed proceedings of the international competition aimed at the evaluation and assessment of Ambient Assisted Living (AAL) systems and services, EvAAL 2011, which was organized in two major events, the Competition in Valencia, Spain, in July 2011, and the Final workshop in Lecce, Italy, in September 2011.
The three volume set LNAI 7506, LNAI 7507 and LNAI 7508 constitutes the refereed proceedings of the 5th International Conference on Intelligent Robotics and Applications, ICIRA 2012, held in Montreal, Canada, in October 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Joint Conference on Green Communication and Networking (GreeNets 2011), held in Colmar, France, on October 5-7, 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2012) held in Frankfurt/Main, Germany, in June 2012.
This book constitutes the refereed proceedings of the Second International Workshop on Human-Computer Interaction, Tourism and Cultural Heritage, HCITOCH 2011, held in Cordoba, Argentina, in September 2011.
This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Tallinn, Estonia, in September 2011.
This book constitutes the refereed proceedings of the Joint International Conference on Electronic Government and the Information Systems Perspective, and Electronic Democracy, EGOVIS/EDEM 2012, held in Vienna, Austria, in September 2012, in conjunction with DEXA 2012.
This book constitutes the refereed proceedings of the 4th International Conference on Well-Being in the Information Society, WIS 2012, held in Turku, Finland, in August 2012.
This book constitutes the refereed proceedings of the 9th International Conference on Cooperative Design, Visualization, and Engineering, CDVE 2012, held in Osaka, Japan, in September 2012.
This book constitutes the refereed proceedings of the 5th International Conference on Hybrid Learning, ICHL 2012, held in Guangzhou, China, in August 2012.
This book constitutes the proceedings of the 10th International Conference on Business Process Management, BPM 2012, held in Tallinn, Estonia, in September 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011.
This book and its companion volume, LNCS 7282 and 7283, constitute the refereed proceedings of the 8th International Conference, EuroHaptics 2012, held in Tampere, Finland, in June 2012.
This book and its companion volume, LNCS 7282 and 7283, constitute the refereed proceedings of the 8th International Conference, EuroHaptics 2012, held in Tampere, Finland, in June 2012.
This book constitutes the refereed proceedings of the 10th International Conference on Pervasive Computing, Pervasive 2012, held in Newcastle, UK, in June 2012.
This book constitutes the refereed proceedings of the 7th International Conference on Theory and Application of Diagrams, Diagrams 2012, held in Canaterbury, UK, in July 2012.
This book constitutes the proceedings of the 7th International Conference on Persuasive Technology, PERSUASIVE 2012, held in Linkoping, Sweden, in June 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST on Auctions, Market Mechanisms and Their Applications (AMMA 2011) held in New York, USA, August 22-23, 2011.
This book constitutes the refereed proceedings of the 13 International Conference on Product-Focused Software Process Improvement, PROFES 2012, held in Madrid, Spain, in June 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management.
This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Broadband Communications, Networks and Systems (BROADNETS 2010) held in October 2010 in Athens, Greece.
This book constitutes the refereed proceedings of the 12th International Conference on Software Process Improvement and Capability Determination, SPICE 2012, held in Palma de Mallorca, Spain, in May 2012.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2012).
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011) held in Aalborg, Denmark, in May 2011.
This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012, held in Darmstadt, Germany, May 2012.
This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St.
This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011.
This book constitutes the refereed proceedings of the 18th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2012, held in Essen, Germany, in March 2012.
This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2011, held in Zanzibar, Tansania, in November 2011.