This book constitutes the refereed proceedings of the 5th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, held in College Park, MD, USA, in April 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference, eHealth 2011, held in Malaga, Spain, in November 2011.
This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011.
This book constitutes the refereed proceedings of the 13th International Conference on Passive and Active Measurement, PAM 2012, held in Vienna, Austria, in March 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known as ARSPA-WITS), TOSCA 2011, held in Saarbrucken, Germany, in March/April 2011, in association with ETAPS 2011.
This book constitutes the thoroughly refereed post-workshop proceedings of 5 workshops, held at the 10th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2011, in Taipei, Taiwan, May 2-6, 2011.
This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 12th International Middleware Conference, held in Lisbon, Portugal, in December 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC 2011, held in Gros Islet, St.
This book constitutes the refereed proceedings of the Third International Conference on Social Robotics, ICSR 2011, held in Amsterdam, The Netherlands, in November 2011.
This book constitutes the refereed proceedings of the Second International Joint Conference on Ambient Intelligence, AmI 2011, held in Amsterdam, The Netherlands, in November 2011.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011.
This book constitutes selected papers from the lectures given at the workshops held in conjunction with the User Modeling, Adaptation and Personalization Conference, UMAP 2011, Girona, Spain, in July 2011.
This book constitutes the refereed proceedings of the 5th International Conference on Informatics in Schools: Situation, Evolution and Perspectives, ISSEP 2011, held in Bratislava, Slovakia, in October 2011.
This book constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2011, held in Naples, Italy, in September 2011.
This book constitutes the proceedings of the Second International Conference on Security-Enriched Urban Computing and Smart Grid, held in Hualien, Taiwan, in September 2011.
This book constitutes the refereed proceedings of the 8th International Conference on Cooperative Design, Visualization, and Engineering, CDVE 2011, held in Hong Kong, China, in September 2011.
The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2011, held in Lisbon, Portugal, in September 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOM 2010, held in Cape Town, South Africa, in November 2010.
This book constitutes the proceedings of the 17th Collaboration Researchers' International Working Group Conference on Collaboration and Technology, held in Paraty, Brazil, in October 2011.
The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2011, held in Lisbon, Portugal, in September 2011.
The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2011, held in Lisbon, Portugal, in September 2011.
The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2011, held in Lisbon, Portugal, in September 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, held in Shanghai, China, in November 2010.
This book constitutes the refereed proceedings of the 8th International Conference on Ubiquitous Intelligence and Computing, UIC 2010, held in Banff, Canada, September 2011.
This book constitutes the joint thoroughly refereed post-proceedings of The Modeling Social Media Workshop, MSM 2010 held in Toronto, Canada in June 2010 and the International Workshop on Mining Ubiquitous and Social Environments, MUSE 2010, held in Barcelona, Spain in September 2010.
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference, eHealth 2010, held in Casablanca, Morocco, in December 2010.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Sensor Systems and Software, S-Cube 2010, held in Miami, Florida, USA, in December 2010.
This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle,WA, USA in September 2, 2011 as a satellite workshop of the VLDB 2011 Conference .
This book constitutes the refereed proceedings of the 13th International Conference on Data Warehousing and Knowledge Discovery, DaWak 2011 held in Toulouse, France in August/September 2011.
This book constitutes the refereed proceedings of the Third International Conference on Electronic Participation, ePart 2011, held in Delft, The Netherlands, in August/September 2011.
This four-volume-set (CCIS 208, 209, 210, 211) constitutes the refereed proceedings of the International Symposium on Applied Economics, Business and Development, ISAEBD 2011, held in Dalian, China, in August 2011.
This four-volume-set (CCIS 208, 209, 210, 211) constitutes the refereed proceedings of the International Symposium on Applied Economics, Business and Development, ISAEBD 2011, held in Dalian, China, in August 2011.
This four-volume-set (CCIS 208, 209, 210, 211) constitutes the refereed proceedings of the International Symposium on Applied Economics, Business and Development, ISAEBD 2011, held in Dalian, China, in August 2011.
This book constitutes the refereed proceedings of the 6th International Workshop on Haptic and Audio Interaction Design, HAID 2011 held in Kusatsu, Japan, in August 2011.
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011, held in Toulouse, France, in August/September 2011 in conjunction with DEXA 2011.
This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in Athens, Greece, in September 2010.
This book constitutes the refereed proceedings of the 5th KES International Conference on Agent and Multi-Agent Systems, KES-AMSTA 2011, held in Manchester, UK, in June/July 2011.
This book constitutes the refereed proceedings of the 12 International Conference on Product-Focused Software Process Improvement, PROFES 2011, held in Torre Canne, Italy, in June 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010.