This book constitutes the refereed proceedings of the SecondInternational Conference on Internet of Vehicles, IOV 2015, held inChengdu, China, in December 2015.
This book constitutes the refereed proceedings of the 6thInternational Conference on E-Democracy, E-Democracy 2015, held in Athens,Greece, in December 2015.
This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China.
This book constitutes the refereed proceedings of the 16th International Conference on Product-Focused Software Process Improvement, PROFES 2015, held in Bolzano, Italy, in December 2015.
This volume constitutes the refereed proceedings of the 8th International Conference on Multimedia Communications, Services and Security, MCSS 2015, held in Krakow, Poland, in November 2015.
This book constitutes the refereed proceedings of the 9th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2015, held in Puerto Varas, Chile, in December 2015.
This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015.
This book constitutes the refereed proceedings of the 12th European Conference on Ambient Intelligence, AmI 2015, held in Athens, Greece, in November 2015.
This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2015, held Catania, Italy, in October 2015.
Theinformation infrastructure---comprising computers, embedded devices, networksand software systems---is vital to day-to-day operations in every sector:information and telecommunications, banking and finance, energy, chemicals andhazardous materials, agriculture, food, water, public health, emergencyservices, transportation, postal and shipping, government and defense.
This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015.
This book constitutes the refereed proceedings of the 7th International Conference on Social Robotics, ICSR 2015, held in Paris, France, in October 2015.
This book constitutes the refereed proceedings of the 7th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2015, held in Seoul, South Korea, in October 2015.
This book constitutes the refereed proceedings of the 8th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2015, held in Ljubljana, Slovenia, in September/October 2015.
This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015.
This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015.
This book constitutes the proceedings of the 15th International Conference on Transport Systems Telematics, TST 2015, held in Wroclaw, Poland, in April 2015.
This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on Availability, Reliability and Security, and the 9th IFIP WG 8.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014.
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.
This book constitutes the refereed proceedings of the 8th International Workshop on Multiple Access Communications, MACOM 2015, held in Helsinki, Finland, in September 2015.
This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015.
This book constitutes the refereed proceedings of the 10th International Conference on Global Security, Safety and Sustainability, ICGS3 2015, held in London, UK, in September 2015.
This book constitutes the refereed proceedings of seven workshops held at the 18th International Conference on Image Analysis and Processing, ICIAP 2015, in Genoa, Italy, in September 2015: International Workshop on Recent Advances in Digital Security: Biometrics and Forensics, BioFor 2015; International Workshop on Color in Texture and Material Recognition, CTMR 2015; International Workshop on Medical Imaging in Rheumatology: Advanced applications for the analysis of in ammation and damage in the rheumatoid Joint, RHEUMA 2015; International Workshop on Image-Based Smart City Application, ISCA 2015; International Workshop on Multimedia Assisted Dietary Management, MADiMa 2015; International Workshop on Scene Background Modeling and initialization, SBMI 2015; and International Workshop on Image and Video Processing for Quality of Multimedia Experience, QoEM 2015.
This book constitutes the refereed proceedings of the 12th International Conference on Mobile Web and Intelligent Information Systems, MobiWIS 2015, held in Rome, Italy, in August 2015.
This book constitutes the proceedings of the 13th International Conference on Business Process Management, BPM 2015, held in Innsbruck, Austria, in August/September 2015.
This book constitutes the refereed proceedings of the Third International Conference on Games and Learning Alliance, GALA 2014, held in Bucharest, Romania, in July 2014.
This book constitutes the revised selected papers of the 12th International Conference on Service-Oriented Computing, ICSOC 2014, held in Paris, France, in November 2014.
This three volume set LNAI 9244, 9245, and 9246 constitutes the refereed proceedings of the 8th International Conference on Intelligent Robotics and Applications, ICIRA 2015, held in Portsmouth, UK, in August 2015.
This three volume set LNAI 9244, 9245, and 9246 constitutes the refereed proceedings of the 8th International Conference on Intelligent Robotics and Applications, ICIRA 2015, held in Portsmouth, UK, in August 2015.
This three volume set LNAI 9244, 9245, and 9246 constitutes the refereed proceedings of the 8th International Conference on Intelligent Robotics and Applications, ICIRA 2015, held in Portsmouth, UK, in August 2015.
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015.
This book constitutes the refereed proceedings of the 21st International Conference on Collaboration and Technology, CRIWG 2015, held in Yerevan, Armenia, in September 2015.
The four-volume set LNCS 9296-9299 constitutes the refereed proceedings of the 15th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT 2015, held in Bamberg, Germany, in September 2015.
This book constitutes the refereed proceedings of the 4th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2015, held in Valencia, Spain, in September 2015, in conjunction with DEXA 2015.
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on E-Voting and Identity, VoteID 2015, held in Bern, Switzerland, in September 2015.
This book constitutes the proceedings of the 4th International Conference on Cryptology and Information Security in Latin America, LatinCrypt 2015, held in Guadalajara, Mexico, in August 2015.
This book constitutes the proceedings of the 15th International Conference on Intelligent Virtual Agents, IVA 2015, held in Delft, The Netherlands, in August 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014.
This book will help researchers and engineers in the design of ethical systems for robots, addressing the philosophical questions that arise and exploring modern applications such as assistive robots and self-driving cars.