This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011.
This book constitutes the refereed proceedings of the 16th International Conference on Applications of Natural Language to Information Systems, held in Alicante, Spain, in June 2011.
This book constitutes the thoroughly refereed post-conferenceproceedings of the first two international workshops on computationalmodels of collaboration in distributed systems: CARE 2009, held assatellite event of the 22nd Australasian Joint Conference on ArtificialIntelligence AI09 in Melbourne, Australia, in December 2009 and CARE2010, held in conjunction with the International Conference onIntelligent Agent Technology (IAT) in Toronto, Canada, in August 2010.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2011, held in Beijing, China, in July 2011.
This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010.
This book constitutes the refereed proceedings of the Third International Workshop on Ambient Assisted Living, IWAAL 2011, held in Torremolinos-Malaga, Spain, in June 2011 as a satellite event of IWANN 2011, the International Work-Conference on Artificial and Natural Neural Networks.
This book constitutes the refereed proceedings of the International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning, PSDML 2010, held in Barcelona, Spain, in September 2010.
This book constitutes the refereed proceedings of the 11th International Conference on Software Process Improvement and Capability Determination, SPICE 2011, held in Dublin, Ireland, in May/June 2011.
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
This book constitutes the thoroughly refereed post-workshop proceedingsof the 9th International Conference on Web-Based Learning, ICWL 2010,held in Shanghai, China, in December 2010.
This book constitutes the refereed proceedings of the 17th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2011, held in Essen, Germany, in March 2011.
This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security, held in Amsterdam, The Netherlands, in May 2011.
This book constitutes the refereed proceedings of the InternationalConference on Advances in Information Technology and MobileCommunication, AIM 2011, held at Nagpur, India, in April 2011.
This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Wireless and Mobile Communication in Healthcare, MobiHealth 2010, held in Ayia Napa, Cyprus, in October 2010.
This book constitutes the reviewed post-proceedings of the 5th International ICST Conference on Access Networks, AccessNets 2010, and of the satellite event , the First International ICST Workshop on Autonomic Networking and Self-Management in Access Networks, SELFMAGICNETS 2010, held jointly in Budapest, Hungary in November 2010.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010.
This book constitutes the refereed proceedings of the 4th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, held in College Park, MD, USA, March 29-31, 2011.
This book constitutes the refereed proceedings of the 12th International Conference on Passive and Active Measurement, PAM 2011, held in Atlanta, GA, USA, in March 2011.
This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2010, held October 4-6, 2010 in Abu Dhabi, United Arab Emirates.
This book constitutes the refereed proceedings of the First International Workshop on Human-Computer Interaction, Tourism and Cultural Heritage, HCITOCH 2010, held in Brescello, Italy, in September 2010.
This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010.
This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007.
The 7 revised full papers, 11 revised medium-length papers, 6 revised short, and 7 demo papers presented together with 10 poster/abstract papers describing late-breaking work were carefully reviewed and selected from numerous submissions.
Ubiquitous sensors, devices, networks and information are paving the way toward a smart world in which computational intelligence is distributed throughout the physical environment to provide reliable and relevant services to people.
The International Conference on E-business Technology & Strategy (CETS) provides a peer-reviewed forum for researchers from across the globe to share contemporary research on developments in the fields of e-business, information technology and business strategy.
It is a great pleasure to share with you the Springer CCIS 111 proceedings of the Third World Summit on the Knowledge Society--WSKS 2010--that was organized by the International Scientific Council for the Knowledge Society, and supported by the Open Research Society, NGO, (http://www.
In a world supported by Ambient Intelligence (AmI), various devices embedded in the environment collectively use the distributed information and the intelligence inherent in this interconnected environment.
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010.
This book presents the proceedings of the 7th International Conference on Trust, P- vacy and Security in Digital Business (TrustBus 2010), held in Bilbao, Spain during August 30-31, 2010.