This volume contains the proceedings of UIC 2009, the 6th International C- ference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces.
It is a great pleasure to share with you the Springer LNCS proceedings of the First World Summit on the Knowledge Society - WSKS 2008 that was organized by the Open Research Society, NGO, http://www.
This book constitutes the refereed proceedings of the 8th International Conference on Smart Card Research and Advanced Applications, CARDIS 2008, held in London, UK, in September 2008.
This book constitutes the proceedings of the 9th International Conference on Web Information Systems Engineering, WISE 2008, held in Auckland, New Zealand, in September 2008.
This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government, EGOV 2008, held in Torino, Italy, in August/September 2008 within the DEXA 2008 conference cluster.
With the rapid development of information technologies and the transition to next-generation networks, computer systems and in particular embedded s- tems are becoming more and more mobile and ubiquitous.
Many applications in government,airport, commercial, defense and law enfor- mentareashaveabasicneedforautomaticauthenticationofhumansbothlocally orremotelyonaroutinebasis.
st The 1 Workshop on Business Intelligence for the Real-Time Enterprise (BIRTE nd 2006) was held on September 11, 2006 in conjunction with the 32 International Conference on Very Large Data Bases (VLDB 2006) in Seoul, Korea.
Informatics Education - Supporting Computational Thinking contains papers presented at the Third International Conference on Informatics in Secondary Schools - Evolution and Perspective, ISSEP 2008, held in July 2008 in Torun, Poland.
This book constitutes the refereed proceedings of the 4th IEEE Tutorial and Research Workshop on Perception and Interactive Technologies for Speech-Based Systems, PIT 2008, held in Kloster Irsee, Germany, in June 2008.
Since its establishment in Hong Kong in 1998,the international Intelligent Data Engineering and Automated Learning (IDEAL) conference has become a r- erence for researchers in both theoretical and practical aspects of learning and information processing, data mining, retrieval and management, bioinformatics and bio-inspired models, agents and hybrid systems and ?
This book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Krakow, Poland, September 5-7, 2006.
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12-14, 2005 in Milan, Italy.
With SPLC 2005 we celebrated the formation of a new conference series, the International Software Product Line Conference (SPLC) which results from the "e;uni?
This three-volume set LNCS constitutes the proceedings of several Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, during June 2025.
A follow-up to the author's prescient bestseller, first published in 1982, that alerted the public to the likely impacts of information technologies and the emergence of a post-industrial society.
This book provides a comprehensive overview of cybersecurity management in ports, cybersecurity vulnerabilities, and managerial strategies to improve cyber resilience.
Enterprising the Internet has been a process over the past years and while this book does not set judgement, it does call for a moment of pause and reflection on the impact of these technologies to individuals.
This three-volume set LNCS constitutes the proceedings of several Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, during June 2025.
The book covers theoretical foundations on how LLMs can enhance learning, cognitive reinforcement, improving learning efficiency, and personalization in learning, applications across the curriculum, teacher training and support for LLM integration, using in assessment and evaluation, and measuring the impact and affordances of LLMs.
The text explains how explainable artificial intelligence impacts problem-solving and aims to provide practical suggestions across various emerging industries.
This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2–4, 2025.
This three-volume set LNCS constitutes the proceedings of several Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, during June 2025.
This book comprehensively covers designing and implementing misinformation intervention strategies and risk communication approaches for generative artificial intelligence (AI) technologies.
This book comprehensively covers designing and implementing misinformation intervention strategies and risk communication approaches for generative artificial intelligence (AI) technologies.
We are pleased to present the proceedings of the International Conference on Advanced Data Analytics and Computing (ICADAC) 2025, a premier platform that brings together researchers, scholars, and industry professionals to share their latest findings, technological advancements, and practical applications in the field of data analytics and intelligent computing.
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets.