On the way towards the Information Society, global networks such as the Internet, together with mobile computing, have made wide-area computing over virtual communities a reality.
This book constitutes the thoroughly refereed post-proceedings of the 4th International Information Hiding Workshop, IHW 2001, held in Pittsburgh, PA, USA, in April 2001.
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 7th Symposium on Recent Advances in Intrusion Detection (RAID 2004), which took place in Sophia-Antipolis, French Riviera, France, September 15-17, 2004.
We were very pleased to once again extend to the delegates and, we are pleased to th say, our friends the warmest of welcomes to the 8 International Conference on Knowledge-Based Intelligent Information and Engineering Systems at Wellington - stitute of Technology in Wellington, New Zealand.
This book constitutes the refereed proceedings of the Third International Software Product Line Conference, SPLC 2004, held in Boston, MA, USA in August/September 2004.
Driven by the need for a closer alignment of business and IT requirements, the role of business process models in the development of enterprise software systems has increased continuously.
Knowledge discovery and data mining have become areas of growing significance because of the recent increasing demand for KDD techniques, including those used in machine learning, databases, statistics, knowledge acquisition, data visualization, and high performance computing.
Welcome to the proceedings of the 2004 International Conference on Embedded and Ubiquitous Computing (EUC 2004) which was held in Aizu-Wakamatsu City, Japan, 25-27 August 2004.
Peer-to-peer (P2P) computing is currently attracting enormous public attention, spurred by the popularity of file-sharing systems such as Napster, Gnutella, and Morpheus.
PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, the International As- ciation for Cryptologic Research (www.
These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7-9 October 2002, in Noordwijkerhout, The Netherlands.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
Electronic Commerce, as a gamut of activities involving electronic transactions performed over a network via software that may be more or less autonomous, is an emerging reality.
The EGOV Conference Series intends to assess the state of the art in e-Gove- ment and to provide guidance for research and development in this fast-moving ?
On behalf of the PROFES organizing committee we are proud to present to you the proceedings of the 5th International Conference on Product Focused Software Process Improvement (PROFES 2004), held in Kansai Science City, Japan.
This volume brings together, through a peer-revision process, the advanced research results obtained by the European COST Action 2102: Cross-Modal Analysis of Verbal and Nonverbal Communication, primarily discussed for the first time at the Second COST 2102 International Training School on "e;Development of Multimodal Int- faces: Active Listening and Synchrony"e; held in Dublin, Ireland, March 23-27 2009.
In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs.
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Agent-Mediated Electronic Commerce, AMEC 2002, held in Bologna, Italy in July 2002 during the AAMAS 2002 conference.