The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica from February 28 to March 3, 2005.
We will be, sooner or later, not only handling personal computers but also mul- purpose cellular phones, complex personal digital assistants, devices that will be context-aware, and even wearable computers stitched to our clothes.
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach.
This volume contains the proceedings of the 3rd International Conference on Business Process Management (BPM 2005), organized by LORIA in Nancy, France, September 5-8, 2005.
The International Conference on Networking (ICN 2005) was the fourth conf- ence in its series aimed at stimulating technical exchange in the emerging and important ?
As its name suggests, the EHCI-DSVIS conference has been a special event, merging two different, although overlapping, research communities: EHCI (Engineering for Human-Computer Interaction) is a conference organized by the IFIP 2.
Digital cities constitutes a multidisciplinary field of research and development, where researchers, designers and developers of communityware interact and collaborate with social scientists studying the use and effects of these kinds of infrastructures and systems in their local application context.
This volume contains papers selected for presentation at the 7th Asia Pacific Conference on Web Technology (APWeb 2005), which was held in Shanghai, China during March 29-April 1, 2005.
The challenge faced in today's manufacturing and business environments is the question of how to satisfy increasingly stringent customer requirements while managing growing system complexity.
On behalf of the Program Committee, it is our pleasure to present the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took place in Seattle, Washington, USA, September 7-9, 2005.
Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005.
On behalf of the PROFES Organizing Committee we are proud to present to you the proceedings of the 6th International Conference on Product Focused Software Process Improvement (PROFES 2005), held in Oulu, Finland.
Peer-to-peer (P2P) computing is attracting enormous media attention, spurred by the popularity of file sharing systems such as Napster, Gnutella, and Morpheus.
The Industrial Conference on Data Mining ICDM-Leipzig was the fourth meeting in a series of annual events which started in 2000, organized by the Institute of Computer Vision and Applied Computer Sciences (IBaI) in Leipzig.
Blender 2D Animation: The Complete Guide to the Grease Pencil, Second Edition describes how to access the Grease Pencil component in Blender and create 2D animation within the Blender 3D environment.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Global Security, Safety, and Sustainability (ICDS3), and of the 4th e-Democracy Joint Conferences (e-Democracy 2011) which were held in Thessaloniki in August 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Personal Satellite Services, PSATS 2010, held in Rome, Italy, Februray 2010.
This book introduces a comprehensive model for evaluating the effects of artificial intelligence (AI) on human rights, democracy, and the rule of law and an innovative framework that merges Human Rights Impact Assessments (HRIAs) practices with AI-focused algorithmic impact assessment approaches.
This book introduces a comprehensive model for evaluating the effects of artificial intelligence (AI) on human rights, democracy, and the rule of law and an innovative framework that merges Human Rights Impact Assessments (HRIAs) practices with AI-focused algorithmic impact assessment approaches.
Collaborative Networks for a Sustainable World Aiming to reach a sustainable world calls for a wider collaboration among multiple stakeholders from different origins, as the changes needed for sustainability exceed the capacity and capability of any individual actor.
This book constitutes the joint thoroughly refereed post-proceedings of the Second International Workshop on Modeling Social Media, MSM 2011, held in Boston, MA, USA, in October 2011, and the Second International Workshop on Mining Ubiquitous and Social Environments, MUSE 2011, held in Athens, Greece, in September 2011.
This book constitutes the refereed proceedings of the Second IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-Eur Asia 2014, with the collocation of Asia ARES 2014 as a special track on Availability, Reliability and Security, held in Bali, Indonesia, in April 2014.