This book Advances in Technology and Management contains 116 full length papers presented at the International Conference on Technology and Management, held on June 12-13, 2012, Jeju-Island, Korea.
This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference Mobile Lightweight Wireless Systems (MOBILIGHT 2011) held in Bilbao, Spain on May 9-10.
This book constitutes the refereed proceedings of the Turing Centenary Conference and the 8th Conference on Computability in Europe, CiE 2012, held in Cambridge, UK, in June 2012.
This book constitutes revised and selected papers of the 9th European Workshop on Reinforcement Learning, EWRL 2011, which took place in Athens, Greece in September 2011.
The two-volume set LNCS 7609 and 7610 constitutes the thoroughly refereed proceedings of the 5th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, held in Heraklion, Crete, Greece, in October 2012.
The two-volume set LNCS 7609 and 7610 constitutes the thoroughly refereed proceedings of the 5th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, held in Heraklion, Crete, Greece, in October 2012.
The book addresses a number of recent topics at the crossroad of philosophy and cognitive science, taking advantage of both the western and the eastern perspectives and conceptions that emerged and were discussed at the PCS2011 Conference recently held in Guangzhou.
This book constitutes the refereed proceedings of the 9th International Conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, CPAIOR 2012, held in Nantes, France, in May/June 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011.
This book constitutes thoroughly refereed post-conference proceedings ofthe workshops of the 17th International Conference on ParallelComputing, Euro-Par 2011, held in Bordeaux, France, in August 2011.
This book contains the extended and revised versions of eight of the ten full papers (out of 58 submissions) presented at the First International Symposium on Business Modeling and Software Design (BMSD 2011), held in Sofia, Bulgaria.
This book constitutes the refereed proceedings of the 18th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2012, held in Essen, Germany, in March 2012.
This book constitutes the refereed proceedings of the 9th International Conference on Theory and Applications of Models of Computation, TAMC 2012, held in Beijing, China, in May 2012.
This book constitutes thoroughly refereed post-conference proceedings of the workshops of the 17th International Conference on Parallel Computing, Euro-Par 2011, held in Bordeaux, France, in August 2011.
This book constitutes the refereed proceedings of the 16th Annual International Conference on Research in Computational Molecular Biology, RECOMB 2012, held in Barcelona, Spain, in April 2012.
This book contains thoroughly refereed and revised papers from the 8th International Andrei Ershov Memorial Conference on Perspectives of System Informatics, PSI 2011, held in Akademgorodok, Novosibirsk, Russia, in June/July 2011.
This book constitutes the refereed post-proceedings of the Joint International Semantic Technology Conference, JIST 2011, held in Hangzhou, China, in December 2011.
This book constitutes the refereed post-proceedings of the 8th International Workshop on Economics of Grids, Clouds, Systems, and Services, GECON 2011, held in Paphos, Cyprus, in December 2011.
This book presents a comprehensive documentation of the scientific outcome of satellite events held at the 14th International Conference on Model-Driven Engineering, Languages and Systems, MODELS 2011, held in Wellington, New Zealand, in October 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Software and Data Technologies, ICSOFT 2010, held in Athens, Greece, in July 2010.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Runtime Verification, RV 2011, held in San Francisco, USA, in September 2011.
This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software.
This book constitutes the proceedings of the 15th International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2012, held as part of the joint European Conference on Theory and Practice of Software, ETAPS 2012, which took place in Tallinn, Estonia, in March/April 2012.
This book constitutes the refereed proceedings of the 6th International Frontiers of Algorithmics Workshop, FAW 2012, and the 8th International Conference on Algorithmic Aspects in Information and Management, AAIM 2012, jointly held in Beijing, China, in May 2012.
This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011.
This book constitutes the thoroughly refereed post-conference proceedings of three workshops of the 12th International Conference on Web-Age Information Management, WAIM 2011, held in Wuhan, China, in September 2011.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
"e;Fuzzy Engineering and Operations Research"e; is the edited outcome of the 5th International Conference on Fuzzy Information and Engineering (ICFIE2011) held during Oct.
This book constitutes the proceedings of the 21st International Conference on Compiler Construction, CC 2012, held as part of the joint European Conference on Theory and Practice of Software, ETAPS 2012, which took place in Tallinn, Estonia, in March/April 2012.
This two-volume set, consisting of LNCS 7181 and LNCS 7182, constitutes the thoroughly refereed proceedings of the 13th International Conference on Computer Linguistics and Intelligent Processing, held in New Delhi, India, in March 2012.
Information and Communication Technologies has enlarged its horizon and it is practiced under multidisciplinary contexts that introduce new challenges to theoretical and technical approaches.
This book constitutes the joint refereed proceedings of the 4th International Workshop on Communication Technologies for Vehicles/Trains, Nets4Cars 2012 and Nets4Trains 2012, held in Vilnius, Lithuania, in April 2012.
This book constitutes the proceedings of the 18th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning, LPAR-18, held in Merida, Venezuela, in March 2012.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines.
This two-volume set, consisting of LNCS 7181 and LNCS 7182, constitutes the thoroughly refereed proceedings of the 13th International Conference on Computer Linguistics and Intelligent Processing, held in New Delhi, India, in March 2012.
This book constitutes the proceedings of the 10th International Conference on Latent Variable Analysis and Signal Separation, LVA/ICA 2012, held in Tel Aviv, Israel, in March 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on Computational and Clinical Applications in Abdominal Imaging, held in conjunction with MICCAI 2011, in Toronto, Canada, on September 18, 2011.
This 2-Volume-Set, CCIS 0269-CCIS 0270, constitutes the refereed proceedings of the International Conference on Global Trends in Computing and Communication (CCIS 0269) and the International Conference on Global Trends in Information Systems and Software Applications (CCIS 0270), ObCom 2011, held in Vellore, India, in December 2011.
This two volume set LNCS 7446 and LNCS 7447 constitutes the refereed proceedings of the 23rd International Conference on Database and Expert Systems Applications, DEXA 2012, held in Vienna, Austria, September 3-6, 2012.
This book constitutes the refereed and revised proceedings of the workshops and the doctoral consortium co-located with the 10th International Conference on Perspectives in Business Informatics Research (BIR), held in Riga, Latvia, in October 2011.
This book constitutes the refereed proceedings of the 6th International Conference on Information Systems, Technology and Management, ICISTM 2012, held in Grenoble, France, in March 2012.
This two volume set LNCS 7446 and LNCS 7447 constitutes the refereed proceedings of the 23rd International Conference on Database and Expert Systems Applications, DEXA 2012, held in Vienna, Austria, September 3-6, 2012.
This two-volume set, CCIS 0269-CCIS 0270, constitutes the refereed post-conference proceedings of the International Conference on Global Trends in Computing and Communication, ObCom 2011, held in Vellore, India, in December 2011.
This book constitutes the refereed proceedings of the 16th International GI/ITG Conference on Measurement, Modeling and Evaluation of Computing Systems and Dependability and Fault Tolerance, MMB & DFT 2012, held in Kaiserslautern, Germany, in March 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2010.
This book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference on Wireless Communications and Applications, ICWCA 2011, held in Sanya, China, in August 2011.