This book constitutes the refereed proceedings of the First European Conference on Service-Oriented and Cloud Computing, ESOCC, held in Bertinoro, Italy, in September 2012.
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012.
This book constitutes the thoroughly refereed proceedings of the First International Symposium on Data-Driven Process Discovery and Analysis held in Campione d'Italia, Italy, in June/July 2011.
The purpose of the 2012 3rd International Asia Conference on industrial engineering and management innovation (IEMI2012) is to bring together researchers, engineers and practitioners interested in the application of informatics to industrial engineering and management innovation.
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Sensor Systems and Software, S-Cube 2012, held in Lisbon, Portugal in June 2012.
This book constitutes the refereed proceedings of the Joint International Conference on Electronic Government and the Information Systems Perspective, and Electronic Democracy, EGOVIS/EDEM 2012, held in Vienna, Austria, in September 2012, in conjunction with DEXA 2012.
This book constitutes the refereed proceedings of the 18th EUNICE 2012 conference on information and communication technologies, held in Budapest, in August 2012.
This book constitutes the refereed proceedings of the Second International Conference on ICT as Key Technology for the Fight against Global Warming, ICT-GLOW 2012, held in Vienna, Austria, in September 2012, in conjunction with DEXA 2012.
This book constitutes the proceedings of the Third Technology Conference on Performance Evaluation and Benchmarking, TPCTC 2011, held in conjunction with the 37th International Conference on Very Large Data Bases, VLDB 2011, in Seattle, August/September 2011.
This book contains extended and revised versions of a set of selected papers from two workshops organized by the Euro Working Group on Decision Support Systems (EWG-DSS), which were held in London and Paris, in June and November 2011, respectively.
This volume contains ten thoroughly refereed and revised papers detailing recent advances in research on designing trading agents and mechanisms for agent-mediated e-commerce.
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012.
This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011.
This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011.
This book presents the thoroughly refereed post-conference proceedings of the International Conference on Formal Verification of Object-Oriented Software, FoVeOOS 2011, held in Turin, Italy, in October 2011 - organised by COST Action IC0701.
This book constitutes the proceedings of the 10th International Conference on Business Process Management, BPM 2012, held in Tallinn, Estonia, in September 2012.
This book contains the refereed proceedings of the Third Scandinavian Conference on Information Systems (SCIS), held in Sigtuna, Sweden, in August 2012.
This book constitutes the refereed proceedings of the 13th International Conference on Electronic Commerce and Web Technologies (EC-Web) held in Vienna, Austria, in September 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011.
This book constitutes the refereed proceedings of the 7th International Conference on Sequences and Their Applications, SETA 2012, held in Waterloo, Canada, in June 2012.
This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012.
This book constitutes the proceedings of the Fourth International IFIP Working Conference on Enterprise Interoperability (IWEI 2012) , held in Harbin, China, September 6-7, 2012.
This book constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing, TGC 2011, held in Aachen, Germany, in June 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST on Auctions, Market Mechanisms and Their Applications (AMMA 2011) held in New York, USA, August 22-23, 2011.
This book constitutes the thoroughly refereed proceedings of eight international workshops held in Gdansk, Poland, in conjunction with the 24th International Conference on Advanced Information Systems Engineering, CAiSE 2012, in June 2012.
This book constitutes the refereed proceedings of the 13 International Conference on Product-Focused Software Process Improvement, PROFES 2012, held in Madrid, Spain, in June 2012.
The two-volume set LNCS 7289 and 7290 constitutes the refereed proceedings of the 11th International IFIP TC 6 Networking Conference held in Prague, Czech Republic, in May 2012.
This book constitutes the refereed proceedings of three workshops colocated with NETWORKING 2012, held in Prague, Czech Republic, in May 2012: the Workshop on Economics and Technologies for Inter-Carrier Services (ETICS 2012), the Workshop on Future Heterogeneous Network (HetsNets 2012), and the Workshop on Computing in Networks (CompNets 2012).
The two-volume set LNCS 7289 and 7290 constitutes the refereed proceedings of the 11th International IFIP TC 6 Networking Conference held in Prague, Czech Republic, in May 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management.
This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012.
This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012.
This book contains the refereed proceedings of the 15th International Conference on Business Information Systems, BIS 2012, held in Vilnius, Lithuania, in May 2012.
This book contains the refereed proceedings of the 13th International Conference on Agile Software Development, XP 2012, held in Malmo, Sweden, in May 2012.
This book constitutes the refereed proceedings of the 12th International Conference on Software Process Improvement and Capability Determination, SPICE 2012, held in Palma de Mallorca, Spain, in May 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International ICST Conference on Wireless Internet (WICON 2011) held in Xi'an, Shaanxi, China in October 2011.
This book constitutes the refereed proceedings of the 5th International Conference on Multimedia Communications, Services and Security, MCSS 2012, held in Krakow, Poland, in May/June 2012.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, held in Kuala Lumpur, Malaysia, in May 2012 - held in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2012).
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011) held in Aalborg, Denmark, in May 2011.
This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012, held in Darmstadt, Germany, May 2012.
This book contains the refereed proceedings of the Third International Conference on Software Business (ICSOB) held in Cambridge, MA, USA, in June 2012.
This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St.
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Web Services and Formal Methods, WS-FM 2011, held in Clermont-Ferrand, France, in September 2011.
This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference Mobile Lightweight Wireless Systems (MOBILIGHT 2011) held in Bilbao, Spain on May 9-10.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011.