This book constitutes the refereed proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016, held in Hyderabad, India, in December 2016.
This book aims to provide a general overview of heuristic search, to present the basic steps of the most popular heuristics, and to stress their hidden difficulties as well as their opportunities.
This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016.
This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016: the 7th International Workshop on Trust, Security and Privacy for Big Data, TrustData 2016; the 6th International Symposium on Trust, Security and Privacy for Emerging Applications, TSP 2016; the 4th International Workshop on Network Optimization and Performance Evaluation, NOPE 2016; the Second International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys 2016; the Annual Big Data Security, Privacy and Trust Workshop, BigDataSPT 2016; and the First International Workshop on Cloud Storage Service and Computing, WCSSC 2016.
This book constitutes the refereed proceedings of the Third International Conference on Security Standardisation Research, SSR 2016, held in Gaithersburg, MD, USA, in December 2016.
This book constitutes the proceedings of the 17th International Conference on Product-Focused Software Process Improvement, PROFES 2016, held in Trondheim, Norway, in November 2016.
This book constitutes the proceedings of the 10th European Conference on Software Architecture, ECSA 2016, held in Copenhagen, Denmark, in November/December 2016.
This book constitutes the refereed proceedings of the 21st International Symposium on Formal Methods, FM 2016, held in Limassol, Cyprus, in November 2016.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.
This book constitutes the refereed proceedings of the 18th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2016, held in Lyon, France, in November 2016.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense.
This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016.
This book constitutes the refereed proceedings of the Third International Conference on Future Data and Security Engineering, FDSE 2016, held in Can Tho City, Vietnam, in November 2016.
This book provides an in-depth analysis of the older-tourist market, and of the challenges and opportunities created by population ageing from a tourism marketing perspective, by combining a demand-side and a supply-side approach to older tourists.
This book constitutes the refereed proceedings of seven workshops and a symposium, held at the 35th International Conference on Conceptual Modeling, ER 2016, in Gifu, Japan.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Security for Information Technology and Communications, SECITC 2016, held in Bucharest, Romania, in June 2016.
This book discusses the effective use of modern ICT solutions for business needs, including the efficient use of IT resources, decision support systems, business intelligence, data mining and advanced data processing algorithms, as well as the processing of large datasets (inter alia social networking such as Twitter and Facebook, etc.
This book constitutes the refereed proceedings of the Third International Conference on Information Systems for Crisis Response and Management in Mediterranean Countries, ISCRAM-med 2016, held in Madrid, Spain, in October 2016.
This book constitutes the refereed proceedings of the 11th International Workshop on Data Privacy Management, DPM 2016 and the 5th International Workshop on Quantitative Aspects in Security Assurance, QASA 2016, held in Heraklion, Crete, Greece, in September 2016.
The LNCS Transactions on Modularity and Composition are devoted to all aspects of software modularity and composition methods, tools, and techniques, covering requirement analysis, design, implementation, maintenance, and evolution.
Drawing on research conducted over the last 3 years in Cornwall, UK, this new book explores the impact of the EU/BT funded introduction of fibre broadband on rural SMEs.
This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016.
This book constitutes the refereed proceedings of the 7th International Conference on Decision and Game Theory for Security, GameSec 2016, held in New York, NY, USA, in November 2016.
This book presents a series of high performance product design (PD) and development best practices that can create or improve product development organization.
This book reflects the tremendous changes in the telecommunications industry in the course of the past few decades - shorter innovation cycles, stiffer competition and new communication products.
This book constitutes the refereed proceedings of the SIGSAND/PLAIS EuroSymposium 2016 titled Information Systems: Development, Research, Applications, Education, held in Gdansk and Sopot, Poland, on September 29, 2016.
This book constitutes revised papers of the proceedings of the 9th International Workshop on System Analysis and Modeling, SAM 2016, held in Saint-Melo, France, in October 2016.
This book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016.
The LNCS Transactions on Foundations for Mastering Change, FoMaC, aims to establish a forum for formal-methods-based research, dealing with the nature of today's agile system development, which is characterized by unclear premises, unforeseen change, and the need for fast reaction, in a context of hard-to-control frame conditions, such as third-party components, network problems, and attacks.
This book constitutes the proceedings of the 10th International Conference on Network and System Security, NSS 2016, held in Taipei, Taiwan, in September 2016.
This book constitutes the proceedings of the 14th International Conference on Service-Oriented Computing, ICSOC 2016, held in Banff, AB, Canada, in October 2016.
This book constitutes the refereed proceedings of the 8th International Workshop on Software Engineering for Resilient Systems, SERENE 2016, held in Gothenburg, Sweden, in September 2016.
In a series of essays, this book describes and analyzes the concept and theory of the recent smart city phenomenon from a global perspective, with a focus on its implementation around the world.
The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016.
The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016.
This book constitutes the refereed proceedings oft he 19th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, held in Evry, France, in September 2016.
This book addresses the topic of exploiting enterprise-linked data with a particular focus on knowledge construction and accessibility within enterprises.
This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016.
This compendium introduces game theory and gamification to a number of different domains and describes their professional application in information systems.
This book constitutes the refereed proceedings of the 6th International Conference on Model and Data Engineering, MEDI 2016, held in Almeria, Spain, in September 2016.