th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, during August 30 - September 2, 2006.
The fourth edition of the European Conference on Model-Driven Architecture - Foundations and Applications (ECMDA-FA 2008) was dedicated to furthering the state of knowledge and fostering the industrialization of the model-driven architecture (MDA) methodology.
This book contains the best papers from the International Conference on Web Inf- mation Systems and Technologies (WEBIST 2007), organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), endorsed by IW3C2, and held in Barcelona, Spain.
th This volume presents the proceedings of the 6 IEEE International Workshop on IP Operations and Management (IPOM 2006), which was held as part of Manweek 2006 rd th in Dublin, Ireland from October 23 to 25 , 2006.
Delegates and friends, we are very pleased to extend to you the sincerest of welcomes to this, the 10th International Conference on Knowledge Based and Intelligent Information and Engineering Systems at the Bournemouth International Centre in Bournemouth, UK, brought to you by KES International.
Delegates and friends, we are very pleased to extend to you the sincerest of welcomes to this, the 10th International Conference on Knowledge Based and Intelligent Information and Engineering Systems at the Bournemouth International Centre in Bournemouth, UK, brought to you by KES International.
The LNCS Journal Transactions on Aspect-Oriented Software Development is devoted to all facets of aspect-oriented software development (AOSD) techniques in the context of all phases of the software life cycle, from requirements and design to implementation, maintenance and evolution.
This volume of Lecture Notes in Computer Science contains all accepted papers th of the 5 International Conference on Innovative Internet Community Systems 2 (I CS), which was held at the Sorbonne in Paris, from June 20-22, 2005.
In recent years applied cryptography has developed considerably to satisfy the - creasing security requirements of various information technology disciplines, such as telecommunications, networking, database systems, mobile applications and others.
This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, held in Newcastle upon Tyne, UK in July 2005.
This volume contains the proceedings of the 26th International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (ICATPN 2005).
Dear delegates,friendsand membersofthe growingKES professionalcommunity,w- come to the proceedings of the 9th International Conference on Knowledge-Based and IntelligentInformationandEngineeringSystemshostedbyLa TrobeUniversityin M- bourne Australia.
Dear delegates,friendsand membersofthe growingKES professionalcommunity,w- come to the proceedings of the 9th International Conference on Knowledge-Based and IntelligentInformationandEngineeringSystemshostedbyLa TrobeUniversityin M- bourne Australia.
The Asian Internet Engineering Conference (AINTEC) brings together researchers and engineers interested in practical and theoretical problems in Internet technologies.