This book constitutes the conference proceedings of 6th International Workshop on Algorithmic Bias in Search and Recommendation, BIAS 2025 and 2nd International Workshop on Information Retrieval for Understudied Users, IR4U2, held in Padua, Italy, on July 17, 2025.
This book constitutes the conference proceedings of 6th International Workshop on Algorithmic Bias in Search and Recommendation, BIAS 2025 and 2nd International Workshop on Information Retrieval for Understudied Users, IR4U2, held in Padua, Italy, on July 17, 2025.
This book constitutes the refereed proceedings of the 23rd International Conference on Business Process Management, BPM 2025, which took place in Seville, Spain, in September 2025.
This book constitutes the refereed proceedings of the 23rd International Conference on Business Process Management, BPM 2025, which took place in Seville, Spain, in September 2025.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Financial Cryptography and Data Security, FC 2016, held in Christ church, Barbados, in February 2016.
The book aims to help readers comprehensively understand the concepts, principles and practical applications of e-commerce, to master the basic knowledge and skills of e-commerce from different dimensions, and to improve the readers' understanding and applications in the field of e-commerce.
The book aims to help readers comprehensively understand the concepts, principles and practical applications of e-commerce, to master the basic knowledge and skills of e-commerce from different dimensions, and to improve the readers' understanding and applications in the field of e-commerce.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Financial Cryptography and Data Security, FC 2016, held in Christ church, Barbados, in February 2016.
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Web and Internet Economics, WINE 2016, held in Montreal, QC, Canada, in December 2016.
This book constitutes the refereed proceedings of three workshops heldat the 20th International Conference on Financial Cryptography and DataSecurity, FC 2016, in Christ Church, Barbados, in February 2016.
This book constitutes the refereed proceedings of the Second International Multidisciplinary Social Networks Conference, MISNC 2015, held in Matsuyama, Japan, in September 2015.
This book constitutes the refereed proceedings of three workshops held at the 19th International Conference on Financial Cryptography and Data Security, FC 2015, in San Juan, Puerto Rico, in January 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014.
This book constitutes the refereed proceedings of the 2014 Multidisciplinary International Social Networks Research, MISNC 2014, held in Kaohsiung, Taiwan, in September 2014.
This book contains the thoroughly refereed and revised best papers from the 9th International Conference on Web Information Systems and Technologies, WEBIST 2013, held in Aachen, Germany, in May 2013, organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), and co-organized by the RWTH Aachen University.
This book constitutes the refereed proceedings of the 7th International Symposium on Algorithmic Game Theory, SAGT 2014, held in Haifa, Israel, in October 2014.
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2014, held in Delhi, India, in September 2013.
This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014.
This book constitutes the refereed proceedings of the 16th International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2013, held in Dunedin, New Zealand, in December 2013.
This book constitutes the thoroughly refereed conference proceedings of the 9th International Conference on Web and Internet Economics, WINE 2013, held in Cambridge, MA, USA, in December 2013.
This book constitutes the proceedings of the 6th International Symposium on Algorithmic Game Theory, SAGT 2013, held in Aachen, Germany, in October 2013.
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013.
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013.
This book constitutes the refereed proceedings of the 10 th International Conference on Mobile Web Information Systems, MobiWIS 2013, held in Paphos, Cyprus, in August 2013.
This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2013, held in Rodney Bay, St.
This book contains a selection of thoroughly refereed and revised papers from the Fourth International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2012, held in October 2012 in Lafayette, Indiana, USA.
This book constitutes the refereed proceedings of the 14th International Conference on Electronic Commerce and Web Technologies (EC-Web) held in Prague, Czech Republic, in August 2013.
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013.
This book constitutes the refereed proceedings of the 15th International Conference on Electronic Commerce, ICEC 2013, held in Turku, Finland, in August 2013.
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on User Modeling, Adaption, and Personalization, held in Rome, Italy, in June 2013.
This volume contains 11 thoroughly refereed and revised papers detailing recent advances in research on designing trading agents and mechanisms for agent-mediated e-commerce.
This book constitutes the refereed post-proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2012, held in Heraklion, Crete, Greece, in July 2012.
This book constitutes the proceedings of the 6th International Workshop on Enterprise Applications and Services in the Finance Industry, FinanceCom 2012, held in Barcelona, Spain, on June 10, 2012.
This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013.
This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences.
This book contains the thoroughly refereed and revised best papers from the 8th International Conference on Web Information Systems and Technologies, WEBIST 2012, held in Porto, Portugal, in April 2012, and organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), in collaboration with ACM SIGMIS.
This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on Agents and Data Mining Interaction, ADMI 2012, held in Valencia, Spain, in June 2012.
This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012.