This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Game Theory for Networks (GameNets 2012) held in Vancouver, Canada, May 24-26, 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire.
This book constitutes the refereed proceedings of the two workshops held at the 14th International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2011, held in Wollongong, Australia, in November.
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland.
This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012.
This volume contains 9 thoroughly refereed and revised papers detailing recent advances in research on designing trading agents and mechanisms for agent-mediated e-commerce.
This book constitutes the proceedings of the 7th Mediterranean Conference on Information Systems, MCIS 2012, held in Guimaraes, Portugal, in September 2012.
This book constitutes the refereed proceedings of the 7th Security Research Conference, Future Security 2012, held in Bonn, Germany, in September 2012.
The volume LNCS 7529 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2012, held in Chengdu, China, in October 2012.
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012.
This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012.
This book constitutes the refereed proceedings of the 15th International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2012, held in Kuching, Sarawak, Malaysia, in September 2012.
This volume contains ten thoroughly refereed and revised papers detailing recent advances in research on designing trading agents and mechanisms for agent-mediated e-commerce.
This book constitutes the refereed proceedings of the 20 th International Conference on User Modeling, Adaptation, and Personalization, held in Montreal, Canada, in July 2012.
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012.
This book constitutes the refereed proceedings of the 13th International Conference on Electronic Commerce and Web Technologies (EC-Web) held in Vienna, Austria, in September 2012.
This book constitutes the refereed proceedings of the International Workshop on Internet of Things, IOT 2012, held in Changsha, China, during August 17-19.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST on Auctions, Market Mechanisms and Their Applications (AMMA 2011) held in New York, USA, August 22-23, 2011.
This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St.
This book contains the thoroughly refereed and revised best papers from the 7th International Conference on Web Information Systems and Technologies, WEBIST 2011, held in Nordwijkerhout, The Netherlands, in May 2011, organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), in collaboration with ACM SIGMIS and co-sponsored by the Workflow Management Coalition (WFMC).
This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Joint Conference on e-Business and Telecommunications, ICETE 2010, held in Athens, Greece, in July 2010.
This book constitutes the refereed proceedings of the 6th International Workshop on Internet Charging and QoS Technologies, ICQT 2011, held in Paris, France, in October 2011 collocated with the 7th International Conference on Network and Service Management.
This four-volume-set (CCIS 208, 209, 210, 211) constitutes the refereed proceedings of the International Symposium on Applied Economics, Business and Development, ISAEBD 2011, held in Dalian, China, in August 2011.
This four-volume-set (CCIS 208, 209, 210, 211) constitutes the refereed proceedings of the International Symposium on Applied Economics, Business and Development, ISAEBD 2011, held in Dalian, China, in August 2011.
This four-volume-set (CCIS 208, 209, 210, 211) constitutes the refereed proceedings of the International Symposium on Applied Economics, Business and Development, ISAEBD 2011, held in Dalian, China, in August 2011.
This four-volume-set (CCIS 208, 209, 210, 211) constitutes the refereed proceedings of the International Symposium on Applied Economics, Business and Development, ISAEBD 2011, held in Dalian, China, in August 2011.
This book constitutes the refereed proceedings of the 12th International Conference on Electronic Commerce and Web Technologies (EC-Web) held in Toulouse, France, in August/September 2011.
This book contains the thoroughly refereed and revised best papers from the 6th International Conference on Web Information Systems and Technologies, WEBIST 2010, held in Valencia, Spain, in April 2010, organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), in collaboration with ACM SIGMIS and co-sponsored by the Workflow Management Coalition (WFMC).
The volume includes a set of selected papers extended and revised from the International Conference on Informatics, Cybernetics, and Computer Engineering.
This four-volume set LNCS 6761-6764 constitutes the refereed proceedings of the 14th International Conference on Human-Computer Interaction, HCII 2011, held in Orlando, FL, USA in July 2011, jointly with 8 other thematically similar conferences.
This book constitutes the refereed proceedings of the 6th InternationalJoint Conference on e-Business and Telecommunications, ICETE 2009, heldin Milan, Italy, in July 2009.
The two-volume set CCIS 143 and CCIS 144 constitutes the refereed proceedings of the International Conference on Electronic Commerce, Web Application, and Communication, ECWAC 2011, held in Guangzhou, China, in April 2011.
This volume constitutes the proceedings of the 5th International Conference on E-Technologies, MCETECH 2011, held in Les Diablerets, Switzerland, January 23-26, 2011.
This book is based on a selection of thoroughly revised and extended best papers from the 8th Workshop on E-Business (WEB 2009) held in Phoenix, AZ, USA, on December 15th, 2009.
The International Conference on E-business Technology & Strategy (CETS) provides a peer-reviewed forum for researchers from across the globe to share contemporary research on developments in the fields of e-business, information technology and business strategy.
It is a great pleasure to share with you the Springer CCIS 111 proceedings of the Third World Summit on the Knowledge Society--WSKS 2010--that was organized by the International Scientific Council for the Knowledge Society, and supported by the Open Research Society, NGO, (http://www.
Manufacturing and operations management paradigms are evolving toward more open and resilient spaces where innovation is driven not only by ever-changing customer needs but also by agile and fast-reacting networked structures.
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010.
It is a great pleasure to share with you the Springer CCIS 112 proceedings of the Third World Summit on the Knowledge Society--WSKS 2010--that was organized by the International Scientific Council for the Knowledge Society, and supported by the Open Research Society, NGO, (http://www.
The design and analysis of electronic commerce systems in which agents are - ployed involves finding solutions to a large and diverse array of problems, concerning individual agent behaviors, interaction, and collective behavior.
This book constitutes the proceedings of the nine workshops that were organized in conjunction with the Business Information Systems Conference, BIS 2009, taking place in Poznan, Poland, on April 27-29, 2009.
This book contains a selection of the best papers from WEBIST 2009 (the 5th Int- national Conference on Web Information Systems and Technologies), held in Lisbon, Portugal, in 2009, organized by the Institute for Systems and Technologies of Inf- mation, Control and Communication (INSTICC), in collaboration with ACM SIGMIS and co-sponsored by the Workflow Management Coalition (WFMC).
Recent developments in information and communication technology (ICT) have paved the way for a world of advanced communication, intelligent information processing and ubiquitous access to information and services.
After the lesson learned during last years and following the successful edition of EC-Web 2009, for its 11th edition EC-Web tried to provide a clearer description of the electronic commerce universe focusing on some relevant topics.