The design and analysis of electronic commerce systems in which agents are - ployed involves finding solutions to a large and diverse array of problems, concerning individual agent behaviors, interaction, and collective behavior.
The past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security.
This book constitutes the proceedings of the nine workshops that were organized in conjunction with the Business Information Systems Conference, BIS 2009, taking place in Poznan, Poland, on April 27-29, 2009.
Copulas are mathematical objects that fully capture the dependence structure among random variables and hence offer great flexibility in building multivariate stochastic models.
This book contains a selection of the best papers from WEBIST 2009 (the 5th Int- national Conference on Web Information Systems and Technologies), held in Lisbon, Portugal, in 2009, organized by the Institute for Systems and Technologies of Inf- mation, Control and Communication (INSTICC), in collaboration with ACM SIGMIS and co-sponsored by the Workflow Management Coalition (WFMC).
Recent developments in information and communication technology (ICT) have paved the way for a world of advanced communication, intelligent information processing and ubiquitous access to information and services.
After the lesson learned during last years and following the successful edition of EC-Web 2009, for its 11th edition EC-Web tried to provide a clearer description of the electronic commerce universe focusing on some relevant topics.
This volume contains the proceedings of the First International ICST Conference on Digital Business (DigiBiz 2009), hosted by City University London in London, UK.
This book constitutes the refereed proceedings of the 13th International Conference on Principles of Distributed Systems, OPODIS 2009, held in Nimes, France, in December 2009.
Intelligent Decision Technologies (IDT) seeks an interchange of research on intelligent systems and intelligent technologies which enhance or improve decision making in industry, government and academia.
The management of services and operations in today's organizations are - coming increasingly dependent on their enterprise local area network (enterprise LAN).
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Information Theoretic Security, ICITS 2007, held in Madrid, Spain, in May 2007.
While the areas of information management and management science are full of algorithmic challenges, the proliferation of data has called for the design of e?
th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE), which was held in July 2008, in Porto, Portugal.
The First International ICST Conference on Communications Infrastructure, Systems and Applications in Europe (EuropeComm 2009) was held August 11-13, 2009, in London.
This book will be a valuable source of information for those concerned with rural and farm tourism, sustainable tourism and the marketing of "e;Calibri"e;>local gastronomy.
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals.
This volume compiles the papers accepted for presentation at the 16thWorking C- ference on Requirements Engineering: Foundation for Software Quality (REFSQ 2010), held in Essen during June 30 and July 1-2, 2010.
This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009.
Interest in agile development continues to grow: the number of practitioners adopting such methodologies is increasing as well as the number of researchers investigating the effectiveness of the different practices and proposing improvements.
This book constitutes the thoroughly refereed post-workshop proceedings of eight international workshops held in Ulm, Germany, in conjunction with the 7th International Conference on Business Process Management, BPM 2009, in September 2009.
On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 12th International Symposium on Recent Advances in Intrusion Detection systems (RAID 2009),which took place in Saint-Malo,France, during September 23-25.