This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011.
This book constitutes the refereed proceedings of the 12 International Conference on Product-Focused Software Process Improvement, PROFES 2011, held in Torre Canne, Italy, in June 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010.
This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011.
This book constitutes the refereed proceedings of the 14th International Conference on Model Driven Engineering Languages and Systems, MODELS 2011, held in Wellington, New Zealand, in October 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the Second IFIP TC 2 Central and East-European Conference on Software Engineering Techniques, CEE-SET 2008, held in Brno, Czech Republic, in October 2008.
This is the proceedings of the selected papers presented at 2011 International Conference on Engineering Education and Management (ICEEM2011) held in Guangzhou, China, during November 18-20, 2011.
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2011, held in Beijing, China, in July 2011.
This book constitutes the thoroughly refereed proceedings of ten international workshops held in London, UK, in conjunction with the 23rd International Conference on Advanced Information Systems Engineering, CAiSE 2011, in June 2011.
This is the proceedings of the selected papers presented at 2011 International Conference on Engineering Education and Management (ICEEM2011) held in Guangzhou, China, during November 18-20, 2011.
This book constitutes the refereed proceedings of the 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Dakar, Senegal, in July 2011.
This book contains the refereed proceedings of the 14th International Conference on Business Information Systems, BIS 2011, held in Poznan, Poland, in June 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011.
This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011.
This book contains the refereed proceedings of the Second International Conference on Software Business (ICSOB) held in Brussels, Belgium, in June 2011.
This book constitutes the refereed proceedings of the International Conference on Ergonomics and Health Aspects of Work with Computers, EHAWC 2011, held within the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011, incorporating 12 thematically similar conferences.
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Critical Information Infrastructure Security, CRITIS 2010, held in Athens, Greece in September 2010.
This four-volume set LNCS 6761-6764 constitutes the refereed proceedings of the 14th International Conference on Human-Computer Interaction, HCII 2011, held in Orlando, FL, USA in July 2011, jointly with 8 other thematically similar conferences.
This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011.
This book constitutes the refereed proceedings of the 17th International Symposium on Formal Methods, FM 2011, held in Limerick, Ireland, in June 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010.
This book constitutes the refereed proceedings of the Third International Symposium on End-User Development, IS-EUD 2011, held in Torre Canne, Italy, in June 2011.
This book constitutes the refereed proceedings of the 7th European Conference on Modelling Foundations and Applications, held in Birmingham, UK, in June 2011.
This book constitutes the refereed proceedings of the International ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning, PSDML 2010, held in Barcelona, Spain, in September 2010.
This book constitutes the joint refereed proceedings of the 5th International Frontiers of Algorithmics Workshop, FAW 2011, and the 7th International Conference on Algorithmic Aspects in Information and Management, AAIM 2011, jointly held in Jinhua, China, in May 2011.
This book constitutes the refereed proceedings of the 11th International Conference on Software Process Improvement and Capability Determination, SPICE 2011, held in Dublin, Ireland, in May/June 2011.
This book constitutes the refereed proceedings of the Third International Conference on Wireless, Mobile Networks and Applications, WiMoA 2011, and the First International Conference on Computer Science, Engineering and Applications, ICCSEA 2011, held in Dubai, United Arab Emirates, in May 2011.
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
This book presents a comprehensive documentation of the scientific outcome of 14 satellite events held at the 13th International Conference on Model-Driven Engineering, Languages and Systems, MODELS 2010, held in Oslo, Norway, in October 2010.
This book constitutes the proceedings of the Third International Workshop on Traffic Monitoring and Analysis, TMA 2011, held in Vienna, Austria, on April 27, 2011 - co-located with EW 2011, the 17th European Wireless Conference.
This book constitutes the refereed proceedings of the 6th InternationalJoint Conference on e-Business and Telecommunications, ICETE 2009, heldin Milan, Italy, in July 2009.
This book contains selected papers from the symposium "e;Operations Research 2010"e; which was held from September 1-3, 2010 at the "e;Universitat der Bundeswehr Munchen"e;, Germany.
This book constitutes the thoroughly refereed post-workshop proceedings of nine international workshops held in Hoboken, NJ, USA, in conjunction with the 8th International Conference on Business Process Management, BPM 2010, in September 2010.
This book constitutes the refereed proceedings of the 17th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2011, held in Essen, Germany, in March 2011.
The two-volume set LNCS 6640 and 6641 constitutes the refereed proceedings of the 10th International IFIP TC 6 Networking Conference held in Valencia, Spain, in May 2011.
The two-volume set LNCS 6640 and 6641 constitutes the refereed proceedings of the 10th International IFIP TC 6 Networking Conference held in Valencia, Spain, in May 2011.
This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security, held in Amsterdam, The Netherlands, in May 2011.
This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in Tallinn, Estonia, in May 2011.
The two-volume set CCIS 143 and CCIS 144 constitutes the refereed proceedings of the International Conference on Electronic Commerce, Web Application, and Communication, ECWAC 2011, held in Guangzhou, China, in April 2011.
This book constitutes the proceedings of the Third International IFIP Working Conference on Enterprise Interoperability (IWEI 2011) , held in Stockholm, Sweden, March 23-24, 2011.
This volume constitutes the proceedings of the 5th International Conference on E-Technologies, MCETECH 2011, held in Les Diablerets, Switzerland, January 23-26, 2011.