This volume of the LNCS series contains the proceedings of the 5th Internat- nal Working Conference on Active Networks (IWAN 2003) held in the ancient cultural city of Kyoto, Japan.
Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources.
Crypto 2002, the 22nd Annual Crypto Conference, was sponsored by IACR, the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara.
Peer-to-peer (P2P) computing is currently attracting enormous public attention, spurred by the popularity of file-sharing systems such as Napster, Gnutella, and Morpheus.
The increasing complexity of manufacturing systems as well as the overall demands for flexible and fault-tolerant control of production processes stimulates (among many others) two key emerging technologies that are already making an important breakthrough in the field of intelligent manufacturing, control, and diagnostics.
This volume comprises papers from the following three workshops that were part of the complete program for the International Conference on Extending Database Technology (EDBT) held in Prague, Czech Republic, in March 2002: XML-Based Data Management (XMLDM) Second International Workshop on Multimedia Data and Document Engineering (MDDE) Young Researchers Workshop (YRWS) Together, the three workshops featured 48 high-quality papers selected from approximately 130 submissions.
th This volume contains the papers presented at the 13 International Conference on Knowledge Engineering and Knowledge Management (EKAW 2002) held in Sig enza, Spain, October 1-4, 2002.
Financial Cryptography 2000 marked the fourth time the technical, business, legal, and political communities from around the world joined together on the smallislandofAnguilla,BritishWestIndiestodiscussanddiscovernewadvances in securing electronic ?
The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing, and storage.
Just like the previous workshop at VLDB 1999 in Edinburgh, the purpose of this workshop is to promote telecom data management as one of the core research areas in database research and to establish a strong connection between the telecom and database research communities.
PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, the International As- ciation for Cryptologic Research (www.
This volume of the Lecture Notes in Computer Science series contains all the papersacceptedforpresentationatthe13thIFIP/IEEEInternationalWorkshop on Distributed Systems: Operations and Management (DSOM 2004), which was held at the University of California, Davis during November 15-17, 2004.
This two-volume set constitutes the refereed proceedings of the 11th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE-98, held in Benicassim, Castellon, Spain, in June 1998.