With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
The LNCS Jounal on Transactions on Aspect-Oriented Software Development is devoted to all facets of aspect-oriented software development (AOSD) techniques in the context of all phases of the software life cycle, from requirements and design to implementation, maintenance and evolution.
The 2007 NSF BioSurveillance Workshop (BioSurveillance 2007) was built on the success of the first NSF BioSurveillance Workshop, hosted by the University of Arizona's NSF BioPortal Center in March 2006.
Delegates and friends, we are very pleased to extend to you the sincerest of welcomes to this, the 10th International Conference on Knowledge Based and Intelligent Information and Engineering Systems at the Bournemouth International Centre in Bournemouth, UK, brought to you by KES International.
ItwasourpleasuretoholdtheInternationalWorkshoponSecurity2006(IWSEC 2006) this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series.
th This volume presents the proceedings of the 17 IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM 2006), which was held rd th in Dublin, Ireland during October 23 to 25 , 2006.
These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, Japan, October 10-13, 2006.
This volume of the Lecture Notes in Computer Science series contains the papers accepted for presentation at the Second International Conference on Autonomous Infrastructure, Management and Security (AIMS 2008).
This book constitutes the refereed proceedings of the 24th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2005, held in Fredrikstad, Norway, in September 2005.
th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, during August 30 - September 2, 2006.
The fourth edition of the European Conference on Model-Driven Architecture - Foundations and Applications (ECMDA-FA 2008) was dedicated to furthering the state of knowledge and fostering the industrialization of the model-driven architecture (MDA) methodology.
This book contains the best papers from the International Conference on Web Inf- mation Systems and Technologies (WEBIST 2007), organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), endorsed by IW3C2, and held in Barcelona, Spain.
The 5th International Conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems (CPAIOR 2008) was held in Paris, France May 20-23, 2008.