Thisvolumecontainsaselectionofpapersfromthe5thInternationalConference on the Practice and Theory of Automated Timetabling (PATAT 2004) held in Pittsburgh, USA, August 18-20, 2004.
This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005.
This volume contains papers presented at the first joint conference of the Software Pr- ess Workshop and the International Workshop on Software Process Simulation and Modeling (SPW/ProSim 2006) held in Shanghai, P.
This volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference 2006 (ISPEC 2006), which took place in Hangzhou, China, April 11-14, 2006.
This volume contains selected papers, presented at the international c- ference on Intelligent Information Processing and Web Mining Conference nd IIS:IIPWM'06, organized in Ustro?
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications.
TEAA 2005 (Trends in Enterprise Application Architecture) took place as a workshop of the conference VLDB 2005 (31st International Conference on Very Large Databases) in August 2005 in Trondheim, Norway.
The 6th Workshop on Technologies for E-Services (TES-05) was held September 2-3, 2005, in conjunction with the 31st International Conference on Very Large Data Bases (VLDB 2005) in Trondheim, Norway.
Six parallel Business Process Management workshops were held on September 5th, 2005, in conjunction with the Third International Conference on Business Process Management (BPM 2005) in Nancy, France.
Dear delegates,friendsand membersofthe growingKES professionalcommunity,w- come to the proceedings of the 9th International Conference on Knowledge-Based and IntelligentInformationandEngineeringSystemshostedbyLa TrobeUniversityin M- bourne Australia.
The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Commu- cations and Information Security Association).
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures for Computer Network - curity (MMM-ACNS 2005) held in St.
This volume contains the proceedings of the Third International Conference on Service-Oriented Computing (ICSOC 2005), that took place in Amsterdam, The Netherlands, December 12-15, 2005.
This book constitutes the refereed proceedings of the 5th International Conference on Audio- and Video-Based Biometric Person Authentication, AVBPA 2005, held in Hilton Rye Town, NY, USA, in July 2005.
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA).
The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica from February 28 to March 3, 2005.
This volume contains the proceedings of Formal Methods 2005, the 13th InternationalSymposiumonFormalMethodsheldinNewcastleuponTyne,UK, during July 18-22, 2005.
It was our great pleasure to extend a welcome to all who participated in SERA 2004, the second International Conference on Software Engineering Research, Management and Applications, held at the Omni Hotel, Los Angeles, California, USA.