This book constitutes the proceedings of the 6th Euro Symposium on Systems Analysis and Design, SIGSAND/PLAIS 2013, held in Gdansk, Poland, in September 2013.
This book constitutes a collection of selected contributions from the 12th International Conference on Perspectives in Business Informatics Research, BIR 2013, held in Warsaw, Poland, in September 2013.
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013.
This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013.
This book constitutes the refereed proceedings of the Second European Conference on Service-Oriented and Cloud Computing, ESOCC 2013, held in Malaga, Spain, in September 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012.
This book constitutes the proceedings of the 11th International Conference on Business Process Management, BPM 2013, held in Beijing, China, in August 2013.
This book constitutes the refereed proceedings of the 10 th International Conference on Mobile Web Information Systems, MobiWIS 2013, held in Paphos, Cyprus, in August 2013.
This book constitutes the outcome of the Workshop on Measurement and Measurement Tools which was held as part of the Future Internet Research Experimentation (FIRE) initiative during the Future Internet Assembly conference (FIA) in May 2012.
This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2013, held in Rodney Bay, St.
This book constitutes the refereed proceedings of the Second Joint International Conference on Electronic Government and the Information Systems Perspective, and Electronic Democracy, EGOVIS/EDEM 2013, held in Prague, Czech Republic, in August 2013, in conjunction with DEXA 2013.
This book constitutes the refereed proceedings of the 6th International Conference on Industrial Applications of Holonic and Multi-Agent Systems, HoloMAS 2013, held in Prague, Czech Republic, in August 2013, in conjunction with DEXA 2013.
This book contains a selection of thoroughly refereed and revised papers from the Fourth International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2012, held in October 2012 in Lafayette, Indiana, USA.
This book constitutes the refereed proceedings of the 14th International Conference on Electronic Commerce and Web Technologies (EC-Web) held in Prague, Czech Republic, in August 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop, COSADE 2013, held in Paris, France, in March 2013.
This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013.
This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013.
This book constitutes the thoroughly refereed conference proceedings of the 6th International Workshop on Business Intelligence for the Real-Time Enterprise, BIRTE 2012, held in Istanbul, Turkey, in August 2012, in conjunction with VLDB 2012, the International Conference on Very Large Data Bases.
This book constitutes the proceedings of the 9th European Conference on Modelling Foundations and applications, ECMFA 2013, held in Montpellier, France, in July 2013.
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2013, held in Wroclaw, Poland, in July 2013.
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013.
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013.
The five-volume set LNCS 8004--8008 constitutes the refereed proceedings of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, NV, USA in July 2013.
This book constitutes the refereed proceedings of the 14th International Conference on Product-Focused Software Process Improvement, PROFES 2013, held in Paphos, Cyprus, in June 2013.
This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013.
This volume constitutes the proceedings of the 6th Working Conference on Practice-Driven Research on Enterprise Transformation (PRET), held in Utrecht, The Netherlands, on June 6, 2013, co-located with the Enterprise Transformation Track of the 21st European Conference on Information Systems (ECIS).
This book contains the refereed proceedings of the 14th International Conference on Agile Software Development, XP 2013, held in Vienna, Austria, in June 2013.
This book constitutes the refereed proceedings of the 15th International Conference on Electronic Commerce, ICEC 2013, held in Turku, Finland, in August 2013.
This book constitutes the refereed proceedings of the 13th International Conference on Software Process Improvement and Capability Determination, SPICE 2013, held in Bremen, Germany, in June 2013.
This book constitutes the refereed proceedings of the 7th International Frontiers of Algorithmics Workshop, FAW 2013, and the 9th International Conference on Algorithmic Aspects in Information and Management, AAIM 2013, jointly held in Dalian, China, in June 2013.
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on User Modeling, Adaption, and Personalization, held in Rome, Italy, in June 2013.
This book constitutes the refereed proceedings of the 25th International Conference on Advanced Information Systems Engineering, CAiSE 2013, held in Valencia, Spain, in June 2013.
The Transactions on Pattern Languages of Programming subline aims to publish papers on patterns and pattern languages as applied to software design, development, and use, throughout all phases of the software life cycle, from requirements and design to implementation, maintenance and evolution.
This volume contains 11 thoroughly refereed and revised papers detailing recent advances in research on designing trading agents and mechanisms for agent-mediated e-commerce.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012).
This book constitutes the revised selected papers of the combined workshops on Web Information Systems Engineering, WISE 2011 and WISE 2012, held in Sydney, Australia, in October 2011 and in Paphos, Cyprus, in November 2012.
This book contains the extended and revised versions papers from the Second International Symposium on Business Modeling and Software Design (BMSD 2012), held in Geneva, Switzerland, in July 2012, organized and sponsored by the Interdisciplinary Institute for Collaboration and Research on Enterprise Systems and Technology (IICREST), in cooperation with the Center for Telematics and Information Technology (CTIT), the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), and Technical University of Sofia.
This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013.
The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions.
This book constitutes the refereed proceedings of the Second International Conference on Health Information Science, HIS 2013, held in London, UK, in March 2013.
This book constitutes the thoroughly refereed proceedings of the 2012 ICSOC Workshops consisting of 6 scientific satellite events, organized in 3 main tracks including workshop track (ASC, DISA.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Advanced Infocomm Technology, ICAIT 2012, held in Paris, France, July 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Smart Card Research and Advanced Applications, CARDIS 2012, held in Graz, Austria, in November 2012.
This book contains the refereed proceedings of the International Conference on Modeling and Simulation in Engineering, Economics, and Management, MS 2013, held in Castellon de la Plana, Spain, in June 2013.