This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2008, held in Newcastle upon Tyne, UK, in September 2008.
This book constitutes the refereed proceedings of the Second International Conference on Provable Security, ProvSec 2008, held in Shanghai, China, October 30 - November 1, 2008.
This book constitutes the refereed proceedings of the 5th International Workshop on Visualization for Cyber Security held on September 15, 2008, in Cambridge, Massachusetts, USA, in conjunction with the 11th International Symposium on Recent Advances in Intrusion Detection (RAID).
This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ICICS 2008, held in Birmingham, UK, in October 2008.
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008.
This book constitutes the thoroughly refereed post-conference proceedings of the Second IFIP TC 2 Central and East Conference on Software Engineering Techniques, CEE-SET 2007, held in Poznan, Poland, in October 2007.
This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded Systems, CHES 2008, held in Washington, D.
This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008.
It is a pleasure to welcome you to the proceedings of the second International Castle Meeting on Coding Theory and its Applications, held at La Mota Castle in Medina del Campo.
The Visual Information Systems International Conference series is designed to provide a forum for researchers and practitioners from diverse areas of computing including computer vision, databases, human-computer interaction, information security, image processing, information visualization and mining, as well as knowledge and information management to exchange ideas, discuss challenges, present their latest results and to advance research and development in the construction and application of visual information systems.
This book contains the best papers of the 4th International Conference on E-business and Telecommunications (ICETE), which was held during July 28-31, 2007 in Barcelona, Spain.
This volume contains the best papers presented at the 12th East-European Conference on Advances in Databases and Information Systems (ADBIS 2008) held during S- tember 5-9, 2008, in Pori, Finland.
* Data warehousing and semantic data mining * Spatial, temporal, multimedia and multimodal semantics * Semantics in data visualization * Semantic services for mobile users * Supporting tools * Applications of semantic-driven approaches These topics are to be understood as specifically related to semantic issues.
* Web semantics and semi-structured data * Semantic caching * Data warehousing and semantic data mining * Spatial, temporal, multimedia and multimodal semantics * Semantics in data visualization * Semantic services for mobile users * Supporting tools * Applications of semantic-driven approaches These topics are to be understood as specifically related to semantic issues.
This book contains the best papers of the Second International Conference on E-business and Telecommunication Networks (ICETE), which was held, in 2005, at the Microsoft Research Centre - Reading, in the UK.
This volume contains the proceedings of the 11th International Symposium on Database Programming Languages (DBPL 2007), held in Vienna, Austria, on September 23-24, 2007.
Since its first edition in 2003, the XML Database Symposium series (XSym) has been a forum for academics, practitioners, users and vendors to discuss the use of and synergy between databases and XML.
The series of East European Conferences on Advances in Databases and Information Systems (ADBIS) is an established and prestigious forum for the exchange of the latest research results in data management.
* Semantic caching * Data warehousing and semantic data mining * Spatial, temporal, multimedia and multimodal semantics * Semantics in data visualization * Semantic services for mobile users * Supporting tools * Applications of semantic-driven approaches These topics are to be understood as specifically related to semantic issues.
This book contains the best papers of the Third International Conference on E-business and Telecommunications (ICETE), which was held in 2006 in Portugal.
This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, held in Lausanne, Switzerland in February 2008.