This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Smart Card Research and Advanced Applications, CARDIS 2019, held in Prague, Czech Republic, in November 2019.
The two volumes LNCS 11982 and 11983 constitute the proceedings of the 11th International Symposium on Cyberspace Safety and Security, CSS 2019, held in Guangzhou, China, in December 2019.
This book constitutes the proceedings of the 14th International Conference on Queueing Theory and Network Applications, QTNA 2019, held in Ghent, Belgium, in August 2019.
This book focuses on the emerging advances in distributed communication systems, big data, intelligent computing and Internet of Things, presenting state-of-the-art research in frameworks, algorithms, methodologies, techniques and applications associated with data engineering and wireless distributed communication technologies.
This collection of peer-reviewed workshop papers provides comprehensive coverage of cutting-edge research into topological approaches to data analysis and visualization.
This book constitutes the refereed proceedings of the Second International Conference on Smart Blockchain, SmartBlock 2019, held in Birmingham, UK, in October 2019.
This book is devoted to control of finite and infinite dimensional processes with continuous-time and discrete time control, focusing on suppression problems and new methods of adaptation applicable for systems with sliding motions only.
This book constitutes the refereed proceedings of the 22nd International Conference on Distributed and Computer and Communication Networks, DCCN 2019, held in Moscow, Russia, in September 2019.
This work presents recent mathematical methods in the area of optimal control with a particular emphasis on the computational aspects and applications.
This book proposes a synergistic framework to help IP vendors to protect hardware IP privacy and integrity from design, optimization, and evaluation perspectives.
This comprehensive book is primarily intended for researchers, engineers, mathematicians and computer security specialists who are interested in multimedia security, steganography, encryption, and related research fields.
The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019.
This book offers a transdisciplinary perspective on the concept of "e;smart villages"e; Written by an authoritative group of scholars, it discusses various aspects that are essential to fostering the development of successful smart villages.
This book reports on the development and assessment of a novel framework for studying neural interactions (the connectome) and their dynamics (the chronnectome).
This book constitutes the refereed proceedings of the 5th Conference on AElectronic Governance and Open Society: Challenges in Eurasia, EGOSE 2018, held in St.
This book constitutes the proceedings of the Second International Conference on Information and Communication Technology for Development for Africa, ICT4DA 2019, held in Bahir Dar, Ethiopia, in May 2019.
This book presents refereed proceedings of the First International Conference on Algebra, Codes and Cryptology, A2C 2019, held in Dakar, Senegal, in December 2019.
This volume of Eurasian Studies in Business and Economics includes selected papers from the 24th Eurasia Business and Economics Society (EBES) Conference, held in Bangkok.
This book discusses methods and algorithms for the near-optimal adaptive control of nonlinear systems, including the corresponding theoretical analysis and simulative examples, and presents two innovative methods for the redundancy resolution of redundant manipulators with consideration of parameter uncertainty and periodic disturbances.
This volume explores the complex problems that arise in the modeling and simulation of crowd dynamics in order to present the state-of-the-art of this emerging field and contribute to future research activities.
This book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Be'er Sheva, Israel, in July 2020.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019.
In the context of life sciences, we are constantly confronted with information that possesses precise semantic values and appears essentially immersed in a specific evolutionary trend.
This book constitutes the thoroughly refereed post-conference proceedings of the International Workshop on Interplay of Security, Safety and System/Software Architecture, CSITS 2018, and the International Workshop on Cyber Security for Intelligent Transportation Systems, ISSA 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018.
This book presents papers on various problems of dependability in computer systems and networks that were discussed at the 14th DepCoS-RELCOMEX conference, in Brunow, Poland, from 1st to 5th July 2019.
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018.
This book constitutes the refereed proceedings of the 18th International Conference on Cryptology and Network Security, CANS 2019, held in Fuzhou, China, in October 2019.
This book provides profound insights into industrial control system resilience, exploring fundamental and advanced topics and including practical examples and scenarios to support the theoretical approaches.
This book constitutes the thoroughly refereed post-conference proceedings of the 24th International Conference on Financial Cryptography and Data Security, FC 2020, held in Kota Kinabalu, Malaysia, in February 2020.
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019.
This two-volume book constitutes the refereed proceedings of the Second International Conference on Multimedia Technology and Enhanced Learning, ICMTEL 2020, held in Leicester, United Kingdom, in April 2020.
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018.
This book aims to bring together researchers and practitioners from diverse disciplines-from sociology, biology, physics, and computer science-who share a passion to better understand the interdependencies within and across systems.
This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS 2018, held in Amalfi, Italy, in October 2018.
This textbook provides a rigorous mathematical perspective on error-correcting codes, starting with the basics and progressing through to the state-of-the-art.
This text provides one of the first book-length studies on the innovative and sustainable development of complex systems in the era of digital transformations, combining quantitative data from several countries with detailed qualitative accounts at the national level.
This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018.
This book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019.