The synergy and convergence of research on grid computing and peer-to-peer (P2P) computing have materialized in the meeting of the two research communities: parallel systems and distributed systems.
This book constitutes the refereed proceedings of the 20th International Conference on Database and Expert Systems Applications, DEXA 2009, held in Linz, Austria, in August/September 2009.
This book constitutes the refereed proceedings of the Third International Conference on Information Systems, Technology and Management, ICISTM 2009, held in Ghaziabad, India, in March 2009The 30 revised full papers presented together with 4 keynote papers were carefully reviewed and selected from 79 submissions.
The international conference \Operations Research 2008"e;, the annual meeting of the German Operations Research Society (GOR), was held at the University of Augsburg on September 3-5, 2008.
This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008.
This book constitutes the refereed proceedings of the 8th International Conference on Smart Card Research and Advanced Applications, CARDIS 2008, held in London, UK, in September 2008.
This book constitutes the refereed proceedings of the 5th International Conference on Sequences and Their Applications, SETA 2008, held in Lexington, KY, USA in September 2008.
These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Security--ESORICS 2008--held October 6-8, 2008 in Torremolinos (Malaga), Spain, and hosted by the University of Malaga, C- puter Science Department.
With the rapid development of information technologies and the transition to next-generation networks, computer systems and in particular embedded s- tems are becoming more and more mobile and ubiquitous.
These are the proceedings of the Workshop on Sequences, Subsequences, and Consequences that was held at the University of Southern California (USC), May 31 - June 2, 2007.
The 26th International Conference on Conceptual Modeling in Auckland, New Zealand, hosted six workshops which allowed participants to focus their p- sentations and discussions on advanced topics that cannot easily ?
This book constitutes the refereed proceedings of the Third International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2002, held in Manchester, UK in August 2002.
Since its establishment in Hong Kong in 1998,the international Intelligent Data Engineering and Automated Learning (IDEAL) conference has become a r- erence for researchers in both theoretical and practical aspects of learning and information processing, data mining, retrieval and management, bioinformatics and bio-inspired models, agents and hybrid systems and ?
This book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Krakow, Poland, September 5-7, 2006.
This volume contains revised versions of selected papers presented at the biennial meeting of the Classification and Data Analysis Group (CLADAG) of the Italian Statistical Society, which was held in Parma, June 6-8, 2005.
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12-14, 2005 in Milan, Italy.
This book and its sister volume, LNAI 3613 and 3614, constitute the proce- ings of the Second International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2005), jointly held with the First International Conference on Natural Computation (ICNC 2005, LNCS 3610, 3611, and 3612) from - gust 27-29, 2005 in Changsha, Hunan, China.
The European Conference on Machine Learning (ECML) and the European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD) were jointly organized this year for the ?
For more than a decade, data warehousing and knowledge discovery technologies have been developing into key technologies for decision-making processes in com- nies.
This three-volume set LNCS constitutes the proceedings of several Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, during June 2025.
A follow-up to the author's prescient bestseller, first published in 1982, that alerted the public to the likely impacts of information technologies and the emergence of a post-industrial society.
SHORTLISTED FOR THE 2022 NED KELLY AWARD FOR BEST TRUE CRIMEThe compelling story of South Australia s disgraced former chief forensic pathologist and the legal scandals in which he became implicated.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
Performative methods are playing an increasingly prominent role in research into historical production processes, materials, bodily knowledge and sensory skills, and in forms of education and public engagement in classrooms and museums.
This book constitutes the refereed proceedings of the workshops held at the 44th International Conference on Conceptual Modeling, ER 2025, which took place in Poitiers, France, during October 20–23, 2025.
This book offers advanced iterative learning control (ILC) and optimization methods for industrial batch systems, facilitating engineering applications subject to time- and batch-varying process uncertainties that could not be effectively addressed by the existing ILC methods.
This book offers advanced iterative learning control (ILC) and optimization methods for industrial batch systems, facilitating engineering applications subject to time- and batch-varying process uncertainties that could not be effectively addressed by the existing ILC methods.
This three-set volume LNCS 16217-16219 constitutes the refereed proceedings of 27th International Conference on Information and Communications Security, ICICS 2025, held in Nanjing, China, during October 29–31, 2025.
This groundbreaking book explores the complex world of elongate mineral particles (EMPs), critical occupational and environmental agents with significant public health implications.