The LNCS Journal on Data Semantics is devoted to the presentation of notable work that, in one way or another, addresses research and development on issues related to data semantics.
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA).
The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica from February 28 to March 3, 2005.
This book is an extended collection of revised contributions that were initially submitted to the International Workshop on Adaptive Multimedia Retrieval (AMR 2005).
Economic application of nonlinear dynamics, microscopic agent-based modelling, and the use of artificial intelligence techniques as learning devices of boundedly rational actors are among the most exciting interdisciplinary ventures of economic theory over the past decade.
Juval Portugali The notion of complex artificial environments (CAE) refers to theories of c- plexity and self-organization, as well as to artifacts in general, and to artificial - vironments, such as cities, in particular.
This volume contains a collection of papers presented at the 3rd Interna- tional Symposium on Autonomous Minirobots for Research and Edutainment (AMiRE 2005) that is held at Awara-Spa, Fukui, Japan, September 20-22, 2005.
Leading-edge research groups in the field of scientific computing present their outstanding projects using the High Performance Computer in Bavaria (HLRB), Hitachi SR8000-F1, one of the top-level supercomputers for academic research in Germany.
On behalf of the Program Committee, it is our pleasure to present the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took place in Seattle, Washington, USA, September 7-9, 2005.
Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005.
It was a pleasure to take part in the 2005 European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005), held on July 13-14 in Visegrad (Hungary) in conjunction with the First International Conference on Wireless Internet (WICON) .
DEXA 2005, the 16th International Conference on Database and Expert Systems Applications, was held at the Copenhagen Business School, Copenhagen, Denmark, from August 22 to 26, 2005.
Applied social research has long been recognised as essential in the field of social work and welfare, though its value is not always immediately apparent.
Applied social research has long been recognised as essential in the field of social work and welfare, though its value is not always immediately apparent.
This book engages in the stream of transnational migration studies by drawing on an empirical examination of the ties that Tunisian migrants and their descendants, living in both northern and southern Italy, maintain with their country of origin.
This book engages in the stream of transnational migration studies by drawing on an empirical examination of the ties that Tunisian migrants and their descendants, living in both northern and southern Italy, maintain with their country of origin.
This book constitutes the refereed proceedings of the 26th International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2025, held in Modena, Italy, during December 16–19, 2025.
This book constitutes the refereed proceedings of the 26th International Conference on Cryptology in India, held in Bhubaneshwar, India, during December 14-17, 2025.
This book constitutes the refereed proceedings of the 26th International Conference on Cryptology in India, held in Bhubaneshwar, India, during December 14-17, 2025.
This book offers an in-depth review of kinetically constrained models (KCMs), a topic that lies at the crossroads of probability and statistical mechanics.
This book constitutes the proceedings of the 25th International Conference, The Inclusive Web: Realizing Safe, Accessible, Inclusive, and Sustainable Web Engineering, ICWE 2025, held in Delft, The Netherlands, during June 30–July 3, 2025.
This book constitutes the proceedings of the 25th International Conference, The Inclusive Web: Realizing Safe, Accessible, Inclusive, and Sustainable Web Engineering, ICWE 2025, held in Delft, The Netherlands, during June 30–July 3, 2025.
Dieses Buch beschreibt, unter welchen Bedingungen das in der DDR am weitesten verbreitete Fernschreibchiffriergerät sowie der dazugehörige Algorithmus vor etwa 50 Jahren zum Schutz von Staatsgeheimnissen entwickelt wurden.