As the interconnectivity between humans through technical devices is becoming ubiquitous, the next step is already in the making: ambient intelligence, i.
Bringing together over fifty contributions on all aspects of nonlinear and complex dynamics, this impressive topical collection is both a scientific and personal tribute, on the occasion of his 70th birthday, by many outstanding colleagues in the broad fields of research pursued by Prof.
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
Brain Dynamics serves to introduce graduate students and nonspecialists from various backgrounds to the field of mathematical and computational neurosciences.
Effective evacuation of people from closed spaces is an extremely important topic, since it can save real lives in emergency situations that can be brought about by natural and human made disasters.
ASIACRYPT'98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Beijing Friendship Hotel from October 18 to 22.
The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography.
This book constitutes the refereed proceedings of the Third International Conference on Visual Information Systems, VISUAL'99, held in Amsterdam, The Netherlands, in June 1999.
In the first part, this book analyzes the knowledge discovery process in order to understand the relations between knowledge discovery steps and focusing.
This book constitutes the refereed proceedings of the 21st International Conference on Computer Safety, Reliability and Security, SAFECOMP 2002, held in Catania, Italy in September 2002.
Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International Conference on Information Security and Cryptology (ICISC2001) was held at the 63 Building in Seoul, Korea, Dec- ber 6-7, 2001.
The objective of the workshops held in conjunction with ER 2002, the 21st International Conference on Conceptual Modeling, was to give participants the opportunitytopresentanddiscussemerginghottopics,thusaddingnewpersp- tives to conceptual modeling.
The objective of the workshops associated with the ER2000 19th International Conference on Conceptual Modeling was to give participants the opportunity to present and discuss emerging, hot topics, thus adding new perspectives to conceptual modeling.
After the advent of data mining and its successful application on conventional data, Web-related information has been an appropriate and increasingly popular target of knowledge discovery.
The growth of the Internet and the availability of powerful computers and hi- speed networks as low-cost commodity components are changing the way we do computing.
The widespread interest this book has found among professors, scientists and stu- dents working in a variety of fields has made a new edition necessary.
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects.
The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and TelecommunicationsResearchInstitute(ETRI),andtheMinistryofInformation and Communication (MIC).
In this book for the first time two scientific fields - consensus formation and synchronization of communications - are presented together and examined through their interrelational aspects, of rapidly growing importance.
Synchronization of chaotic systems, a patently nonlinear phenomenon, has emerged as a highly active interdisciplinary research topic at the interface of physics, biology, applied mathematics and engineering sciences.
Crypto '99, the Nineteenth Annual Crypto Conference, was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department, University of California, Santa Barbara (UCSB).
The Conference on Spatial Information Theory - COSIT - grew out of a series of workshops / NATO Advanced Study Institutes / NSF specialist meetings concerned with cognitive and applied aspects of representing large-scale space, particularly geographic space.
The International Conference on Networking (ICN01) is the first conference in its series aimed at stimulating technical exchange in the emerging and important field of networking.