In June of 2002, over 500 professors, students and researchers met in Boston, Massachusetts for the Fourth International Conference on Complex Systems.
This proceedings volume consists of selected papers presented at the Ninth Int- national Conference on Computer-Aided Scheduling of Public Transport (CASPT 2004), which was held at the Hilton San Diego Resort and Conference Center in San Diego, California, USA, from August 9-11, 2004.
This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in June 2008.
It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4-7, 2006.
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences.
With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
ItwasourpleasuretoholdtheInternationalWorkshoponSecurity2006(IWSEC 2006) this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series.
These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, Japan, October 10-13, 2006.
Computational science based on the high-level use of computers has been called the third major method in the field of scientific research, standing alongside the conventional methods of theory and experiment.
The LNCS Journal on Data Semantics is devoted to the presentation of notable work that, in one way or another, addresses research and development on issues related to data semantics.
This volume contains the papers presented at the 13th International Symposium on String Processing and Information Retrieval (SPIRE), held October 11-13, 2006, in Glasgow, Scotland.
The two premier annual European conferences in the areas of machine learning anddatamining havebeencollocatedeversincethejointconferenceinFreiburg, Germany,2001.
This book constitutes the refereed proceedings of the 24th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2005, held in Fredrikstad, Norway, in September 2005.
th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, during August 30 - September 2, 2006.
Developing software for current and especially for future architectures will require knowledge about parallel programming techniques of applications and library p- grammers.
Today, PKIs have come of age and they support the security of several large networked systems, such as company-wide document management systems,- governmentapplicationsandsecureVPN.