The8thWorkshopontheFoundationsofGeneticAlgorithms,FOGA-8,washeld at the University of Aizu in Aizu-Wakamatsu City, Japan, January 5–9, 2005. This series of workshops was initiated in 1990 to encourage
This volume comprises the proceedings of the 4th Conference on Advanced - cryption Standard, ‘AES — State of the Crypto Analysis,’ which was held in Bonn, Germany, during 10–12 May 2004. The conferenc
This book presents thoroughly revised tutorial papers based on lectures given by leading researchers at the First Summer School on Reasoning Web in Msida, Malta, in July 2005. The objective is to prov
This book constitutes the refereed proceedings of the 3rd International Conference on Human.Society@Internet, HSI 2005, held in Tokyo, Japan in July 2005.The 32 revised full papers and 9 revised poste
This book constitutes the refereed proceedings of the 5th International Conference on Audio- and Video-Based Biometric Person Authentication, AVBPA 2005, held in Hilton Rye Town, NY, USA, in July 2005
This book constitutes the refereed proceedings of the 4th International Conference on Web-Based Learning, ICWL 2005, held in? Hong Kong, China in July/August 2005.The 33 revised full papers and 9 shor
Maluf, Davide Martinenghi, Stan Matwin, Natasha Noy, Werner Nutt, James Peters, Jean-Marc Petit, Vijay Raghavan, Jan Rauch, Gilbert Ritschard, Erik Rosenthal, Marie-Christine Rousset, Nahid Shahmehri,
This book constitutes the refereed proceedings of the 18th Annual Conference on Learning Theory, COLT 2005, held in Bertinoro, Italy in June 2005.The 45 revised full papers together with three article
This book constitutes the refereed proceedings of the 4th International Conference on Machine Learning and Data Mining in Pattern Recognition, MLDM 2005, held in Leipzig, Germany, in July 2005.The 68
The 16th Annual Symposium on Combinatorial Pattern Matching was held on Jeju Island, Korea on June 19–22, 2005. Previous meetings were held in Paris, London, Tucson, Padova, Asilomar, Helsinki, Laguna
This book constitutes the refereed proceedings of the International Conference on E-Government, TCGOV 2005, held in Bolzano, Italy in March 2005.The 28 revised full papers presented were carefully rev
In this book, we present a collection of papers around the topic of agent com- nication. The communication between agents has been one of the major topics of research in multiagent systems. The curren
This book constitutes the refereed proceedings of the Second International Conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, CPAIOR 2
On behalf of the Organizing Committee I am pleased to present the proceedings of the 2005 Symposium on Component-Based Software Engineering (CBSE). CBSE is concerned with the development of software-i
This book constitutes the refereed proceedings of the Third International Conference on Wired/Wireless Internet Communications, WWIC 2005, held in Xanthi, Greece in May 2005.The 34 revised full papers
Inconsistency arises in many areas in advanced computing. Often inconsistency is unwanted, for example in the specification for a plan or in sensor fusion in robotics; however, sometimes inconsistency
‘Network’ is a heavily overloaded term, so that ‘network analysis’ means different things to different people. Specific forms of network analysis are used in the study of diverse structures such as th
This book constitutes the refereed proceedings of the 4th International Workshop on Algorithms in Bioinformatics, WABI 2004, held in Bergen, Norway, in September 2004.The 39 revised full papers presen
This book is devoted to computer-based modeling in cardiology, by taking an educational point of view, and by summarizing knowledge from several, commonly considered delimited areas of cardiac researc
Interactive Digital Storytelling has evolved as a prospering research topic banding together formerly disjointed disciplines stemming from the arts and humanities as well as computer science. It’s tie
The Internet and the worldwide web play an increasingly important role in our private and professional activities, for example in accessing information about cultural, political, economical, medical o
A self-contained treatment of theoretically and practically important efficient algorithms for the primality problem. The text covers the randomized algorithms by Solovay-Strassen and Miller-Rabin fro
This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.The 32 rev
This book constitutes the refereed proceedings of the first International Theory of Cryptography Conference, TCC 2004, held in Cambridge, MA, USA in February 2004.The 28 revised full papers presented
The aim of contextual logic is to provide a formal theory of elementary logic, which is based on the doctrines of concepts, judgements, and conclusions. Concepts are mathematized using Formal Concept
This book constitutes the refereed proceedings of the 18th International Symposium on Computer and Information Sciences, ISCIS 2003, held in Antalya, Turkey in November 2003.The 135 revised papers pre
The 7th Annual Financial Cryptography Conference was held January 27–30, 2003, in Guadeloupe, French West Indies. Financial Cryptography is organized by the International Financial Cryptography Associ
Algorithms that have to process large data sets have to take into account that the cost of memory access depends on where the data is stored. Traditional algorithm design is based on the von Neumann m
Nowadays, engineering large-scale software systems means dealing with complex systems composed of pervasive software components that move around and adapt to nondeterministic and open environments, li
This book constitutes the refereed proceedings of the Second International Workshop on Experimental and Efficient Algorithms, WEA 2003, held in Ascona, Switzerland in May 2003.The 19 revised full pape
This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on the Design, Specification, and Verification of Interactive Systems, DSV-IS 2002, held in Rostock, G
A central aim and ever-lasting dream of computer science is to put the development of hardware and software systems on a mathematical basis which is both firm and practical. Such a scientific foundati
TheAlgorithmicNumberTheorySymposiabeganin1994atCornellUniversity inIthaca,NewYorktorecognizethegrowingimportanceofalgorithmicwork in the theory of numbers. The subject of the conference is broadly con
This book constitutes the refereed proceedings of the 7th International Conference on Parallel Problem Solving from Nature,PPSN 2002, held in Granada, Spain in September 2002.The 90 revised full paper
Biometric authentication refers to identifying an individual based on his or her distinguishing physiological and/or behavioral characteristics. It associates an individual with a previously determine
Although framework technology has proven its worth as a software reuse technique in many domains, there have been reservations regarding its application in embedded systems, mostly due to limited CPU
Data warehouses differ significantly from traditional transaction-oriented operational database applications. Indexing techniques and index structures applied in the transaction-oriented context are n
The ?rst International Summer School on Theoretical Aspects of Computer Science was organized by the Institute for Studies in Theoretical Physics and Mathematics(IPM)inTehran,Iran. ProgramCommittee Co
th DEXA 2001, the 12 International Conference on Database and Expert Systems Applications was held on September 3–5, 2001, at the Technical University of Munich, Germany. The rapidly growing spectrum
Haptic human-computer interaction is interaction between a human computer user and the computer user interface based on the powerful human sense of touch. Haptic hardware has been discussed and exploi