This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Sensor Systems and Software, S-Cube 2012, held in Lisbon, Portugal in June 2012.
This book constitutes the proceedings of the 4th International Conference on Intelligent Technologies for Interactive Entertainment (INTETAIN 11). The 20 full papers, 3 posters, 10 demos and 4 worksho
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 20
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Mobile Networks and Managements (MONAMI 2011) held in Aveiro, Portugal, in Septe
This book constitutes the thoroughly refereed proceedings of the 4th International Conference on Mobile Wireless Middleware, Operating Systems, and Applications, Mobilware 2011, held in London, UK, in
This book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference on Wireless Communications and Applications, ICWCA 2011, held in Sanya, China, in A
This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam,
The field of artificial economics (AE) embraces a broad range of methodologies relying on computer simulations in order to model and study the complexity of economic and social phenomena. The overarch
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Personal Satellite Services, PSATS 2011, held in Malaga, Spain, in February 2011
This book constitutes the proceedings of the 7th International ICST Conference, TridentCom 2011, held in Shanghai, China, in April 2011. Out of numerous submissions the Program Committee finally selec
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Mobile Multimedia Communications (MOBIMEDIA 2011) held in Cagliari, Italy, in Sept
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Game Theory for Networks (GameNets 2011) held in Shanghai, China, April 16-18, 2011.
Quantum dots as nanomaterials have been extensively investigated in the past several decades from growth to characterization to applications. As the basis of future developments in the field, this boo
This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference, UCMedia 2009, which was held on 9-11 December 2009 at Hotel Novotel Venezia Mestre Cast
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Broadband Communications, Networks and Systems (BROADNETS 2010) held in October 20
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST on Auctions, Market Mechanisms and Their Applications (AMMA 2011) held in New York, USA, Augu
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International ICST Conference on Wireless Internet (WICON 2011) held in Xi’an, Shaanxi, China in October 2011. The
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2010
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2011, held in
This volume constitutes the refereed proceedings of the Third International ICST Conference, ADHOCNETS 2011, held in Paris, France, in September 2011. The 15 revised full papers - selected from 42 sub
This monograph is aiming at researchers of systems control, especially those interested in multiagent systems, distributed and decentralized control, and structured systems. The book assumes no prior
Search and Classification Using Multiple Autonomous Vehicles provides a comprehensive study of decision-making strategies for domain search and object classification using multiple autonomous vehicles
This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2011, held in Lucerne, Switzerland, i
Sensor networks have recently come into prominence because they hold the potential to revolutionize a wide spectrum of both civilian and military applications. An ingenious characteristic of sensor ne
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India
Predictive theories of phenomena involving phase change with applications in engineering are investigated in this volume, e.g.solid-liquid phase change, volume and surface damage, and phase change inv
This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised ful
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 re
This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011. The 26
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Ambient Systems and Media, AMBI-SYS 2011, held in Porto, Portugal in March 2011
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOM 2010, held in
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference, eHealth 2010, held in Casablanca, Morocco, in December 2010. The 30 revised full papers
This is the third volume in a series of books on selected topics in Nanoscale Science and Technology based on lectures given at the well-known Istituto Nazionale di Fisica Nucleare (INFN) schools of t
This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Malaga, in June 2
This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011.The 23 revised full papers p
This monograph treats the theory of Dirichlet forms from a comprehensive point of view, using "nonstandard analysis." Thus, it is close in spirit to the discrete classical formulation of Dirichlet spa
This book constitutes the proceedings of the 6th International ICST Conference, TridentCom 2010, held in Berlin, Germany, in May 2010. Out of more than 100 submitted contributions the Program Committe