Many students and programmers familiar with Pascal are now looking to upgrade their skills to a well-structured object-oriented programming language such as C++. This textbook provides such an "upgrad
This brief presents the challenges and solutions for VANETs’ security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network M
This book constitutes the refereed proceedings of the 5th International Workshop CCAA 2013, held in conjunction with MICCAI 2013, in Nagoya, Japan, in September 2013. The book includes 32 papers which
This book constitutes the refereed proceedings of the 12th International Conference on Entertainment Computing, ICEC 2013, held in Sao Paulo, Brazil, in October 2013. The 13 full papers, 6 short paper
This book constitutes the refereed proceedings of the 12th International Conference on Web-Based Learning, ICWL 2013, held in Kenting, Taiwan, in October 2013. The 34 revised full papers presented wer
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to applicati
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.The 43 papers included in the book were carefully
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 201
This book constitutes the refereed proceedings of the 19th International Symposium on Fundamentals of Computation Theory, FCT 2013, held in Liverpool, UK, in August 2013. The 29 papers (26 full papers
This book contains revised selected papers from the Second International Conference on Information Technologies for Performing Arts, Media Access and Entertainment, ECLAP 2013, held in Porto, Portugal
This book constitutes the thoroughly refereed proceedings of the 8th International Haifa Verification Conference, HVC 2012, held in Haifa, Israel in November 2012. The 18 revised full papers presented
This book constitutes the refereed proceedings of the 11th International Conference on Smart Homes and Health Telematics, ICOST 2013, held in Singapore, in June 2013. The 22 revised full papers presen
This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12
This book constitutes the refereed proceedings of the 6th International Conference on Hybrid Learning, ICHL 2013, held in Toronto, ON, Canada, in August 2013. The 35 papers presented in this volume we
This book constitutes the thoroughly refereed post-conference proceedings of the 29th British National Conference on Databases, BNCOD 2013, held in Oxford, UK, in July 2013. The 20 revised full papers
This edited volume highlights recent research advances in humanitarian relief logistics. The contributed chapters span the spectrum of key issues and activities from preparedness to mitigation operati
Matching problems with preferences are all around us — they arise when agents seek to be allocated to one another on the basis of ranked preferences over potential outcomes. Efficient algorithms are n
This book constitutes the refereed proceedings of the 10th Extended Semantic Web Conference, ESWC 2013, held in Montpellier, France, in May 2013. The 42 revised full papers presented together with thr
Technology, people, e-workplaces: these are the elements that fast moving organizations use to meet changing business requirements by using technology to invent new business processes, to re-align
This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communi
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 201
This book constitutes the refereed proceedings of the Second International Conference on Health Information Science, HIS 2013, held in London, UK, in March 2013.The 20 full papers presented together w
The four-volume set LNCS 7724--7727 constitutes the thoroughly refereed post-conference proceedings of the 11th Asian Conference on Computer Vision, ACCV 2012, held in Daejeon, Korea, in November 2012
The four-volume set LNCS 7724--7727 constitutes the thoroughly refereed post-conference proceedings of the 11th Asian Conference on Computer Vision, ACCV 2012, held in Daejeon, Korea, in November 2012
Commanding and controlling organizations in extreme situations is a challenging task in military, intelligence, and disaster management. Such command and control must be quick, effective, and consider
This book constitutes the thoroughly refereed workshop proceedings of the Second International Workshop on Medical Computer Vision, MCV 2012, held in Nice, France, October 2012 in conjunction with the
This book constitutes the refereed post-proceedings of the Joint International Conference on Pervasive Computing and the Networked World, ICPCA-SWS 2012, held in Istanbul, Turkey, in November 2012. Th
This book constitutes the proceedings of the 35th European Conference on IR Research, ECIR 2013, held in Moscow, Russia, in March 2013. The 55 full papers, 38 poster papers and 10 demonstrations prese
Collecting work presented at the 9th Metaheuristics International Conference (2011), this book covers theoretical properties and performance guarantees, configuration of metaheuristic algorithms, comb
This volume constitutes the refereed proceedings of the 11th International Conference on Applied Parallel and Scientific Computing, PARA 2012, held in Helsinki, Finland, in June 2012. The 35 revised f
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Symposium on Graph Drawing, GD 2012, held in Redmond, WA, USA, in September 2012. The 42 revised ful
This work focuses on central catadioptric systems, from the early step of calibration to high-level tasks such as 3D information retrieval. The book opens with a thorough introduction to the sphere ca
Business modelling is a vast arena of research and practice, which is gaining increasing important in the rapid development of e-commerce, globalization, and in particular, the movement toward glob
This monograph is a slightly revised version of my PhD thesis [86], com- pleted in the Department of Computer Science at the University of Edin- burgh in June 1988, with an additional chapter summaris
Social media has drastically improved the way we can reach target audiences and serve our customers. Like its financial counterpart, the social media audit (SMA) can be described as a formalized revie
This text teaches the essentials of C programming, concentrating on what readers need to know in order to produce stand-alone programs and so solve typical scientific and engineering problems. It is a
In Decision Modelling And Information Systems: The Information Value Chain the authors explain the interrelationships between the decision support, decision modelling, and information systems. The fir
The author shows how using computers and FORTRAN 95 it is possible to tackle and solve a wide range of problems as they might be encountered in engineering or in the physical sciences.
Often considered more of an art than a science, books on clustering have been dominated by learning through example with techniques chosen almost through trial and error. Even the two most popular, an
This textbook provides undergraduate students with an introduction to the basic theoretical models of computability, and develops some of the model's rich and varied structure. The first part of the b