This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011.
This book constitutes the refereed proceedings of the 6th Chinese Conference on Biometric Recognition, CCBR 2011, held in Beijing, China in December 2011. The 35 revised full papers were carefully rev
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Haifa Verification Conference, HVC 2010, held in Haifa, Israel in October 2010.The 10 revised full pa
This book constitutes the refereed proceedings of the 14th International Conference on Fundamental Approaches to Software Engineering, FASE 2011, held in Saarbrucken, Germany, March 26—April 3, 2011,
This book constitutes the refereed proceedings of the 13th International Workshop of Descriptional Complexity of Formal Systems 2011, held in Limburg, Germany, in July 2011. The 21 revised full papers
This book constitutes the refereed proceedings of the 4th International Conference, ICMT 2011, held in Zurich, Switzerland in June 2011.The 14 revised full papers were carefully revised and selected f
The book constitutes the refereed proceedings of the 10th International Conference on Software Composition, SC 2011, held in Zurich, Switzerland, in June/July 2011, co-located with TOOLS 2011 Federate
This book constitutes the refereed proceedings of the 12th International Conference on Software Reuse, ICSR 2011, held in Pohang, South Korea, in June 2011. The 16 revised full papers were carefully r
The two volume set LNAI 7101 and 7102 constitute the refereed proceedings of the 4th International Conference on Intelligent Robotics and Applications, ICIRA 2011, held in Aachen, Germany, in November
This book constitutes the refereed proceedings of the 7th Asia Information Retrieval Societies Conference AIRS 2011, held in Dubai, United Arab Emirates, in December 2011. The 31 revised full papers a
This book constitutes the revised selected papers of the 37th International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2011, held at Tepla Monastery, Czech Republic, in June 2011.The
This volume constitutes the refereed proceedings of the 5th Multi-disciplinary International Workshop On Artificial Intelligence, MIWAI 2011, held in Hyderabad, India, in December 2011. The 38 revised
This book constitutes the refereed proceedings of the 7th International Workshop on Databases in Networked Information Systems, DNIS 2011, held in Aizu-Wakamatsu, Japan in December 2011. The 18 revise
The two volume set LNAI 7101 and LNAI 7102 constitutes the refereed proceedings of the 4th International Conference on Intelligent Robotics and Applications, ICIRA 2011, held in Aachen, Germany, in No
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie finger
The two-volume set LNCS 7066 and LNCS 7067 constitutes the proceedings of the Second International Visual Informatics Conference, IVIC 2011, held in Selangor, Malaysia, during November 9-11, 2011.The
The two-volume set LNCS 7066 and LNCS 7067 constitutes the proceedings of the Second International Visual Informatics Conference, IVIC 2011, held in Selangor, Malaysia, during November 9-11, 2011.The
This book constitutes the thoroughly refereed post-conference proceedings of the 14th Brazilian Symposium on Formal Methods, SBMF 2011, held in Sao Paulo, Brazil, in September 2011; co-located with CB
This book constitutes the refereed proceedings of the 16th Iberoamerican Congress on Pattern Recognition, CIARP 2011, held in Pucon, Chile, in November 2011. The 81 revised full papers presented toget
This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised ful
This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011. The
Peter Byrne erzahlt die Lebensgeschichte von Hugh Everett?III (1930–1982), dessen Theorie der multiplen Universen die Physik und Philosophie entscheidend beeinflusst hat. Neben seiner beruhmten Interp
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, p
This book constitutes the refereed proceedings of the 16th European Symposium on Computer Security, ESORICS 2011, held in Leuven, Belgium, in September 2011. The 36 papers included in the book were ca
This book constitutes the refereed proceedings of the 23rd IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2011, held in Paris, France, in November 2011. The 13 revised ful
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Symposium on Quantum Interaction, QI 2011, held in Aberdeen, UK, in June 2011. The 26 revised full pa
The two-volume set LNCS 7031 and 7032 constitutes the proceedings of the 10th International Semantic Web Conference, ISWC 2011, held in Bonn, Germany, in October 2011. Part I, LNCS 7031, contains 50 r
This book constitutes the refereed proceedings of the 30th International Conference on Conceptual Modeling, ER 2011, held in Brussels, Belgium, in October/November 2011. The 25 revised full papers pre
This Festschrift volume, published in honor of Carolyn Talcott on the occasion of her 70th birthday, contains a collection of papers presented at a symposium held in Menlo Park, California, USA, in No
The two-volume set LNCS 7031 and LNCS 7032 constitutes the proceedings of the 10th International Semantic Web Conference, ISWC 2011, held in Bonn, Germany, in October 2011.Part I, LNCS 7031, contains
This book constitutes the refereed proceedings of four workshops held in conjunction with the Third European Conference, ServiceWave 2010, held in Ghent, Belgium, in December 2010. The book includes 2
This book constitutes the thoroughly refereed post proceedings of two international workshops on special aspects of digital libraries, namely the First International Workshop on Natural Language Proce
This volume constitutes the refereed proceedings of the Fourth European Conference, ServiceWave 2011, held in Poznan, Poland, in October 2011. The 25 revised full papers presented together with 3 invi
This book constitutes the refereed proceedings of the 13th International Conference on Formal Engineering Methods, ICFEM 2011, held in Durham, UK, October 2011. The 40 revised full papers together wit
Das frei nutzbare Programm R ist ein leicht erlernbares und flexibles Werkzeug fur die Datenanalyse. In dem Buch wird die Anwendung anhand einfacher, aber auch anspruchsvoller Beispiele veranschaulich
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 re
This two volume set LNCS 7016 and LNCS 7017 constitutes the refereed proceedings of the 11th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2011, held in Melb
This two volume set LNCS 7016 and LNCS 7017 constitutes the refereed proceedings of the 11th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2011, held in Melb
The two-volume set LNAI 6922 and LNAI 6923 constitutes the refereed proceedings of the Third International Conference on Computational Collective Intelligence, ICCCI 2011, held in Gdynia, Poland, in S
Since the mid 1980s, software agents and multi-agent systems have grown into a very active area of research and also commercial development activity. One of the limiting factors in industry take-up of