This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007.The 15 revised full papers presente
These Transactions publish archival papers in the broad area of Petri nets and other models of concurrency, ranging from theoretical work to tool support and industrial applications. ToPNoC issues are
Edited in collaboration with FoLLI, the Association of Logic, Language and Information, this book constitutes the refereed proceedings of the 4th Indian Conference on Logic and Its Applications, ICLA
This volume constitutes the refereed proceedings of 11 international workshops held as part of OTM 2010 in Hersonissos, Greece in October 2010. The 68 revised full papers presented were carefully revi
This volume presents the revised lecture notes of selected talks given at the Third Central European Functional Programming School, CEFP 2009, held in May 2009 in Komarno, Slovakia. It was co-organize
This book constitutes the refereed proceedings of the 4th International Conference on Combinatorial Optimization and Applications, COCOA 2010, held in Kailua-Kona, HI, USA, in December 2010.The 49 rev
The three volume set LNCS 6453, LNCS 6454, and LNCS 6455 constitutes the refereedproceedings of the 6th International Symposium on Visual Computing, ISVC 2010, heldin Las Vegas, NV, USA, in November/D
This book constitutes the refereed proceedings of the 9th International Conference on Web-Based Learning, ICWL 2010, held in Shanghai, China, in December 2010. The 36 revised full papers and 8 short p
This book constitutes the refereed proceedings of the First International Conference on Swarm, Evolutionary, and Memetic Computing, SEMCCO 2010, held in Chennai, India, in December 2010.The 86 revised
This book constitutes the refereed proceedings of the 4th International Workshop on Real-World Wireless Sensor Networks, REALWSN 2010, held in Colombo, Sri Lanka, in December 2010.The 11 full papers a
This book constitutes the refereed proceedings of the 21st International Symposium on Algorithms and Computation, ISAAC 2010, held in Jeju, South Korea in December 2010.The 77 revised full papers pres
This book constitutes the refereed contest reports of the 20th International Conference on Pattern Recognition, ICPR 2010, held in Istanbul, Turkey, in August 2010. The 31 revised full papers presente
This book constitutes the refereed proceedings of the 12th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2010, held in Changchun, China, in August 2010.?The 78 re
This book constitutes the refereed proceedings of the 12th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2010, held in Changchun, China, in August 2010. The 78 re
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology in India, INDOCRYPT 2010, held in Hyderabad, India, in December 2010. The 22 revised full papers were
This book constitutes the refereed proceedings of the 15th iberoamerican Congress on Pattern Recognition, CIARP 2010, held in Sao Paulo, Brazil, in November 2010. The 70 revised full papers presented
This book constitutes the refereed proceedings of the 6th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2010, held in Istanbul, Turkey, in June 2010. The
This book explores concepts of games and strategies to provide a paradigm for understanding the nature of computation and provides an elementary introduction to the mathematics and modelling of compu
This book constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security, ICICS 2010, held in Barcelona, Spain, in December 2010. The 31 revised f
This book constitutes the refereed proceedings of the 6th Asia Information Retrieval Symposium, AIRS 2010, held in Taipei, Taiwan, in December 2010.The 26 revised full papers and 31 revised poster pap
These Transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the Semantic Web, social networks
The two-volume set of LNCS 6426/6427 constitutes the refereed proceedings of 3 confederated international conferences on CoopIS (Cooperative Information Systems), DOA (Distributed Objects and Applicat
This book constitutes the thoroughly refereed post-conference proceedings of theworkshops held at the 10th International Conference on Web Engineering, ICWE 2010, in Vienna, Austria, in July 2010.The
The two-volume set of LNCS 6426/6427 constitutes the refereed proceedings of 3 confederated international conferences on CoopIS (Cooperative Information Systems), DOA (Distributed Objects and Applicat
The 23 papers presented together with 4 invited papers 2 system and tool presentations and 1 tutorial lecture were carefully reviewed and selected from 95 initial submissions. The papers are devoted t
This volume constitutes the refereed proceedings of the Third European Conference, ServiceWave 2010, held in Ghent, Belgium, in December 2010. The 15 revised full papers presented were carefully revie
This festschrift volume, published in honor of Manfred Nagl on the occasion of his 65th birthday, contains 30 refereed contributions, edited by five of his academic descendants. The types of papers va
The three volume set LNCS 6453, LNCS 6454, and LNCS 6455 constitutes the refereedproceedings of the 6th International Symposium on Visual Computing, ISVC 2010, heldin Las Vegas, NV, USA, in November/D
This book constitutes the refereed proceedings of the 6th InternationalConference on Information Systems Security, ICISS 2010, held inGandhinagar, India, in December 2010.The 14 revised full papers pr
This book constitutes the refereed proceedings of the 14th International Conference on Principles of Distributed Systems, OPODIS 2010, held in Tozeur, Tunisia, in December 2010.The 32 full papers and
As software systems become increasingly ubiquitous, issues of dependability become ever more crucial. Given that solutions to these issues must be considered from the very beginning of the design proc
This book comprises selected papers of the Second International Conference on Future Generation Information Technology, FGIT 2010, in Jeju Island, Korea, in December 2010.The 60 full papers presented
This book constitutes the refereed best selected papers of the 5th International Symposium on Parameterized and Exact Computation, IPEC 2010, held in Chennai, India, in December 2010.The 19 revised fu
This book constitutes the refereed proceedings of the 9th International Conference on Cryptology and Network Security, CANS 2010, held in Kuala Lumpur, Malaysia, in December 2010. The 21 revised full
This book constitutes the proceedings of the 11th International Conference on Web Information Systems Engineering, WISE 2010, held in Hong Kong, China, in December 2010. The 32 revised full papers and
Undergraduate Topics in Computer Science (UTiCS) delivers high-quality instructional content for undergraduates studying in all areas of computing and information science. From core foundational and
As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security expert
This book constitutes the refereed proceedings of the 8th International Conference, ICSOC 2010, held in San Francisco, CA, USA, in December 2010.The 33 revised full papers and three full industry pape
The three volume set LNCS 6453, LNCS 6454, and LNCS 6455 constitutes the refereedproceedings of the 6th International Symposium on Visual Computing, ISVC 2010, heldin Las Vegas, NV, USA, in November/D
This book constitutes the refereed proceedings of the Third International Symposium on Unifying Theories of Programming, UTP 2010, held in Shanghai, China, in November 2010, in conjunction with the 12