This is a short tract on the essentials of differential and symplectic geometry together with a basic introduction to several applications of this rich framework: analytical mechanics, the calculus of
This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on E-Learning, E-Education, and Online Training (eLEOT 2014) held in Bethesda, MD, USA,
This book constitutes the proceedings of the 9th International ICST Conference, TridentCom 2014, held in Guangzhou, China, in May 2014. The 49 revised full papers presented were carefully selected out
This book constitutes the thoroughly refereed proceedings of the 6th International Conference on Ad Hoc Networks, ADHOCNETS 2014, held in Rhodes, Greece, in August 2014. The 16 regular and invited pap
The Future Internet envisions a move toward widespread use of services as a way of networked interaction. However, while the technologies for developing and deploying services are well established, me
This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th E
This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN 2014, and the Second Workshop on Applied Homomorp
This book describes how control of distributed systems can be advanced by an integration of control, communication, and computation. The global control objectives are met by judicious combinations of
This book constitutes revised post-proceedings of the 4th International Symposium on Pervasive Computing Paradigms for Mental Health, MindCare 2014, held in Tokyo, Japan, in May 2014. The 11 full and
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013
This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014.The 16 revised
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in Novemb
The relationship between Tropical Geometry and Mirror Symmetry goes back to the work of Kontsevich and Y. Soibelman (2000), who applied methods of non-archimedean geometry (in particular, tropical cur
This book constitutes the thoroughly refereed proceedings of the 5th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2013, held in Blantyre, Malawi, in N
This book is a collection of contributions defining the state of current knowledge and new trends in hybrid systems – systems involving both continuous dynamics and discrete events – as described by t
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2
This book on mathematical modeling of biological processes includes a wide selection of biological topics that demonstrate the power of mathematics and computational codes in setting up biological pro
This book constitutes the refereed proceedings of the 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, held in Waterloo, ON, Canada, in October 2014. The 16 revised full papers
This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction w
This book constitutes the proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2014, held in Gothenburg, Sweden, in September 2014. The 22 full papers
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the s
This book constitutes the refereed proceedings of the 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2014, held in Egham, UK, in July 2014.Th
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short
The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014.Th
The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014.Th
This book brings theories in nonlinear dynamics, stochastic processes, irreversible thermodynamics, physical chemistry and biochemistry together in an introductory but formal and comprehensive manner.
This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26
This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July
This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full paper
This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International ICST Conference on Sensor Systems and Software, S-Cube 2013, held in Lucca, Italy, 2013. The 8 revise
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in Sept
This book describes the latest progress in the application of nanotechnology for water treatment and purification. Leaders in the field present both the fundamental science and a comprehensive overvie
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, held in Amsterdam, The Netherlands, in S
This book constitutes the post-proceedings of the 5th International ICST Conference on Mobile Networks and Management, MONAMI 2013, held in Cork, Ireland, in September 2013. The 18 revised full papers
This book constitutes the refereed proceedings of the 14th International Symposium on Privacy Enhancing Technologies, PETS 2014, held in Amsterdam, The Netherlands, in July 2014. The 16 full papers pr
This book constitutes the thoroughly refereed post conference proceedings of the 4th International Conference on Cloud Computing, Cloud Comp 2013, held in Wuhan, China, in October 2013. The 28 revised
This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESS
This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014.
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Context-Aware Systems and Applications, ICCASA 2013, held in Phu Quoc Island, Vietnam in November 20