Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015. The 24 revised full papers and 19 short papers presented were carefully selected from 148 submissions.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines.
This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016. side-channel analysis (case studies); fault analysis; and side-channel analysis (tools).
This book constitutes the refereed proceedings of the 12th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2015, held in Cluj-Napoca, Romania, in September 2015. The 11 revised full papers and 10 paper-in-progress presented were carefully reviewed and selected from 38 submissions.
This book constitutes the refereed proceedings of the 10th International Tbilisi Symposium on Logic, Language and Computation, TbiLLC 2013, held in Gudauri, Georgia, in September 2013.
This book constitutes the proceedings of the 8th International Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2015, held in Sousse, Tunisia, in May 2015. The 20 papers presented in this volume were carefully reviewed and selected from 27 submissions.
This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015.
This book constitutes the refereed proceedings of the 7th International Symposium on NASA Formal Methods, NFM 2015, held in Pasadena, CA, USA, in April 2015. The 24 revised regular papers presented together with 9 short papers were carefully reviewed and selected from 108 submissions. formal approaches to fault tolerance;
This book constitutes the thoroughly refereed post-conference proceedings of the 27th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2014, held in Hillsboro, OR, USA, in September 2014. The 25 revised full papers were carefully reviewed and selected from 39 submissions.
The First A4Cloud Summer School has been one of the first events in the area of accountability and security in the cloud. It was organized by the EU-funded A4Cloud project, in collaboration with the European projects CIRRUS, Coco Cloud, CUMULUS, and SPECS.
This book constitutes the refereed proceedings of the 7th International Workshop on Traffic Monitoring and Analysis, TMA 2015, held in Barcelona, Spain, in April 2015. The 16 full papers presented in this volume were carefully reviewed and selected from 54 submissions.
This book constitutes the refereed proceedings of the 12th Annual Conference on Theory and Applications of Models of Computation, TAMC 2014, held in Singapore, in May 2015. The papers treat all topics relating to the theory and applications of models computation, for example recursion theory and mathematical logic; graphy theory;
This book constitutes the proceedings of the 12th European Conference on Multi-Agent Systems, EUMAS 2014, held in Prague, Czech Republic, in December 2014. The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 79 submissions.
This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014.
This book constitutes the refereed proceedings of the Third International Symposium on Statistical Learning and Data Sciences, SLDS 2015, held in Egham, Surrey, UK, April 2015.
This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014. The 18 revised full papers presented together with 5 short papers and 2 position papers were carefully reviewed and selected from 48 submissions.
This book constitutes the thoroughly refereedpost-conference proceedings of the 25th International Symposium on Logic-BasedProgram Synthesis and Transformation, LOPSTR 2015, held in Siena, Italy, inJuly 2015. The 21 revised full papers presented together with 3invited talks were carefully reviewed and selected from 30 submissions.
This bookconstitutes the proceedings of the 7th International Conference on SocialInformatics, SocInfo 2015, held in Beijing, China, in December 2015. The 19papers presented in this volume were carefully reviewed and selected from 42submissions. They cover topics such as user modeling, opinion mining, userbehavior, and crowd sourcing.
This bookconstitutes revised selected papers from the third ECML PKDD Workshop on DataAnalytics for Renewable Energy Integration, DARE 2015, held in Porto, Portugal,in September 2015. The 10 papers presented in this volume were carefully reviewed and selected forinclusion in this book.
This book constitutes the refereed proceedings of the SecondInternational Conference on Internet of Vehicles, IOV 2015, held inChengdu, China, in December 2015. The 40 full papers presented were carefully reviewed and selected from128 submissions.
This journal subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, empirical investigations, state-of-the-art methods, and tools in all different genres of edutainment, such as game-based learning and serious games, interactive storytelling, virtual learning environments, VR-based education, and related fields. It covers aspects from educational and game theories, human-computer interaction, computer graphics, artificial intelligence, and systems design. The 24 papers presented in this 11th issue were organized in four parts dealing with: object reconstruction and management; graphics; VR/AR; and applications.
This volume contains the refereed proceedings of the 13th International Conference on Logic Programming and Nonmonotonic Reasoning, LPNMR 2015, held in September 2015 in Lexington, KY, USA.
This book constitutes the refereed proceedings of seven workshops held at the 18th International Conference on Image Analysis and Processing, ICIAP 2015, in Genoa, Italy, in September 2015: International Workshop on Recent Advances in Digital Security: Biometrics and Forensics, BioFor 2015;
This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. They are organized in topical sections on secure computation: primitives and new models;
This bookconstitutes the refereed proceedings of the workshops held at the 17thAsia-Pacific Web Conference, APWeb 2015, in Guangzhou, China, in September2015. The 15 fullpapers were carefully reviewed and selected from various submissions.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.