You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the First International Conference on Applied Cryptography and Network Security, ACNS 2003, held in Kunming, China, in October 2003. The 32 revised full papers presented were carefully reviewed and selected from a total of 191 submissions. The papers are organized in topical sections on cryptographic applications, intrusion detection, cryptographic algorithms, digital signatures, security modeling, Web security, security protocols, cryptanalysis, key management, and efficient implementations.
This book constitutes the proceedings of the 15th International Conference on Advanced Data Mining and Applications, ADMA 2019, held in Dalian, China in November 2019. The 39 full papers presented together with 26 short papers and 2 demo papers were carefully reviewed and selected from 170 submissions. The papers were organized in topical sections named: Data Mining Foundations; Classification and Clustering Methods; Recommender Systems; Social Network and Social Media; Behavior Modeling and User Profiling; Text and Multimedia Mining; Spatial-Temporal Data; Medical and Healthcare Data/Decision Analytics; and Other Applications.
PRIMA 2000 was the third in the series of Paci c Rim International Workshops on Multi-Agents. It was held on August 28-29, 2000, in Melbourne, Australia in conjunction with the Paci c Rim International Conference on Arti cial Intel- gence 2000. PRIMA is the main forum for the agent or multi-agent researchers in paci c rim countries to exchange and discuss their research results. This volume contains selected papers from PRIMA 2000. It covers theory, design, and applications of intelligent agents. The speci c aspects include co- dination, negotiation, learning, architecture, speci cation, allocation, and app- cation of intelligent agents. All papers are of high quality because each of them was reviewed and recommended by at least two international renowned program committee members. Many people contributed to this volume. We would like to thank all the a- hors who submitted papers to the workshop. Many thanks also to the members of the program committee who diligently reviewed all the papers. Finally, we thank the editorial sta of Springer-Verlag for publishing this volume in the Lecture Notes in Arti cial Intelligence series.
This book constitutes the refereed proceedings of the 12th European Symposium on Research in Computer Security, ESORICS 2007, held in Dresden, Germany in September 2007. It features 39 revised full papers. ESORICS is confirmed as the European research event in computer security. It presents original research contributions, case studies and implementation experiences that address any aspect of computer security, in theory, mechanisms, applications, or practical experience.
This two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences on Cooperative Information Systems (CoopIS 2008), Distributed Objects and Applications (DOA 2008), Grid computing, high performAnce and Distributed Applications (GADA 2008), Information Security (IS 2008), and Ontologies, Databases and Applications of Semantics (ODBASE 2008), held as OTM 2008 in Monterrey, Mexico, in November 2008. The 86 revised full and 9 revised short papers presented together with 5 invited papers and 4 keynote talks were carefully reviewed and selected from a total of 292 submissions. Corresponding to the five OTM 2008 main conferences CoopIS, DOA, ...
The 30-volume set, comprising the LNCS books 12346 until 12375, constitutes the refereed proceedings of the 16th European Conference on Computer Vision, ECCV 2020, which was planned to be held in Glasgow, UK, during August 23-28, 2020. The conference was held virtually due to the COVID-19 pandemic. The 1360 revised papers presented in these proceedings were carefully reviewed and selected from a total of 5025 submissions. The papers deal with topics such as computer vision; machine learning; deep neural networks; reinforcement learning; object recognition; image classification; image processing; object detection; semantic segmentation; human pose estimation; 3d reconstruction; stereo vision; computational photography; neural networks; image coding; image reconstruction; object recognition; motion estimation.
This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, held in Kamakura, Japan in March 1999. The 25 revised full papers presented were carefully reviewed and selected from a total of 61 submissions. The volume reports most recent research results on all relevant aspects in public key cryptography. Among the topics covered are digital signatures, anonymous finger printing, message authentication, digital payment, key escrow, RSA systems, hash functions, decision oracles, random numbers, finite field computations, pay-per-view-systems, and electronic commerce.
The six-volume set LNCS 14447 until 14452 constitutes the refereed proceedings of the 30th International Conference on Neural Information Processing, ICONIP 2023, held in Changsha, China, in November 2023. The 652 papers presented in the proceedings set were carefully reviewed and selected from 1274 submissions. They focus on theory and algorithms, cognitive neurosciences; human centred computing; applications in neuroscience, neural networks, deep learning, and related fields.
The Fifth International Workshop on Security (IWSEC 2010) was held at Kobe InternationalConferenceCenter,Kobe,Japan,November22–24,2010. Thewo- shop was co-organized by CSEC, a special interest group concerned with the computer security of the Information Processing Society of Japan (IPSJ) and ISEC,atechnicalgroupconcernedwiththe informationsecurityofTheInstitute of Electronics, Information and Communication Engineers (IEICE). The exc- lentLocalOrganizingCommitteewasledbytheIWSEC2010GeneralCo-chairs, Hiroaki Kikuchi and Toru Fujiwara. This year IWSEC 2010 had three tracks, the Foundations of Security (Track I), Security in Networks and Ubiquitous Computing Systems (Track II), and Security i...