Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This book constitutes the refereed proceedings of the 16th Conference of the Spanish Association for Artificial Intelligence, CAEPIA 2016, held in Salamanca, Spain, in September 2016. The 47 revised full papers presented were carefully selected from 166 submissions.
This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. multi-party computation; outsourcing computation; two-party computation;
This book constitutes the refereed proceedings of the 7th International Conference of the CLEF Initiative, CLEF 2016, held in Toulouse, France, in September 2016. The 10 full papers and 8 short papers presented together with 5 best of the labs papers were carefully reviewed and selected from 36 submissions.
This book constitutes the proceedings of the 27th International Workshop on Combinatorial Algorithms, IWOCA 2016, held in Helsinki, Finland, in August 2016. The 35 papers presented in this volume were carefully reviewed and selected from 87 submissions. online algorithms; combinatorial algorithms; graph algorithms;
This book constitutes the refereed proceedings of the 11th International Workshop on Security, IWSEC 2016, held in Tokyo, Japan, in September 2016. The 15 regular papers and 4 short papers presented in this volume were carefully reviewed and selected from 53 submissions. They were organized in topical sections named: system security;
This book constitutes the refereed proceedings of the 5th European Conference on Service-Oriented and Cloud Computing, ESOCC 2016, held in Vienna, Austria, in September 2016. The 16 full papers presented were carefully reviewed and selected from 33 submissions.
This book constitutes the proceedings of the 10th International Conference on Swarm Intelligence, ANTS 2016, held in Brussels, Belgium, in September 2016. The 18 full papers and 7 short papers presented in this volume were carefully reviewed and selected from 47 submissions.
This book constitutes the refereed proceedings of the 15th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2016, held in Guimaraes, Portugal, in September 2016, in conjunction with the 8th International Conference on eParticipation, ePart 2016.
The last part of the book is dedicated to metric learning and time series comparison, it addresses the problem of speeding-up the dynamic time warping or dealing with multi-modal and multi-scale metric learning for time series classification and clustering.
This two volume set LNCS 9827 and LNCS 9828 constitutes the refereed proceedings of the 27th International Conference on Database and Expert Systems Applications, DEXA 2016, held in Porto, Portugal, September 2016. Distributed and Big Data Processing; Data Integration, and Interoperability; Semantic Web, and Data Semantics; Data Analysis;
This two volume set LNCS 9827 and LNCS 9828 constitutes the refereed proceedings of the 27th International Conference on Database and Expert Systems Applications, DEXA 2016, held in Porto, Portugal, September 2016. Distributed and Big Data Processing; Data Integration, and Interoperability; Semantic Web, and Data Semantics; Data Analysis;
The JIST 2015 conference consisted of main technical tracksincluding 2 keynotes, 2 invited talks, a regular technical paper track (fulland short papers), an in-use track, a poster and demo session, workshop, andtutorial. The 14 full and 8 short papers in this volume were carefullyreviewed and selected from 43 submissions.
This bookconstitutes revised selected papers from the 9th International Conference onCritical Information Infrastructures Security, CRITIS 2014, held in Limassol,Cyprus, in October 2014. security of water systems; powerand energy system security; security and recovery policies, cyber security; andsecurity tools and protocols.
This book constitutes the thoroughly refereedpost-conference proceedings of the 7th International Conference on TrustedSystems, INTRUST 2015, held in Beijing, China, in December 2015. The revised 12 full papers presented have beencarefully reviewed and selected from 29 submissions.
This bookconstitutes the thoroughly refereed proceedings of the 8th International Conference on theTheory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2016,held in Fes, Morooco, in April 2016. The 18papers presented in this book were carefully reviewed and selected from 65submissions.
This book constitutes therefereed proceedings of the 11th International Conference on PersuasiveTechnology, PERSUASIVE 2016, held in Salzburg, Austria, in April 2016. The 27 revised full papers and 3 revised short papers presented were carefullyreviewed and selected from 73 submissions.
This book constitutes the thoroughly refereedpost-conference proceedings of the Third Annual Privacy Forum, APF 2015, heldin Luxembourg, Luxembourg, in October 2015. The 11 revised full papers presented in this volume werecarefully reviewed and selected from 24 submissions.
This book contains revised selected papers from the 17th International Conference on Membrane Computing, CMC 2017, held in Milan, Italy, in July 2016. The 19 full papers presented in this volume were carefully reviewed and selected from 28 submissions.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on Computer Assisted and Robotic Endoscopy, CARE 2016, held in conjunction with MICCAI 2016, in Athens, Greece, in October 2016. The 11 revised full papers were carefully selected out of 13 initial submissions.
This book constitutes the proceedings of the 23rd International Working Conference on Requirements Engineering - Foundation for Software Quality, REFSQ 2017, held in Essen, Germany, in February/March 2017. human factors in requirements engineering; goal-orientation in requirements engineering; agile requirements engineering;
This book constitutes the proceedings of the 11th International Workshop on Algorithms and Computation, WALCOM 2017, held in Hsinchu, Taiwan, in March 2017. The 35 full papers presented together with three invited talks were carefully reviewed and selected from 83 submissions. graph algorithms;
This book constitutes the thoroughly refereed post-conference proceedings of the First JARA High-Performance Computing Symposium, JARA-HPC 2016, held in Aachen, Germany, in October 2016. The 21 full papers presented were carefully reviewed and selected from 26 submissions.
This book constitutes the proceedings of the 13th International Symposium on Smart Graphics, SG 2015, held in Chengdu, China, in August 2015. The 17 full and 3 short papers presented in this volume were carefully reviewed and selected from 35 submissions.
This book constitutes the refereed proceedings of the 11th International Conference on Language and Automata Theory and Applications, LATA 2017, held in Umea, Sweden, in March 2017. The 31 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 73 submissions.
This volume is published in Honor of PhilipWadler on the occasion of his 60th birthday, and the collection of papers forma Festschrift for him. The research papers included hererepresent some of the areas in which Phil has been active, and the editorsthank their colleagues for agreeing to contribute to this Festschrift.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.