The 11th International Workshop on Information Security Applications (WISA
2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop
was hosted by the Korea Institute of Information Security and Cryptology
(KIISC), supported by the Electronics and Telecommunications Research Institute
(ETRI) and the Korea...
This LNCS volume contains the papers accepted for presentation at the 18th
Working Conference on Requirements Engineering: Foundation for Software Quality
(REFSQ 2012), held in Essen, Germany, during March 19–22, 2012.
Requirements engineering (RE) has long been recognized as a major factor for
achieving high-quality...
This volume contains the proceedings of the 15th International conference on
Financial Cryptography and Data Security, held at the Bay Gardens Beach
Resort, St. Lucia, February 28–March 4, 2011.
Financial cryptography and data security (FC) is a well-established international
forum for research, advanced development,...
These proceedings contain the papers presented at the 8th Internationl Symposium
on Automated Technology for Verification and Analysis held during
September 21–24, 2010 in Singapore. The primary objective of the ATVA conferences
remains the same: to exchange and promote the latest advances of
state-of-the-art research on...
It is our great pleasure to welcome you to the proceedings of the 10th annual event of
the International Conference on Algorithms and Architectures for Parallel Processing
(ICA3PP).
ICA3PP is recognized as the main regular event covering the many dimensions of
parallel algorithms and architectures, encompassing...
We are delighted lo present the ECDL 2004 Conference proceedings from the
8th European Conference on Research and Advanced Technology for Digital Li-
braries at the University of Bath. Bath, UK. This followed an impressive and
geographically dispersed series of locations for previous events: Pisa (1997). ller-
aklion (1998),...
Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...
This volume brings together, through a peer-revision process, the advanced research
results obtained by the European COST Action 2102: Cross-Modal Analysis of Verbal
and Nonverbal Communication, primarily discussed for the first time at the Second
COST 2102 International Training School on “Development of Multimodal...
The papers in this volume represent the proceedings of the 7th Industrial Conference on Data Mining. They are organized into topical sections on aspects of classification and prediction, clustering, web mining, data mining in medicine, applications of data mining, time series and frequent pattern mining, and association rule mining. Readers...
Recent history reveals that both the large-scale reforestation projects of the 20th century have often been less successful than anticipated, and that tree growing by smallholders as an alternative means to combat deforestation and promote sustainable land use has received relatively little attention from the scientific and...
The objective of this book is to give an introduction to the software process improvement
field to computer science students. The well-known Capability Maturity Model Integration
(CMMI1) is used as the vehicle for software process improvement as it has become the
de facto standard2 for implementing best practice in software...