 
                This book constitutes the refereed proceedings of the 7th International Conference on Ad-Hoc, Mobile, and Wireless Networks, ...
اقرأ المزيد 
                This book constitutes the thoroughly refereed joint post-workshop proceedings of three international workshops held in conjunction ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...
اقرأ المزيد 
                The KES-AMSTA Symposium Series is a sub-series of the KES Conference Series. The aim of the symposium was to provide an international ...
اقرأ المزيد 
                This book constitutes the thoroughly refereed post-workshop proceedings of the 5th International Workshop on Agents and Peer-to-Peer ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the First International Symposium on Algorithmic Game Theory, SAGT 2008, ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ...
اقرأ المزيد 
                This book proposes a novel approach to Artificial Intelligence (AI) ethics. AI offers many advantages: better and faster ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the International Workshop on Biosurveillance and Biosecurity, BioSecure ...
اقرأ المزيد 
                This book constitutes the thoroughly refereed post-workshop proceedings of 6 internationl workshops held in Brisbane, Australia, ...
اقرأ المزيد 
                This book aims to provide a trans-disciplinary research framework and methodology for interaction design. The analysis directs ...
اقرأ المزيد 
                This book originate from a workshop held at the European University Institute of Florence, Italy, in December 2006. The workshop ...
اقرأ المزيدThis book addresses the application of computing to cultural heritage and the discipline of Digital Humanities that formed ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the 11th International Conference on Computers Helping People with Special ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيد 
                In this book defense and security related applications are increasingly being tackled by researchers and practioners using ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيد 
                The emerging information technologies have given rise to new human patterns in terms of both physiological and psychological ...
اقرأ المزيد 
                This book constitutes the refereed proceedings of the 9th International Conference on Electronic Commerce and Web Technologies, ...
اقرأ المزيد