This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions. The papers cover all aspects of secure computing and communication in networking and distributed systems such as cloud-based data centers.
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, ...
On behalf of the NDT 2010 conference, the Program Committee and Charles University in Prague, Czech Republic, we welcome you to the proceedings of the Second International Conference on 'Networked Digital Technologies' (NDT 2010). The NDT 2010 conference explored new advances in digital and Web technology applications. It brought together researchers from various areas of computer and information sciences who addressed both theoretical and applied aspects of Web technology and Internet applications. We hope that the discussions and exchange of ideas that took place will contribute to...
On behalf of the NDT 2010 conference, the Program Committee and Charles University in Prague, Czech Republic, we welcome you to the proceedings of the...
The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing...
The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its...
The Second International Conference on Networks and Communications (NeCoM 2010), the Second International Conference on Wireless and Mobile Networks (WiMoN 2010), and the Second International Conference on Web and Semantic Technology (WeST 2010) were held in Chennai, India, during July 23-25, 2010. They attracted many local and int- national delegates, presenting a balanced mixture of intellects from the East and from the West. The goal of these conferences is to bring together researchers and practitioners from academia and industry to focus on understanding computer networks, wireless...
The Second International Conference on Networks and Communications (NeCoM 2010), the Second International Conference on Wireless and Mobile Networks (...
This book constitutes the proceedings of the Third International Conference on Advances in Information Technology, IAIT 2009, held in Bangkok, Thailand in December 2009.
The volume aims to provide a forum for researchers, educators, government officers, consultants, private sectors, managers, developers and others in the rapidly growing field of information technology to meet, discuss and exchange ideas on recent advances.
This book constitutes the proceedings of the Third International Conference on Advances in Information Technology, IAIT 2009, held in Bangkok, Thai...
Software engineering is understood as a broad term linking science, traditional en- neering, art and management and is additionally conditioned by social and external factors (conditioned to the point that brilliant engineering solutions based on strong science, showing artistic creativity and skillfully managed can still fail for reasons beyond the control of the development team). Modern software engineering needs a paradigm shift commensurate with a change of the computing paradigm from: 1. Algorithms to interactions (and from procedural to object-oriented programming) 2. Systems...
Software engineering is understood as a broad term linking science, traditional en- neering, art and management and is additionally conditioned by soc...
This book constitutes the second part of the refereed proceedings of the Third International Conference, IC3 2010, held in Noida, India, in August 2010.
The 23 revised full papers presented were carefully reviewed and selected from numerous submissions.
This book constitutes the second part of the refereed proceedings of the Third International Conference, IC3 2010, held in Noida, India, in August ...
The International Conference on Intelligent Computing (ICIC) was formed to provide an annual forum dedicated to the emerging and challenging topics in artificial intel- gence, machine learning, pattern recognition, image processing, bioinformatics, and computational biology. It aims to bring together researchers and practitioners from both academia and industry to share ideas, problems, and solutions related to the m- tifaceted aspects of intelligent computing. ICIC 2010, held in Changsha, China, August 18-21, 2010, constituted the 6th - ternational Conference on Intelligent Computing. It...
The International Conference on Intelligent Computing (ICIC) was formed to provide an annual forum dedicated to the emerging and challenging topics in...
This book constitutes the first part of the refereed proceedings of the Third International Conference, IC3 2010, held in Noida, India, in August 2010. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions.
This book constitutes the first part of the refereed proceedings of the Third International Conference, IC3 2010, held in Noida, India, in Augu...
This volume contains the proceedings of the Third International DMTF Academic Alliance Workshop on Systems and Virtualization Management: Standards and the Cloud (SVM 2009) held in Wuhan, China, during September 22-23, 2009. The SVM 2009 proceedings are intended for use by students of systems and vir- alization management. The reader is presumed to have a basic knowledge of systems management technologies and standards at the level provided, for example, by the Common Information Model (CIM) standard for modeling management resources. The student of systems management will find here material...
This volume contains the proceedings of the Third International DMTF Academic Alliance Workshop on Systems and Virtualization Management: Standards an...