This book constitutes the refereed proceedings of the 9th IFIP WG 11.8 World Conference on Security Education, WISE 9, held in Hamburg, Germany, in May 2015. The 11 revised papers presented together with 2 invited papers were carefully reviewed and selected from 20 submissions. They are organized in topical sections on innovative methods, software security education, tools and applications for …
Distributed systems are fast becoming the norm in computer science. Formal mathematical models and theories of distributed behaviour are needed in order to understand them. This book proposes a distributed pi-calculus called Dpi, for describing the behaviour of mobile agents in a distributed world. It is based on an existing formal language, the pi-calculus, to which it adds a network layer and…
This book constitutes the proceedings of the 24th International Conference on Information Processing in Medical Imaging, IPMI 2015, held at the Sabhal Mor Ostaig College on the Isle of Skye, Scotland, UK, in June/July 2015. The 22 full papers and 41 poster papers presented in this volume were carefully reviewed and selected from 195 submissions. They were organized in topical sections named:…
This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardwa…
This book constitutes the refereed proceedings of the Third European Conference on Information Literacy, ECIL 2015, held in Tallinn, Estonia, in October 2015. The 61 revised full papers presented were carefully reviewed and selected from 226 submissions. The papers are organized in topical sections on information literacy, environment and sustainability; workplace information literacy and kn…
Computer science
Buku yang disunting ini diterbitkan dalam rangka Konferensi Computers in Urban Planning and Urban Management (CUPUM) 2015, yang diselenggarakan di Boston, Massachusetts, pada tanggal 7-10 Juli 2015. Selama lebih dari 20 tahun, CUPUM telah menjadi salah satu konferensi internasional terkemuka untuk pertukaran ide mengenai penggunaan teknologi komputer dalam mengatasi berbagai masalah ekonomi, so…
This book constitutes the refereed proceedings of the 22nd International Symposium on Methodologies for Intelligent Systems, ISMIS 2015, held in Lyon, France, in October 2015. The 31 revised full papers presented together with 18 short papers were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on data mining methods; databases, information r…
This journal subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, empirical investigations, state-of-the-art methods, and tools in all different genres of edutainment, such as game-based learning and serious games, interactive storytelling, virtual learning environments, VR-based education, and related fields. It covers aspects …
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development …