Language:
English
繁體中文
Help
Login
Lecture notes in computer
書目資訊
lecture notes in computer science
lecture notes in computer science
computational geometry and its appli...
computational geometry and its applications
vlsi engineering
vlsi engineering
database and expert systems applications
database and expert systems applications
agent-oriented software engineering
agent-oriented software engineering
smart card research and applications
smart card research and applications
generic programming
generic programming
abstract state machines
abstract state machines
algorithms and computation
algorithms and computation
informatics
informatics
software reuse
software reuse
embedded computer systems
embedded computer systems
interactive systems
interactive systems
machine learning and data mining in ...
machine learning and data mining in pattern recognition
transactions on data hiding and mult...
transactions on data hiding and multimedia security
medical image computing and computer...
medical image computing and computer-assisted intervention :
pattern recognition and data mining :
pattern recognition and data mining :
advanced concepts for intelligent vi...
advanced concepts for intelligent vision systems :
digital watermarking :
digital watermarking :
digital documents :
digital documents :
digital watermarking :
digital watermarking :
information hiding :
information hiding :
information security applications
information security applications
global computing
global computing
journal on data semantics.
journal on data semantics.
agent-oriented software engineering v
agent-oriented software engineering v
construction and analysis of safe, s...
construction and analysis of safe, secure, and interoperable smart devices
swarm robotics
swarm robotics
verification, model checking, and ab...
verification, model checking, and abstract interpretation
security in communication networks
security in communication networks
sofsem 2005: theory and practice of ...
sofsem 2005: theory and practice of computer science
implementation and application of au...
implementation and application of automata
semantic web services and web proces...
semantic web services and web process composition
practical aspects of declarative lan...
practical aspects of declarative languages
security in ad-hoc and sensor networks
security in ad-hoc and sensor networks
topics in cryptology -- ct-rsa 2005
topics in cryptology -- ct-rsa 2005
combinatorial geometry and graph theory
combinatorial geometry and graph theory
service availability
service availability
attention and performance in computa...
attention and performance in computational vision
public key cryptography - pkc 2005
public key cryptography - pkc 2005
comparative genomics
comparative genomics
regulatory genomics
regulatory genomics
switching and learning in feedback s...
switching and learning in feedback systems
computer music modeling and retrieval
computer music modeling and retrieval
ambient intelligence for scientific ...
ambient intelligence for scientific discovery
information networking
information networking
natural language processing - ijcnlp...
natural language processing - ijcnlp 2004
artificial intelligence and simulation
artificial intelligence and simulation
systems modeling and simulation: the...
systems modeling and simulation: theory and applications
machine learning for multimodal inte...
machine learning for multimodal interaction
computational linguistics and intell...
computational linguistics and intelligent text processing
formal concept analysis
formal concept analysis
argumentation in multi-agent systems
argumentation in multi-agent systems
cots-based software systems
cots-based software systems
from integrated publication and info...
from integrated publication and information systems to information and knowledge environments
quality of service in multiservice i...
quality of service in multiservice ip networks
programming multi-agent systems
programming multi-agent systems
shared memory parallel programming w...
shared memory parallel programming with open mp
system analysis and modeling
system analysis and modeling
theory of cryptography
theory of cryptography
approximation and online algorithms
approximation and online algorithms
environments for multi-agent systems
environments for multi-agent systems
semantic web and databases
semantic web and databases
digital watermarking
digital watermarking
software engineering for multi-agent...
software engineering for multi-agent systems iii
formal methods in software and syste...
formal methods in software and systems modeling
numerical analysis and its applications
numerical analysis and its applications
network analysis
network analysis
evolutionary multi-criterion optimiz...
evolutionary multi-criterion optimization
stacs 2005
stacs 2005
agent communication
agent communication
e-government: towards electronic dem...
e-government: towards electronic democracy
robocup 2004: robot soccer world cup...
robocup 2004: robot soccer world cup viii
spatial cognition iv.
spatial cognition iv.
technologies for e-services
technologies for e-services
mechanizing mathematical reasoning
mechanizing mathematical reasoning
scientific engineering of distribute...
scientific engineering of distributed java applications
law and the semantic web
law and the semantic web
information retrieval technology
information retrieval technology
multiparadigm programming in mozart
multiparadigm programming in mozart
membrane computing
membrane computing
uml modeling languages and applications
uml modeling languages and applications
knowledge discovery in inductive dat...
knowledge discovery in inductive databases
embedded systems design
embedded systems design
hybrid systems: computation and control
hybrid systems: computation and control
formal approaches to software testing
formal approaches to software testing
recent advances in constraints
recent advances in constraints
web technologies research and develo...
web technologies research and development - apweb 2005
grid computing in life science
grid computing in life science
databases, information systems, and ...
databases, information systems, and peer-to-peer computing
logic for programming, artificial in...
logic for programming, artificial intelligence, and reasoning
adaptive agents and multi-agent syst...
adaptive agents and multi-agent systems ii
machines, computations, and universality
machines, computations, and universality
multi-agent and multi-agent-based si...
multi-agent and multi-agent-based simulation
graph-based representations in patte...
graph-based representations in pattern recognition
systems aspects in organic and perva...
systems aspects in organic and pervasive computing - arcs 2005
advances in information retrieval
advances in information retrieval
retical aspects of computing - ictac...
retical aspects of computing - ictac 2004
recent trends in algebraic developme...
recent trends in algebraic development techniques
software engineering and middleware
software engineering and middleware
wireless systems and mobility in nex...
wireless systems and mobility in next generation internet
job scheduling strategies for parall...
job scheduling strategies for parallel processing
digital cities iii. information tech...
digital cities iii. information technologies for social capital: cross-cultural perspectives
conditionals, information, and inference
conditionals, information, and inference
tools and algorithms for the constru...
tools and algorithms for the construction and analysis of systems
database systems for advanced applic...
database systems for advanced applications
from computer literacy to informatic...
from computer literacy to informatics fundamentals
evolutionary computation in combinat...
evolutionary computation in combinatorial optimization
networking -- icn 2005
networking -- icn 2005
intelligent agents and multi-agent s...
intelligent agents and multi-agent systems
databases in networked information s...
databases in networked information systems
computational methods in systems biology
computational methods in systems biology
foundations of software science and ...
foundations of software science and computational structures
applications of evolutionary computing
applications of evolutionary computing
compiler construction
compiler construction
fundamental approaches to software e...
fundamental approaches to software engineering
high performance computing for compu...
high performance computing for computational science - vecpar 2004
programming languages and systems
programming languages and systems
genetic programming
genetic programming
discrete geometry for computer imagery
discrete geometry for computer imagery
passive and active network measurement
passive and active network measurement
security in pervasive computing
security in pervasive computing
scale space and pde methods in compu...
scale space and pde methods in computer vision
zb 2005: formal specification and de...
zb 2005: formal specification and development in z and b
applications of declarative programm...
applications of declarative programming and knowledge management
operational semantics for timed systems
operational semantics for timed systems
information security practice and ex...
information security practice and experience
typed lambda calculi and applications
typed lambda calculi and applications
term rewriting and applications
term rewriting and applications
coordination models and languages
coordination models and languages
formal methods for mobile computing
formal methods for mobile computing
dependable computing - edcc 2005
dependable computing - edcc 2005
logical aspects of computational lin...
logical aspects of computational linguistics
networking 2005 :
networking 2005 :
scientific applications of grid comp...
scientific applications of grid computing
rapid integration of software engine...
rapid integration of software engineering techniques
communicating sequential processes. ...
communicating sequential processes. the first 25 years
computational science and its applic...
computational science and its applications - iccsa 2005
computational science and its applic...
computational science and its applications, iccsa 2005
computational science and its applic...
computational science and its applications - iccsa 2005
computational science and its applic...
computational science and its applications - iccsa 2005
advances in artificial intelligence
advances in artificial intelligence
research in computational molecular ...
research in computational molecular biology
component-based software engineering
component-based software engineering
foundations of intelligent systems
foundations of intelligent systems
location- and context-awareness
location- and context-awareness
wired/wireless internet communications
wired/wireless internet communications
advances in cryptology - eurocrypt 2005
advances in cryptology - eurocrypt 2005
agent-oriented information systems ii
agent-oriented information systems ii
advances in neural networks - isnn 2005
advances in neural networks - isnn 2005
advances in neural networks - isnn 2005
advances in neural networks - isnn 2005
advances in neural networks - isnn 2005
advances in neural networks - isnn 2005
experimental and efficient algorithms
experimental and efficient algorithms
transactions on rough sets iii
transactions on rough sets iii
intelligence and security informatics
intelligence and security informatics
human interactive proofs
human interactive proofs
global optimization and constraint s...
global optimization and constraint satisfaction
web and wireless geographical inform...
web and wireless geographical information systems
pervasive computing
pervasive computing
self-star properties in complex info...
self-star properties in complex information systems
natural language processing and info...
natural language processing and information systems
computational science -- iccs 2005
computational science -- iccs 2005
trust management
trust management
computational science -- iccs 2005
computational science -- iccs 2005
computational science -- iccs 2005
computational science -- iccs 2005
structural information and communica...
structural information and communication complexity
testing of communicating systems
testing of communicating systems
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
sequences and their applications - s...
sequences and their applications - seta 2004
implementation and application of fu...
implementation and application of functional languages
advanced information systems engineering
advanced information systems engineering
engineering human computer interacti...
engineering human computer interaction and interactive systems
semantic web: research and applications
semantic web: research and applications
integration of ai and or techniques ...
integration of ai and or techniques in constraint programming for combinatorial optimization problems
pattern recognition and image analysis
pattern recognition and image analysis
pattern recognition and image analysis
pattern recognition and image analysis
active mining
active mining
functional imaging and modeling of t...
functional imaging and modeling of the heart
autonomous intelligent systems: agen...
autonomous intelligent systems: agents and data mining
constraint solving and language proc...
constraint solving and language processing
advances in xml information retrieval
advances in xml information retrieval
universal access in health telematics
universal access in health telematics
declarative agent languages and tech...
declarative agent languages and technologies ii
dna computing
dna computing
context: nature, impact, and role
context: nature, impact, and role
new computational paradigms
new computational paradigms
engineering self-organising systems
engineering self-organising systems
formal methods for open object-based...
formal methods for open object-based distributed systems
scenarios: models, transformations a...
scenarios: models, transformations and tools
integer programming and combinatoria...
integer programming and combinatorial optimization
product focused software process imp...
product focused software process improvement
combinatorial pattern matching
combinatorial pattern matching
privacy enhancing technologies
privacy enhancing technologies
advanced studies in biometrics
advanced studies in biometrics
computational intelligence and bioin...
computational intelligence and bioinspired systems
advances in web intelligence
advances in web intelligence
applied cryptography and network sec...
applied cryptography and network security
algorithmic applications in management
algorithmic applications in management
journal on data semantics iii
journal on data semantics iii
information security and cryptology ...
information security and cryptology - icisc 2004
distributed applications and interop...
distributed applications and interoperable systems
software architecture
software architecture
ry and applications of satisfiabilit...
ry and applications of satisfiability testing
extreme programming and agile proces...
extreme programming and agile processes in software engineering
model-based testing of reactive systems
model-based testing of reactive systems
reliable software technology - ada-e...
reliable software technology - ada-europe 2005
quality of service - iwqos 2005
quality of service - iwqos 2005
data management in a connected world
data management in a connected world
computer algebra and geometric algeb...
computer algebra and geometric algebra with applications
mechanisms, symbols, and models unde...
mechanisms, symbols, and models underlying cognition
applications and theory of petri net...
applications and theory of petri nets 2005
multiple classifier systems
multiple classifier systems
artificial intelligence and knowledg...
artificial intelligence and knowledge engineering applications: a bioinspired approach
image analysis
image analysis
distributed computing in sensor systems
distributed computing in sensor systems
fast software encryption
fast software encryption
local pattern detection
local pattern detection
information processing in medical im...
information processing in medical imaging
developments in language theory
developments in language theory
information security and privacy
information security and privacy
innovations in applied artificial in...
innovations in applied artificial intelligence
learning theory
learning theory
advanced encryption standard - aes
advanced encryption standard - aes
sdl 2005: model driven
sdl 2005: model driven
intrusion and malware detection and ...
intrusion and malware detection and vulnerability assessment
logic based program synthesis and tr...
logic based program synthesis and transformation
financial cryptography and data security
financial cryptography and data security
advances in grid computing - egc 2005
advances in grid computing - egc 2005
knowledge and information visualization
knowledge and information visualization
machine learning and data mining in ...
machine learning and data mining in pattern recognition
modeling and using context
modeling and using context
embedded computer systems: architect...
embedded computer systems: architectures, modeling, and simulation
intelligent data engineering and aut...
intelligent data engineering and automated learning - ideal 2005
database: enterprise, skills and inn...
database: enterprise, skills and innovation
massively multi-agent systems i
massively multi-agent systems i
computer aided verification
computer aided verification
foundations of genetic algorithms
foundations of genetic algorithms
principles of distributed systems
principles of distributed systems
symbolic and quantitative approaches...
symbolic and quantitative approaches to reasoning with uncertainty
metainformatics
metainformatics
engineering societies in the agents ...
engineering societies in the agents world v
autonomic communication
autonomic communication
multilingual information access for ...
multilingual information access for text, speech and images
biomimetic neural learning for intel...
biomimetic neural learning for intelligent robots
nonlinear speech modeling and applic...
nonlinear speech modeling and applications
automata, languages and programming
automata, languages and programming
reasoning web
reasoning web
ry and applications of satisfiabilit...
ry and applications of satisfiability testing
web and communication technologies a...
web and communication technologies and internet-related social issues - hsi 2005
artificial intelligence in medicine
artificial intelligence in medicine
image and video retrieval
image and video retrieval
abstraction, reformulation and appro...
abstraction, reformulation and approximation
combinatorial and algorithmic aspect...
combinatorial and algorithmic aspects of networking
fm 2005: formal methods
fm 2005: formal methods
unconventional programming paradigms
unconventional programming paradigms
user modeling 2005
user modeling 2005
ubiquitous computing systems
ubiquitous computing systems
advanced data mining and applications
advanced data mining and applications
advances in web-based learning - icw...
advances in web-based learning - icwl 2005
data integration in the life sciences
data integration in the life sciences
ecoop 2005 - object-oriented programming
ecoop 2005 - object-oriented programming
automated deduction - cade-20
automated deduction - cade-20
advances in bioinformatics and compu...
advances in bioinformatics and computational biology
languages and compilers for high per...
languages and compilers for high performance computing
trusting agents for trusting electro...
trusting agents for trusting electronic societies
computational logic in multi-agent s...
computational logic in multi-agent systems
computing and combinatorics
computing and combinatorics
public key infrastructure
public key infrastructure
advanced distributed systems
advanced distributed systems
algorithms and data structures
algorithms and data structures
networking and mobile computing
networking and mobile computing
advances in cryptology - crypto 2005
advances in cryptology - crypto 2005
parallel computing technologies
parallel computing technologies
advances in spatial and temporal dat...
advances in spatial and temporal databases
embedded software and systems
embedded software and systems
data and applications security xix
data and applications security xix
case-based reasoning research and de...
case-based reasoning research and development
artificial immune systems
artificial immune systems
inductive logic programming
inductive logic programming
smart graphics
smart graphics
fundamentals of computation theory
fundamentals of computation theory
model checking software
model checking software
trust, privacy, and security in digi...
trust, privacy, and security in digital business
mathematics of surfaces xi
mathematics of surfaces xi
advances in intelligent computing
advances in intelligent computing
computer science logic
computer science logic
holonic and multi-agent systems for ...
holonic and multi-agent systems for manufacturing
business process management
business process management
approximation, randomization and com...
approximation, randomization and combinatorial optimization. algorithms and techniques
model driven architecture
model driven architecture
concur 2005 - concurrency theory
concur 2005 - concurrency theory
fuzzy systems and knowledge discovery
fuzzy systems and knowledge discovery
advances in natural computation
advances in natural computation
advances in natural computation
advances in natural computation
advances in natural computation
advances in natural computation
fuzzy systems and knowledge discovery
fuzzy systems and knowledge discovery
rem proving in higher order logics
rem proving in higher order logics
security protocols
security protocols
electronic government
electronic government
e-commerce and web technologies
e-commerce and web technologies
cryptographic hardware and embedded ...
cryptographic hardware and embedded systems - ches 2005
hybrid metaheuristics
hybrid metaheuristics
logic programming and nonmonotonic r...
logic programming and nonmonotonic reasoning
advanced functional programming
advanced functional programming
data warehousing and knowledge discovery
data warehousing and knowledge discovery
database and expert systems applications
database and expert systems applications
database and xml technologies
database and xml technologies
static analysis
static analysis
advances in databases and informatio...
advances in databases and information systems
algebra and coalgebra in computer sc...
algebra and coalgebra in computer science
rough sets, fuzzy sets, data mining,...
rough sets, fuzzy sets, data mining, and granular computing
rough sets, fuzzy sets, data mining,...
rough sets, fuzzy sets, data mining, and granular computing
euro-par 2005 parallel processing
euro-par 2005 parallel processing
formal techniques for computer syste...
formal techniques for computer systems and business processes
mathematical foundations of computer...
mathematical foundations of computer science 2005
pattern recognition
pattern recognition
peer-to-peer, grid, and service-orie...
peer-to-peer, grid, and service-orientation in digital library architectures
evolvable systems :
evolvable systems :
intelligent virtual agents :
intelligent virtual agents :
multiagent system technologies :
multiagent system technologies :
software composition :
software composition :
artificial neural networks :
artificial neural networks :
artificial neural networks :
artificial neural networks :
pattern recognition and data mining :
pattern recognition and data mining :
ubicomp 2005: ubiquitous computing :
ubicomp 2005: ubiquitous computing :
ki 2005: advances in artificial inte...
ki 2005: advances in artificial intelligence :
research and advanced technology for...
research and advanced technology for digital libraries :
digital watermarking :
digital watermarking :
text, speech and dialogue :
text, speech and dialogue :
communications and multimedia security :
communications and multimedia security :
advances in multimedia information s...
advances in multimedia information systems :
principles and practice of semantic ...
principles and practice of semantic web reasoning :
advances in intelligent data analysi...
advances in intelligent data analysis vi :
secure data management :
secure data management :
pattern recognition and data mining :
pattern recognition and data mining :
advances in artificial life :
advances in artificial life :
image analysis and processing - icia...
image analysis and processing - iciap 2005 :
knowledge-based intelligent informat...
knowledge-based intelligent information and engineering systems :
knowledge-based intelligent informat...
knowledge-based intelligent information and engineering systems :
knowledge-based intelligent informat...
knowledge-based intelligent information and engineering systems :
knowledge-based intelligent informat...
knowledge-based intelligent information and engineering systems :
automated reasoning with analytic ta...
automated reasoning with analytic tableaux and related methods :
comparative genomics :
comparative genomics :
software product lines :
software product lines :
progress in cryptology - mycrypt 2005 :
progress in cryptology - mycrypt 2005 :
human-computer interaction - interac...
human-computer interaction - interact 2005 :
cooperative design, visualization, a...
cooperative design, visualization, and engineering :
foundations of security analysis and...
foundations of security analysis and design iii :
computer security - esorics 2005 :
computer security - esorics 2005 :
spatial information theory :
spatial information theory :
computer algebra in scientific compu...
computer algebra in scientific computing :
architecting dependable systems iii
architecting dependable systems iii
computer analysis of images and patt...
computer analysis of images and patterns :
information security :
information security :
computer aided systems theory - euro...
computer aided systems theory - eurocast 2005 :
algorithms in bioinformatics :
algorithms in bioinformatics :
recent advances in parallel virtual ...
recent advances in parallel virtual machine and message passing interface :
model driven engineering languages a...
model driven engineering languages and systems :
integrated circuit and system design...
integrated circuit and system design. power and timing modeling, optimization and simulation :
high performance computing and commu...
high performance computing and communications :
advanced concepts for intelligent vi...
advanced concepts for intelligent vision systems :
quality of software architectures an...
quality of software architectures and software quality :
entertainment computing - icec 2005 :
entertainment computing - icec 2005 :
intelligent media technology for com...
intelligent media technology for communicative intelligence :
information hiding :
information hiding :
ai*ia 2005: advances in artificial i...
ai*ia 2005: advances in artificial intelligence :
multi-agent systems and applications...
multi-agent systems and applications iv :
frontiers of combining systems :
frontiers of combining systems :
peer-to-peer systems iv :
peer-to-peer systems iv :
image analysis and recognition :
image analysis and recognition :
deterministic and statistical method...
deterministic and statistical methods in machine learning :
unconventional computation :
unconventional computation :
service availability :
service availability :
computational life sciences :
computational life sciences :
correct hardware design and verifica...
correct hardware design and verification methods :
retical computer science :
retical computer science :
retical aspects of computing - ictac...
retical aspects of computing - ictac 2005 :
groupware: design, implementation, a...
groupware: design, implementation, and use :
computer network security :
computer network security :
algorithms - esa 2005 :
algorithms - esa 2005 :
formal methods for components and ob...
formal methods for components and objects :
ad-hoc, mobile, and wireless networks :
ad-hoc, mobile, and wireless networks :
generative programming and component...
generative programming and component engineering :
distributed computing :
distributed computing :
natural language processing - ijcnlp...
natural language processing - ijcnlp 2005 :
information retrieval technology :
information retrieval technology :
formal techniques for networked and ...
formal techniques for networked and distributed systems - forte 2005 :
peer-to-peer systems and applications
peer-to-peer systems and applications
computer safety, reliability, and se...
computer safety, reliability, and security :
logic programming :
logic programming :
automated technology for verificatio...
automated technology for verification and analysis :
advances in web-age information mana...
advances in web-age information management :
analysis and modelling of faces and ...
analysis and modelling of faces and gestures :
discovery science :
discovery science :
distributed and parallel computing :
distributed and parallel computing :
principles and practice of constrain...
principles and practice of constraint programming - cp 2005 :
algorithmic learning theory :
algorithmic learning theory :
machine learning: ecml 2005 :
machine learning: ecml 2005 :
knowledge discovery in databases: pk...
knowledge discovery in databases: pkdd 2005 :
brain, vision, and artificial intell...
brain, vision, and artificial intelligence :
medical image computing and computer...
medical image computing and computer-assisted intervention -- miccai 2005 :
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2005 :
variational, geometric, and level se...
variational, geometric, and level set methods in computer vision :
operations and management in ip-base...
operations and management in ip-based networks :
ambient networks :
ambient networks :
conceptual modeling - er 2005 :
conceptual modeling - er 2005 :
perspectives in conceptual modeling :
perspectives in conceptual modeling :
computer supported cooperative work ...
computer supported cooperative work in design i :
transactions on computational system...
transactions on computational systems biology ii
mobility aware technologies and appl...
mobility aware technologies and applications :
computer vision for biomedical image...
computer vision for biomedical image applications :
computer and information sciences - ...
computer and information sciences - iscis 2005 :
advances in biometric person authent...
advances in biometric person authentication :
stochastic algorithms: foundations a...
stochastic algorithms: foundations and applications :
dependable computing :
dependable computing :
computer vision in human-computer in...
computer vision in human-computer interaction :
affective computing and intelligent ...
affective computing and intelligent interaction :
advanced parallel processing technol...
advanced parallel processing technologies :
management of multimedia networks an...
management of multimedia networks and services :
advances in computer systems archite...
advances in computer systems architecture :
advances in informatics :
advances in informatics :
biological and medical data analysis :
biological and medical data analysis :
programming languages and systems :
programming languages and systems :
on the move to meaningful internet s...
on the move to meaningful internet systems 2005: coopis, doa, and odbase :
on the move to meaningful internet s...
on the move to meaningful internet systems 2005: coopis, doa, and odbase :
on the move to meaningful internet s...
on the move to meaningful internet systems 2005: otm 2005 workshops :
string processing and information re...
string processing and information retrieval :
semantic web - iswc 2005 :
semantic web - iswc 2005 :
agents and peer-to-peer computing :
agents and peer-to-peer computing :
parallel and distributed processing ...
parallel and distributed processing and applications :
parallel and distributed processing ...
parallel and distributed processing and applications - ispa 2005 workshops :
power-aware computer systems :
power-aware computer systems :
formal methods and software engineer...
formal methods and software engineering :
network and parallel computing :
network and parallel computing :
self-stabilizing systems :
self-stabilizing systems :
transactions on rough sets iv
transactions on rough sets iv
deep structure, singularities, and c...
deep structure, singularities, and computer vision :
intelligent techniques for web perso...
intelligent techniques for web personalization :
progress in pattern recognition, ima...
progress in pattern recognition, image analysis and applications :
micai 2005: advances in artificial i...
micai 2005: advances in artificial intelligence :
rules and rule markup languages for ...
rules and rule markup languages for the semantic web :
trustworthy global computing :
trustworthy global computing :
web information systems engineering ...
web information systems engineering - wise 2005 :
web information systems engineering ...
web information systems engineering - wise 2005 workshops :
model driven architecture - foundati...
model driven architecture - foundations and applications :
advances in multimedia information p...
advances in multimedia information processing - pcm 2005 :
advances in multimedia information p...
advances in multimedia information processing - pcm 2005 :
cryptography and coding :
cryptography and coding :
software process improvement :
software process improvement :
energy minimization methods in compu...
energy minimization methods in computer vision and pattern recognition :
geospatial semantics :
geospatial semantics :
high performance embedded architectu...
high performance embedded architectures and compilers :
middleware 2005 :
middleware 2005 :
ai 2005: advances in artificial inte...
ai 2005: advances in artificial intelligence :
professional knowledge management :
professional knowledge management :
discrete and computational geometry :
discrete and computational geometry :
integrated formal methods :
integrated formal methods :
fsttcs 2005: foundations of software...
fsttcs 2005: foundations of software technology and theoretical computer science :
pattern recognition and machine inte...
pattern recognition and machine intelligence :
intelligent technologies for interac...
intelligent technologies for interactive entertainment :
grid and cooperative computing - gcc...
grid and cooperative computing - gcc 2005 :
virtual storytelling. using virtual ...
virtual storytelling. using virtual reality technologies for storytelling :
component deployment :
component deployment :
logic for programming, artificial in...
logic for programming, artificial intelligence, and reasoning :
component-based software development...
component-based software development for embedded systems :
advances in cryptology - asiacrypt 2...
advances in cryptology - asiacrypt 2005 :
practice and theory of automated tim...
practice and theory of automated timetabling v :
information systems security :
information systems security :
socionics :
socionics :
progress in artificial intelligence :
progress in artificial intelligence :
advances in visual computing :
advances in visual computing :
advances in computer science - asian...
advances in computer science - asian 2005. data management on the web :
languages and compilers for parallel...
languages and compilers for parallel computing :
embedded and ubiquitous computing - ...
embedded and ubiquitous computing - euc 2005 workshops :
progress in cryptology - indocrypt 2...
progress in cryptology - indocrypt 2005 :
embedded and ubiquitous computing - ...
embedded and ubiquitous computing - euc 2005 :
service-oriented computing - icsoc 2...
service-oriented computing - icsoc 2005 :
computational intelligence and secur...
computational intelligence and security :
computational intelligence and secur...
computational intelligence and security :
web and wireless geographical inform...
web and wireless geographical information systems :
cryptology and network security :
cryptology and network security :
digital libraries: implementing stra...
digital libraries: implementing strategies and sharing experiences :
information security and cryptology :
information security and cryptology :
mobile ad-hoc and sensor networks :
mobile ad-hoc and sensor networks :
embedded software and systems :
embedded software and systems :
transactions on computational system...
transactions on computational systems biology iii
technologies for advanced heterogene...
technologies for advanced heterogeneous networks :
internet and network economics :
internet and network economics :
processes, terms and cycles: steps o...
processes, terms and cycles: steps on the road to infinity :
security and privacy in ad-hoc and s...
security and privacy in ad-hoc and sensor networks :
information and communications secur...
information and communications security :
algorithms and computation :
algorithms and computation :
formal modeling and analysis of time...
formal modeling and analysis of timed systems :
database programming languages :
database programming languages :
distributed computing - iwdc 2005 :
distributed computing - iwdc 2005 :
distributed computing and internet t...
distributed computing and internet technology :
graph-theoretic concepts in computer...
graph-theoretic concepts in computer science :
journal on data semantics iv
journal on data semantics iv
job scheduling strategies for parall...
job scheduling strategies for parallel processing :
advances in intelligent computing
advances in intelligent computing
high performance computing - hipc 2005
high performance computing - hipc 2005
database theory - icdt 2005
database theory - icdt 2005
selected areas in cryptography
selected areas in cryptography
formal approaches to agent-based systems
formal approaches to agent-based systems
transactions on computational system...
transactions on computational systems biology i
agent-mediated electronic commerce vi
agent-mediated electronic commerce vi
nonlinear analyses and algorithms fo...
nonlinear analyses and algorithms for speech processing
practical aspects of declarative lan...
practical aspects of declarative languages
distributed computing and networking
distributed computing and networking
advances in multimedia modeling
advances in multimedia modeling
graph drawing
graph drawing
high performance embedded architectu...
high performance embedded architectures and compilers
declarative agent languages and tech...
declarative agent languages and technologies v
sofsem 2008: theory and practice of ...
sofsem 2008: theory and practice of computer science
foundations of information and knowl...
foundations of information and knowledge systems
journal on data semantics x
journal on data semantics x
wireless sensor networks
wireless sensor networks
high-performance computing
high-performance computing
understanding planning tasks
understanding planning tasks
algorithmic aspects of wireless sens...
algorithmic aspects of wireless sensor networks
walcom: algorithms and computation
walcom: algorithms and computation
towards affordance-based robot control
towards affordance-based robot control
approximation and online algorithms
approximation and online algorithms
adaptive agents and multi-agent syst...
adaptive agents and multi-agent systems iii. adaptation and multi-agent learning
dna computing
dna computing
hardware and software: verification ...
hardware and software: verification and testing
agent-oriented information systems iv
agent-oriented information systems iv
pillars of computer science
pillars of computer science
computational linguistics and intell...
computational linguistics and intelligent text processing
formal concept analysis
formal concept analysis
architecture of computing systems-ar...
architecture of computing systems-arcs 2008
machine learning for multimodal inte...
machine learning for multimodal interaction
robot vision
robot vision
large-scale knowledge resources. con...
large-scale knowledge resources. construction and application
verification, model checking, and ab...
verification, model checking, and abstract interpretation
object-oriented technology. ecoop 20...
object-oriented technology. ecoop 2007 workshop reader
new frontiers in artificial intelligence
new frontiers in artificial intelligence
business process management workshops
business process management workshops
public key cryptography ??pkc 2008
public key cryptography ??pkc 2008
inductive logic programming
inductive logic programming
theory of cryptography
theory of cryptography
knowledge management for health care...
knowledge management for health care procedures
probabilistic inductive logic progra...
probabilistic inductive logic programming
advances in web based learning - icw...
advances in web based learning - icwl 2007
arabic and chinese handwriting recog...
arabic and chinese handwriting recognition
combinatorial image analysis
combinatorial image analysis
euro-par 2007 workshops: parallel pr...
euro-par 2007 workshops: parallel processing
privacy, security, and trust in kdd
privacy, security, and trust in kdd
virtual systems and multimedia
virtual systems and multimedia
advances in information retrieval
advances in information retrieval
trustworthy global computing
trustworthy global computing
internet of things
internet of things
software composition
software composition
concept lattices and their applications
concept lattices and their applications
coordination, organizations, institu...
coordination, organizations, institutions, and norms in agent systems iii
information security practice and ex...
information security practice and experience
foundations of software science and ...
foundations of software science and computational structures
database systems for advanced applic...
database systems for advanced applications
agent and multi-agent systems
agent and multi-agent systems
evolutionary computation in combinat...
evolutionary computation in combinatorial optimization
genetic programming
genetic programming
job scheduling strategies for parall...
job scheduling strategies for parallel processing
programming languages and systems
programming languages and systems
fundamental approaches to software e...
fundamental approaches to software engineering
evolutionary computation, machine le...
evolutionary computation, machine learning and data mining in bioinformatics
applications of evolutionary computing
applications of evolutionary computing
latin 2008
latin 2008
compiler construction
compiler construction
tools and algorithms for the constru...
tools and algorithms for the construction and analysis of systems
research in computational molecular ...
research in computational molecular biology
progress in www research and development
progress in www research and development
relations and kleene algebra in comp...
relations and kleene algebra in computer science
argumentation in multi-agent systems
argumentation in multi-agent systems
formal methods and testing
formal methods and testing
advances in cryptology -- eurocrypt 2008
advances in cryptology -- eurocrypt 2008
functional and logic programming
functional and logic programming
modeling communication with robots a...
modeling communication with robots and virtual humans
programming multi-agent systems
programming multi-agent systems
tests and proofs
tests and proofs
discrete geometry for computer imagery
discrete geometry for computer imagery
theory and applications of models of...
theory and applications of models of computation
web services and formal methods
web services and formal methods
passive and active network measurement
passive and active network measurement
advances in geometric modeling and p...
advances in geometric modeling and processing
topics in cryptology :
topics in cryptology :
algorithmic game theory
algorithmic game theory
bioinformatics research and applications
bioinformatics research and applications
agent-oriented software engineering viii
agent-oriented software engineering viii
trust management ii
trust management ii
advances in grid and pervasive computing
advances in grid and pervasive computing
types for proofs and programs
types for proofs and programs
parallel processing and applied math...
parallel processing and applied mathematics
foundations of intelligent systems
foundations of intelligent systems
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
service availability
service availability
integration of ai and or techniques ...
integration of ai and or techniques in constraint programming for combinatorial optimization problems
progress in cryptology - africacrypt...
progress in cryptology - africacrypt 2008
semantic web
semantic web
coordination models and languages
coordination models and languages
mining complex data
mining complex data
heterogeneous objects modelling and ...
heterogeneous objects modelling and applications
experimental algorithms
experimental algorithms
openmp shared memory parallel progra...
openmp shared memory parallel programming
information retrieval technology
information retrieval technology
distributed applications and interop...
distributed applications and interoperable systems
wired/wireless internet communications
wired/wireless internet communications
advances in artificial intelligence
advances in artificial intelligence
formal techniques for networked and ...
formal techniques for networked and distributed systems--forte 2008
computational intelligence
computational intelligence
integer programming and combinatoria...
integer programming and combinatorial optimization
formal methods for computational sys...
formal methods for computational systems biology
applied cryptography and network sec...
applied cryptography and network security
dependability metrics
dependability metrics
analytical and stochastic modeling t...
analytical and stochastic modeling techniques and applications
transactions on data hiding and mult...
transactions on data hiding and multimedia security iii
algorithms and architectures for par...
algorithms and architectures for parallel processing
artificial evolution
artificial evolution
algorithmic number theory
algorithmic number theory
computer vision systems
computer vision systems
networking 2008
networking 2008
openmp in a new era of parallelism
openmp in a new era of parallelism
pervasive computing
pervasive computing
making globally distributed software...
making globally distributed software development a success story
formal methods for industrial critic...
formal methods for industrial critical systems
computer science - theory and applic...
computer science - theory and applications
theory and applications of satisfiab...
theory and applications of satisfiability testing--sat 2008
rough sets and knowledge technology
rough sets and knowledge technology
parameterized and exact computation
parameterized and exact computation
information security theory and prac...
information security theory and practices
service-oriented computing
service-oriented computing
fm 2008: formal methods
fm 2008: formal methods
new stream cipher designs
new stream cipher designs
formal methods in systems biology
formal methods in systems biology
persuasive technology
persuasive technology
testing of software and communicatin...
testing of software and communicating systems
multimodal technologies for percepti...
multimodal technologies for perception of humans
reliable software technologies ada-e...
reliable software technologies ada-europe 2008
concurrency, graphs and models
concurrency, graphs and models
applications and theory of petri nets
applications and theory of petri nets
algorithmic aspects in information a...
algorithmic aspects in information and management
new frontiers in applied artificial ...
new frontiers in applied artificial intelligence
haptics: perception, devices and sce...
haptics: perception, devices and scenarios
requirements engineering: foundation...
requirements engineering: foundation for software quality
combinatorial pattern matching
combinatorial pattern matching
models in software engineering
models in software engineering
model driven architecture foundation...
model driven architecture foundations and applications
intelligent tutoring systems
intelligent tutoring systems
from animals to animats 10
from animals to animats 10
intelligence and security informatics
intelligence and security informatics
verified software: theories, tools, ...
verified software: theories, tools, experiments
neural information processing
neural information processing
neural information processing
neural information processing
distributed computing in sensor systems
distributed computing in sensor systems
ubiquitous intelligence and computing
ubiquitous intelligence and computing
autonomic and trusted computing
autonomic and trusted computing
frontiers in algorithmics
frontiers in algorithmics
pattern recognition
pattern recognition
structural information and communica...
structural information and communication complexity
perception in multimodal dialogue sy...
perception in multimodal dialogue systems
computational science iccs 2008
computational science iccs 2008
computational science iccs 2008
computational science iccs 2008
computational science iccs 2008
computational science iccs 2008
logic and theory of algorithms
logic and theory of algorithms
public key infrastructure
public key infrastructure
advanced information systems engineering
advanced information systems engineering
product-focused software process imp...
product-focused software process improvement
artificial intelligence and soft com...
artificial intelligence and soft computing icaisc 2008
computing and combinatorics
computing and combinatorics
technologies for e-learning and digi...
technologies for e-learning and digital entertainment
transactions on edutainment i
transactions on edutainment i
image analysis and recognition
image analysis and recognition
performance evaluation: metrics, mod...
performance evaluation: metrics, models and benchmarks
data integration in the life sciences
data integration in the life sciences
computational science and its applic...
computational science and its applications iccsa 2008
computational science and its applic...
computational science and its applications iccsa 2008
natural language and information systems
natural language and information systems
smart homes and health telematics
smart homes and health telematics
informatics education - supporting c...
informatics education - supporting computational thinking
logic, language, information and com...
logic, language, information and computation
artificial neural networks in patter...
artificial neural networks in pattern recognition
information security and privacy
information security and privacy
sharing data, information and knowledge
sharing data, information and knowledge
transactions on computational science i
transactions on computational science i
medical imaging and informatics
medical imaging and informatics
ada 2005 rationale
ada 2005 rationale
agents and peer-to-peer computing
agents and peer-to-peer computing
adaptive multimedial retrieval: retr...
adaptive multimedial retrieval: retrieval, user, and semantics
high confidence software reuse in la...
high confidence software reuse in large systems
robocup 2007: robot soccer world cup xi
robocup 2007: robot soccer world cup xi
static analysis
static analysis
practical programming model for the ...
practical programming model for the multi-core era
scientific and statistical database ...
scientific and statistical database management
changing television environments
changing television environments
arithmetic of finite fields
arithmetic of finite fields
25 years of model checking
25 years of model checking
algorithm theory - swat 2008
algorithm theory - swat 2008
image and signal processing
image and signal processing
theory and practice of model transfo...
theory and practice of model transformations
articulated motion and deformable ob...
articulated motion and deformable objects
biomedical simulation
biomedical simulation
deontic logic in computer science
deontic logic in computer science
digital mammography
digital mammography
computers helping people with specia...
computers helping people with special needs
detection of intrusions and malware,...
detection of intrusions and malware, and vulnerability assessment
computer aided verification
computer aided verification
embedded computer systems: architect...
embedded computer systems: architectures, modeling, and simulation
collaborative and distributed chemic...
collaborative and distributed chemical engineering. from understanding to substantial design process support
data and applications security xxii
data and applications security xxii
interactive systems. design, specifi...
interactive systems. design, specification, and verification
automata, languages and programming
automata, languages and programming
automata, languages and programming
automata, languages and programming
computer-human interaction
computer-human interaction
resilient networks and services
resilient networks and services
rewriting techniques and applications
rewriting techniques and applications
ecoop 2008 -- object-oriented progra...
ecoop 2008 -- object-oriented programming
mathematics of program construction
mathematics of program construction
conceptual structures: knowledge vis...
conceptual structures: knowledge visualization and reasoning
privacy enhancing technologies
privacy enhancing technologies
advances in mass data analysis of im...
advances in mass data analysis of images and signals in medicine, biotechnology, chemistry and food industry
advances in data mining. medical app...
advances in data mining. medical applications, e-commerce, marketing, and theoretical aspects
implementation and applications of a...
implementation and applications of automata
multi-agent-based simulation viii
multi-agent-based simulation viii
model-driven development of reliable...
model-driven development of reliable automotive services
information visualization
information visualization
semantic web, ontologies and databases
semantic web, ontologies and databases
fast software encryption
fast software encryption
visual data mining
visual data mining
reflections on the teaching of progr...
reflections on the teaching of programming
algorithms and models for the web-graph
algorithms and models for the web-graph
hybrid systems: computation and control
hybrid systems: computation and control
algebraic methodology and software t...
algebraic methodology and software technology
medical imaging and augmented reality
medical imaging and augmented reality
computer music modeling and retrieva...
computer music modeling and retrieval. sense of sounds
secure transaction protocol analysis
secure transaction protocol analysis
intelligent computer mathematics
intelligent computer mathematics
trusted computing - challenges and a...
trusted computing - challenges and applications
scaling topic maps
scaling topic maps
adaptive hypermedia and adaptive web...
adaptive hypermedia and adaptive web-based systems
reconfigurable computing: architectu...
reconfigurable computing: architectures, tools and applications
information security and cryptology
information security and cryptology
cellular automata
cellular automata
geosensor networks
geosensor networks
engineering environment-mediated mul...
engineering environment-mediated multi-agent systems
advances in web based learning - icw...
advances in web based learning - icwl 2008
cryptographic hardware and embedded ...
cryptographic hardware and embedded systems -- ches 2008
languages, methodologies and develop...
languages, methodologies and development tools for multi-agent systems
transactions on rough sets viii
transactions on rough sets viii
artificial immune systems
artificial immune systems
information theoretic security
information theoretic security
combinatorial optimization and appli...
combinatorial optimization and applications
affect and emotion in human-computer...
affect and emotion in human-computer interaction
algebraic biology
algebraic biology
model checking software
model checking software
hybrid learning and education
hybrid learning and education
advances in cryptology -- crypto 2008
advances in cryptology -- crypto 2008
data management in grid and peer-to-...
data management in grid and peer-to-peer systems
unconventional computing
unconventional computing
web information systems engineering ...
web information systems engineering -- wise 2008 workshops
electronic government
electronic government
financial cryptography and data security
financial cryptography and data security
mathematical foundations of computer...
mathematical foundations of computer science 2008
secure data management
secure data management
languages and compilers for parallel...
languages and compilers for parallel computing
balancing agility and formalism in s...
balancing agility and formalism in software engineering
advances in natural language processing
advances in natural language processing
common component modeling example
common component modeling example
computational forensics
computational forensics
concur 2008 - concurrency theory
concur 2008 - concurrency theory
approximation, randomization and com...
approximation, randomization and combinatorial optimization. algorithms and techniques
implementation and application of fu...
implementation and application of functional languages
smart graphics
smart graphics
massively multi-agent technology
massively multi-agent technology
euro-par 2008 -- parallel processing
euro-par 2008 -- parallel processing
web information systems engineering ...
web information systems engineering - wise 2008
intelligent virtual agents
intelligent virtual agents
grid economics and business models
grid economics and business models
next generation teletraffic and wire...
next generation teletraffic and wired/wireless advanced networking
advances in case-based reasoning
advances in case-based reasoning
pairing-based cryptography -- pairi...
pairing-based cryptography -- pairing 2008
reliable implementation of real numb...
reliable implementation of real number algorithms: theory and practice
software process and product measurement
software process and product measurement
advances in bioinformatics and compu...
advances in bioinformatics and computational biology
architecting dependable systems v
architecting dependable systems v
database and expert systems applications
database and expert systems applications
network-based information systems
network-based information systems
advances in databases and informatio...
advances in databases and information systems
e-commerce and web technologies
e-commerce and web technologies
trust, privacy and security in digit...
trust, privacy and security in digital business
theoretical aspects of computing - i...
theoretical aspects of computing - ictac 2008
artificial intelligence: methodology...
artificial intelligence: methodology, systems, and applications
security and cryptography for networks
security and cryptography for networks
focused access to xml documents
focused access to xml documents
inductive logic programming
inductive logic programming
coding theory and applications
coding theory and applications
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
artificial neural networks - icann 2008
artificial neural networks - icann 2008
automated reasoning
automated reasoning
ad-hoc, mobile, and wireless networks
ad-hoc, mobile, and wireless networks
knowledge-based intelligent informat...
knowledge-based intelligent information and engineering systems
knowledge-based intelligent informat...
knowledge-based intelligent information and engineering systems
knowledge-based intelligent informat...
knowledge-based intelligent information and engineering systems
reasoning web
reasoning web
optical supercomputing
optical supercomputing
advances in multilingual and multimo...
advances in multilingual and multimodal information retrieval
formal modeling and analysis of time...
formal modeling and analysis of timed systems
developments in language theory
developments in language theory
cooperative information agents xii
cooperative information agents xii
data warehousing and knowledge discovery
data warehousing and knowledge discovery
ki 2008: advances in artificial inte...
ki 2008: advances in artificial intelligence
machine learning for multimodal inte...
machine learning for multimodal interaction
evolvable systems
evolvable systems
information security
information security
visual information systems
visual information systems
smart card research and advanced app...
smart card research and advanced applications
sequences and their applications - s...
sequences and their applications - seta 2008
progress in pattern recognition, ima...
progress in pattern recognition, image analysis and applications
visualization for computer security
visualization for computer security
principles and practice of constrain...
principles and practice of constraint programming
computational processing of the port...
computational processing of the portuguese language
advanced intelligent computing theor...
advanced intelligent computing theories and applications
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2008
managing large-scale service deployment
managing large-scale service deployment
modelling autonomic communications e...
modelling autonomic communications environments
ip operations and management
ip operations and management
management of converged multimedia n...
management of converged multimedia networks and services
algorithms in bioinformatics
algorithms in bioinformatics
text, speech and dialogue
text, speech and dialogue
recent advances in intrusion detection
recent advances in intrusion detection
graph transformations
graph transformations
computer performance engineering
computer performance engineering
advanced intelligent computing theor...
advanced intelligent computing theories and applications
privacy in statistical databases
privacy in statistical databases
geographic information science
geographic information science
recent advances in parallel virtual ...
recent advances in parallel virtual machine and message passing interface
ant colony optimization and swarm in...
ant colony optimization and swarm intelligence
computer science logic
computer science logic
artificial neural networks - icann 2008
artificial neural networks - icann 2008
transactions on computational science ii
transactions on computational science ii
research and advanced technology for...
research and advanced technology for digital libraries
spatial cognition.
spatial cognition.
abstract state machines, b and z
abstract state machines, b and z
times of convergence
times of convergence
computers and games
computers and games
engineering societies in the agents ...
engineering societies in the agents world viii
hybrid artificial intelligence systems
hybrid artificial intelligence systems
knowledge engineering and knowledge ...
knowledge engineering and knowledge management
computer safety, reliability, and se...
computer safety, reliability, and security
parallel problem solving from nature...
parallel problem solving from nature - ppsn x
challenge of anticipation
challenge of anticipation
diagrammatic representation and infe...
diagrammatic representation and inference
advances in neural networks - isnn 2008
advances in neural networks - isnn 2008
advances in neural networks - isnn 2008
advances in neural networks - isnn 2008
algorithms - esa 2008
algorithms - esa 2008
distributed computing
distributed computing
emerging technologies and informatio...
emerging technologies and information systems for the knowledge society
software technologies for embedded a...
software technologies for embedded and ubiquitous systems
logics in artificial intelligence
logics in artificial intelligence
multiagent system technologies
multiagent system technologies
verified software: theories, tools, ...
verified software: theories, tools, experiments
model driven engineering languages a...
model driven engineering languages and systems
artificial intelligence : theories, ...
artificial intelligence : theories, models and applications
haptic and audio interaction design
haptic and audio interaction design
grammatical inference
grammatical inference
cooperative design, visualization an...
cooperative design, visualization and engineering
software architecture
software architecture
central european functional programm...
central european functional programming school
graphics recognition
graphics recognition
advanced data mining and applications
advanced data mining and applications
pedagogically founded courseware gen...
pedagogically founded courseware generation for web-based learning
language and automata theory and app...
language and automata theory and applications
logic-based program synthesis and tr...
logic-based program synthesis and transformation
pricai 2008: trends in artificial in...
pricai 2008: trends in artificial intelligence
advances in cryptology - asiacrypt 2008
advances in cryptology - asiacrypt 2008
transactions on petri nets and other...
transactions on petri nets and other models of concurrency i
programming languages and systems
programming languages and systems
ai 2008: advances in artificial inte...
ai 2008: advances in artificial intelligence
interactive storytelling
interactive storytelling
practical aspects of knowledge manag...
practical aspects of knowledge management
advances in information and computer...
advances in information and computer security
advances in visual computing
advances in visual computing
cryptology and network security
cryptology and network security
advances in visual computing
advances in visual computing
intelligent agents and multi-agent s...
intelligent agents and multi-agent systems
structural, syntactic, and statistic...
structural, syntactic, and statistical pattern recognition
simulated evolution and learning
simulated evolution and learning
recent advances in reinforcement lea...
recent advances in reinforcement learning
languages and compilers for parallel...
languages and compilers for parallel computing
biosurveillance and biosecurity
biosurveillance and biosecurity
progress in cryptology - indocrypt 2008
progress in cryptology - indocrypt 2008
advances in software engineering
advances in software engineering
uncertainty reasoning for the semant...
uncertainty reasoning for the semantic web i
innovations for requirements analysi...
innovations for requirements analysis :from stakeholders' needs to formal designs
advances in multimedia information p...
advances in multimedia information processing - pcm 2008
middleware 2008
middleware 2008
information systems security
information systems security
transactions on rough sets ix
transactions on rough sets ix
high performance computing - hipc 2008
high performance computing - hipc 2008
towards a service-based internet
towards a service-based internet
intelligence and security informatics
intelligence and security informatics
web and wireless geographical inform...
web and wireless geographical information systems
logic programming
logic programming
biometrics and identity management
biometrics and identity management
mathematical methods in computer science
mathematical methods in computer science
advances in computation and intelligence
advances in computation and intelligence
journal on data semantics xi
journal on data semantics xi
self-organizing systems
self-organizing systems
algorithms and computation
algorithms and computation
internet and network economics
internet and network economics
formal methods for components and ob...
formal methods for components and objects
bio-inspired computing and communication
bio-inspired computing and communication
principles of distributed systems
principles of distributed systems
semantic multimedia
semantic multimedia
digital watermarking
digital watermarking
graph-theoretic concepts in computer...
graph-theoretic concepts in computer science
transactions on computational system...
transactions on computational systems biology x
learning and intelligent optimization
learning and intelligent optimization
engineering interactive systems
engineering interactive systems
computer supported cooperative work ...
computer supported cooperative work in design iv
complexity of constraints
complexity of constraints
trust in agent societies
trust in agent societies
high performance computing for compu...
high performance computing for computational science - vecpar 2008
algorithmic aspects of wireless sens...
algorithmic aspects of wireless sensor networks
foundations of genetic algorithms :
foundations of genetic algorithms :
adaptive and natural computing algor...
adaptive and natural computing algorithms :
advanced parallel processing technol...
advanced parallel processing technologies :
advances in artificial intelligence :
advances in artificial intelligence :
advances in bioinformatics and compu...
advances in bioinformatics and computational biology :
advances in computation and intellig...
advances in computation and intelligence :
advances in computer science - asian...
advances in computer science - asian 2009 :
advances in conceptual modeling-chal...
advances in conceptual modeling-challenging perspectives :
advances in data and web management :
advances in data and web management :
advances in data mining :
advances in data mining :
advances in databases and informatio...
advances in databases and information systems :
advances in grid and pervasive compu...
advances in grid and pervasive computing :
advances in information and computer...
advances in information and computer security :
advances in information retrieval th...
advances in information retrieval theory :
advances in machine learning :
advances in machine learning :
advances in self-organizing maps :
advances in self-organizing maps :
advances in spatial and temporal dat...
advances in spatial and temporal databases :
advances in ubiquitous user modelling :
advances in ubiquitous user modelling :
advances in web semantics i :
advances in web semantics i :
agent-oriented software engineering ix :
agent-oriented software engineering ix :
agents and data mining interaction :
agents and data mining interaction :
agents for games and simulations :
agents for games and simulations :
algorithms and models for the web-gr...
algorithms and models for the web-graph :
algorithms in bioinformatics :
algorithms in bioinformatics :
computational intelligence methods f...
computational intelligence methods for bioinformatics and biostatistics :
cryptology and network security :
cryptology and network security :
data management in grid and peer-to-...
data management in grid and peer-to-peer systems :
integrated circuit and system design :
integrated circuit and system design :
integration of ai and or techniques ...
integration of ai and or techniques in constraint programming for combinatorial optimization problems :
conceptual structures
conceptual structures
formal concept analysis
formal concept analysis
audio- and video-based biometric per...
audio- and video-based biometric person authentication
modeling decisions for artificial in...
modeling decisions for artificial intelligence
web engineering
web engineering
modelling the physiological human
modelling the physiological human
critical information infrastructures...
critical information infrastructures security
networking - icn 2005
networking - icn 2005
logic and its applications
logic and its applications
formal verification of object-orient...
formal verification of object-oriented software
digital watermarking
digital watermarking
information security
information security
integrated circuit and system design
integrated circuit and system design
theory of quantum computation, commu...
theory of quantum computation, communication and cryptography
performance evaluation, measurement ...
performance evaluation, measurement and characterization of complex systems
computers and games
computers and games
numerical methods and applications
numerical methods and applications
knowledge representation for health-care
knowledge representation for health-care
transactions on edutainment v
transactions on edutainment v
multi-agent-based simulation xi
multi-agent-based simulation xi
engineering secure software and systems
engineering secure software and systems
approximation and online algorithms
approximation and online algorithms
evolution of conceptual modeling
evolution of conceptual modeling
vagueness in communication
vagueness in communication
algebraic methodology and software t...
algebraic methodology and software technology
adaptive multimedia retrieval
adaptive multimedia retrieval
transactions on rough sets xiii
transactions on rough sets xiii
practical aspects of declarative lan...
practical aspects of declarative languages
dna computing and molecular programming
dna computing and molecular programming
distributed computing and networking
distributed computing and networking
advances in multimedia modeling
advances in multimedia modeling
advances in multimedia modeling
advances in multimedia modeling
human-computer interaction, tourism ...
human-computer interaction, tourism and cultural heritage
sofsem 2011
sofsem 2011
information security applications
information security applications
verification, model checking, and ab...
verification, model checking, and abstract interpretation
toward autonomous, adaptive, and con...
toward autonomous, adaptive, and context-aware multimodal interfaces theoretical and practical issues
agents for games and simulations ii
agents for games and simulations ii
generative and transformational tech...
generative and transformational techniques in software engineering iii
medical computer vision
medical computer vision
distributed computing and internet t...
distributed computing and internet technology
self-organizing systems
self-organizing systems
topics in cryptology
topics in cryptology
implementation and application of au...
implementation and application of automata
computational linguistics and intell...
computational linguistics and intelligent text processing
graph drawing
graph drawing
computational linguistics and intell...
computational linguistics and intelligent text processing
open research problems in network se...
open research problems in network security
walcom
walcom
hardware and software: verification ...
hardware and software: verification and testing
data privacy management and autonomo...
data privacy management and autonomous spontaneous security
wireless sensor networks
wireless sensor networks
architecture of computing systems
architecture of computing systems
web and wireless geographical inform...
web and wireless geographical information systems
computer vision
computer vision
ludics, dialogue and interaction
ludics, dialogue and interaction
computational forensics
computational forensics
software language engineering
software language engineering
high performance computing for compu...
high performance computing for computational science
social computing, behavioral-cultura...
social computing, behavioral-cultural modeling and prediction
agent-oriented software engineering x
agent-oriented software engineering x
transactions on high-performance emb...
transactions on high-performance embedded architectures and compilers iii
languages and compilers for parallel...
languages and compilers for parallel computing
formal aspects of security and trust
formal aspects of security and trust
public key cryptography
public key cryptography
computer vision
computer vision
computer vision
computer vision
computer vision
computer vision
computing with instinct
computing with instinct
selected areas in cryptography
selected areas in cryptography
service-oriented computing
service-oriented computing
language, games, and evolution
language, games, and evolution
biometrics and id management
biometrics and id management
hardware and software: verification ...
hardware and software: verification and testing
search computing
search computing
human aspects of visualization
human aspects of visualization
recent advances in constraints
recent advances in constraints
passive and active measurement
passive and active measurement
combinatorial algorithms
combinatorial algorithms
foundations of software science and ...
foundations of software science and computational structures
fundamental approaches to software e...
fundamental approaches to software engineering
programming languages and systems
programming languages and systems
tools and algorithms for the constru...
tools and algorithms for the construction and analysis of systems
compiler construction
compiler construction
reconfigurable computing
reconfigurable computing
formal methods
formal methods
requirements engineering: foundation...
requirements engineering: foundation for software quality
robocup 2010
robocup 2010
web services and formal methods
web services and formal methods
human language technology
human language technology
theory of cryptography
theory of cryptography
transactions on pattern languages of...
transactions on pattern languages of programming ii
communication technologies for vehicles
communication technologies for vehicles
research in computational molecular ...
research in computational molecular biology
evolutionary multi-criterion optimiz...
evolutionary multi-criterion optimization
theory and practice of algorithms in...
theory and practice of algorithms in (computer) systems
formal grammar
formal grammar
discrete geometry for computer imagery
discrete geometry for computer imagery
database systems for advanced applic...
database systems for advanced applications
computational color imaging
computational color imaging
traffic monitoring and analysis
traffic monitoring and analysis
nasa formal methods
nasa formal methods
future internet
future internet
web technologies and applications
web technologies and applications
declarative agent languages and tech...
declarative agent languages and technologies viii
database systems for advanced applic...
database systems for advanced applications
adaptive and natural computing algor...
adaptive and natural computing algorithms
adaptive and natural computing algor...
adaptive and natural computing algorithms
advances in new technologies, intera...
advances in new technologies, interactive interfaces, and communicability
advances in information retrieval
advances in information retrieval
database systems for adanced applica...
database systems for adanced applications
digital privacy
digital privacy
network performance engineering
network performance engineering
intelligent information and database...
intelligent information and database systems
intelligent information and database...
intelligent information and database systems
privacy and security issues in data ...
privacy and security issues in data mining and machine learning
applications of declarative programm...
applications of declarative programming and knowledge management
model checking and artificial intell...
model checking and artificial intelligence
experimental algorithms
experimental algorithms
logic-based program synthesis and tr...
logic-based program synthesis and transformation
new horizons in web-based learning -...
new horizons in web-based learning - icwl 2010 workshops
logic programming and nonmonotonic r...
logic programming and nonmonotonic reasoning
evolutionary computation in combinat...
evolutionary computation in combinatorial optimization
genetic programming
genetic programming
formal concept analysis
formal concept analysis
theory and applications of models of...
theory and applications of models of computation
evolutionary computation, machine le...
evolutionary computation, machine learning and data mining in bioinformatics
networking 2011
networking 2011
applications of evolutionary computation
applications of evolutionary computation
service-oriented perspectives in des...
service-oriented perspectives in design science research
advances in grid and pervasive computing
advances in grid and pervasive computing
applications of evolutionary computation
applications of evolutionary computation
networking 2011
networking 2011
logic programming, knowledge represe...
logic programming, knowledge representation, and nonmonotonic reasoning
rainbow of computer science
rainbow of computer science
logic, language, information and com...
logic, language, information and computation
bioinformatics research and applications
bioinformatics research and applications
euro-par 2010 parallel processing wo...
euro-par 2010 parallel processing workshops
rule-based reasoning, programming, a...
rule-based reasoning, programming, and applications
developments in language theory
developments in language theory
transactions on computational scienc...
transactions on computational science xii
artificial immune systems
artificial immune systems
privacy enhancing technologies
privacy enhancing technologies
descriptional complexity of formal s...
descriptional complexity of formal systems
energy minimization methods in compu...
energy minimization methods in computer vision and pattern recognition
hybrid learning
hybrid learning
scientific and statistical database ...
scientific and statistical database management
optical supercomputing
optical supercomputing
implementation and application of au...
implementation and application of automata
studies in complexity and cryptography
studies in complexity and cryptography
modeling decision for artificial int...
modeling decision for artificial intelligence
structural information and communica...
structural information and communication complexity
rough sets, fuzzy sets, data mining ...
rough sets, fuzzy sets, data mining and granular computing
artificial general intelligence
artificial general intelligence
transactions on aspect-oriented soft...
transactions on aspect-oriented software development viii
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems iii
hybrid deliberative layer for roboti...
hybrid deliberative layer for robotic agents
knowledge processing and data analysis
knowledge processing and data analysis
automated deduction
automated deduction
conceptual structures for discoverin...
conceptual structures for discovering knowledge
combinatorial optimization and appli...
combinatorial optimization and applications
intelligent computer mathematics
intelligent computer mathematics
functional and constraint logic prog...
functional and constraint logic programming
ecoop 2011
ecoop 2011
security protocols xvi
security protocols xvi
computer aided verification
computer aided verification
computational intelligence methods f...
computational intelligence methods for bioinformatics and biostatistics
information security and cryptology
information security and cryptology
logic, language, and computation
logic, language, and computation
model checking software
model checking software
smart graphics
smart graphics
logic and games on automatic structures
logic and games on automatic structures
information security and privacy
information security and privacy
logic and grammar
logic and grammar
ad-hoc, mobile, and wireless networks
ad-hoc, mobile, and wireless networks
collaborative agents
collaborative agents
universal access in human-computer i...
universal access in human-computer interaction
pervasive computing
pervasive computing
information security theory and practice
information security theory and practice
coding and cryptology
coding and cryptology
advances in swarm intelligence
advances in swarm intelligence
algorithms and models for the web graph
algorithms and models for the web graph
relational and algebraic methods in ...
relational and algebraic methods in computer science
distributed applications and interop...
distributed applications and interoperable systems
coordination models and languages
coordination models and languages
openmp in the petascale era
openmp in the petascale era
multidisciplinary information retrieval
multidisciplinary information retrieval
semanic web
semanic web
formal techniques for distributed sy...
formal techniques for distributed systems
theory and application of satisfiabi...
theory and application of satisfiability testing
modelling foundations and applications
modelling foundations and applications
formal methods for eternal networked...
formal methods for eternal networked software systems
tools for teaching logic
tools for teaching logic
computer science
computer science
analytical and stochastic modeling t...
analytical and stochastic modeling techniques and applications
typed lambda calculi and applications
typed lambda calculi and applications
unconventional computation
unconventional computation
artificial neural networks and machi...
artificial neural networks and machine learning
advances in self-organizing maps
advances in self-organizing maps
artificial neural networks and machi...
artificial neural networks and machine learning
inductive logic programming
inductive logic programming
artificial intelligence in education
artificial intelligence in education
applied cryptography and network sec...
applied cryptography and network security
trust and trustworthy computing
trust and trustworthy computing
top productivity through software reuse
top productivity through software reuse
automated reasoning with analytic ta...
automated reasoning with analytic tableaux and related methods
natural language processing and info...
natural language processing and information systems
information processing in medical im...
information processing in medical imaging
computational science and its applic...
computational science and its applications
computational science and its applic...
computational science and its applications
computational science and its applic...
computational science and its applications
computational science and its applic...
computational science and its applications
computational science and its applic...
computational science and its applications
toward useful services for elderly a...
toward useful services for elderly and people with disabilities
advances in artificial life
advances in artificial life
information processing in computer-a...
information processing in computer-assisted interventions
system analysis and modeling
system analysis and modeling
transactions on computational collec...
transactions on computational collective intelligence iv
fast software encryption
fast software encryption
human-computer interaction
human-computer interaction
human-computer interaction
human-computer interaction
human-computer interaction
human-computer interaction
mathematics and computation in music
mathematics and computation in music
human-computer interaction
human-computer interaction
universal access in human-computer i...
universal access in human-computer interaction
pattern recognition and image analysis
pattern recognition and image analysis
universal access in human-computer i...
universal access in human-computer interaction
design, user experience, and usability
design, user experience, and usability
automata, languages and programming
automata, languages and programming
fm 2011
fm 2011
integer programming and combinatoral...
integer programming and combinatoral optimization
web engineering
web engineering
detection of intrusions and malware,...
detection of intrusions and malware, and vulnerability assessment
automata, languages and programming
automata, languages and programming
algebraic informatics
algebraic informatics
end-user development
end-user development
computation, cooperation, and life
computation, cooperation, and life
managing the dynamics of networks an...
managing the dynamics of networks and services
foundations of intelligent systems
foundations of intelligent systems
pattern recognition
pattern recognition
logical aspects of computational lin...
logical aspects of computational linguistics
symbolic and quantitative approaches...
symbolic and quantitative approaches to reasoning with uncertainty
pattern recognition and machine inte...
pattern recognition and machine intelligence
virtual and mixed reality
virtual and mixed reality
digital human modeling
digital human modeling
online communities and social computing
online communities and social computing
ergonomics and health aspects of wor...
ergonomics and health aspects of work with computers
foundations of augmented cognition
foundations of augmented cognition
universal access in human-computer i...
universal access in human-computer interaction
virtual and mixed reality
virtual and mixed reality
human centered design
human centered design
engineering psychology and cognitive...
engineering psychology and cognitive ergonomics
human interface and the management o...
human interface and the management of information
internationalization, design and glo...
internationalization, design and global development
human interface and the management o...
human interface and the management of information
design, user experience, and usability
design, user experience, and usability
agent and multi-agent systems techno...
agent and multi-agent systems technologies and applications
combinatorial pattern matching
combinatorial pattern matching
wired/wireless internet communications
wired/wireless internet communications
transactions on rough sets xiv
transactions on rough sets xiv
modern approaches in applied intelli...
modern approaches in applied intelligence
theory and practice of model transfo...
theory and practice of model transformations
tests and proofs
tests and proofs
applications and theory of petri nets
applications and theory of petri nets
software composition
software composition
objects, models, components, patterns
objects, models, components, patterns
modern approaches in applied intelli...
modern approaches in applied intelligence
autonomous and intelligent systems
autonomous and intelligent systems
user modeling, adaption and personal...
user modeling, adaption and personalization
reliable software technologies
reliable software technologies
advanced information systems engineering
advanced information systems engineering
progress in cryptology
progress in cryptology
data and applications security and p...
data and applications security and privacy xxv
mathematical morphology and its appl...
mathematical morphology and its applications to image and signal processing
product-focused software process imp...
product-focused software process improvement
intelligence and security informatics
intelligence and security informatics
image analysis and recognition
image analysis and recognition
image analysis and recognition
image analysis and recognition
advances in cryptology - eurocrypt 2011
advances in cryptology - eurocrypt 2011
automated deduction in geometry
automated deduction in geometry
graph-based representations in patte...
graph-based representations in pattern recognition
integration of ai and or techniques ...
integration of ai and or techniques in constraint programming for combinatorial optimization problems
geospatial semantics
geospatial semantics
information theoretic security
information theoretic security
transactions on computational system...
transactions on computational systems biology xiii
information security practice and ex...
information security practice and experience
knowledge-driven multimedia informat...
knowledge-driven multimedia information extraction and ontology evolution
semantic web
semantic web
foundations on natural and artificia...
foundations on natural and artificial computation
models in software engineering
models in software engineering
new challenges on bioinspired applic...
new challenges on bioinspired applications
combinatorial image analysis
combinatorial image analysis
image analysis
image analysis
functional imaging and modeling of t...
functional imaging and modeling of the heart
advances in neural networks - isnn 2011
advances in neural networks - isnn 2011
advances in neural networks - isnn 2011
advances in neural networks - isnn 2011
advances in neural networks - isnn 2011
advances in neural networks - isnn 2011
functional and constraint logic prog...
functional and constraint logic programming
advances in artificial intelligence
advances in artificial intelligence
hybrid artificial intelligent systems
hybrid artificial intelligent systems
hybrid artificial intelligent systems
hybrid artificial intelligent systems
advances in artificial life
advances in artificial life
foundations of computer software
foundations of computer software
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
language and automata theory and app...
language and automata theory and applications
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
coordination, organizations, institu...
coordination, organizations, institutions, and norms in agent systems vi
frontiers in algorithmics and algori...
frontiers in algorithmics and algorithmic aspects in information and management
advances in computational intelligence
advances in computational intelligence
advances in computational intelligence
advances in computational intelligence
ambient assisted living
ambient assisted living
computational intelligence in securi...
computational intelligence in security for information systems
advances in swarm intelligence
advances in swarm intelligence
transactions on computational collec...
transactions on computational collective intelligence iii
computer-mediated social networking
computer-mediated social networking
journal on data semantics xiii
journal on data semantics xiii
advances in multimedia information p...
advances in multimedia information processing - pcm 2009
advances in computer science - asian...
advances in computer science - asian 2009
progress in cryptology - indocrypt 2009
progress in cryptology - indocrypt 2009
algorithms and computation
algorithms and computation
rough sets, fuzzy sets, data mining ...
rough sets, fuzzy sets, data mining and granular computing
transactions on computational science vi
transactions on computational science vi
neural information processing
neural information processing
neural information processing
neural information processing
intelligent robotics and applications
intelligent robotics and applications
transactions on pattern languages of...
transactions on pattern languages of programming i
information security applications
information security applications
internet and network economics
internet and network economics
semantic web
semantic web
information and communications security
information and communications security
principles of practice in multi-agen...
principles of practice in multi-agent systems
pattern recognition and machine inte...
pattern recognition and machine intelligence
transactions on edutainment iii
transactions on edutainment iii
rigorous methods for software constr...
rigorous methods for software construction and analysis
formal methods for industrial critic...
formal methods for industrial critical systems
relations and kleene algebra in comp...
relations and kleene algebra in computer science
provable security
provable security
modeling decisions for artificial in...
modeling decisions for artificial intelligence
conceptual modeling - er 2009
conceptual modeling - er 2009
transactions on petri nets and other...
transactions on petri nets and other models of concurrency iii
semantic web - iswc 2009
semantic web - iswc 2009
advances in conceptual modeling-chal...
advances in conceptual modeling-challenging perspectives
flexible query answering systems
flexible query answering systems
rule interchange and applications
rule interchange and applications
testing of software and communicatio...
testing of software and communication systems
visual informatics
visual informatics
fm 2009
fm 2009
stabilization, safety, and security ...
stabilization, safety, and security of distributed systems
on the move to meaningful internet s...
on the move to meaningful internet systems - otm 2009
on the move to meaningful internet s...
on the move to meaningful internet systems - otm 2009
advances in machine learning
advances in machine learning
web information systems and mining
web information systems and mining
artificial intelligence and computat...
artificial intelligence and computational intelligence
micai 2009
micai 2009
on the move to meaningful internet s...
on the move to meaningful internet systems
ambient intelligence
ambient intelligence
software process and product measurement
software process and product measurement
selected areas in cryptography
selected areas in cryptography
engineering societies in the agents ...
engineering societies in the agents world x
combinatorial image analysis
combinatorial image analysis
combinatorial algorithms
combinatorial algorithms
information theoretic security
information theoretic security
protecting persons while protecting ...
protecting persons while protecting the people
software technologies for embedded a...
software technologies for embedded and ubiquitous systems
progress in pattern recognition, ima...
progress in pattern recognition, image analysis, computer vision, and applications
ai*ia 2009
ai*ia 2009
hci and usability for e-inclusion
hci and usability for e-inclusion
advances in visual computing
advances in visual computing
motion in games
motion in games
advances in cryptology - asiacrypt 2009
advances in cryptology - asiacrypt 2009
formal methods and software engineering
formal methods and software engineering
services-oriented computing
services-oriented computing
network control and optimization
network control and optimization
artificial life
artificial life
cryptology and network security
cryptology and network security
geospatial semantics
geospatial semantics
ai 2009
ai 2009
optical supercomputing
optical supercomputing
middleware 2009
middleware 2009
formal methods
formal methods
knowledge science, engineering and m...
knowledge science, engineering and management
future generation information technology
future generation information technology
advances in visual computing
advances in visual computing
semantic multimedia
semantic multimedia
journal on data semantics xiv
journal on data semantics xiv
web and wireless geographical inform...
web and wireless geographical information systems
dna computing and molecular programming
dna computing and molecular programming
interactive storytelling
interactive storytelling
cloud computing
cloud computing
programming languages and systems
programming languages and systems
service-oriented computing: agents, ...
service-oriented computing: agents, semantics, and engineering
information systems security
information systems security
self-organizing systems
self-organizing systems
cryptography and coding
cryptography and coding
principles of distributed systems
principles of distributed systems
learning and intelligent optimization
learning and intelligent optimization
agents for games and simulations
agents for games and simulations
parameterized and exact computation
parameterized and exact computation
automated reasoning with analytic ta...
automated reasoning with analytic tableaux and related methods
dna computing
dna computing
infinity in logic and computation
infinity in logic and computation
transactions on aspect-oriented soft...
transactions on aspect-oriented software development vi
computer algebra in scientific computing
computer algebra in scientific computing
transactions on computational system...
transactions on computational systems biology xi
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2009
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2009
artificial neural networks - icann 2009
artificial neural networks - icann 2009
recent advances in intrusion detection
recent advances in intrusion detection
web information systems engineering,...
web information systems engineering, wise 2009
model driven engineering languages a...
model driven engineering languages and systems
algorithmic decision theory
algorithmic decision theory
digital watermarking
digital watermarking
computational collective intelligence
computational collective intelligence
knowledge-based and intelligent info...
knowledge-based and intelligent information and engineering systems
knowledge-based and intelligent info...
knowledge-based and intelligent information and engineering systems
job scheduling strategies for parall...
job scheduling strategies for parallel processing
learning in the synergy of multiple ...
learning in the synergy of multiple disciplines
algorithmic game theory
algorithmic game theory
advanced functional programming
advanced functional programming
computer vision systems
computer vision systems
progress in artificial intelligence
progress in artificial intelligence
runtime verification
runtime verification
advanced concepts for intelligent vi...
advanced concepts for intelligent vision systems
aspects of natural language processing
aspects of natural language processing
comparative genomics
comparative genomics
discovery science
discovery science
automated technology for verificatio...
automated technology for verification and analysis
identity and privacy in the internet age
identity and privacy in the internet age
information retrieval technology
information retrieval technology
computer aided systems theory - euro...
computer aided systems theory - eurocast 2009
multimodal corpora
multimodal corpora
advances in computation and intelligence
advances in computation and intelligence
advances in information and computer...
advances in information and computer security
active media technology
active media technology
safety and security in multiagen systems
safety and security in multiagen systems
logic, rationality, and interaction
logic, rationality, and interaction
security protocols
security protocols
teaching formal methods
teaching formal methods
hybrid metaheuristics
hybrid metaheuristics
adaptive and natural computing algor...
adaptive and natural computing algorithms
next generation information technolo...
next generation information technologies and systems
stochastic algorithms
stochastic algorithms
brain informatics
brain informatics
ip operations and management
ip operations and management
anaphora processing and applications
anaphora processing and applications
integrated management of systems, se...
integrated management of systems, services, processes and people in it
wired-wireless multimedia networks a...
wired-wireless multimedia networks and services management
modelling autonomic communications e...
modelling autonomic communications environments
advances in ubiquitous user modelling
advances in ubiquitous user modelling
web reasoning and rule systems
web reasoning and rule systems
knowledge representation for agents ...
knowledge representation for agents and multi-agent systems
algorithmic aspects of wireless sens...
algorithmic aspects of wireless sensor networks
robust and online large-scale optimi...
robust and online large-scale optimization
architecting dependable systems vi
architecting dependable systems vi
performance evaluation and benchmarking
performance evaluation and benchmarking
user modeling, adaptation, and perso...
user modeling, adaptation, and personalization
artificial intelligence
artificial intelligence
parallel computing technologies
parallel computing technologies
fundamentals of computation theory
fundamentals of computation theory
recent trends in algebraic developme...
recent trends in algebraic development techniques
efficient algorithms
efficient algorithms
foundations and applications of secu...
foundations and applications of security analysis
electronic government
electronic government
critical information infrastructures...
critical information infrastructures security
mathematics of surfaces xiii
mathematics of surfaces xiii
internet of the future
internet of the future
data warehousing and knowledge discovery
data warehousing and knowledge discovery
algebra and coalgebra in computer sc...
algebra and coalgebra in computer science
unconventional computation
unconventional computation
engineering stochastic local search ...
engineering stochastic local search algorithms
reasoning web
reasoning web
advances in focused retrieval
advances in focused retrieval
computer analysis of images and patterns
computer analysis of images and patterns
recent advances in parallel virtual ...
recent advances in parallel virtual machine and message passing interface
dynamic 3d imaging
dynamic 3d imaging
pattern recognition
pattern recognition
spatial information theory
spatial information theory
computational methods in systems biology
computational methods in systems biology
business process management
business process management
advances in intelligent data analysi...
advances in intelligent data analysis viii
information security theory and practice
information security theory and practice
e-commerce and web technologies
e-commerce and web technologies
emerging intelligent computing techn...
emerging intelligent computing technology and applications
computer science logic
computer science logic
pattern recognition in bioinformatics
pattern recognition in bioinformatics
entertainment computing, icec 2009
entertainment computing, icec 2009
emerging intelligent computing techn...
emerging intelligent computing technology and applications
haptic and audio interaction design
haptic and audio interaction design
concur 2009 - concurrency theory
concur 2009 - concurrency theory
foundations of intelligent systems
foundations of intelligent systems
algorithms - esa 2009
algorithms - esa 2009
e-voting and identity
e-voting and identity
cryptographic hardware and embedded ...
cryptographic hardware and embedded systems - ches 2009
multiagent system technologies
multiagent system technologies
image analysis and processing - icia...
image analysis and processing - iciap 2009
semantics and algebraic specification
semantics and algebraic specification
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
smart spaces and next generation wir...
smart spaces and next generation wired/wireless networking
database systems for advanced applic...
database systems for advanced applications
formal foundations of reuse and doma...
formal foundations of reuse and domain engineering
groupware
groupware
secure data management
secure data management
frontiers of combining systems
frontiers of combining systems
logic programming and nonmonotonic r...
logic programming and nonmonotonic reasoning
algorithms in bioinformatics
algorithms in bioinformatics
principles and practice of constrain...
principles and practice of constraint programming - cp 2009
cooperative design, visualization, a...
cooperative design, visualization, and engineering
artificial neural networks - icann 2009
artificial neural networks - icann 2009
research and advanced technology for...
research and advanced technology for digital libraries
distributed computing
distributed computing
formal modeling and analysis of time...
formal modeling and analysis of timed systems
mobile entity localization and track...
mobile entity localization and tracking in gps-less environnments
intelligent virtual agents
intelligent virtual agents
ad-hoc, mobile, and wireless networks
ad-hoc, mobile, and wireless networks
scalable uncertainty management
scalable uncertainty management
biometric id management and multimod...
biometric id management and multimodal communication
intelligent data engineering and aut...
intelligent data engineering and automated learning - ideal 2009
discrete geometry for computer imagery
discrete geometry for computer imagery
algorithmic learning theory
algorithmic learning theory
advances in information retrieval theory
advances in information retrieval theory
reachability problems
reachability problems
information hiding
information hiding
computer security - esorics 2009
computer security - esorics 2009
evaluating systems for multilingual ...
evaluating systems for multilingual and multimodal information access
computer safety, reliability, and se...
computer safety, reliability, and security
smart sensing and context
smart sensing and context
information security
information security
management enabling the future inter...
management enabling the future internet for changing business and new computing services
sdl 2009
sdl 2009
quality of context
quality of context
traffic management and traffic engin...
traffic management and traffic engineering for the future internet
semantic techniques for the web
semantic techniques for the web
ki 2009
ki 2009
visioning and engineering the knowle...
visioning and engineering the knowledge society
advances in neuro-information processing
advances in neuro-information processing
information processing in medical im...
information processing in medical imaging
computational logic in multi-agent s...
computational logic in multi-agent systems
ecoop 2009--object-oriented programming
ecoop 2009--object-oriented programming
advances in neuro-information processing
advances in neuro-information processing
algorithms and architectures for par...
algorithms and architectures for parallel processing
static analysis
static analysis
artificial immune systems
artificial immune systems
pairing-based cryptography - pairing...
pairing-based cryptography - pairing 2009
advanced data mining and applications
advanced data mining and applications
computer science - theory and applic...
computer science - theory and applications
advances in cryptology - crypto 2009
advances in cryptology - crypto 2009
theorem proving in higher order logics
theorem proving in higher order logics
learning by playing
learning by playing
wireless algorithms, systems, and ap...
wireless algorithms, systems, and applications
advances in web based learning - icw...
advances in web based learning - icwl 2009
theoretical aspects of computing - i...
theoretical aspects of computing - ictac 2009
computational forensics
computational forensics
database and xml technologies
database and xml technologies
algebraic informatics
algebraic informatics
database and expert systems applications
database and expert systems applications
mathematical morphology and its appl...
mathematical morphology and its application to signal and image processing
energy minimization methods in compu...
energy minimization methods in computer vision and pattern recognition
advanced parallel processing technol...
advanced parallel processing technologies
human computer interaction - interac...
human computer interaction - interact 2009
human computer interaction - interac...
human computer interaction - interact 2009
holonic and multi-agent systems for ...
holonic and multi-agent systems for manufacturing
approximation, randomization, and co...
approximation, randomization, and combinatorial optimization
digital watermarking
digital watermarking
data management in grid and peer-to-...
data management in grid and peer-to-peer systems
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems i
trust, privacy and security in digit...
trust, privacy and security in digital business
electronic participation
electronic participation
string processing and information re...
string processing and information retrieval
database programming languages
database programming languages
mathematical foundations of computer...
mathematical foundations of computer science 2009
foundations of security analysis and...
foundations of security analysis and design v
grid economics and business models
grid economics and business models
euro-par 2009 - parallel processing
euro-par 2009 - parallel processing
advances in databases and informatio...
advances in databases and information systems
advances in robotics
advances in robotics
advances in web and network technolo...
advances in web and network technologies, and information management
selected areas in cryptography
selected areas in cryptography
formal methods for components and ob...
formal methods for components and objects
text, speech and dialogue
text, speech and dialogue
human language technology
human language technology
advances in data mining
advances in data mining
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
advances in spatial and temporal dat...
advances in spatial and temporal databases
text, speech and dialogue
text, speech and dialogue
semantics in data and knowledge bases
semantics in data and knowledge bases
wireless algorithms, systems, and ap...
wireless algorithms, systems, and applications
fuzzy logic and applications
fuzzy logic and applications
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
search based software engineering
search based software engineering
towards autonomous robotic systems
towards autonomous robotic systems
interactive theorem proving
interactive theorem proving
ubiquitous intelligence and computing
ubiquitous intelligence and computing
trends in functional programming
trends in functional programming
database and expert systems applications
database and expert systems applications
networking 2011 workshops
networking 2011 workshops
computer analysis of images and patterns
computer analysis of images and patterns
autonomic and trusted computing
autonomic and trusted computing
transactions on edutainment vi
transactions on edutainment vi
secure data management
secure data management
advances in bioinformatics and compu...
advances in bioinformatics and computational biology
electronic government and the inform...
electronic government and the information systems perspective
brain informatics
brain informatics
transactions on computational collec...
transactions on computational collective intelligence v
advanced concepts for intelligent vi...
advanced concepts for intelligent vision systems
formal methods for industrial critic...
formal methods for industrial critical systems
haptic and audio interaction design
haptic and audio interaction design
web reasoning and rule systems
web reasoning and rule systems
advances in cryptology
advances in cryptology
cooperative design, visualization, a...
cooperative design, visualization, and engineering
algorithms
algorithms
web-age information management
web-age information management
reasoning web
reasoning web
machine learning and data mining in ...
machine learning and data mining in pattern recognition
active media technology
active media technology
information and communication on tec...
information and communication on technology for the fight against global warming
human-computer interaction
human-computer interaction
semantic multimedia
semantic multimedia
electronic government
electronic government
data management in grid and peer-to-...
data management in grid and peer-to-peer systems
transactions on computational scienc...
transactions on computational science xiii
mathematical foundations of computer...
mathematical foundations of computer science 2011
computer analysis of images and patterns
computer analysis of images and patterns
trust, privacy and security in digit...
trust, privacy and security in digital business
algorithms in bioinformatics
algorithms in bioinformatics
smart spaces and next generation wir...
smart spaces and next generation wired/wireless networking
human-computer interaction
human-computer interaction
analysis of social media and ubiquit...
analysis of social media and ubiquitous data
fundamentals of computation theory
fundamentals of computation theory
computer algebra in scientific computing
computer algebra in scientific computing
languages, methodologies, and develo...
languages, methodologies, and development tools for multi-agent systems
journal on data semantics xv
journal on data semantics xv
human-computer interaction
human-computer interaction
euro-par 2011 parallel processing
euro-par 2011 parallel processing
euro-par 2011 parallel processing
euro-par 2011 parallel processing
pattern recognition
pattern recognition
algorithms and data structures
algorithms and data structures
intelligent data engineering and aut...
intelligent data engineering and automated learning
information technology in bio- and m...
information technology in bio- and medical informatics
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
comparative evaluation of focused re...
comparative evaluation of focused retrieval
computing and combinatorics
computing and combinatorics
approximation, randomization, and co...
approximation, randomization, and combinatorial optimization
algebra and coalgebra in computer sc...
algebra and coalgebra in computer science
foundations of security analysis and...
foundations of security analysis and design vi
information security and cryptology
information security and cryptology
theoretical aspects of computing
theoretical aspects of computing
data warehousing and knowledge discovery
data warehousing and knowledge discovery
concur 2011
concur 2011
human-computer interaction
human-computer interaction
holonic and multi-agent systems for ...
holonic and multi-agent systems for manufacturing
energy-aware communications
energy-aware communications
electronic participation
electronic participation
business process management
business process management
public key infrastructures, services...
public key infrastructures, services and applications
database and expert systems applications
database and expert systems applications
principles and practice of constrain...
principles and practice of constraint programming
edutainment technologies
edutainment technologies
availability, reliability and securi...
availability, reliability and security for business, enterprise and health information systems
cryptography and coding
cryptography and coding
middleware 2011
middleware 2011
ai 2011
ai 2011
advanced data mining and applications
advanced data mining and applications
progress in cryptology
progress in cryptology
swarm, evolutionary, and memetic com...
swarm, evolutionary, and memetic computing
future generation information technology
future generation information technology
information computing and applications
information computing and applications
smart card research and advanced app...
smart card research and advanced applications
advanced data mining and applications
advanced data mining and applications
information retrieval technology
information retrieval technology
performance evaluation of computer a...
performance evaluation of computer and communication systems
cryptology and network security
cryptology and network security
interactive storytelling
interactive storytelling
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
virtual colonoscopy and abdominal im...
virtual colonoscopy and abdominal imaging
programming languages and systems
programming languages and systems
swarm, evolutionary, and memetic com...
swarm, evolutionary, and memetic computing
anaphora processing and applications
anaphora processing and applications
databases in networked information s...
databases in networked information systems
principles of distributed systems
principles of distributed systems
multi-disciplinary trends in artific...
multi-disciplinary trends in artificial intelligence
algorithms and computation
algorithms and computation
advances in nonlinear speech processing
advances in nonlinear speech processing
algebraic foundations in computer sc...
algebraic foundations in computer science
visual informatics
visual informatics
certified programs and proofs
certified programs and proofs
automated deduction in geometry
automated deduction in geometry
combinatorial algorithms
combinatorial algorithms
social robotics
social robotics
decision and game theory for security
decision and game theory for security
agents in principle, agents in practice
agents in principle, agents in practice
motion in games
motion in games
formal methods, foundations and appl...
formal methods, foundations and applications
analysis of verbal and nonverbal com...
analysis of verbal and nonverbal communication and enactment
video processing and computational video
video processing and computational video
new frontiers in artificial intelligence
new frontiers in artificial intelligence
ambient intelligence
ambient intelligence
advances in soft computing
advances in soft computing
transactions on data hiding and mult...
transactions on data hiding and multimedia security vi
trusted systems
trusted systems
biometric recognition
biometric recognition
service-oriented computing
service-oriented computing
learning and intelligent optimization
learning and intelligent optimization
testing software and systems
testing software and systems
advances in artificial intelligence
advances in artificial intelligence
informatics in schools
informatics in schools
entertainment computing
entertainment computing
progress in pattern recognition, ima...
progress in pattern recognition, image analysis, computer vision, and applications
information systems security
information systems security
human behavior unterstanding [ie: un...
human behavior unterstanding [ie: understanding]
multidisciplinary aspects of time an...
multidisciplinary aspects of time and time perception
neural information processing
neural information processing
advances in cryptology
advances in cryptology
neural information processing
neural information processing
neural information processing
neural information processing
computational geometry, graphs and a...
computational geometry, graphs and applications
graph-theoretic concepts in computer...
graph-theoretic concepts in computer science
internet and network economics
internet and network economics
transactions on high-performance emb...
transactions on high-performance embedded architectures and compilers iv
information and communications security
information and communications security
transactions on computational scienc...
transactions on computational science xiv
post-quantum cryptography
post-quantum cryptography
information quality in e-health
information quality in e-health
flexible query answering systems
flexible query answering systems
visual informatics
visual informatics
advances in databases
advances in databases
advances in conceptual modeling
advances in conceptual modeling
software engineering and formal methods
software engineering and formal methods
algorithms and architectures for par...
algorithms and architectures for parallel processing
algorithmic game theory
algorithmic game theory
collaboration and technology
collaboration and technology
algorithms and architectures for par...
algorithms and architectures for parallel processing
formal modeling
formal modeling
on the move to meaningful internet s...
on the move to meaningful internet systems
model and data engineering
model and data engineering
affective computing and intelligent ...
affective computing and intelligent interaction
social informatics
social informatics
security and trust management
security and trust management
knowledge, information, and creativi...
knowledge, information, and creativity support systems
digital libraries
digital libraries
conceptual modeling
conceptual modeling
formal methods and software engineering
formal methods and software engineering
on the move to meaningful internet s...
on the move to meaningful internet systems
scalable uncertainty management
scalable uncertainty management
stabilization, safety, and security ...
stabilization, safety, and security of distributed systems
network and parallel computing
network and parallel computing
advances in artificial intelligence
advances in artificial intelligence
multiagent system technologies
multiagent system technologies
affective computing and intelligent ...
affective computing and intelligent interaction
logic, rationality, and interaction
logic, rationality, and interaction
agent-oriented software engineering xi
agent-oriented software engineering xi
advances in information and computer...
advances in information and computer security
quantum interaction
quantum interaction
implementation and application of fu...
implementation and application of functional languages
advances in intelligent data analysis x
advances in intelligent data analysis x
algorithmic decision theory
algorithmic decision theory
computer vision/computer graphics co...
computer vision/computer graphics collaboration techniques
progress in artificial intelligence
progress in artificial intelligence
distributed computing
distributed computing
semantic web
semantic web
rule-based modeling and computing on...
rule-based modeling and computing on the semantic web
pattern recognition in bioinformatics
pattern recognition in bioinformatics
integrated uncertainty in knowledge ...
integrated uncertainty in knowledge modelling and decision making
semantic web
semantic web
towards a service-based internet
towards a service-based internet
on the move to meaningful internet s...
on the move to meaningful internet systems
information security
information security
algorithmic learning theory
algorithmic learning theory
economics of converged, internet-bas...
economics of converged, internet-based networks
model driven engineering languages a...
model driven engineering languages and systems
security aspects in information tech...
security aspects in information technology
web information system engineering
web information system engineering
software engineering for resilient s...
software engineering for resilient systems
medical image computing and computer...
medical image computing and computer-assisted intervention
formal modeling and analysis of time...
formal modeling and analysis of timed systems
computer vision systems
computer vision systems
mathematics of language
mathematics of language
provable security
provable security
artificial intelligence and computat...
artificial intelligence and computational intelligence
implementation and application of fu...
implementation and application of functional languages
discovery science
discovery science
reachability problems
reachability problems
web information systems engineering
web information systems engineering
computational collective intelligence
computational collective intelligence
communications and multimedia security
communications and multimedia security
frontiers of combining systems
frontiers of combining systems
photogrammetric image analysis
photogrammetric image analysis
prostate cancer imaging
prostate cancer imaging
computational collective intelligence
computational collective intelligence
advanced language technologies for d...
advanced language technologies for digital libraries
medical image computing and computer...
medical image computing and computer-assisted intervention
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems iv
spatial information theory
spatial information theory
web information systems and mining
web information systems and mining
recent advances in the message passi...
recent advances in the message passing interface
parallel computing technologies
parallel computing technologies
image analysis and processing
image analysis and processing
multiple classifier systems
multiple classifier systems
static analysis
static analysis
knowlege-based and intelligent infor...
knowlege-based and intelligent information and engineering systems
computational logistics
computational logistics
knowledge-based and intelligent info...
knowledge-based and intelligent information and engineering systems
cryptographic hardware and embedded ...
cryptographic hardware and embedded systems
rough sets and knowledge technology
rough sets and knowledge technology
advanced parallel processing technol...
advanced parallel processing technologies
software engineering techniques
software engineering techniques
adaptive and intelligent systems
adaptive and intelligent systems
network optimization
network optimization
ai*ia 2011
ai*ia 2011
advances in databases and informatio...
advances in databases and information systems
computer vision
computer vision
convergence and hybrid information t...
convergence and hybrid information technology
models of computation in context
models of computation in context
ki 2011
ki 2011
similarity-based pattern recognition
similarity-based pattern recognition
information hiding
information hiding
machine learning in medical imaging
machine learning in medical imaging
medical image computing and computer...
medical image computing and computer-assisted intervention
rigorous software engineering for se...
rigorous software engineering for service-oriented systems
artificial intelligence and computat...
artificial intelligence and computational intelligence
dna computing and molecular programming
dna computing and molecular programming
integrated circuit and system design
integrated circuit and system design
advances in information retrieval theory
advances in information retrieval theory
research and advanced technology for...
research and advanced technology for digital libraries
software architecture
software architecture
artificial intelligence in medicine
artificial intelligence in medicine
towards ubiquitous learning
towards ubiquitous learning
automated technology for verificatio...
automated technology for verification and analysis
string processing and information re...
string processing and information retrieval
knowledge-based and intelligent info...
knowledge-based and intelligent information and engineering systems
multilingual and multimodal informat...
multilingual and multimodal information access evaluation
computer safety, reliability, and se...
computer safety, reliability, and security
image analysis and processing
image analysis and processing
advances in visual computing
advances in visual computing
knowledge-based and intelligent info...
knowledge-based and intelligent information and engineering systems
artificial intelligence and computat...
artificial intelligence and computational intelligence
advances in visual computing
advances in visual computing
computer security
computer security
exploring music contents
exploring music contents
computational logic in multi-agent s...
computational logic in multi-agent systems
web information systems and mining
web information systems and mining
towards a service-based internet
towards a service-based internet
modeling and using context
modeling and using context
intelligent virtual agents
intelligent virtual agents
computer vision
computer vision
multimodal brain image analysis
multimodal brain image analysis
multiple access communications
multiple access communications
image analysis :
image analysis :
cloud computing :
cloud computing :
natural language processing and info...
natural language processing and information systems :
nonlinear analyses and algorithms fo...
nonlinear analyses and algorithms for speech processing :
social informatics
social informatics
advances in image and video technology
advances in image and video technology
advances in multimedia modeling
advances in multimedia modeling
on the move to meaningful internet s...
on the move to meaningful internet systems: otm 2012
on the move to meaningful internet s...
on the move to meaningful internet systems: otm 2012
on the move to meaningful internet s...
on the move to meaningful internet systems: otm 2012 workshops
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
multi-disciplinary trends in artific...
multi-disciplinary trends in artificial intelligence
security protocols xx
security protocols xx
advanced concepts for intelligent vi...
advanced concepts for intelligent vision systems
advanced web and network technologie...
advanced web and network technologies, and applications
advances in artificial intelligence ...
advances in artificial intelligence - iberamia 2008
advances in artificial intelligence ...
advances in artificial intelligence - sbia 2008
advances in blended learning
advances in blended learning
advances in conceptual modeling - ch...
advances in conceptual modeling - challenges and opportunities
algorithmic learning theory
algorithmic learning theory
ambient intelligence
ambient intelligence
applications of graph transformation...
applications of graph transformations with industrial relevance
automated technology for verificatio...
automated technology for verification and analysis
business process management
business process management
challenges for next generation netwo...
challenges for next generation network operations and service management
comparative genomics
comparative genomics
component-based software engineering
component-based software engineering
computable models of the law
computable models of the law
computational geometry and graph theory
computational geometry and graph theory
computational logic in multi-agent s...
computational logic in multi-agent systems
computational methods in systems biology
computational methods in systems biology
computer security
computer security
computer vision - eccv 2008.
computer vision - eccv 2008.
computer vision - eccv 2008.
computer vision - eccv 2008.
computer vision - eccv 2008.
computer vision - eccv 2008.
conceptual modeling - er 2008
conceptual modeling - er 2008
digital human modeling
digital human modeling
discovery science
discovery science
dynamic brain - from neural spikes t...
dynamic brain - from neural spikes to behaviors
engineering interactive systems 2008
engineering interactive systems 2008
formal methods and software engineering
formal methods and software engineering
fun and games
fun and games
generative and transformational tech...
generative and transformational techniques in software engineering ii
hci and usability for education and work
hci and usability for education and work
hybrid metaheuristics
hybrid metaheuristics
information and communications security
information and communications security
information hiding
information hiding
information networking
information networking
intelligent data engineering and aut...
intelligent data engineering and automated learning
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
learning classifier systems
learning classifier systems
logic for programming, artificial in...
logic for programming, artificial intelligence, and reasoning
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2008
micai 2008
micai 2008
modeling decisions for artificial in...
modeling decisions for artificial intelligence
motion in games
motion in games
multiobjective optimization
multiobjective optimization
network and parallel computing
network and parallel computing
on the move to meaningful internet s...
on the move to meaningful internet systems: otm 2008
on the move to meaningful internet s...
on the move to meaningful internet systems: otm 2008
on the move to meaningful internet s...
on the move to meaningful internet systems: otm 2008 workshops
pattern recognition in bioinformatics
pattern recognition in bioinformatics
post-quantum cryptography
post-quantum cryptography
principles, systems and applications...
principles, systems and applications of ip telecommunications
provable security
provable security
provenance and annotation of data an...
provenance and annotation of data and processes
quality of software architectures
quality of software architectures
recent advances in constraints
recent advances in constraints
research in cryptology
research in cryptology
rough sets and current trends in com...
rough sets and current trends in computing
rule representation, interchange and...
rule representation, interchange and reasoning on the web
runtime verification
runtime verification
self-sustaining systems
self-sustaining systems
semantics in data and knowledge bases
semantics in data and knowledge bases
service-oriented computing - icsoc 2008
service-oriented computing - icsoc 2008
simulation, modeling, and programmin...
simulation, modeling, and programming for autonomous robots
smart sensing and context
smart sensing and context
software process and product measurement
software process and product measurement
software-intensive systems and new c...
software-intensive systems and new computing paradigms
stabilization, safety, and security ...
stabilization, safety, and security of distributed systems
semantic web
semantic web
semantic web - iswc 2008
semantic web - iswc 2008
theorem proving in higher order logics
theorem proving in higher order logics
theory of quantum computation, commu...
theory of quantum computation, communication, and cryptography
web reasoning and rule systems
web reasoning and rule systems
wireless algorithms, systems, and ap...
wireless algorithms, systems, and applications
wireless systems and mobility in nex...
wireless systems and mobility in next generation internet
computer vision - eccv 2008.
computer vision - eccv 2008.
scalable uncertainty management
scalable uncertainty management
human-computer interaction, tourism ...
human-computer interaction, tourism and cultural heritage
advances in new technologies, intera...
advances in new technologies, interactive interfaces and communicability
foundations of intelligent systems
foundations of intelligent systems
computational collective intelligence
computational collective intelligence
computational collective intelligence
computational collective intelligence
advances in multimedia information p...
advances in multimedia information processing - pcm 2012
simulated evolution and learning
simulated evolution and learning
design and analysis of algorithms
design and analysis of algorithms
ai 2012
ai 2012
biometric recognition
biometric recognition
economics of grids, clouds, systems,...
economics of grids, clouds, systems, and services
active media technology
active media technology
internet and network economics
internet and network economics
cyberspace safety and security
cyberspace safety and security
ambient assisted living and home care
ambient assisted living and home care
artificial general intelligence
artificial general intelligence
artificial evolution
artificial evolution
transactions on aspect-oriented soft...
transactions on aspect-oriented software development ix
future generation information technology
future generation information technology
agent based simulation for a sustain...
agent based simulation for a sustainable society and multi-agent smart computing
current trends in web engineering
current trends in web engineering
quantum interaction
quantum interaction
trends and topics in computer vision
trends and topics in computer vision
trends and topics in computer vision
trends and topics in computer vision
progress in cryptology - indocrypt 2012
progress in cryptology - indocrypt 2012
information systems security
information systems security
programming languages and systems
programming languages and systems
algorithms and computation
algorithms and computation
information retrieval technology
information retrieval technology
trusted systems
trusted systems
swarm, evolutionary, and memetic com...
swarm, evolutionary, and memetic computing
cryptology and network security
cryptology and network security
principles of distributed systems
principles of distributed systems
advanced data mining and applications
advanced data mining and applications
big data analytics
big data analytics
coordination, organizations, institu...
coordination, organizations, institutions, and norms in agent system vii
network and parallel computing
network and parallel computing
computational intelligence methods f...
computational intelligence methods for bioinformatics and biostatistics
focused retrieval of content and str...
focused retrieval of content and structure
formal aspects of component software
formal aspects of component software
tools for practical software verific...
tools for practical software verification
combinatorial algorithms
combinatorial algorithms
communicability, computer graphics a...
communicability, computer graphics and innovative design for interactive systems
social robotics
social robotics
advances in information and computer...
advances in information and computer security
pattern recognition in bioinformatics
pattern recognition in bioinformatics
computational geometry
computational geometry
search computing
search computing
decision and game theory for security
decision and game theory for security
implementation and application of fu...
implementation and application of functional languages
cognitive behavioural systems
cognitive behavioural systems
network and system security
network and system security
modeling decisions for artificial in...
modeling decisions for artificial intelligence
advances in artificial intelligence ...
advances in artificial intelligence - iberamia 2012
testing software and systems
testing software and systems
motion in games
motion in games
machine learning and interpretation ...
machine learning and interpretation in neuroimaging
combinatorial image analaysis
combinatorial image analaysis
outreach of digital libraries
outreach of digital libraries
ambient intelligence
ambient intelligence
advances in cryptology - asiacrypt 2012
advances in cryptology - asiacrypt 2012
multiple access communications
multiple access communications
web information systems engineering ...
web information systems engineering - wise 2012
brain informatics
brain informatics
middleware 2012
middleware 2012
transactions on petri nets and other...
transactions on petri nets and other models of concurrency vi
neural networks
neural networks
certified programs and proofs
certified programs and proofs
transactions on large-scale data- an...
transactions on large-scale data- and knowledge centered systems vii
ubiquitous computing and ambient int...
ubiquitous computing and ambient intelligence
information security applications
information security applications
machine learning in medical imaging
machine learning in medical imaging
transactions on computational system...
transactions on computational systems biology xiv
ai aproaches to the complexity of le...
ai aproaches to the complexity of legal systems
computational intelligence for multi...
computational intelligence for multimedia understanding
ict as key technology against global...
ict as key technology against global warming
e-voting and identity
e-voting and identity
communications and multimedia security
communications and multimedia security
unconventional computation and natur...
unconventional computation and natural computation
concur 2012 - concurrency theory
concur 2012 - concurrency theory
case-based reasoning research and de...
case-based reasoning research and development
geographic information science
geographic information science
cryptographic hardware and embedded ...
cryptographic hardware and embedded systems - ches 2012
algorithms and architectures for par...
algorithms and architectures for parallel processing
advances in databases and informatio...
advances in databases and information systems
algorithms and architectures for par...
algorithms and architectures for parallel processing
search based software engineering
search based software engineering
advanced concepts for intelligent vi...
advanced concepts for intelligent vision systems
argumentation in multi-agent systems
argumentation in multi-agent systems
software engineering for resilient s...
software engineering for resilient systems
programming languages
programming languages
intelligent virtual agents
intelligent virtual agents
artificial neural networks in patter...
artificial neural networks in pattern recognition
information access evaluation
information access evaluation
computer information systems and ind...
computer information systems and industrial management
21st century learning for 21st centu...
21st century learning for 21st century skills
artificial neural networks and machi...
artificial neural networks and machine learning - icann 2012
artificial neural networks and machi...
artificial neural networks and machine learning - icann 2012
theory and practice of digital libraries
theory and practice of digital libraries
formal methods: foundations and appl...
formal methods: foundations and applications
relational and algebraic methods in ...
relational and algebraic methods in computer science
research in attacks, intrusions, and...
research in attacks, intrusions, and defenses
ki 2012: advances in artificial inte...
ki 2012: advances in artificial intelligence
cellular automata
cellular automata
logics in artificial intelligence
logics in artificial intelligence
scalable uncertainty management
scalable uncertainty management
information security
information security
automated technology for verificatio...
automated technology for verification and analysis
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2012
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2012
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2012
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
mesh processing in medical image ana...
mesh processing in medical image analysis 2012
e-learning and games for training, e...
e-learning and games for training, education, health and sports
theoretical computer science
theoretical computer science
artificial intelligence and computat...
artificial intelligence and computational intelligence
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
reachability problems
reachability problems
intelligent robotics and applications
intelligent robotics and applications
recent advances in the message passi...
recent advances in the message passing interface
multimodal brain image analysi
multimodal brain image analysi
stabilization, safety, and security ...
stabilization, safety, and security of distributed systems
spatio-temporal image analysis for l...
spatio-temporal image analysis for longitudinal and time-series image data
model and data engineering
model and data engineering
privacy in statistical databases
privacy in statistical databases
computational methods in systems biology
computational methods in systems biology
energy efficient data centers
energy efficient data centers
graph transformations
graph transformations
model driven engineering languages a...
model driven engineering languages and systems
computer safety, reliability, and se...
computer safety, reliability, and security
computer safety, reliability, and se...
computer safety, reliability, and security
modeling and mining ubiquitous socia...
modeling and mining ubiquitous social media
serious games development and applic...
serious games development and applications
computer vision - eccv 2012
computer vision - eccv 2012
computer vision - eccv 2012
computer vision - eccv 2012
computer vision - eccv 2012
computer vision - eccv 2012
computer vision - eccv 2012
computer vision - eccv 2012
computer vision - eccv 2012
computer vision - eccv 2012
computer vision - eccv 2012
computer vision - eccv 2012
computer vision - eccv 2012
computer vision - eccv 2012
software engineering and formal methods
software engineering and formal methods
theory and practice of natural computing
theory and practice of natural computing
computer vision - eccv 2012
computer vision - eccv 2012
computer vision - eccv 2012
computer vision - eccv 2012
knowledge engineering and knowledge ...
knowledge engineering and knowledge management
computer vision - eccv 2012
computer vision - eccv 2012
human behavior understanding
human behavior understanding
leveraging applications of formal me...
leveraging applications of formal methods, verification and validation. technologies for mastering change
leveraging applications of formal me...
leveraging applications of formal methods, verification and validation. applications and case studies
fast software encryption
fast software encryption
information computing and applications
information computing and applications
outdoor and large-scale real-world s...
outdoor and large-scale real-world scene analysis
string processing and information re...
string processing and information retrieval
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems vi
human-centered software engineering
human-centered software engineering
computer science - theory and applic...
computer science - theory and applications
implementation and application of au...
implementation and application of automata
wireless algorithms, systems, and ap...
wireless algorithms, systems, and applications
advances in bioinformatics and compu...
advances in bioinformatics and computational biology
advances in cryptology - crypto 2012
advances in cryptology - crypto 2012
new frontiers in artificial intelligence
new frontiers in artificial intelligence
similarity search and applications
similarity search and applications
computing and combinatorics
computing and combinatorics
web-age information management
web-age information management
information theoretic security
information theoretic security
trust, privacy and security in digit...
trust, privacy and security in digital business
data management in cloud, grid and p...
data management in cloud, grid and p2p systems
interactive theorem proving
interactive theorem proving
information technology in bio- and m...
information technology in bio- and medical informatics
business system management and engin...
business system management and engineering
formal methods for industrial critic...
formal methods for industrial critical systems
multidisciplinary research and pract...
multidisciplinary research and practice for information systems
knowledge management and acquisition...
knowledge management and acquisition for intelligent systems
data warehousing and knowledge discovery
data warehousing and knowledge discovery
mathematical foundations of computer...
mathematical foundations of computer science 2012
database and expert systems applications
database and expert systems applications
database and expert systems applications
database and expert systems applications
cooperative design, visualization, a...
cooperative design, visualization, and engineering
controlled natural language
controlled natural language
logic, language, information and com...
logic, language, information and computation
topics in performance evaluation, me...
topics in performance evaluation, measurement and characterization
augmented environments for computer-...
augmented environments for computer-assisted interventions
intelligent data engineering and aut...
intelligent data engineering and automated learning - ideal 2012
convergence and hybrid information t...
convergence and hybrid information technology
swarm intelligence
swarm intelligence
internet of things, smart spaces, an...
internet of things, smart spaces, and next generation networking
rules on the web
rules on the web
pricai 2012
pricai 2012
advancing democracy, government and ...
advancing democracy, government and governance
pattern recognition
pattern recognition
spatial cognition viii
spatial cognition viii
fm 2012
fm 2012
coalgebraic methods in computer science
coalgebraic methods in computer science
text, speech and dialogue
text, speech and dialogue
information and communication techno...
information and communication technologies
euro-par 2012 parallel processing
euro-par 2012 parallel processing
secure data management
secure data management
business process management
business process management
computational logic in multi-agent s...
computational logic in multi-agent systems
datalog in academia and industry
datalog in academia and industry
security and cryptography for networks
security and cryptography for networks
parallel problem solving from nature...
parallel problem solving from nature - ppsn xii
theoretical aspects of computing - i...
theoretical aspects of computing - ictac 2012
financial cryptography and data security
financial cryptography and data security
parallel problem solving from nature...
parallel problem solving from nature - ppsn xii
computer algebra in scientific computing
computer algebra in scientific computing
web-age information management
web-age information management
algorithms - esa 2012
algorithms - esa 2012
from animals to animats 12
from animals to animats 12
algorithms in bioinformatics
algorithms in bioinformatics
static analysis
static analysis
reasoning web
reasoning web
omputer security - esorics 2012
omputer security - esorics 2012
advances in visual computing
advances in visual computing
artificial intelligence: methodology...
artificial intelligence: methodology, systems, and applications
advances in visual computing
advances in visual computing
web reasoning and rule systems
web reasoning and rule systems
electronic participation
electronic participation
provable security
provable security
progress in pattern recognition, ima...
progress in pattern recognition, image analysis, computer vision, and applications
collaboration and technology
collaboration and technology
parameterized and exact computation
parameterized and exact computation
formal modeling and analysis of time...
formal modeling and analysis of timed systems
service-oriented and cloud computing
service-oriented and cloud computing
progress in cryptology - latincrypt 2012
progress in cryptology - latincrypt 2012
electronic government
electronic government
entertainment computing - icec 2012
entertainment computing - icec 2012
computational logistics
computational logistics
abdominal imaging
abdominal imaging
advances in web-based learning - icw...
advances in web-based learning - icwl 2012
artificial immune systems
artificial immune systems
advances in computational intelligence
advances in computational intelligence
persuasive technology
persuasive technology
advanced information systems engineering
advanced information systems engineering
image and signal processing
image and signal processing
breast imaging
breast imaging
advances in neural networks - isnn 2012
advances in neural networks - isnn 2012
advances in neural networks - isnn 2012
advances in neural networks - isnn 2012
information security and privacy
information security and privacy
parallel processing and applied math...
parallel processing and applied mathematics
new directions in logic, language an...
new directions in logic, language and computation
advances in data mining. application...
advances in data mining. applications and theoretical aspects
parallel processing and applied math...
parallel processing and applied mathematics
computers helping people with specia...
computers helping people with special needs
computers helping people with specia...
computers helping people with special needs
machine learning and data mining in ...
machine learning and data mining in pattern recognition
advances in brain inspired cognitive...
advances in brain inspired cognitive systems
deontic logic in computer science
deontic logic in computer science
intelligent computing theories and a...
intelligent computing theories and applications
intelligent computing technology
intelligent computing technology
descriptional complexity of formal s...
descriptional complexity of formal systems
ad-hoc, mobile, and wireless networks
ad-hoc, mobile, and wireless networks
languages alive
languages alive
developments in language theory
developments in language theory
arithmetic of finite fields
arithmetic of finite fields
methodologies and technologies for n...
methodologies and technologies for networked enterprises
web engineering
web engineering
model checking software
model checking software
formal verification of object-orient...
formal verification of object-oriented software
combinatorial optimization and appli...
combinatorial optimization and applications
agents and peer-to-peer computing
agents and peer-to-peer computing
advances in computer games
advances in computer games
service-oriented computing - icsoc 2...
service-oriented computing - icsoc 2011 workshops
rough sets and knowledge technology
rough sets and knowledge technology
transactions on rough sets xv
transactions on rough sets xv
information security and cryptology ...
information security and cryptology - icisc 2011
programming multi-agent systems
programming multi-agent systems
intelligent science and intelligent ...
intelligent science and intelligent data engineering
inductive logic programming
inductive logic programming
transactions on data hiding and mult...
transactions on data hiding and multimedia security viii
speech, sound and music processing: ...
speech, sound and music processing: embracing research in india
hybrid learning
hybrid learning
formal grammar
formal grammar
trends in functional programming
trends in functional programming
robocup 2011
robocup 2011
transactions on computational collec...
transactions on computational collective intelligence vii
central european functional programm...
central european functional programming school
rough sets and current trends in com...
rough sets and current trends in computing
combinatorial optimization
combinatorial optimization
generic and indexed programming
generic and indexed programming
digital forensics and watermarking
digital forensics and watermarking
dna computing and molecular programming
dna computing and molecular programming
logic-based program synthesis and tr...
logic-based program synthesis and transformation
trusted systems
trusted systems
applications of discrete geometry an...
applications of discrete geometry and mathematical morphology
agents for educational games and sim...
agents for educational games and simulations
foundations of health informatics en...
foundations of health informatics engineering and systems
foundational and practical aspects o...
foundational and practical aspects of resource analysis
approximation, randomization, and co...
approximation, randomization, and combinatorial optimization
advances in autonomous robotics
advances in autonomous robotics
transactions on computational scienc...
transactions on computational science xvi
prima 2012
prima 2012
haptic and audio interaction design
haptic and audio interaction design
formal aspects of security and trust
formal aspects of security and trust
formal concept analysis
formal concept analysis
semantic web
semantic web
trustworthy global computing
trustworthy global computing
computational topology in image context
computational topology in image context
algorithms and models for the web graph
algorithms and models for the web graph
reliable software technologies - ada...
reliable software technologies - ada-europe 2012
sequences and their applications - s...
sequences and their applications - seta 2012
information processing in computer-a...
information processing in computer-assisted interventions
integrated formal methods
integrated formal methods
correct reasoning
correct reasoning
formal techniques for distributed sy...
formal techniques for distributed systems
distributed applications and interop...
distributed applications and interoperable systems
coordination models and languages
coordination models and languages
abstract state machines, alloy, b, v...
abstract state machines, alloy, b, vdm, and z
multivariate algorithmic revolution ...
multivariate algorithmic revolution and beyond
trust and trustworthy computing
trust and trustworthy computing
agent and multi-agent systems. techn...
agent and multi-agent systems. technologies and applications
information security theory and practice
information security theory and practice
advances in swarm intelligence
advances in swarm intelligence
formal methods for model-driven engi...
formal methods for model-driven engineering
advances in swarm intelligence
advances in swarm intelligence
data integration in the life sciences
data integration in the life sciences
ecoop 2012 - object-oriented programming
ecoop 2012 - object-oriented programming
computational science and its applic...
computational science and its applications - iccsa 2012
advanced research in applied artific...
advanced research in applied artificial intelligence
structural information and communica...
structural information and communication complexity
mathematics of program construction
mathematics of program construction
computational science and its applic...
computational science and its applications - iccsa 2012
computational science and its applic...
computational science and its applications - iccsa 2012
application and theory of petri nets
application and theory of petri nets
computational science and its applic...
computational science and its applications - iccsa 2012
pattern recognition
pattern recognition
algorithm theory - swat 2012
algorithm theory - swat 2012
controlled natural language
controlled natural language
natural language processing and info...
natural language processing and information systems
information technologies in biomedicine
information technologies in biomedicine
pervasive computing
pervasive computing
diagrammatic representation and infe...
diagrammatic representation and inference
scientific and statistical database ...
scientific and statistical database management
logical aspects of computational lin...
logical aspects of computational linguistics
combinatorial pattern matching
combinatorial pattern matching
multidisciplinary information retrieval
multidisciplinary information retrieval
applied cryptography and network sec...
applied cryptography and network security
image analysis and recognition
image analysis and recognition
image analysis and recognition
image analysis and recognition
biomedical image registration
biomedical image registration
automated reasoning
automated reasoning
autonomous and intelligent systems
autonomous and intelligent systems
intelligent computer mathematics
intelligent computer mathematics
progress in cryptology - africacrypt...
progress in cryptology - africacrypt 2012
computer aided verification
computer aided verification
transactions on edutainment viii
transactions on edutainment viii
user modeling, adaptation, and perso...
user modeling, adaptation, and personalization
logic, language and meaning
logic, language and meaning
lectures on logic and computation
lectures on logic and computation
modelling foundations and applications
modelling foundations and applications
progress in vlsi design and test
progress in vlsi design and test
biomimetic and biohybrid systems
biomimetic and biohybrid systems
data and applications security and p...
data and applications security and privacy xxvi
logic of categorial grammars
logic of categorial grammars
articulated motion and deformable ob...
articulated motion and deformable objects
automata, languages, and programming
automata, languages, and programming
automata, languages, and programming
automata, languages, and programming
theory and applications of satisfiab...
theory and applications of satisfiability testing - sat 2012
privacy enhancing technologies
privacy enhancing technologies
bisociative knowledge discovery
bisociative knowledge discovery
transactions on compuational collect...
transactions on compuational collective intelligence vi
graph structures for knowledge repre...
graph structures for knowledge representation and reasoning
perspectives of systems informatics
perspectives of systems informatics
public key infrastructures, services...
public key infrastructures, services and applications
functional and logic programming
functional and logic programming
integration of ai and or techniques ...
integration of ai and or techniques in contraint programming for combinatorial optimzation problems
large-scale scientific computing
large-scale scientific computing
runtime verification
runtime verification
design science research in informati...
design science research in information systems
financial cryptography and data security
financial cryptography and data security
recent advances in reinforcement lea...
recent advances in reinforcement learning
theory and applications of models of...
theory and applications of models of computation
networking 2012 workshops
networking 2012 workshops
networking 2012
networking 2012
networking 2012
networking 2012
public key cryptography - pkc 2012
public key cryptography - pkc 2012
bioinformatics research and applications
bioinformatics research and applications
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
semantic web: research and applications
semantic web: research and applications
fun with algorithms
fun with algorithms
advances in artificial intelligence
advances in artificial intelligence
facing the multicore - challenge ii
facing the multicore - challenge ii
intelligence and security informatics
intelligence and security informatics
artificial intelligence: theories an...
artificial intelligence: theories and applications
tests and proofs
tests and proofs
theory and practice of model transfo...
theory and practice of model transformations
objects, models, components, patterns
objects, models, components, patterns
software composition
software composition
wired/wireless internet communication
wired/wireless internet communication
dependable networks and services
dependable networks and services
advances in grid and pervasive computing
advances in grid and pervasive computing
impact analysis of solutions for chr...
impact analysis of solutions for chronic disease prevention and management
analytical and stochastic modeling t...
analytical and stochastic modeling techniques and applications
software service and application eng...
software service and application engineering
experimental algorithms
experimental algorithms
how the world computes
how the world computes
intelligent tutoring systems
intelligent tutoring systems
openmp in a heterogeneous world
openmp in a heterogeneous world
product-focused software process imp...
product-focused software process improvement
multicore software engineering, perf...
multicore software engineering, performance, and tools
haptics
haptics
haptics
haptics
critical information infrastructures...
critical information infrastructures security
argumentation in multi-agent systems
argumentation in multi-agent systems
case-based reasoning research and de...
case-based reasoning research and development
recent advances in intrusion detection
recent advances in intrusion detection
serious games development and applic...
serious games development and applications
advances in web-based learning - icw...
advances in web-based learning - icwl 2011
knowledge science, engineering and m...
knowledge science, engineering and management
datalog reloaded
datalog reloaded
dependable and historic computing
dependable and historic computing
computer performance engineering
computer performance engineering
security protocols xix
security protocols xix
adaptive multimedia retrieval
adaptive multimedia retrieval
advances in information retrieval :
advances in information retrieval :
algorithms for sensor systems :
algorithms for sensor systems :
approximation, randomization, and co...
approximation, randomization, and combinatorial optimization :
camera-based document analysis and r...
camera-based document analysis and recognition :
advances in multimedia modeling :
advances in multimedia modeling :
computer vision - eccv 2010 :
computer vision - eccv 2010 :
agents and data mining interaction
agents and data mining interaction
graph drawing
graph drawing
principles and practice of multi-age...
principles and practice of multi-agent systems
scale space and variational methods ...
scale space and variational methods in computer vision
rfid: security and privacy
rfid: security and privacy
mathematical and engineering methods...
mathematical and engineering methods in computer science
distributed computing and networking
distributed computing and networking
advanced agent technology
advanced agent technology
formal aspects of component software
formal aspects of component software
advances in multimedia modeling
advances in multimedia modeling
theory of security and applications
theory of security and applications
perception and machine intelligence
perception and machine intelligence
resource discovery
resource discovery
curves and surfaces
curves and surfaces
sofsem 2012
sofsem 2012
verified software
verified software
foundations and practice of security
foundations and practice of security
verification, model checking, and ab...
verification, model checking, and abstract
membrane computing
membrane computing
algebraic and numeric biology
algebraic and numeric biology
security and intelligent information...
security and intelligent information systems
data security and security data
data security and security data
semantic web: eswc 2011 workshops
semantic web: eswc 2011 workshops
computer aided systems theory - euro...
computer aided systems theory - eurocast 2011
financial cryptography and data security
financial cryptography and data security
computer aided systems theory - euro...
computer aided systems theory - eurocast 2011
open problems in network security
open problems in network security
computation, physics and beyond
computation, physics and beyond
practical aspects of declarative lan...
practical aspects of declarative languages
knowledge representation for health-care
knowledge representation for health-care
information security applications
information security applications
grid and pervasive computing workshops
grid and pervasive computing workshops
topics in cryptology - ct-rsa 2012
topics in cryptology - ct-rsa 2012
current trends in web engineering
current trends in web engineering
distributed computing and internet t...
distributed computing and internet technology
walcom: algorithms and computation
walcom: algorithms and computation
applied parallel and scientific comp...
applied parallel and scientific computing
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems v
applied parallel and scientific comp...
applied parallel and scientific computing
engineering secure software and systems
engineering secure software and systems
wireless sensor networks
wireless sensor networks
algorithms for sensor systems
algorithms for sensor systems
mathematical modeling and computatio...
mathematical modeling and computational science
partially supervised learning
partially supervised learning
building a national distributed e-in...
building a national distributed e-infrastructure - pl-grid
conceptual modelling and its theoret...
conceptual modelling and its theoretical foundations
architecture of computing systems - ...
architecture of computing systems - arcs 2012
new frontiers in applied data mining
new frontiers in applied data mining
statistical atlases and computationa...
statistical atlases and computational models of the heart
cryptography and security
cryptography and security
multi-agent-based simulation xii
multi-agent-based simulation xii
recent trends in algebraic developme...
recent trends in algebraic development techniques
medical content-based retrieval for ...
medical content-based retrieval for clinical decision support
selected areas in cryptography
selected areas in cryptography
adaptive and learning agents
adaptive and learning agents
advances in user modeling
advances in user modeling
transactions on computational science xv
transactions on computational science xv
latent variable analysis and signal ...
latent variable analysis and signal separation
data engineering and management
data engineering and management
parameterized and exact computation
parameterized and exact computation
bioinformatics for personalized medicine
bioinformatics for personalized medicine
language and automata theory and app...
language and automata theory and applications
reconfigurable computing
reconfigurable computing
foundations of information and knowl...
foundations of information and knowledge systems
intelligent information and database...
intelligent information and database systems
intelligent information and database...
intelligent information and database systems
intelligent information and database...
intelligent information and database systems
traffic monitoring and analysis
traffic monitoring and analysis
passive and active measurement
passive and active measurement
measurement, modelling, and evaluati...
measurement, modelling, and evaluation of computing systems and dependability and fault tolerance
abdominal imaging. computational and...
abdominal imaging. computational and clinical applications
self-organizing systems
self-organizing systems
computational linguistics and intell...
computational linguistics and intelligent text processing
computational linguistics and intell...
computational linguistics and intelligent text processing
web-age information management
web-age information management
principles of security and trust
principles of security and trust
compiler construction
compiler construction
economics of grids, clouds, systems,...
economics of grids, clouds, systems, and services
transactions on data hiding and mult...
transactions on data hiding and multimedia security vii
requirements engineering: foundation...
requirements engineering: foundation for software quality
logic for programming, artificial in...
logic for programming, artificial intelligence, and reasoning
foundations of software science and ...
foundations of software science and computational structures
tools and algorithms for the constru...
tools and algorithms for the construction and analysis of systems
information processing in cells and ...
information processing in cells and tissues
programming languages and systems
programming languages and systems
fundamental approaches to software e...
fundamental approaches to software engineering
data privacy management and autonomo...
data privacy management and autonomous spontaneus security
computational processing of the port...
computational processing of the portuguese language
nasa formal methods
nasa formal methods
theory of cryptography
theory of cryptography
critical infrastructure protection
critical infrastructure protection
hybrid artificial intelligent systems
hybrid artificial intelligent systems
programming multi-agent systems
programming multi-agent systems
hybrid artificial intelligent systems
hybrid artificial intelligent systems
social computing, behavioral - cultu...
social computing, behavioral - cultural modeling and prediction
transactions on edutainment vii
transactions on edutainment vii
evolutionary computation, machine le...
evolutionary computation, machine learning and data mining in bioinformatics
transactions on petri nets and other...
transactions on petri nets and other models of concurrency v
declarative agent languages and tech...
declarative agent languages and technologies ix
approximation and online algorithms
approximation and online algorithms
evolutionary computation in combinat...
evolutionary computation in combinatorial optimization
genetic programming
genetic programming
evolutionary and biologically inspir...
evolutionary and biologically inspired music, sound, art and design
applications of evolutionary computation
applications of evolutionary computation
theory and applications of formal ar...
theory and applications of formal argumentation
information security technology for ...
information security technology for applications
advances in software engineering tec...
advances in software engineering techniques
software language engineering
software language engineering
advances in information retrieval
advances in information retrieval
advances in cryptology - eurocrypt 2012
advances in cryptology - eurocrypt 2012
database systems for advanced applic...
database systems for advanced applications
database systems for advanced applic...
database systems for advanced applications
database systems for advanced applic...
database systems for advanced applications
information security practice and ex...
information security practice and experience
web and wireless geographical inform...
web and wireless geographical information systems
web technologies and applications
web technologies and applications
advanced computing, networking and s...
advanced computing, networking and security
fundamentals of software engineering
fundamentals of software engineering
games, actions and social software
games, actions and social software
latin 2012: theoretical informatics
latin 2012: theoretical informatics
artificial intelligence and soft com...
artificial intelligence and soft computing
artificial intelligence and soft com...
artificial intelligence and soft computing
swarm and evolutionary computation
swarm and evolutionary computation
health information science
health information science
camera-based document analysis and r...
camera-based document analysis and recognition
logic programs, norms and action
logic programs, norms and action
web technologies and applications
web technologies and applications
logic and program semantics
logic and program semantics
reversible computation
reversible computation
information security technology for ...
information security technology for applications
research in computational molecular ...
research in computational molecular biology
models in software engineering
models in software engineering
communication technologies for vehicles
communication technologies for vehicles
frontiers in algorithmics and algori...
frontiers in algorithmics and algorithmic aspects in information and management
euro-par 2011: parallel processing w...
euro-par 2011: parallel processing workshops
euro-par 2011: parallel processing w...
euro-par 2011: parallel processing workshops
web services and formal methods
web services and formal methods
constructive side-channel analysis a...
constructive side-channel analysis and secure design
security and trust management
security and trust management
telecommunication economics
telecommunication economics
abstract state machines 2003
abstract state machines 2003
ad-hoc, mobile, and wireless networks
ad-hoc, mobile, and wireless networks
advanced conceptual modeling techniques
advanced conceptual modeling techniques
advanced lectures on machine learning
advanced lectures on machine learning
advanced parallel processing technol...
advanced parallel processing technologies
advances in artificial intelligence
advances in artificial intelligence
advanced symbolic analysis for compilers
advanced symbolic analysis for compilers
advances in computer systems archite...
advances in computer systems architecture
advances in computing science--asian...
advances in computing science--asian 2003
advances in cryptology-asiacrypt 2003
advances in cryptology-asiacrypt 2003
advances in cross-language informati...
advances in cross-language information retrieval
advances in databases and informatio...
advances in databases and information systems
advances in informatics
advances in informatics
advances in intelligent data analysis v
advances in intelligent data analysis v
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
advances in spatial and temporal dat...
advances in spatial and temporal databases
advances in web intelligence
advances in web intelligence
advances in web-based learning--icwl...
advances in web-based learning--icwl 2003
agent-technologies, infrastructures,...
agent-technologies, infrastructures, tools, and applications for e-services
ai 2003
ai 2003
ai*ia 2003
ai*ia 2003
agent-oriented software engineering iii
agent-oriented software engineering iii
algorithms--esa 2003
algorithms--esa 2003
algorithmic learning theory
algorithmic learning theory
algorithms and complexity
algorithms and complexity
algorithms and data structures
algorithms and data structures
ambient intelligence
ambient intelligence
application and theory of petri nets...
application and theory of petri nets 2003
applications of evolutionary computing
applications of evolutionary computing
applied algebra, algebraic algorithm...
applied algebra, algebraic algorithms, and error-correcting codes
applied cryptography and network sec...
applied cryptography and network security
approximation, randomization, and co...
approximation, randomization, and combinatorial optimization
architecting dependable systems
architecting dependable systems
architectures for quality of service...
architectures for quality of service in the internet
artificial immune systems
artificial immune systems
artificial intelligence in medicine ...
artificial intelligence in medicine : 9th conference on artificial intelligence in medicine in europe, aime 2003, protaras, cyprus, october 18-22, 2003 proceedings
artificial neural nets problem solvi...
artificial neural nets problem solving methods: 7th international work-conference on artificial and natural neural networks, iwann 2003, mao, menorca, spain, june 3-6, 2003 proceedings.
artificial neural networks and neura...
artificial neural networks and neural information processing-icann/iconip 2003
audio-and video-based biometric pers...
audio-and video-based biometric person authentication
automata, languages and programming
automata, languages and programming
automated deduction, cade-19
automated deduction, cade-19
automated reasoning with analytic ta...
automated reasoning with analytic tableaux and related methods
biomedical image registration
biomedical image registration
business process management
business process management
case-based reasoning research and de...
case-based reasoning research and development
combinatorial optimization--eureka, ...
combinatorial optimization--eureka, you shrink!
combinatorial pattern matching
combinatorial pattern matching
communication and multimedia security
communication and multimedia security
communication in multiagent systems
communication in multiagent systems
compiler construction
compiler construction
component-based software quality
component-based software quality
computational methods in neural modeling
computational methods in neural modeling
computational methods in systems biology
computational methods in systems biology
computational processing of the port...
computational processing of the portuguese language
computational science and its applic...
computational science and its applications
computational science and its applic...
computational science and its applications
computational science and its applic...
computational science and its applications
computational science-- iccs 2003
computational science-- iccs 2003
computational science-- iccs 2003
computational science-- iccs 2003
computational science-- iccs 2003
computational science-- iccs 2003
computational science-- iccs 2003
computational science-- iccs 2003
computer analysis of images and patterns
computer analysis of images and patterns
computer and information sciences, i...
computer and information sciences, iscis 2003
computer network security
computer network security
computer performance evaluation
computer performance evaluation
computer safety, reliability, and se...
computer safety, reliability, and security
computer science in perspective
computer science in perspective
computer science logic
computer science logic
computer security - esorics 2003
computer security - esorics 2003
computer vision systems
computer vision systems
computers and games
computers and games
computing and combinatorics
computing and combinatorics
conceptual modeling-er 2003
conceptual modeling-er 2003
conceptual modeling for novel applic...
conceptual modeling for novel application domains
cooperative information agents.
cooperative information agents.
correct hardware design and verifica...
correct hardware design and verification methods
cots-based software systems
cots-based software systems
cryptographic hardware and embedded ...
cryptographic hardware and embedded system, ches 2003
cryptography and coding
cryptography and coding
data warehousing and knowledge discovery
data warehousing and knowledge discovery
database and expert systems applications
database and expert systems applications
database and xml technologies
database and xml technologies
databases in networked information s...
databases in networked information systems
dependable computing
dependable computing
design and control of workflow processes
design and control of workflow processes
developing industrial case-based rea...
developing industrial case-based reasoning applications
developments in applied artificial i...
developments in applied artificial intelligence
developments in language theory
developments in language theory
developments in language theory
developments in language theory
digital libraries
digital libraries
digital rights management
digital rights management
digital rights management
digital rights management
digital watermarking
digital watermarking
discovery science
discovery science
discrete and computational geometry
discrete and computational geometry
discrete geometry for computer imagery
discrete geometry for computer imagery
discrete mathematics and theoretical...
discrete mathematics and theoretical computer science
distributed applications and interop...
distributed applications and interoperable systems
distributed computing
distributed computing
dna computing
dna computing
e-commerce and web technologies
e-commerce and web technologies
ecoop 2003 -- object-oriented progra...
ecoop 2003 -- object-oriented programming
electronic information and communica...
electronic information and communication in mathematics
embedded software
embedded software
empirical methods and studies in sof...
empirical methods and studies in software engineering
energy minimization methods in compu...
energy minimization methods in computer vision and pattern recognition
engineering societies in the agents ...
engineering societies in the agents world.
evolutionary multi-criterion optimiz...
evolutionary multi-criterion optimization
evolvable systems
evolvable systems
experimental and efficient algorithms
experimental and efficient algorithms
information extraction in the web era
information extraction in the web era
extreme programming and agile methods
extreme programming and agile methods
extreme programming and agile proces...
extreme programming and agile processes in software engineering
fast software encryption
fast software encryption
field-programmable logic and applica...
field-programmable logic and applications
financial cryptography
financial cryptography
financial cryptography
financial cryptography
fme 2003
fme 2003
formal aspects of security
formal aspects of security
formal methods and software engineering
formal methods and software engineering
formal methods at the crossroads
formal methods at the crossroads
formal methods for components and ob...
formal methods for components and objects
formal methods for open object-based...
formal methods for open object-based distributed systems
formal methods for software architec...
formal methods for software architectures
foundations of intelligent systems
foundations of intelligent systems
foundations of software science and ...
foundations of software science and computational structures
formal techniques for networked and ...
formal techniques for networked and distributed systems, forte 2003
functional imaging and modeling of t...
functional imaging and modeling of the heart
fundamental approaches to software e...
fundamental approaches to software engineering
fundamentals of computation theory
fundamentals of computation theory
future directions in distributed com...
future directions in distributed computing
generative programming and component...
generative programming and component engineering
generic programming
generic programming
genetic and evolutionary computation...
genetic and evolutionary computation--gecco 2003
genetic and evolutionary computation...
genetic and evolutionary computation--gecco 2003
genetic programming
genetic programming
geometry, morphology, and computatio...
geometry, morphology, and computational imaging
global computing
global computing
global optimization and constraint s...
global optimization and constraint satisfaction
graph based representations in patte...
graph based representations in pattern recognition
graph-theoretic concepts in computer...
graph-theoretic concepts in computer science
group communications and charges
group communications and charges
groupware
groupware
hierarchical neural networks for ima...
hierarchical neural networks for image interpretation
high performance computing
high performance computing
high performance computing, hipc 2003
high performance computing, hipc 2003
high performance computing for compu...
high performance computing for computational science, vecpar 2002
high-speed networks and multimedia c...
high-speed networks and multimedia communications
human-computer interaction with mobi...
human-computer interaction with mobile devices and services
hybrid systems
hybrid systems
image analysis
image analysis
image and video retrieval
image and video retrieval
implementation and application of au...
implementation and application of automata
implementation and application of au...
implementation and application of automata
implementation of functional languages
implementation of functional languages
inductive logic programming
inductive logic programming
inductive logic programming
inductive logic programming
inductive synthesis of functional pr...
inductive synthesis of functional programs
information and communications security
information and communications security
information hiding
information hiding
information processing in medical im...
information processing in medical imaging
information processing in sensor net...
information processing in sensor networks
information networking
information networking
information security
information security
information security and cryptology-...
information security and cryptology--icisc 2002
information security and privacy
information security and privacy
innovative concepts for agent-based ...
innovative concepts for agent-based systems
innovative internet community systems
innovative internet community systems
integrated circuit and system design
integrated circuit and system design
intelligent agents and multi-agent s...
intelligent agents and multi-agent systems
intelligent data engineering and aut...
intelligent data engineering and automated learning, ideal 2003
intelligent information agents
intelligent information agents
intelligent search on xml data :
intelligent search on xml data :
intelligent virtual agents
intelligent virtual agents
interactive multimedia on next gener...
interactive multimedia on next generation networks
interactive systems
interactive systems
job scheduling strategies for parall...
job scheduling strategies for parallel processing
journal on data semantics.
journal on data semantics.
ki 2003
ki 2003
knowledge discovery in databases: pk...
knowledge discovery in databases: pkdd 2003
knowledge management in electronic g...
knowledge management in electronic government
knowledge-based intelligent informat...
knowledge-based intelligent information and engineering systems
languages and compilers for parallel...
languages and compilers for parallel computing
learning classifier systems
learning classifier systems
logic based program synthesis and tr...
logic based program synthesis and transportation
logic for programming artificial int...
logic for programming artificial intelligence and reasoning
machine learning
machine learning
machine learning and data mining in ...
machine learning and data mining in pattern recognition
management of multimedia networks an...
management of multimedia networks and services
matchmaking in electronic markets
matchmaking in electronic markets
mathematical knowledge management
mathematical knowledge management
mathematics of surfaces
mathematics of surfaces
medical data analysis
medical data analysis
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2003
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2003
membrane computing
membrane computing
metainformatics
metainformatics
middleware 2003
middleware 2003
mining multimedia and complex data
mining multimedia and complex data
mobile agents for telecommunication ...
mobile agents for telecommunication applications
mobile communications
mobile communications
mobile data management
mobile data management
model checking software
model checking software
modeling and using context
modeling and using context
modular programming languages
modular programming languages
multi-agent systems and applications.
multi-agent systems and applications.
multi-agent-based simulation ii
multi-agent-based simulation ii
multiple classifier systems
multiple classifier systems
neural nets
neural nets
new horizons in information management
new horizons in information management
numerical methods and applications
numerical methods and applications
object-oriented information systems
object-oriented information systems
objects, components, architectures, ...
objects, components, architectures, services, and applications for a networked world
on the move to meaningful internet s...
on the move to meaningful internet systems 2003
on the move to meaningful internet s...
on the move to meaningful internet systems 2003
parallel computing technologies
parallel computing technologies
pattern recognition
pattern recognition
pattern recognition and image analysis
pattern recognition and image analysis
peer-to-peer systems ii
peer-to-peer systems ii
personal wireless communications
personal wireless communications
perspectives of system informatics
perspectives of system informatics
petri net technology for communicati...
petri net technology for communication-based systems
power-aware computer systems
power-aware computer systems
practice and theory of automated tim...
practice and theory of automated timetabling.
principles and practice of constrain...
principles and practice of constraint programming-cp 2003
privacy enhancing technologies
privacy enhancing technologies
privacy enhancing technologies
privacy enhancing technologies
programming languages and systems
programming languages and systems
programming languages and systems
programming languages and systems
progress in artificial intelligence
progress in artificial intelligence
progress in cryptology
progress in cryptology
quality for all
quality for all
quality of future internet services
quality of future internet services
quality of service in multiservice i...
quality of service in multiservice ip networks
quality of service-iwqos 2003
quality of service-iwqos 2003
adaptive agents and multi-agent syst...
adaptive agents and multi-agent systems, adaptation and multi-agent learning
advances in information retrieval
advances in information retrieval
advances in learning software organi...
advances in learning software organizations
advances in web-age information mana...
advances in web-age information management
algorithms for memory hierarchies
algorithms for memory hierarchies
composition of secure multi-party pr...
composition of secure multi-party protocols
conceptual structures for knowledge ...
conceptual structures for knowledge creation and communication
multi-agent-based simulation iii
multi-agent-based simulation iii
openmp shared memory parallel progra...
openmp shared memory parallel programming
principles and practice of semantic ...
principles and practice of semantic web reasoning
progress in pattern recognition, spe...
progress in pattern recognition, speech and image analysis
recent advances in constraints
recent advances in constraints
recent advances in intrusion detection
recent advances in intrusion detection
recent trends in algebraic developme...
recent trends in algebraic development techniques
recent advances in parallel virtual ...
recent advances in parallel virtual machine and message passing interface
reliable software technologies-ada-e...
reliable software technologies-ada-europe 2003
rewriting techniques and applications
rewriting techniques and applications
robocup 2002: robot soccer world cup.
robocup 2002: robot soccer world cup.
rough sets, fuzzy sets, data mining,...
rough sets, fuzzy sets, data mining, and granular computing
rules and rule markup languages for ...
rules and rule markup languages for the semantic web
scale space methods in computer vision
scale space methods in computer vision
scientific engineering for distribut...
scientific engineering for distributed java applications
sdl 2003
sdl 2003
security engineering with patterns
security engineering with patterns
security in communication networks
security in communication networks
selected areas in cryptography
selected areas in cryptography
self-adaptive software: applications
self-adaptive software: applications
self-stabilizing systems
self-stabilizing systems
semantics in databases
semantics in databases
service-oriented computing--icsoc 2003
service-oriented computing--icsoc 2003
smart graphics
smart graphics
software and compilers for embedded ...
software and compilers for embedded systems
software configuration management
software configuration management
software engineering and middleware
software engineering and middleware
software engineering for large-scale...
software engineering for large-scale mulit-agent systems
software process technology
software process technology
software security
software security
spatial cognition.
spatial cognition.
spatial information theory
spatial information theory
spatio-temporal databases
spatio-temporal databases
stacs 2003
stacs 2003
static analysis
static analysis
stochastic algorithms
stochastic algorithms
string processing and information re...
string processing and information retrieval
surgery simulation and soft tissue m...
surgery simulation and soft tissue modeling
symbolic and numerical scientific co...
symbolic and numerical scientific computation
technologies for e-services
technologies for e-services
telecommunications and beyond
telecommunications and beyond
testing of communicating systems
testing of communicating systems
text, speech and dialogue
text, speech and dialogue
text-and speech-triggered informatio...
text-and speech-triggered information access
logic system of concept graphs with ...
logic system of concept graphs with negation
semantic web, iswc 2003
semantic web, iswc 2003
theorem proving in higher order logics
theorem proving in higher order logics
theoretical computer science
theoretical computer science
tools and algorithms for the constru...
tools and algorithms for the construction and analysis of systems
topics in cryptology, ct-rsa 2003
topics in cryptology, ct-rsa 2003
trust management
trust management
trust, reputation, and security
trust, reputation, and security
typed lambda calculi and applications
typed lambda calculi and applications
types for proofs and programs
types for proofs and programs
ubicomp 2003
ubicomp 2003
universal access
universal access
user modeling 2003
user modeling 2003
utilizing problem structure in planning
utilizing problem structure in planning
verification, model checking, and ab...
verification, model checking, and abstract interpretation
virtual storytelling
virtual storytelling
visual content processing and repres...
visual content processing and representation
web and communication technologies a...
web and communication technologies and internet-related social issues--hsi 2003
web engineering
web engineering
web knowledge management and decisio...
web knowledge management and decision support
web services-icws-europe 2003
web services-icws-europe 2003
web technologies and applications
web technologies and applications
webkdd 2002
webkdd 2002
zb 2003
zb 2003
uml 2003-the unified modeling language
uml 2003-the unified modeling language
electronic government
electronic government
advanced information systems engineering
advanced information systems engineering
intelligence and security informatics
intelligence and security informatics
web, web-services, and database systems
web, web-services, and database systems
integration of software specificatio...
integration of software specification techniques for applications in engineering
integrated formal methods
integrated formal methods
universal multiservice networks
universal multiservice networks
verification: theory and practice
verification: theory and practice
web information systems: wise 2004 w...
web information systems: wise 2004 workshops
web services
web services
wireless sensor networks
wireless sensor networks
intelligence in communication systems
intelligence in communication systems
uml 2004
uml 2004
abstract state machines 2004
abstract state machines 2004
active networks
active networks
ad-hoc, mobile, and wireless networks
ad-hoc, mobile, and wireless networks
adaptive hypermedia and adaptive web...
adaptive hypermedia and adaptive web-based systems
adaptive multimedia retrieval
adaptive multimedia retrieval
advanced distributed systems
advanced distributed systems
advanced information systems engineering
advanced information systems engineering
advanced lectures on machine learning
advanced lectures on machine learning
advanced web technologies and applic...
advanced web technologies and applications
advances in agent communication
advances in agent communication
advances in artificial intelligence
advances in artificial intelligence
advances in artificial intelligence-...
advances in artificial intelligence-- iberamia 2004
advances in artificial intelligence
advances in artificial intelligence
advances in case-based reasoning
advances in case-based reasoning
advances in computer systems archite...
advances in computer systems architecture
advances in cryptology, asiacrypt 2004
advances in cryptology, asiacrypt 2004
advances in cryptology
advances in cryptology
advances in database technology--edb...
advances in database technology--edbt 2004
advances in databases and informatio...
advances in databases and information systems
advances in information retrieval
advances in information retrieval
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
advances in learning software organi...
advances in learning software organizations
advances in natural language processing
advances in natural language processing
advances in neural networks--isnn 2004
advances in neural networks--isnn 2004
advances in neural networks--isnn 2004
advances in neural networks--isnn 2004
advances in web intelligence
advances in web intelligence
advances in web-based learning, icwl...
advances in web-based learning, icwl 2004
advances in web-age information mana...
advances in web-age information management
affective dialogue systems
affective dialogue systems
agent-based hybrid intelligent systems
agent-based hybrid intelligent systems
agent-mediated electronic commerce v
agent-mediated electronic commerce v
agent-oriented information systems
agent-oriented information systems
agents and computational autonomy
agents and computational autonomy
algebraic methodology and software t...
algebraic methodology and software technology
algorithm theory - swat 2004
algorithm theory - swat 2004
algorithmic aspects of wireless sens...
algorithmic aspects of wireless sensor networks
algorithmic learning theory
algorithmic learning theory
algorithmic number theory
algorithmic number theory
algorithms and models for the web-graph
algorithms and models for the web-graph
algorithms in bioinformatics
algorithms in bioinformatics
algorithms--esa 2004
algorithms--esa 2004
ambient intelligence
ambient intelligence
ant colony optimization and swarm in...
ant colony optimization and swarm intelligence
applications and theory of petri net...
applications and theory of petri nets 2004
applications of evolutionary computing
applications of evolutionary computing
applications of graph transformation...
applications of graph transformations with industrial relevance
applied computing
applied computing
applied cryptography and network sec...
applied cryptography and network security
applying formal methods
applying formal methods
approximation and online algorithms
approximation and online algorithms
approximation, randomization, and co...
approximation, randomization, and combinatorial optimization : algorithms and techniques
architecting dependable systems ii
architecting dependable systems ii
articulated motion and deformable ob...
articulated motion and deformable objects
artificial evolution
artificial evolution
artificial immune systems
artificial immune systems
artificial intelligence and soft com...
artificial intelligence and soft computing - icaisc 2004
artificial intelligence and symbolic...
artificial intelligence and symbolic computation
aspects of molecular computing
aspects of molecular computing
automated deduction in geometry
automated deduction in geometry
automated reasoning
automated reasoning
automated technology for verificatio...
automated technology for verification and analysis
biological and medical data analysis
biological and medical data analysis
biologically inspired approaches to ...
biologically inspired approaches to advanced information technology
biometric authentication
biometric authentication
biometric authentication
biometric authentication
business process management
business process management
casl reference manual
casl reference manual
cellular automata
cellular automata
coevolutionary fuzzy modeling
coevolutionary fuzzy modeling
combinatorial pattern matching
combinatorial pattern matching
comparative evaluation of multilingu...
comparative evaluation of multilingual information access systems
compiler construction
compiler construction
component deployment
component deployment
component-based software engineering
component-based software engineering
computational linguistics and intell...
computational linguistics and intelligent text processing
computational neuroscience
computational neuroscience
computational science-- iccs 2004
computational science-- iccs 2004
computational science-- iccs 2004
computational science-- iccs 2004
computational science-- iccs 2004
computational science-- iccs 2004
computational science-- iccs 2004
computational science-- iccs 2004
computational science and its applic...
computational science and its applications - iccsa 2004
computational science and its applic...
computational science and its applications - iccsa 2004
computational science and its applic...
computational science and its applications
computer aided verification
computer aided verification
computer and information sciences
computer and information sciences
computer human interaction
computer human interaction
computer music modeling and retrieval
computer music modeling and retrieval
computer safety, reliability, and se...
computer safety, reliability, and security
computer science logic
computer science logic
computer security - esorics 2004
computer security - esorics 2004
computer systems: architectures, mod...
computer systems: architectures, modeling, and simulation
computer vision, eccv 2004
computer vision, eccv 2004
computer vision, eccv 2004
computer vision, eccv 2004
computer vision, eccv 2004
computer vision, eccv 2004
computer vision, eccv 2004
computer vision, eccv 2004
computer vision and mathematical met...
computer vision and mathematical methods in medical and biomedical image analysis
computer vision in human-computer in...
computer vision in human-computer interaction
computers helping people with specia...
computers helping people with special needs
computing and combinatorics
computing and combinatorics
concept lattices
concept lattices
conceptual modeling for advanced app...
conceptual modeling for advanced application domains
conceptual modeling- er 2004
conceptual modeling- er 2004
conceptual structures at work
conceptual structures at work
concur 2004 _ concurrency theory
concur 2004 _ concurrency theory
constraint databases
constraint databases
content computing
content computing
cooperative design, visualization, a...
cooperative design, visualization, and engineering
cooperative information agents viii
cooperative information agents viii
coordination models and languages
coordination models and languages
cots-based software systems
cots-based software systems
cryptographic hardware and embedded ...
cryptographic hardware and embedded systems--ches 2004
current topics in artificial intelli...
current topics in artificial intelligence
data integration in the life sciences
data integration in the life sciences
data warehousing and knowledge discovery
data warehousing and knowledge discovery
database and expert systems applications
database and expert systems applications
database and xml technologies
database and xml technologies
database programming languages
database programming languages
database support for data mining app...
database support for data mining applications
declarative agent languages and tech...
declarative agent languages and technologies
deontic logic in computer science
deontic logic in computer science
diagrammatic representation and infe...
diagrammatic representation and inference
digital documents :
digital documents :
distributed computing
distributed computing
dna computing
dna computing
document analysis systems vi
document analysis systems vi
domain-specific program generation
domain-specific program generation
e-commerce and web technologies
e-commerce and web technologies
ecoop 2004 - object-oriented programming
ecoop 2004 - object-oriented programming
electronic government
electronic government
embedded and ubiquitous computing
embedded and ubiquitous computing
embodied artificial intelligence :
embodied artificial intelligence :
engineering knowledge in the age of ...
engineering knowledge in the age of the semantic web
engineering self-organising systems
engineering self-organising systems
engineering societies in the agents ...
engineering societies in the agents world iv
entertainment computing -- icec 2004
entertainment computing -- icec 2004
euro-par 2004 parallel processing
euro-par 2004 parallel processing
evolutionary computation in combinat...
evolutionary computation in combinatorial optimization
experimental and efficient algorithms
experimental and efficient algorithms
extreme programming and agile method...
extreme programming and agile methods--xp/agile universe 2004
extreme programming and agile proces...
extreme programming and agile processes in software engineering
fast software encryption
fast software encryption
field-programmable logic and applica...
field-programmable logic and applications
financial cryptography
financial cryptography
finite fields and applications
finite fields and applications
flexible query answering systems
flexible query answering systems
formal approaches to software testing
formal approaches to software testing
formal methods and software engineering
formal methods and software engineering
formal methods for components and ob...
formal methods for components and objects
formal methods for the design of rea...
formal methods for the design of real-time systems
formal methods in computer-aided design
formal methods in computer-aided design
formal modeling and analysis of time...
formal modeling and analysis of timed systems
formal techniques for networked and ...
formal techniques for networked and distributed systems - forte 2004
formal techniques, modelling and ana...
formal techniques, modelling and analysis of timed and fault-tolerant systems
foundations of information and knowl...
foundations of information and knowledge systems
foundations of security analysis and...
foundations of security analysis and design ii
foundations of software science and ...
foundations of software science and computation structures
from object-orientation to formal me...
from object-orientation to formal methods
functional and logic programming
functional and logic programming
fundamental approaches to software e...
fundamental approaches to software engineering
generative programming and component...
generative programming and component engineering
generic model management
generic model management
genetic and evolutionary computation...
genetic and evolutionary computation--gecco 2004
genetic and evolutionary computation...
genetic and evolutionary computation--gecco 2004
genetic programming
genetic programming
geographic information science
geographic information science
gesture-based communication in human...
gesture-based communication in human-computer interaction
grammatical inference
grammatical inference
graph drawing
graph drawing
graph transformations
graph transformations
graphics recognition
graphics recognition
grid and cooperative computing
grid and cooperative computing
grid and cooperative computing
grid and cooperative computing
grid and cooperative computing
grid and cooperative computing
grid and cooperative computing
grid and cooperative computing
grid computing
grid computing
grid computing
grid computing
grid services engineering and management
grid services engineering and management
groupware
groupware
high speed networks and multimedia c...
high speed networks and multimedia communications
higher-level hardware synthesis
higher-level hardware synthesis
hybrid systems
hybrid systems
image analysis and recognition
image analysis and recognition
image analysis and recognition
image analysis and recognition
image and video retrieval
image and video retrieval
independent component analysis and b...
independent component analysis and blind signal separation
inductive logic programming
inductive logic programming
information and communications security
information and communications security
information networking
information networking
information security
information security
information security and cryptology-...
information security and cryptology--icisc 2003
information security and privacy
information security and privacy
innovations in applied artificial in...
innovations in applied artificial intelligence
integer programming and combinatoria...
integer programming and combinatorial optimization
intelligent information integration ...
intelligent information integration for the semantic web
intelligent tutoring systems
intelligent tutoring systems
interactive multimedia and next gene...
interactive multimedia and next generation networks
key technologies for data management
key technologies for data management
ki 2004
ki 2004
knowledge discovery in databases: pk...
knowledge discovery in databases: pkdd 2004
knowledge management in electronic g...
knowledge management in electronic government
knowledge-based intelligent informat...
knowledge-based intelligent information and engineering systems.
knowledge-based intelligent informat...
knowledge-based intelligent information and engineering systems.
knowledge-based intelligent informat...
knowledge-based intelligent information and engineering systems.
languages and compilers for parallel...
languages and compilers for parallel computing
large-scale scientific computing
large-scale scientific computing
latin 2004
latin 2004
learning theory
learning theory
least squares orthogonal distance fi...
least squares orthogonal distance fitting of curves and surfaces in space
lectures on concurrency and petri nets
lectures on concurrency and petri nets
logic based program synthesis and tr...
logic based program synthesis and transformation
logic programming
logic programming
logic versus approximation
logic versus approximation
logics in artificial intelligence
logics in artificial intelligence
machine learning
machine learning
machine translation
machine translation
management of multimedia networks an...
management of multimedia networks and services
mathematical foundations of computer...
mathematical foundations of computer science 2004
mathematical knowledge management
mathematical knowledge management
mathematics of program construction
mathematics of program construction
medical image computing and computer...
medical image computing and computer-assisted intervention-miccai 2004
medical image computing and computer...
medical image computing and computer-assisted intervention miccai 2004
medical imaging and augmented reality
medical imaging and augmented reality
medical simulation
medical simulation
membrane computing
membrane computing
metainformatics
metainformatics
micai 2004
micai 2004
middleware 2004
middleware 2004
mobile and ubiquitous information access
mobile and ubiquitous information access
mobile human-computer interaction--m...
mobile human-computer interaction--mobilehci 2004 :
mobility aware technologies and appl...
mobility aware technologies and applications
model checking software
model checking software
model generation for natural languag...
model generation for natural language interpretation and analysis
model-checking based data retrieval
model-checking based data retrieval
modeling decisions for artificial in...
modeling decisions for artificial intelligence
multiple classifier systems
multiple classifier systems
natural language generation
natural language generation
network and parallel computing
network and parallel computing
networking 2004
networking 2004
neural information processing
neural information processing
numerical software with result verif...
numerical software with result verification
object-oriented and internet-based t...
object-oriented and internet-based technologies
object-oriented technology
object-oriented technology
objects, agents, and features
objects, agents, and features
on the move to meaningful internet s...
on the move to meaningful internet systems 2004 : coopis, doa, and odbase
on the move to meaningful internet s...
on the move to meaningful internet systems 2004 : coopis, doa, and odbase
on the move to meaningful internet s...
on the move to meaningful internet systems 2004
organic and pervasive computing--arc...
organic and pervasive computing--arcs 2004
parallel problem solving from nature...
parallel problem solving from nature - ppsn viii
parallel processing and applied math...
parallel processing and applied mathematics
parameterized and exact computation
parameterized and exact computation
passive and active network measurement
passive and active network measurement
pattern recognition
pattern recognition
pervasive computing
pervasive computing
practical aspects of declarative lan...
practical aspects of declarative languages
practical aspects of knowledge manag...
practical aspects of knowledge management
pricai 2004
pricai 2004
principles and practice of constrain...
principles and practice of constraint programming--cp 2004
principles and practice of semantic ...
principles and practice of semantic web reasoning
principles of distributed systems
principles of distributed systems
privacy in statistical databases
privacy in statistical databases
product focused software process imp...
product focused software process improvement
program development in computational...
program development in computational logic
programming languages and systems
programming languages and systems
programming languages and systems
programming languages and systems
programming multi-agent systems
programming multi-agent systems
progress in pattern recognition, ima...
progress in pattern recognition, image analysis and applications
public key cryptography - pkc 2004
public key cryptography - pkc 2004
public key infrastructure
public key infrastructure
quality of service in the emerging n...
quality of service in the emerging networking panorama
querying databases privately
querying databases privately
radical innovations of software and ...
radical innovations of software and systems engineering in the future
reading and learning
reading and learning
real-time and embedded computing sys...
real-time and embedded computing systems and applications
recent advances in constraints
recent advances in constraints
recent advances in intrusion detection
recent advances in intrusion detection
recent advances in parallel virtual ...
recent advances in parallel virtual machine and message passing interface
regulated agent-based social systems
regulated agent-based social systems
relational and kleene-algebraic meth...
relational and kleene-algebraic methods in computer science
reliable software technologies - ada...
reliable software technologies - ada-europe 2004
research and advanced technology for...
research and advanced technology for digital libraries
rewriting techniques and applications
rewriting techniques and applications
robocup 2003
robocup 2003
rough sets and current trends in com...
rough sets and current trends in computing
rules and rule markup languages for ...
rules and rule markup languages for the semantic web
scientific engineering of distribute...
scientific engineering of distributed java applications
secure data management
secure data management
security in pervasive computing
security in pervasive computing
selected areas in cryptography
selected areas in cryptography
semantics of a networked world
semantics of a networked world
semirings for soft constraint solvin...
semirings for soft constraint solving and programming
service assurance with partial and i...
service assurance with partial and intermittent resources
smart graphics
smart graphics
software and compilers for embedded ...
software and compilers for embedded systems
software architecture
software architecture
software engineering for multi-agent...
software engineering for multi-agent systems ii
software engineering research and ap...
software engineering research and applications
software process improvement
software process improvement
software product lines
software product lines
software product-family engineering
software product-family engineering
software reuse: methods, techniques,...
software reuse: methods, techniques, and tools
software security
software security
stacs 2004
stacs 2004
stateless core
stateless core
static analysis
static analysis
statistical methods in video processing
statistical methods in video processing
string processing and information re...
string processing and information retrieval
multiagent system technologies
multiagent system technologies
personal wireless communications
personal wireless communications
structural information and communica...
structural information and communication complexity
structural, syntactic, and statistic...
structural, syntactic, and statistical pattern recognition
teaching formal methods
teaching formal methods
technologies for interactive digital...
technologies for interactive digital storytelling and entertainment
telecommunications and networking - ...
telecommunications and networking - ict 2004
testing of communicating systems
testing of communicating systems
tex, xml, and digital typography
tex, xml, and digital typography
text, speech, and dialogue
text, speech, and dialogue
semantic web
semantic web
semantic web - iswc 2004
semantic web - iswc 2004
theorem proving in higher order logics
theorem proving in higher order logics
theory and applications of satisfiab...
theory and applications of satisfiability testing
theory is forever
theory is forever
theory of cryptography
theory of cryptography
tools and algorithms for the constru...
tools and algorithms for the construction and analysis of systems
topics in cryptology - ct-rsa 2004
topics in cryptology - ct-rsa 2004
transactions on rough sets i
transactions on rough sets i
trust and privacy in digital business
trust and privacy in digital business
trust management
trust management
ubicomp 2004
ubicomp 2004
advances in cryptology - crypto 2004
advances in cryptology - crypto 2004
artificial intelligence: methodology...
artificial intelligence: methodology, systems, and applications
automata, languages and programming
automata, languages and programming
natural language processing and info...
natural language processing and information systems
computational science and its applic...
computational science and its applications - iccsa 2004
database systems for advanced applic...
database systems for advanced applications
databases, information systems, and ...
databases, information systems, and peer-to-peer computing
types for proofs and programs
types for proofs and programs
digital watermarking :
digital watermarking :
discovery science
discovery science
integrated circuit and system design...
integrated circuit and system design: power and timing modeling, optimization and simulation
integration of ai and or techniques ...
integration of ai and or techniques in constraint programming for combinatorial optimization problems
utility computing
utility computing
web engineering
web engineering
web information systems - wise 2004
web information systems - wise 2004
web mining: from web to semantic web
web mining: from web to semantic web
web services, e-business, and the se...
web services, e-business, and the semantic web
wired/wireless internet communications
wired/wireless internet communications
intelligent data engineering and aut...
intelligent data engineering and automated learning--ideal 2004
intelligence and security informatics
intelligence and security informatics
user-centred interaction paradigms f...
user-centred interaction paradigms for universal access in the information society
validation of stochastic systems
validation of stochastic systems
high performance embedded architectu...
high performance embedded architectures and compilers
sanskrit computational linguistics
sanskrit computational linguistics
verification, model checking, and ab...
verification, model checking, and abstract interpretation
declarative agent languages and tech...
declarative agent languages and technologies vi
logic and its applications
logic and its applications
gesture-based human-computer interac...
gesture-based human-computer interaction and simulation
practical aspects of declarative lan...
practical aspects of declarative languages
computer performance evaluation and ...
computer performance evaluation and benchmarking
service-oriented computing - icsoc 2...
service-oriented computing - icsoc 2007 workshops
approximation and online algorithms
approximation and online algorithms
membrane computing
membrane computing
software engineering
software engineering
sofsem 2009
sofsem 2009
integrated circuit and system design
integrated circuit and system design
algorithms and models for the web-graph
algorithms and models for the web-graph
wireless sensor networks
wireless sensor networks
logical foundations of computer science
logical foundations of computer science
sanskrit computational linguistics
sanskrit computational linguistics
walcom: algorithms and computation
walcom: algorithms and computation
argumentation in multi-agent systems
argumentation in multi-agent systems
transactions on computational scienc...
transactions on computational science iii
graph drawing
graph drawing
integrated formal methods
integrated formal methods
information security applications
information security applications
computational linguistics and intell...
computational linguistics and intelligent text processing
network control and optimization
network control and optimization
new frontiers in applied data mining
new frontiers in applied data mining
end-user development
end-user development
model checking and artificial intell...
model checking and artificial intelligence
mobile response
mobile response
architecture of computing systems - ...
architecture of computing systems - arcs 2009
theory of cryptography
theory of cryptography
numerical analysis and its applications
numerical analysis and its applications
logic-based program synthesis and tr...
logic-based program synthesis and transformation
multimodal signals: cognitive and al...
multimodal signals: cognitive and algorithmic issues
advances in web mining and web usage...
advances in web mining and web usage analysis
attention in cognitive systems
attention in cognitive systems
trusted computing
trusted computing
methods, models and tools for fault ...
methods, models and tools for fault tolerance
distributed computing and networking
distributed computing and networking
engineering secure software and systems
engineering secure software and systems
software language engineering
software language engineering
human machine interaction
human machine interaction
coordination, organizations, institu...
coordination, organizations, institutions and norms in agent systems iv
public key cryptography - pkc 2009
public key cryptography - pkc 2009
programming languages and systems
programming languages and systems
fundamental approaches to software e...
fundamental approaches to software engineering
foundations of software science and ...
foundations of software science and computational structures
independent component analysis and s...
independent component analysis and signal separation
creating brain-like intelligence
creating brain-like intelligence
reconfigurable computing
reconfigurable computing
logic, language, and computation
logic, language, and computation
advances in data and web management
advances in data and web management
compiler construction
compiler construction
information security and cryptology ...
information security and cryptology - icisc 2008
tools and algorithms for the constru...
tools and algorithms for the construction and analysis of systems
emerging trends in visual computing
emerging trends in visual computing
computer processing of oriental lang...
computer processing of oriental languages
quantum interaction
quantum interaction
database systems for advanced applic...
database systems for advanced applications
transactions on petri nets and other...
transactions on petri nets and other models of concurrency.
passive and active network measurement
passive and active network measurement
language and automata theory and app...
language and automata theory and applications
future internet - fis 2008
future internet - fis 2008
transactions on computational science iv
transactions on computational science iv
agent-oriented software engineering ix
agent-oriented software engineering ix
hybrid systems
hybrid systems
new frontiers in artificial intelligence
new frontiers in artificial intelligence
formal theories of information
formal theories of information
applications of declarative programm...
applications of declarative programming and knowledge management
bioinformatics and computational biology
bioinformatics and computational biology
information security practice and ex...
information security practice and experience
topics in cryptology--ct-rsa 2009
topics in cryptology--ct-rsa 2009
transactions on high-performance emb...
transactions on high-performance embedded architectures and compilers.
trustworthy global computing
trustworthy global computing
euro-par 2008 workshops - parallel p...
euro-par 2008 workshops - parallel processing
advances in information retrieval
advances in information retrieval
active and programmable networks
active and programmable networks
advances in cryptology - eurocrypt 2009
advances in cryptology - eurocrypt 2009
evolutionary computation in combinat...
evolutionary computation in combinatorial optimization
evolutionary multi-criterion optimiz...
evolutionary multi-criterion optimization
epistemological aspects of computer ...
epistemological aspects of computer simulation in the social sciences
applications of evolutionary computing
applications of evolutionary computing
genetic programming
genetic programming
evolutionary computation, machine le...
evolutionary computation, machine learning and data mining in bioinformatics
service-oriented computing - icsoc 2...
service-oriented computing - icsoc 2008 workshops
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
advanced internet based systems and ...
advanced internet based systems and applications
web services and formal methods
web services and formal methods
intelligence and security informatics
intelligence and security informatics
information security and cryptology
information security and cryptology
formal aspects in security and trust
formal aspects in security and trust
pervasive computing
pervasive computing
towards digital optical networks
towards digital optical networks
bioinformatics research and applications
bioinformatics research and applications
numerical validation in current hard...
numerical validation in current hardware architectures
agent computing and multi-agent systems
agent computing and multi-agent systems
traffic monitoring and analysis
traffic monitoring and analysis
models in software engineering
models in software engineering
advances in grid and pervasive computing
advances in grid and pervasive computing
hardware and software : verification...
hardware and software : verification and testing
location and context awareness
location and context awareness
computer vision/computer graphics, c...
computer vision/computer graphics, collaboration techniques
multi-agent-based simulation ix
multi-agent-based simulation ix
networking 2009
networking 2009
advances in neural networks - isnn 2009
advances in neural networks - isnn 2009
advances in neural networks - isnn 2009
advances in neural networks - isnn 2009
advances in neural networks - isnn 2009
advances in neural networks - isnn 2009
agent and multi-agent systems: techn...
agent and multi-agent systems: technologies and applications
trustworthy software development pro...
trustworthy software development processes
knowledge acquisition : approaches a...
knowledge acquisition : approaches algorithms and applications
privacy, security, and trust in kdd
privacy, security, and trust in kdd
languages: from formal to natural
languages: from formal to natural
network economics for next generatio...
network economics for next generation networks
similarity-based clustering
similarity-based clustering
formal concept analysis
formal concept analysis
advances in artificial intelligence
advances in artificial intelligence
modular ontologies
modular ontologies
formal methods for web services
formal methods for web services
integration of ai and or techniques ...
integration of ai and or techniques in constraint programming for combinatorial optimization problems
functional imaging and modeling of t...
functional imaging and modeling of the heart
applied cryptography and network sec...
applied cryptography and network security
computational science - iccs 2009
computational science - iccs 2009
computational science - iccs 2009
computational science - iccs 2009
formal to practical security
formal to practical security
research in computational molecular ...
research in computational molecular biology
theory and applications of models of...
theory and applications of models of computation
object-oriented technology. ecoop 20...
object-oriented technology. ecoop 2008 workshop reader
smart graphics
smart graphics
wired/wireless internet communications
wired/wireless internet communications
semantic web: research and applications
semantic web: research and applications
scale space and variational methods ...
scale space and variational methods in computer vision
scientific and statistical database ...
scientific and statistical database management
evolving openmp in an age of extreme...
evolving openmp in an age of extreme parallelism
computer vision and graphics
computer vision and graphics
large-scale scientific computing
large-scale scientific computing
constraint handling rules
constraint handling rules
cognitive vision
cognitive vision
groupware
groupware
digital libraries
digital libraries
medical imaging and augmented reality :
medical imaging and augmented reality :
virtual and mixed reality - new trends :
virtual and mixed reality - new trends :
conceptual modeling :
conceptual modeling :
evolutionary computation, machine le...
evolutionary computation, machine learning and data mining in bioinformatics :
optical supercomputing :
optical supercomputing :
practical aspects of declarative lan...
practical aspects of declarative languages
intelligent strategies for pathway m...
intelligent strategies for pathway mining
citizen in sensor networks
citizen in sensor networks
trends in functional programming
trends in functional programming
algorithms for sensor systems
algorithms for sensor systems
specifying big data benchmarks
specifying big data benchmarks
multimedia modeling
multimedia modeling
multimedia modeling
multimedia modeling
applied algorithms
applied algorithms
information theoretic security
information theoretic security
sofsem 2014
sofsem 2014
distributed computing and internet t...
distributed computing and internet technology
graph structures for knowledge repre...
graph structures for knowledge representation and reasoning
wireless sensor networks
wireless sensor networks
algorithms and computation
algorithms and computation
pairing-based cryptography - pairing...
pairing-based cryptography - pairing 2013
performance characterization and ben...
performance characterization and benchmarking
frontiers in gaming simulation
frontiers in gaming simulation
distributed computing and networking
distributed computing and networking
image and video technology
image and video technology
image and video technology - psivt 2...
image and video technology - psivt 2013 workshops
foundations of health information en...
foundations of health information engineering and systems
public key infrastructures, services...
public key infrastructures, services and applications
verification, model checking, and ab...
verification, model checking, and abstract interpretation
privacy technologies and policy
privacy technologies and policy
verified software
verified software
transactions on computational scienc...
transactions on computational science xxii
membrane computing
membrane computing
statistical atlases and computationa...
statistical atlases and computational models of the heart
mobile social signal processing
mobile social signal processing
topics in cryptology - ct-rsa 2014
topics in cryptology - ct-rsa 2014
architecture of computing systems - ...
architecture of computing systems - arcs 2014
engineering secure software and systems
engineering secure software and systems
structured object-oriented formal la...
structured object-oriented formal language and method
passive and active measurement
passive and active measurement
language and automata theory and app...
language and automata theory and applications
foundations of information and knowl...
foundations of information and knowledge systems
openshmem and related technologies
openshmem and related technologies
research in computational molecular ...
research in computational molecular biology
measurement, modelling, and evaluati...
measurement, modelling, and evaluation of computing systems and dependability and fault tolerance
intelligent information and database...
intelligent information and database systems
intelligent information and database...
intelligent information and database systems
databases in networked information s...
databases in networked information systems
self-organizing systems
self-organizing systems
theory of cryptography
theory of cryptography
information technology and open sour...
information technology and open source: applications for education, innovation, and sustainability
web information systems engineering ...
web information systems engineering - wise 2013 workshops
theory and applications of formal ar...
theory and applications of formal argumentation
mathematical methods for curves and ...
mathematical methods for curves and surfaces
transactions on computational collec...
transactions on computational collective intelligence xiii
algebraic and algorithmic aspects of...
algebraic and algorithmic aspects of differential and integral operators
specification, algebra, and software
specification, algebra, and software
public-key cryptography - pkc 2014
public-key cryptography - pkc 2014
software engineering and formal methods
software engineering and formal methods
trustworthy global computing
trustworthy global computing
information security applications
information security applications
camera-based document analysis and r...
camera-based document analysis and recognition
foundations and practice of security
foundations and practice of security
medical computer vision : large data...
medical computer vision : large data in medical imaging
social computing, behavioral-cultura...
social computing, behavioral-cultural modeling and prediction
clinical image-based procedures
clinical image-based procedures
requirements engineering
requirements engineering
games for training, education, healt...
games for training, education, health and sports
advances in information retrieval
advances in information retrieval
latin 2014
latin 2014
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xiii
theory of quantum computation, commu...
theory of quantum computation, communication, and cryptography
data privacy management and autonomo...
data privacy management and autonomous spontaneous security
transactions on rough sets xvii
transactions on rough sets xvii
multi-agent-based simulation xiv
multi-agent-based simulation xiv
principles of security and trust
principles of security and trust
fundamental approaches to software e...
fundamental approaches to software engineering
compiler construction
compiler construction
foundations of software science and ...
foundations of software science and computation structures
programming languages and systems
programming languages and systems
tools and algorithms for the constru...
tools and algorithms for the construction and analysis of systems
traffic monitoring and analysis
traffic monitoring and analysis
information and communication technology
information and communication technology
transactions on data hiding and mult...
transactions on data hiding and multimedia security ix
linked open data - creating knowledg...
linked open data - creating knowledge out of interlinked data :
logic and its applications
logic and its applications
smart homes and health telematics
smart homes and health telematics
multimedia modeling
multimedia modeling
multimedia modeling
multimedia modeling
trends in functional programming
trends in functional programming
statistical atlases and computationa...
statistical atlases and computational models of the heart
transactional memory
transactional memory
mining, modeling, and recommending '...
mining, modeling, and recommending 'things' in social media
verification, model checking, and ab...
verification, model checking, and abstract interpretation
in memory data management and analysis
in memory data management and analysis
energy minimization methods in compu...
energy minimization methods in computer vision and pattern recognition
multi-agent-based simulation xv
multi-agent-based simulation xv
advances in knowledge representation...
advances in knowledge representation, logic programming, and abstract argumentation
artificial life and computational in...
artificial life and computational intelligence
unifying theories of programming
unifying theories of programming
multimodal pattern recognition of so...
multimodal pattern recognition of social signals in human-computer-interaction
spatio-temporal image analysis for l...
spatio-temporal image analysis for longitudinal and time-series image data
algorithms and discrete applied math...
algorithms and discrete applied mathematics
distributed computing and internet t...
distributed computing and internet technology
formal methods
formal methods
computer algebra and polynomials
computer algebra and polynomials
information security applications
information security applications
software engineering and formal methods
software engineering and formal methods
formal aspects of component software
formal aspects of component software
wireless sensor networks
wireless sensor networks
algorithms for sensor systems
algorithms for sensor systems
sofsem 2015
sofsem 2015
advances in web-based learning - icw...
advances in web-based learning - icwl 2013 workshops
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xvii
social informatics
social informatics
performance characterization and ben...
performance characterization and benchmarking
multimodal analyses enabling artific...
multimodal analyses enabling artificial agents in human-machine interaction
language and automata theory and app...
language and automata theory and applications
numerical methods and applications
numerical methods and applications
walcom
walcom
semantic technology
semantic technology
engineering secure software and systems
engineering secure software and systems
energy efficient data centers
energy efficient data centers
job scheduling strategies for parall...
job scheduling strategies for parallel processing
quantum interaction
quantum interaction
solving software challenges for exascale
solving software challenges for exascale
computational color imaging
computational color imaging
smart health
smart health
arithmetic of finite fields
arithmetic of finite fields
ad-hoc networks and wireless
ad-hoc networks and wireless
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xviii
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xix
swarm, evolutionary, and memetic com...
swarm, evolutionary, and memetic computing
social computing and social media
social computing and social media
engineering psychology and cognitive...
engineering psychology and cognitive ergonomics
human aspects of information securit...
human aspects of information security, privacy, and trust
learning and collaboration technologies
learning and collaboration technologies
human interface and the management o...
human interface and the management of information
human interface and the management o...
human interface and the management of information
hybrid learning
hybrid learning
universal access in human-computer i...
universal access in human-computer interaction
universal access in human-computer i...
universal access in human-computer interaction
universal access in human-computer i...
universal access in human-computer interaction
universal access in human-computer i...
universal access in human-computer interaction
image analysis and recognition
image analysis and recognition
distributed, ambient, and pervasive ...
distributed, ambient, and pervasive interactions
symbolic and quantitative approaches...
symbolic and quantitative approaches to reasoning with uncertainty
foundations of augmented cognition
foundations of augmented cognition
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
human aspects of it for the aged pop...
human aspects of it for the aged population
hci in business
hci in business
design, user experience, and usability
design, user experience, and usability
human-computer interaction
human-computer interaction
cross-cultural design
cross-cultural design
human aspects of it for the aged pop...
human aspects of it for the aged population
human-computer interaction
human-computer interaction
cross-cultural design
cross-cultural design
human-computer interaction
human-computer interaction
virtual, augmented and mixed reality
virtual, augmented and mixed reality
digital human modeling
digital human modeling
digital human modeling
digital human modeling
graph transformation
graph transformation
modelling foundations and applications
modelling foundations and applications
theory and practice of model transfo...
theory and practice of model transformations
tests and proofs
tests and proofs
algorithms for computational biology
algorithms for computational biology
cryptography and information securit...
cryptography and information security in the balkans
automated deduction in geometry
automated deduction in geometry
artificial general intelligence
artificial general intelligence
automated deduction - cade-25
automated deduction - cade-25
constructive side-channel analysis a...
constructive side-channel analysis and secure design
developments in language theory
developments in language theory
rule technologies
rule technologies
computer aided verification
computer aided verification
computer aided verification
computer aided verification
reasoning web
reasoning web
computational social networks
computational social networks
wireless algorithms, systems, and ap...
wireless algorithms, systems, and applications
algorithms and data structures
algorithms and data structures
data integration in the life sciences
data integration in the life sciences
parallel computing technologies
parallel computing technologies
behavior modeling
behavior modeling
intelligent virtual agents
intelligent virtual agents
dna computing and molecular programming
dna computing and molecular programming
web reasoning and rule systems
web reasoning and rule systems
big data computing and communications
big data computing and communications
search-based software engineering
search-based software engineering
database systems for advanced applic...
database systems for advanced applications
implementation and application of au...
implementation and application of automata
towards autonomous robotic systems
towards autonomous robotic systems
biomimetic and biohybrid systems
biomimetic and biohybrid systems
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxi
transactions on rough sets xix
transactions on rough sets xix
financial cryptography and data security
financial cryptography and data security
advances in cryptology - crypto 2015
advances in cryptology - crypto 2015
advances in cryptology - crypto 2015
advances in cryptology - crypto 2015
euro-par 2015
euro-par 2015
transactions on computational collec...
transactions on computational collective intelligence xviii
stabilization, safety, and security ...
stabilization, safety, and security of distributed systems
unconventional computation and natur...
unconventional computation and natural computation
image and graphics
image and graphics
information and communications security
information and communications security
image and graphics
image and graphics
image and graphics
image and graphics
advanced intelligent computing theor...
advanced intelligent computing theories and applications
interactive theorem proving
interactive theorem proving
progress in cryptology - latincrypt 2015
progress in cryptology - latincrypt 2015
fundamentals of computation theory
fundamentals of computation theory
intelligent computing theories and m...
intelligent computing theories and methodologies
intelligent computing theories and m...
intelligent computing theories and methodologies
quantitative evaluation of systems
quantitative evaluation of systems
e-voting and identity
e-voting and identity
advances in spatial and temporal dat...
advances in spatial and temporal databases
modelling and simulation for autonom...
modelling and simulation for autonomous systems
electronic government and the inform...
electronic government and the information systems perspective
advances in information and computer...
advances in information and computer security
electronic government
electronic government
latent variable analysis and signal ...
latent variable analysis and signal separation
electronic participation
electronic participation
wired/wireless internet communications
wired/wireless internet communications
human-computer interaction - interac...
human-computer interaction - interact 2015
human-computer interaction - interac...
human-computer interaction - interact 2015
human-computer interaction - interac...
human-computer interaction - interact 2015
human-computer interaction - interac...
human-computer interaction - interact 2015
big data analytics and knowledge dis...
big data analytics and knowledge discovery
information technology in bio- and m...
information technology in bio- and medical informatics
curves and surfaces
curves and surfaces
trust and trustworthy computing
trust and trustworthy computing
database and expert systems applications
database and expert systems applications
database and expert systems applications
database and expert systems applications
industrial applications of holonic a...
industrial applications of holonic and multi-agent systems
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
augmented and virtual reality
augmented and virtual reality
trust, privacy and security in digit...
trust, privacy and security in digital business
software engineering and formal methods
software engineering and formal methods
formal modeling and analysis of time...
formal modeling and analysis of timed systems
business process management
business process management
machines, computations, and universality
machines, computations, and universality
algorithmic decision theory
algorithmic decision theory
computer analysis of images and patterns
computer analysis of images and patterns
internet of things, smart spaces, an...
internet of things, smart spaces, and next generation networks and systems
software engineering for resilient s...
software engineering for resilient systems
advances in databases and informatio...
advances in databases and information systems
mobile web and intelligent informati...
mobile web and intelligent information systems
logic, rewriting, and concurrency
logic, rewriting, and concurrency
computer analysis of images and patterns
computer analysis of images and patterns
advanced parallel processing technol...
advanced parallel processing technologies
principles and practice of constrain...
principles and practice of constraint programming
new trends in image analysis and pro...
new trends in image analysis and processing - iciap 2015 workshops
image analysis and processing - icia...
image analysis and processing - iciap 2015
image analysis and processing - icia...
image analysis and processing - iciap 2015
internet and distributed computing s...
internet and distributed computing systems
modeling decisions for artificial in...
modeling decisions for artificial intelligence
computer performance engineering
computer performance engineering
information security
information security
brain informatics and health
brain informatics and health
model checking software
model checking software
multiple access communications
multiple access communications
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
progress in artificial intelligence
progress in artificial intelligence
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
combinatorics on words
combinatorics on words
information security theory and practice
information security theory and practice
experimental ir meets multilingualit...
experimental ir meets multilinguality, multimodality, and interaction
mathematical foundations of computer...
mathematical foundations of computer science 2015
mathematical foundations of computer...
mathematical foundations of computer science 2015
fast software encryption
fast software encryption
new frontiers in artificial intelligence
new frontiers in artificial intelligence
algorithms in bioinformatics
algorithms in bioinformatics
cryptographic hardware and embedded ...
cryptographic hardware and embedded systems - ches 2015
collaboration and technology
collaboration and technology
service-oriented computing - icsoc 2...
service-oriented computing - icsoc 2014 workshops
games and learning alliance
games and learning alliance
algebraic informatics
algebraic informatics
information processing in cells and ...
information processing in cells and tissues
speech and computer
speech and computer
logic programming and nonmonotonic r...
logic programming and nonmonotonic reasoning
spatial information theory
spatial information theory
computational methods in systems biology
computational methods in systems biology
correct system design
correct system design
web-age information management
web-age information management
fields of logic and computation ii
fields of logic and computation ii
scalable uncertainty management
scalable uncertainty management
software architecture
software architecture
model and data engineering
model and data engineering
runtime verification
runtime verification
string processing and information re...
string processing and information retrieval
agent environments for multi-agent s...
agent environments for multi-agent systems iv
intelligence science and big data en...
intelligence science and big data engineering : big data and machine learning techniques
intelligence science and big data en...
intelligence science and big data engineering : image and video data engineering
programming languages
programming languages
computer algebra in scientific computing
computer algebra in scientific computing
algorithms, probability, networks, a...
algorithms, probability, networks, and games
text, speech, and dialogue
text, speech, and dialogue
computational collective intelligence
computational collective intelligence
service oriented and cloud computing
service oriented and cloud computing
advances in multimedia information p...
advances in multimedia information processing - pcm 2015
advances in multimedia information p...
advances in multimedia information processing - pcm 2015
security, privacy, and applied crypt...
security, privacy, and applied cryptography engineering
cooperative design, visualization, a...
cooperative design, visualization, and engineering
computer security - esorics 2015
computer security - esorics 2015
computer security - esorics 2015
computer security - esorics 2015
technology and practice of passwords
technology and practice of passwords
human behavior understanding
human behavior understanding
frontiers of combining systems
frontiers of combining systems
computer safety, reliability, and se...
computer safety, reliability, and security
computer safety, reliability, and se...
computer safety, reliability, and security
design for teaching and learning in ...
design for teaching and learning in a networked world
similarity-based pattern recognition
similarity-based pattern recognition
computational logistics
computational logistics
discovery science
discovery science
computational collective intelligence
computational collective intelligence
ai*ia 2015 advances in artificial in...
ai*ia 2015 advances in artificial intelligence
automated reasoning with analytic ta...
automated reasoning with analytic tableaux and related methods
information and communication technology
information and communication technology
theory and applications of satisfiab...
theory and applications of satisfiability testing - sat 2015
computer information systems and ind...
computer information systems and industrial management
computational intelligence methods f...
computational intelligence methods for bioinformatics and biostatistics
advances in intelligent data analysi...
advances in intelligent data analysis xiv
data science
data science
algorithmic learning theory
algorithmic learning theory
ki 2015
ki 2015
reachability problems
reachability problems
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2015
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2015
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2015
case-based reasoning research and de...
case-based reasoning research and development
entertainment computing - icec 2015
entertainment computing - icec 2015
research and advanced technology for...
research and advanced technology for digital libraries
openmp
openmp
advances in artificial intelligence
advances in artificial intelligence
augmented environments for computer-...
augmented environments for computer-assisted interventions
fundamentals of software engineering
fundamentals of software engineering
relational and algebraic methods in ...
relational and algebraic methods in computer science
current trends in web engineering
current trends in web engineering
intelligent data engineering and aut...
intelligent data engineering and automated learning - ideal 2015
radio frequency identification
radio frequency identification
security and trust management
security and trust management
machine learning in medical imaging
machine learning in medical imaging
sdl 2015
sdl 2015
symbiotic interaction
symbiotic interaction
pattern recognition
pattern recognition
automated technology for verificatio...
automated technology for verification and analysis
semantic web - iswc 2015
semantic web - iswc 2015
semantic web - iswc 2015
semantic web - iswc 2015
open and big data management and inn...
open and big data management and innovation
geometric science of information
geometric science of information
similarity search and applications
similarity search and applications
integrated uncertainty in knowledge ...
integrated uncertainty in knowledge modelling and decision making
dynamic data-driven environmental sy...
dynamic data-driven environmental systems science
cyber physical systems
cyber physical systems
theoretical aspects of computing - i...
theoretical aspects of computing - ictac 2015
knowledge science, engineering and m...
knowledge science, engineering and management
natural language processing and chin...
natural language processing and chinese computing
agents and artificial intelligence
agents and artificial intelligence
foundations of intelligent systems
foundations of intelligent systems
web technologies and applications
web technologies and applications
structural information and communica...
structural information and communication complexity
conceptual modeling
conceptual modeling
advances in neural networks - isnn 2015
advances in neural networks - isnn 2015
informatics in schools
informatics in schools
biometric recognition
biometric recognition
coordination, organizations, institu...
coordination, organizations, institutions, and norms in agent systems x
formal methods and software engineering
formal methods and software engineering
advances in web-based learning - icw...
advances in web-based learning - icwl 2015
prima 2015
prima 2015
programming languages with applicati...
programming languages with applications to biology and security
pattern recognition applications and...
pattern recognition applications and methods
social robotics
social robotics
decision and game theory for security
decision and game theory for security
semantic web
semantic web
network and system security
network and system security
trends and applications in knowledge...
trends and applications in knowledge discovery and data mining
mobile, secure, and programmable net...
mobile, secure, and programmable networking
advances in conceptual modeling
advances in conceptual modeling
progress in pattern recognition, ima...
progress in pattern recognition, image analysis, computer vision, and applications
rough sets and knowledge technology
rough sets and knowledge technology
rough sets, fuzzy sets, data mining,...
rough sets, fuzzy sets, data mining, and granular computing
statistical language and speech proc...
statistical language and speech processing
chinese computational linguistics an...
chinese computational linguistics and natural language processing based on naturally annotated big data
advanced concepts for intelligent vi...
advanced concepts for intelligent vision systems
advances in visual informatics
advances in visual informatics
dependable software engineering
dependable software engineering
testing software and systems
testing software and systems
ambient intelligence
ambient intelligence
provable security
provable security
security protocols xxiii
security protocols xxiii
future data and security engineering
future data and security engineering
on the move to meaningful internet s...
on the move to meaningful internet systems
on the move to meaningful internet s...
on the move to meaningful internet systems
globalizing domain-specific languages
globalizing domain-specific languages
multi-disciplinary trends in artific...
multi-disciplinary trends in artificial intelligence
engineering multi-agent systems
engineering multi-agent systems
web information systems engineering ...
web information systems engineering - wise 2015
web information systems engineering ...
web information systems engineering - wise 2015
hardware and software
hardware and software
ai 2015
ai 2015
research in attacks,intrusions, and ...
research in attacks,intrusions, and defenses
ambient assisted living
ambient assisted living
risk assessment and risk-driven testing
risk assessment and risk-driven testing
secure it systems
secure it systems
large-scale scientific computing
large-scale scientific computing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
knowledge representation for health care
knowledge representation for health care
progress in cryptology - indocrypt 2015
progress in cryptology - indocrypt 2015
cryptology and network security
cryptology and network security
theory and practice of natural computing
theory and practice of natural computing
product-focused software process imp...
product-focused software process improvement
interactive storytelling
interactive storytelling
big data analytics
big data analytics
advances in artificial intelligence ...
advances in artificial intelligence and soft computing
advances in artificial intelligence ...
advances in artificial intelligence and its applications
algorithms and architectures for par...
algorithms and architectures for parallel processing
algorithms and architectures for par...
algorithms and architectures for parallel processing
algorithms and architectures from pa...
algorithms and architectures from parallel processing
algorithms and architectures for par...
algorithms and architectures for parallel processing
algorithms and architectures for par...
algorithms and architectures for parallel processing
internet of vehicles - safe and inte...
internet of vehicles - safe and intelligent mobility
financial cryptography and data security
financial cryptography and data security
transactions on edutainment xi
transactions on edutainment xi
static analysis
static analysis
algorithms - esa 2015
algorithms - esa 2015
algorithmic game theory
algorithmic game theory
logic, rationality, and interaction
logic, rationality, and interaction
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxii
clustering high-dimensional data
clustering high-dimensional data
service-oriented computing
service-oriented computing
transactions on petri nets and other...
transactions on petri nets and other models of concurrency x
distributed computing
distributed computing
advances in cryptology - asiacrypt 2015
advances in cryptology - asiacrypt 2015
advances in cryptology - asiacrypt 2015
advances in cryptology - asiacrypt 2015
algorithms and computation
algorithms and computation
inductive logic programming
inductive logic programming
multimodal retrieval in the medical ...
multimodal retrieval in the medical domain
modeling and using context
modeling and using context
text analysis pipelines
text analysis pipelines
ubiquitous computing and ambient int...
ubiquitous computing and ambient intelligence
openshmem and related technologies
openshmem and related technologies
ambient intelligence for health
ambient intelligence for health
programming languages and systems
programming languages and systems
neural information processing
neural information processing
combinatorial optimization and appli...
combinatorial optimization and applications
algorithms and models for the web graph
algorithms and models for the web graph
information systems security
information systems security
advances in services computing
advances in services computing
security standardisation research
security standardisation research
cryptography and coding
cryptography and coding
euro-par 2015
euro-par 2015
computer aided systems theory - euro...
computer aided systems theory - eurocast 2015
multiagent system technologies
multiagent system technologies
data analytics for renewable energy ...
data analytics for renewable energy integration
social informatics
social informatics
logic-based program synthesis and tr...
logic-based program synthesis and transformation
hybrid systems biology
hybrid systems biology
information security
information security
advances in visual computing
advances in visual computing
advances in visual computing
advances in visual computing
machine learning meets medical imaging
machine learning meets medical imaging
agents and artificial intelligence
agents and artificial intelligence
digital libraries
digital libraries
advances in computer games
advances in computer games
recent trends in algebraic developme...
recent trends in algebraic development techniques
web technologies and applications
web technologies and applications
algorithms for sensor systems
algorithms for sensor systems
membrane computing
membrane computing
logic for programming, artificial in...
logic for programming, artificial intelligence, and reasoning
web and internet economics
web and internet economics
transactions on computational collec...
transactions on computational collective intelligence xix
energy informatics
energy informatics
combinatorial image analysis
combinatorial image analysis
mining intelligence and knowledge ex...
mining intelligence and knowledge exploration
hybrid systems biology
hybrid systems biology
cloud computing and security
cloud computing and security
innovative security solutions for in...
innovative security solutions for information technology and communications
chinese lexical semantics
chinese lexical semantics
transactions on computational collec...
transactions on computational collective intelligence xx
pattern recognition applications and...
pattern recognition applications and methods
machine learning, optimization, and ...
machine learning, optimization, and big data
semantic keyword-based search on str...
semantic keyword-based search on structured data sources
trusted systems
trusted systems
foundations of biomedical knowledge ...
foundations of biomedical knowledge representation
applied cryptography and network sec...
applied cryptography and network security
patch-based techniques in medical im...
patch-based techniques in medical imaging
advanced methodologies for bayesian ...
advanced methodologies for bayesian networks
software engineering
software engineering
cloud computing and big data
cloud computing and big data
adaptive resource management and sch...
adaptive resource management and scheduling for cloud computing
theory and applications of formal ar...
theory and applications of formal argumentation
approximation and online algorithms
approximation and online algorithms
graph structures for knowledge repre...
graph structures for knowledge representation and reasoning
models of strategic reasoning
models of strategic reasoning
software engineering and formal methods
software engineering and formal methods
networked systems
networked systems
information retrieval technology
information retrieval technology
robocup 2015
robocup 2015
logic and its applications
logic and its applications
runtime verification
runtime verification
theory of quantum computation, commu...
theory of quantum computation, communication, and cryptography
distributed computing and networking
distributed computing and networking
unifying theories of programming
unifying theories of programming
logical foundations of computer science
logical foundations of computer science
advances in multimedia modeling
advances in multimedia modeling
advances in multimedia modeling
advances in multimedia modeling
conceptual structures for stem resea...
conceptual structures for stem research and education
software engineering for self-adapti...
software engineering for self-adaptive systems ii
evaluation of natural language and s...
evaluation of natural language and speech tools for italian
transactions on computational scienc...
transactions on computational science xvii
sofsem 2013: theory and practice of ...
sofsem 2013: theory and practice of computer science
formal aspects of component software
formal aspects of component software
job scheduling strategies for parall...
job scheduling strategies for parallel processing
verification, model checking, and ab...
verification, model checking, and abstract interpretation
formal methods for components and ob...
formal methods for components and objects
data privacy management and autonomo...
data privacy management and autonomous spontaneous security
facing the multicore-challenge iii
facing the multicore-challenge iii
uncertainty reasoning for the semant...
uncertainty reasoning for the semantic web ii
generative and transformational tech...
generative and transformational techniques in software engineering iv
selected areas in cryptography
selected areas in cryptography
semantics in data and knowledge bases
semantics in data and knowledge bases
languages and compilers for parallel...
languages and compilers for parallel computing
mathematical and engineering methods...
mathematical and engineering methods in computer science
software engineering
software engineering
walcom: algorithms and computation
walcom: algorithms and computation
distributed computing and internet t...
distributed computing and internet technology
citizen in sensor networks
citizen in sensor networks
software language engineering
software language engineering
algorithms for sensor systems
algorithms for sensor systems
construction and evolution of code g...
construction and evolution of code generators
radio frequency identification
radio frequency identification
integrated circuit and system design
integrated circuit and system design
security protocols xvii
security protocols xvii
assurances for self-adaptive systems
assurances for self-adaptive systems
agents and data mining interaction
agents and data mining interaction
reversible computation
reversible computation
pairing-based cryptography - pairing...
pairing-based cryptography - pairing 2012
information retrieval meets informat...
information retrieval meets information visualization
process support and knowledge repres...
process support and knowledge representation in health care
transactions on rough sets xvi
transactions on rough sets xvi
wireless sensor networks
wireless sensor networks
topics in cryptology - ct-rsa 2013
topics in cryptology - ct-rsa 2013
chinese lexical semantics
chinese lexical semantics
public-key cryptography - pkc 2013
public-key cryptography - pkc 2013
information hiding
information hiding
architecture of computing systems - ...
architecture of computing systems - arcs 2013
cognitive agents for virtual environ...
cognitive agents for virtual environments
intelligent information and database...
intelligent information and database systems
intelligent information and database...
intelligent information and database systems
engineering secure software and systems
engineering secure software and systems
theory of cryptography
theory of cryptography
informatics in schools
informatics in schools
intelligent science and intelligent ...
intelligent science and intelligent data engineering
automated reasoning and mathematics
automated reasoning and mathematics
medical content-based retrieval for ...
medical content-based retrieval for clinical decision support
selected topics in performance evalu...
selected topics in performance evaluation and benchmarking
tools and algorithms for the constru...
tools and algorithms for the construction and analysis of systems
membrane computing
membrane computing
system analysis and modeling
system analysis and modeling
graph drawing
graph drawing
emerging trends in knowledge discove...
emerging trends in knowledge discovery and data mining
computer performance engineering
computer performance engineering
applied parallel and scientific comp...
applied parallel and scientific computing
transactions on computational collec...
transactions on computational collective intelligence ix
graphics recognition
graphics recognition
principles of security and trust
principles of security and trust
euro-par 2012: parallel processing w...
euro-par 2012: parallel processing workshops
programming languages and systems
programming languages and systems
compiler construction
compiler construction
fundamental approaches to software e...
fundamental approaches to software engineering
foundations of software science and ...
foundations of software science and computation structures
evolutionary computation, machine le...
evolutionary computation, machine learning and data mining in bioinformatics
passive and active measurement
passive and active measurement
medical computer vision
medical computer vision
integer programming and combinatoria...
integer programming and combinatorial optimization
computational color imaging
computational color imaging
data traffic monitoring and analysis
data traffic monitoring and analysis
reconfigurable computing: architectu...
reconfigurable computing: architectures, tools and applications
information and communication technology
information and communication technology
information theory, combinatorics, a...
information theory, combinatorics, and search theory
aliasing in object-oriented programming
aliasing in object-oriented programming
evolutionary and biologically inspir...
evolutionary and biologically inspired music, sound, art and design
transactions on aspect-oriented soft...
transactions on aspect-oriented software development x
advances in information retrieval
advances in information retrieval
logic, language, and computation
logic, language, and computation
language of mathematics
language of mathematics
pervasive computing and the networke...
pervasive computing and the networked world
transactions on edutainment ix
transactions on edutainment ix
language and automata theory and app...
language and automata theory and applications
discrete geometry for computer imagery
discrete geometry for computer imagery
multimodal pattern recognition of so...
multimodal pattern recognition of social signals in human-computer-interaction
web and wireless geographical inform...
web and wireless geographical information systems
foundations and practice of security
foundations and practice of security
databases in networked information s...
databases in networked information systems
evolutionary multi-criterion optimiz...
evolutionary multi-criterion optimization
persuasive technology
persuasive technology
applications of evolutionary computation
applications of evolutionary computation
research in computational molecular ...
research in computational molecular biology
evolutionary computation in combinat...
evolutionary computation in combinatorial optimization
genetic programming
genetic programming
social computing, behavioral-cultura...
social computing, behavioral-cultural modeling and prediction
computational linguistics and intell...
computational linguistics and intelligent text processing
computational linguistics and intell...
computational linguistics and intelligent text processing
smart card research and advanced app...
smart card research and advanced applications
detection of intrusions and malware,...
detection of intrusions and malware, and vulnerability assessment
computer vision - accv 2012
computer vision - accv 2012
knowledge engineering, machine learn...
knowledge engineering, machine learning and lattice computing with applications
your virtual butler
your virtual butler
new frontiers in mining complex patterns
new frontiers in mining complex patterns
web technologies and applications
web technologies and applications
computer vision - accv 2012 workshops
computer vision - accv 2012 workshops
requirements engineering
requirements engineering
adaptive multimedia retrieval
adaptive multimedia retrieval
computer vision - accv 2012
computer vision - accv 2012
computer vision - accv 2012
computer vision - accv 2012
computer vision - accv 2012
computer vision - accv 2012
computer vision - accv 2012 workshops
computer vision - accv 2012 workshops
advances in computational intelligence
advances in computational intelligence
advances in computational intelligence
advances in computational intelligence
health information science
health information science
statistical atlases and computationa...
statistical atlases and computational models of the heart
adaptive and natural computing algor...
adaptive and natural computing algorithms
database systems for advanced applic...
database systems for advanced applications
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
database systems for advanced applic...
database systems for advanced applications
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems viii
recent trends in algebraic developme...
recent trends in algebraic development techniques
programming logics
programming logics
languages and compilers for parallel...
languages and compilers for parallel computing
information security and cryptology ...
information security and cryptology - icisc 2012
coordination, organizations, institu...
coordination, organizations, institutions, and norms in agent systems viii
service-oriented computing - icsoc 2...
service-oriented computing - icsoc 2012 workshops
declarative agent languages and tech...
declarative agent languages and technologies x
transactions on edutainment x
transactions on edutainment x
semantic technology
semantic technology
security and trust management
security and trust management
approximation and online algorithms
approximation and online algorithms
smart grid security
smart grid security
multiple classifier systems
multiple classifier systems
advances on practical applications o...
advances on practical applications of agents and multi-agent systems
clinical image-based procedures
clinical image-based procedures
future internet
future internet
transactions on petri nets and other...
transactions on petri nets and other models of concurrency vii
computation, logic, games, and quant...
computation, logic, games, and quantum foundations
integration of ai and or techniques ...
integration of ai and or techniques in constraint programming for combinatorial optimization problems
logic-based program synthesis and tr...
logic-based program synthesis and transformation
model-based methodologies for pervas...
model-based methodologies for pervasive and embedded software
advanced infocomm technology
advanced infocomm technology
theory and applications of models of...
theory and applications of models of computation
artificial intelligence in medicine
artificial intelligence in medicine
communication technologies for vehicles
communication technologies for vehicles
grid and pervasive computing
grid and pervasive computing
information security practice and ex...
information security practice and experience
bioinformatics research and applications
bioinformatics research and applications
augmented environments for computer-...
augmented environments for computer-assisted interventions
nasa formal methods
nasa formal methods
graph-based representations in patte...
graph-based representations in pattern recognition
web services and formal methods
web services and formal methods
algorithms and complexity
algorithms and complexity
scale space and variational methods ...
scale space and variational methods in computer vision
semantic web
semantic web
mathematical morphology and its appl...
mathematical morphology and its applications to signal and image processing
formal concept analysis
formal concept analysis
web information systems engineering ...
web information systems engineering - wise 2011 and 2012 workshops
computational intelligence methods f...
computational intelligence methods for bioinformatics and biostatistics
advances in cryptology - eurocrypt 2013
advances in cryptology - eurocrypt 2013
wired/wireless internet communication
wired/wireless internet communication
advances in artificial intelligence
advances in artificial intelligence
coordination models and languages
coordination models and languages
transactions on computational collec...
transactions on computational collective intelligence x
hybrid metaheuristics
hybrid metaheuristics
information security and cryptology
information security and cryptology
experimental algorithms
experimental algorithms
information security theory and practice
information security theory and practice
distributed applications and interop...
distributed applications and interoperable systems
progress in cryptology - africacrypt...
progress in cryptology - africacrypt 2013
recent trends in applied artificial ...
recent trends in applied artificial intelligence
formal techniques for distributed sy...
formal techniques for distributed systems
reliable software technologies - ada...
reliable software technologies - ada-europe 2013
business process models
business process models
integrated formal methods
integrated formal methods
pattern recognition and image analysis
pattern recognition and image analysis
network and system security
network and system security
transactions on pattern languages of...
transactions on pattern languages of programming iii
programming multi-agent systems
programming multi-agent systems
advances in swarm intelligence
advances in swarm intelligence
advances in swarm intelligence
advances in swarm intelligence
high performance computing for compu...
high performance computing for computational science - vecpar 2012
frontiers in algorithmics and algori...
frontiers in algorithmics and algorithmic aspects in information and management
computing and combinatorics
computing and combinatorics
dependable computing
dependable computing
transactions on computational scienc...
transactions on computational science xviii
multi-agent-based simulation xiii
multi-agent-based simulation xiii
image analysis
image analysis
combinatorial pattern matching
combinatorial pattern matching
typed lambda calculi and applications
typed lambda calculi and applications
case-based reasoning research and de...
case-based reasoning research and development
model checking software
model checking software
optical supercomputing
optical supercomputing
computer science - theory and applic...
computer science - theory and applications
web-age information management
web-age information management
information processing in computer-a...
information processing in computer-assisted interventions
automated deduction - cade-24
automated deduction - cade-24
artificial intelligence and soft com...
artificial intelligence and soft computing
post-quantum cryptography
post-quantum cryptography
natural and artificial computation i...
natural and artificial computation in engineering and medical applications
language processing and intelligent ...
language processing and intelligent information systems
natural and artificial models in com...
natural and artificial models in computation and biology
artificial intelligence and soft com...
artificial intelligence and soft computing
advances in computational intelligence
advances in computational intelligence
advances in computational intelligence
advances in computational intelligence
application and theory of petri nets...
application and theory of petri nets and concurrency
end-user development
end-user development
advanced information systems engineering
advanced information systems engineering
supercomputing
supercomputing
developments in language theory
developments in language theory
advances in brain inspired cognitive...
advances in brain inspired cognitive systems
inductive logic programming
inductive logic programming
natural language processing and info...
natural language processing and information systems
design science at the intersection o...
design science at the intersection of physical and virtual design
user modeling, adaptation, and perso...
user modeling, adaptation, and personalization
advances in nonlinear speech processing
advances in nonlinear speech processing
static analysis
static analysis
information processing in medical im...
information processing in medical imaging
formal methods for dynamical systems
formal methods for dynamical systems
theory and practice of model transfo...
theory and practice of model transformations
functional imaging and modeling of t...
functional imaging and modeling of the heart
trust and trustworthy computing
trust and trustworthy computing
sdl 2013
sdl 2013
tests and proofs
tests and proofs
safe and secure software reuse
safe and secure software reuse
applied cryptography and network sec...
applied cryptography and network security
pattern recognition
pattern recognition
emerging management mechanisms for t...
emerging management mechanisms for the future internet
modelling foundations and applications
modelling foundations and applications
software architecture
software architecture
ecoop 2013
ecoop 2013
nature of computation
nature of computation
information security and privacy
information security and privacy
human factors in computing and infor...
human factors in computing and informatics
theory and applications of satisfiab...
theory and applications of satisfiability testing
unconventional computation and natur...
unconventional computation and natural computation
privacy enhancing technologies
privacy enhancing technologies
foundations of health information en...
foundations of health information engineering and systems
image analysis and recognition
image analysis and recognition
artificial intelligence in education
artificial intelligence in education
human-computer interaction and knowl...
human-computer interaction and knowledge discovery in complex, unstructured, big data
ad-hoc, mobile, and wireless network
ad-hoc, mobile, and wireless network
robocup 2012
robocup 2012
product-focused software process imp...
product-focused software process improvement
descriptional complexity of formal s...
descriptional complexity of formal systems
mathematics and computation in music
mathematics and computation in music
virtual, augmented and mixed reality
virtual, augmented and mixed reality
analytical and stochastic modeling t...
analytical and stochastic modeling techniques and applications
virtual, augmented and mixed reality
virtual, augmented and mixed reality
data integration in the life sciences
data integration in the life sciences
foundations of augmented cognition
foundations of augmented cognition
big data
big data
inclusive society
inclusive society
integrated uncertainty in knowledge ...
integrated uncertainty in knowledge modelling and decision making
artificial general intelligence
artificial general intelligence
web-age information management
web-age information management
software composition
software composition
computational science and its applic...
computational science and its applications - iccsa 2013
computational science and its applic...
computational science and its applications - iccsa 2013
computational science and its applic...
computational science and its applications - iccsa 2013
computational science and its applic...
computational science and its applications - iccsa 2013
computational science and its applic...
computational science and its applications - iccsa 2013
business process management
business process management
benchmarking peer-to-peer systems
benchmarking peer-to-peer systems
advances in neural networks - isnn 2013
advances in neural networks - isnn 2013
advances in neural networks - isnn 2013
advances in neural networks - isnn 2013
symbolic and quantitative approaches...
symbolic and quantitative approaches to reasoning with uncertainty
cross-cultural design
cross-cultural design
similarity-based pattern recognition
similarity-based pattern recognition
cross-cultural design
cross-cultural design
pattern recognition in bioinformatics
pattern recognition in bioinformatics
digital human modeling and applicati...
digital human modeling and applications in health, safety, ergonomics, and risk management
digital human modeling and applicati...
digital human modeling and applications in health, safety, ergonomics, and risk management
e-voting and identify
e-voting and identify
universal access in human-computer i...
universal access in human-computer interaction
universal access in human-computer i...
universal access in human-computer interaction
universal access in human-computer i...
universal access in human-computer interaction
web engineering
web engineering
automata, languages, and programming
automata, languages, and programming
human interface and the management o...
human interface and the management of information
automata, languages, and programming
automata, languages, and programming
human interface and the management o...
human interface and the management of information
human interface and the management o...
human interface and the management of information
design, user experience, and usability
design, user experience, and usability
human-computer interaction
human-computer interaction
detection of intrusions and malware,...
detection of intrusions and malware, and vulnerability assessment
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
data and applications security and p...
data and applications security and privacy xxvii
human-computer interaction
human-computer interaction
human-computer interaction
human-computer interaction
implementation and application of au...
implementation and application of automata
intelligent computer mathematics
intelligent computer mathematics
human-computer interaction
human-computer interaction
human-computer interaction
human-computer interaction
human aspects of information securit...
human aspects of information security, privacy, and trust
distributed, ambient, and pervasive ...
distributed, ambient, and pervasive interactions
engineering psychology and cognitive...
engineering psychology and cognitive ergonomics
engineering psychology and cognitive...
engineering psychology and cognitive ergonomics
online communities and social computing
online communities and social computing
computer vision systems
computer vision systems
intelligent computing theories
intelligent computing theories
intelligent computing theories and t...
intelligent computing theories and technology
statistical language and speech proc...
statistical language and speech processing
hardware and software
hardware and software
theory, practice, and applications o...
theory, practice, and applications of rules on the web
interactive theorem proving
interactive theorem proving
web reasoning and rule systems
web reasoning and rule systems
intelligence and security informatics
intelligence and security informatics
theories of programming and formal m...
theories of programming and formal methods
wireless algorithms, systems, and ap...
wireless algorithms, systems, and applications
machine learning and data mining in ...
machine learning and data mining in pattern recognition
advances in data mining
advances in data mining
transactions on computational scienc...
transactions on computational science xix
reasoning web
reasoning web
knowledge science, engineering and m...
knowledge science, engineering and management
computer aided verification
computer aided verification
biomimetic and biohybrid systems
biomimetic and biohybrid systems
wireless access flexibility
wireless access flexibility
smart health
smart health
agreement technologies
agreement technologies
new frontiers in artificial intelligence
new frontiers in artificial intelligence
personal web
personal web
formal grammar
formal grammar
constructive side-channel analysis a...
constructive side-channel analysis and secure design
euro-par 2013 parallel processing
euro-par 2013 parallel processing
information technologies for perform...
information technologies for performing arts, media access, and entertainment
transactions on large-scale data- an...
transactions on large-scale data- and knowledge centered systems ix
digital forensics and watermaking
digital forensics and watermaking
algorithms and data structures
algorithms and data structures
fundamentals of computation theory
fundamentals of computation theory
concur 2013 - concurrency theory
concur 2013 - concurrency theory
quantitative evaluation of systems
quantitative evaluation of systems
formal modeling and analysis of time...
formal modeling and analysis of timed systems
advances in spatial and temporal dat...
advances in spatial and temporal databases
mobile web information systems
mobile web information systems
cryptographic hardware and embedded ...
cryptographic hardware and embedded systems - ches 2013
human-computer interaction - interac...
human-computer interaction - interact 2013
human-computer interaction - interac...
human-computer interaction - interact 2013
human-computer interaction - interac...
human-computer interaction - interact 2013
human-computer interaction - interac...
human-computer interaction - interact 2013
spatial information theory
spatial information theory
speech and computer
speech and computer
multimodal brain image analysis
multimodal brain image analysis
computer algebra in scientific computing
computer algebra in scientific computing
economics of grids, clouds, systems,...
economics of grids, clouds, systems, and services
automated technology for verificatio...
automated technology for verification and analysis
structured object-oriented formal la...
structured object-oriented formal language and method
theoretical aspects of computing - i...
theoretical aspects of computing - ictac 2013
unifying theories of programming and...
unifying theories of programming and formal engineering methods
search based software engineering
search based software engineering
hybrid learning and continuing education
hybrid learning and continuing education
agent-oriented software engineering xiii
agent-oriented software engineering xiii
financial cryptography and data security
financial cryptography and data security
logic, language, information, and co...
logic, language, information, and computation
public key infrastructures, services...
public key infrastructures, services and applications
geometric science of information
geometric science of information
advances in cryptology - crypto 2013
advances in cryptology - crypto 2013
data management in cloud, grid and p...
data management in cloud, grid and p2p systems
advances in cryptology - crypto 2013
advances in cryptology - crypto 2013
multilingual information access in s...
multilingual information access in south asian languages
industrial applications of holonic a...
industrial applications of holonic and multi-agent systems
information technology in bio- and m...
information technology in bio- and medical informatics
data warehousing and knowledge discovery
data warehousing and knowledge discovery
networked systems
networked systems
technology-enabled innovation for de...
technology-enabled innovation for democracy, government and governance
database and expert systems applications
database and expert systems applications
computer security - esorics 2013
computer security - esorics 2013
algebra and coalgebra in computer sc...
algebra and coalgebra in computer science
fundamentals of software engineering
fundamentals of software engineering
computer analysis of images and patterns
computer analysis of images and patterns
computer analysis of images and patterns
computer analysis of images and patterns
database systems for advanced applic...
database systems for advanced applications
space-efficient data structures, str...
space-efficient data structures, streams, and algorithms
database and expert systems applications
database and expert systems applications
advances in depth image analysis and...
advances in depth image analysis and applications
mathematical foundations of computer...
mathematical foundations of computer science 2013
internet of things, smart spaces, an...
internet of things, smart spaces, and next generation networking
trends and applications in knowledge...
trends and applications in knowledge discovery and data mining
approximation, randomization, and co...
approximation, randomization, and combinatorial optimization
trust, privacy, and security in digi...
trust, privacy, and security in digital business
electronic participation
electronic participation
beauty of functional code
beauty of functional code
electronic government
electronic government
lightweight cryptography for securit...
lightweight cryptography for security and privacy
energy minimization methods in compu...
energy minimization methods in computer vision and pattern recognition
intelligent virtual agents
intelligent virtual agents
trends in functional programming
trends in functional programming
algorithms - esa 2013
algorithms - esa 2013
algorithms in bioinformatics
algorithms in bioinformatics
transactions on petri nets and other...
transactions on petri nets and other models of concurrency viii
research and advanced technology for...
research and advanced technology for digital libraries
availability, reliability, and secur...
availability, reliability, and security in information systems and hci
advances in communication networking
advances in communication networking
combinatorics on words
combinatorics on words
text, speech, and dialogue
text, speech, and dialogue
security engineering and intelligenc...
security engineering and intelligence informatics
formal methods for components and ob...
formal methods for components and objects
service-oriented and cloud computing
service-oriented and cloud computing
algebraic informatics
algebraic informatics
advances in databases and informatio...
advances in databases and information systems
openmp in the era of low power devic...
openmp in the era of low power devices and accelerators
computer performance engineering
computer performance engineering
flexible query answering systems
flexible query answering systems
multiagent system technologies
multiagent system technologies
serious games development and applic...
serious games development and applications
computer safety, reliability, and se...
computer safety, reliability, and security
scaling up learning for sustained impact
scaling up learning for sustained impact
cooperative design, visualization, a...
cooperative design, visualization, and engineering
hybrid artificial intelligent systems
hybrid artificial intelligent systems
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
ki 2013: advances in artificial inte...
ki 2013: advances in artificial intelligence
machine learning and knowledge disco...
machine learning and knowledge discovery in satabases
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
similarity search and applications
similarity search and applications
haptic and audio interaction design
haptic and audio interaction design
formal methods: foundations and appl...
formal methods: foundations and applications
dna computing and molecular programming
dna computing and molecular programming
machine learning in medical imaging
machine learning in medical imaging
string processing and information re...
string processing and information retrieval
human behavior understanding
human behavior understanding
multicore software engineering, perf...
multicore software engineering, performance, and tools
parallel computing technologies
parallel computing technologies
scalable uncertainty management
scalable uncertainty management
computational collective intelligence
computational collective intelligence
energy efficiency in large scale dis...
energy efficiency in large scale distributed systems
automated reasoning with analytic ta...
automated reasoning with analytic tableaux and related methods
software engineering and formal methods
software engineering and formal methods
logic programming and nonmonotonic r...
logic programming and nonmonotonic reasoning
pattern recognition
pattern recognition
computational logic in multi-agent s...
computational logic in multi-agent systems
principles and practice of constrain...
principles and practice of constraint programming
advances in artificial intelligence
advances in artificial intelligence
progress in artificial intelligence
progress in artificial intelligence
automated deduction in geometry
automated deduction in geometry
computational methods in systems biology
computational methods in systems biology
language processing and knowledge in...
language processing and knowledge in the web
artificial neural networks and machi...
artificial neural networks and machine learning - icann 2013
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2013
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2013
communications and multimedia security
communications and multimedia security
runtime verification
runtime verification
information access evaluation
information access evaluation
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2013
network and parallel computing
network and parallel computing
augmented reality environments for m...
augmented reality environments for medical imaging and computer-assisted interventions
cellular automata and discrete compl...
cellular automata and discrete complex systems
frontiers of combining systems
frontiers of combining systems
software engineering for resilient s...
software engineering for resilient systems
discovery science
discovery science
programming languages
programming languages
computer information systems and ind...
computer information systems and industrial management
algorithmic learning theory
algorithmic learning theory
formal methods for industrial critic...
formal methods for industrial critical systems
computational logistics
computational logistics
on the move to meaningful internet s...
on the move to meaningful internet systems: otm 2013 conferences
on the move to meaningful internet s...
on the move to meaningful internet systems: otm 2013 workshops
reachability problems
reachability problems
multidisciplinary information retrieval
multidisciplinary information retrieval
abdominal imaging
abdominal imaging
security and trust management
security and trust management
entertainment computing - icec 2013
entertainment computing - icec 2013
trustworthy global computing
trustworthy global computing
advances in web-based learning - icw...
advances in web-based learning - icwl 2013
image analysis and processing - icia...
image analysis and processing - iciap 2013
image analysis and processing - icia...
image analysis and processing - iciap 2013
new trends in image analysis and pro...
new trends in image analysis and processing - iciap 2013
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems x
security, privacy, and applied crypt...
security, privacy, and applied cryptography engineering
semantic web
semantic web
from sounds to music and emotions
from sounds to music and emotions
measurement methodology and tools
measurement methodology and tools
model and data engineering
model and data engineering
critical information infrastructure ...
critical information infrastructure security
model-driven engineering languages a...
model-driven engineering languages and systems
advances in bioinformatics and compu...
advances in bioinformatics and computational biology
software language engineering
software language engineering
social robotics
social robotics
information and communications security
information and communications security
active media technology
active media technology
brain and health informatics
brain and health informatics
interactive storytelling
interactive storytelling
decision and game theory for security
decision and game theory for security
advanced concepts for intelligent vi...
advanced concepts for intelligent vision systems
cryptology and network security
cryptology and network security
advances in visual informatics
advances in visual informatics
hardware and software
hardware and software
stabilization, safety, and security ...
stabilization, safety, and security of distributed systems
ambient assisted living and active aging
ambient assisted living and active aging
partially supervised learning
partially supervised learning
logic, rationality, and interaction
logic, rationality, and interaction
modeling and using context
modeling and using context
web information systems engineering ...
web information systems engineering - wise 2013
formal methods and software engineering
formal methods and software engineering
rough sets, fuzzy sets, data mining,...
rough sets, fuzzy sets, data mining, and granular computing
provable security
provable security
web information systems engineering ...
web information systems engineering - wise 2013
intelligent data engineering and aut...
intelligent data engineering and automated learning - ideal 2013
research in attacks, intrusions and ...
research in attacks, intrusions and defenses
rough sets and knowledge technology
rough sets and knowledge technology
financial cryptography and data security
financial cryptography and data security
radio frequency identification
radio frequency identification
semantic web - iswc 2013
semantic web - iswc 2013
semantic web - iswc 2013
semantic web - iswc 2013
collaboration and technology
collaboration and technology
algorithmic game theory
algorithmic game theory
advances in intelligent data analysi...
advances in intelligent data analysis xii
internet and distributed computing s...
internet and distributed computing systems
critical information infrastructures...
critical information infrastructures security
secure it systems
secure it systems
chinese computational linguistics an...
chinese computational linguistics and natural language processing based on naturally annotated big data
numerical analysis and its applications
numerical analysis and its applications
distributed computing
distributed computing
evolution of telecommunication services
evolution of telecommunication services
algorithmic decision theory
algorithmic decision theory
constraint solving and language proc...
constraint solving and language processing
in search of elegance in the theory ...
in search of elegance in the theory and practice of computation
testing software and systems
testing software and systems
transactions on computational collec...
transactions on computational collective intelligence xi
transactions on computational science xx
transactions on computational science xx
advances in visual computing
advances in visual computing
advances in visual computing
advances in visual computing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
algorithmic probability and friends
algorithmic probability and friends
biometric recognition
biometric recognition
human computer interaction
human computer interaction
advances in computer entertainment
advances in computer entertainment
ubiquitous computing and ambient int...
ubiquitous computing and ambient intelligence
fuzzy logic and applications
fuzzy logic and applications
social informatics
social informatics
trusted systems
trusted systems
structural information and communica...
structural information and communication complexity
cyberspace safety and security
cyberspace safety and security
ambient intelligence
ambient intelligence
ai 2013
ai 2013
combinatorial optimization and appli...
combinatorial optimization and applications
multiple access communcations
multiple access communcations
parameterized and exact computation
parameterized and exact computation
process support and knowledge repres...
process support and knowledge representation in health care
advances in information and computer...
advances in information and computer security
applications of declarative programm...
applications of declarative programming and knowledge management
multimodal communication in politica...
multimodal communication in political speech
modeling decisions for artificial in...
modeling decisions for artificial intelligence
implementation and application of fu...
implementation and application of functional languages
security protocols xxi
security protocols xxi
progress in pattern recognition, ima...
progress in pattern recognition, image analysis, computer vision, and applications
progress in pattern recognition, ima...
progress in pattern recognition, image analysis, computer vision, and applications
conceptual modeling
conceptual modeling
number theory and cryptography
number theory and cryptography
advances in cryptology - asiacrypt 2013
advances in cryptology - asiacrypt 2013
advances in cryptology - asiacrypt 2013
advances in cryptology - asiacrypt 2013
intelligence science and big data en...
intelligence science and big data engineering
prima 2013
prima 2013
multi-disciplinary trends in artific...
multi-disciplinary trends in artificial intelligence
time-of-flight and depth imaging
time-of-flight and depth imaging
learning and intelligent optimization
learning and intelligent optimization
service-oriented computing
service-oriented computing
theory and practice of natural computing
theory and practice of natural computing
graph-theoretic concepts in computer...
graph-theoretic concepts in computer science
advances in soft computing and its a...
advances in soft computing and its applications
advances in soft computing and its a...
advances in soft computing and its applications
ada 2012 rationale
ada 2012 rationale
resource discovery
resource discovery
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xi
combinatorial algorithms
combinatorial algorithms
computational geometry and graphs
computational geometry and graphs
practical aspects of declarative lan...
practical aspects of declarative languages
advanced parallel processing technol...
advanced parallel processing technologies
transactions on computational scienc...
transactions on computational science xxi
progress in cryptology - indocrypt 2013
progress in cryptology - indocrypt 2013
ai*ia 2013
ai*ia 2013
algorithms and models for the web graph
algorithms and models for the web graph
programming languages and systems
programming languages and systems
certified programs and proofs
certified programs and proofs
digital libraries
digital libraries
big data analytics
big data analytics
advances in multimedia information p...
advances in multimedia information processing - pcm 2013
swarm, evolutionary, and memetic com...
swarm, evolutionary, and memetic computing
swarm, evolutionary, and memetic com...
swarm, evolutionary, and memetic computing
graph drawing
graph drawing
mining intelligence and knowledge ex...
mining intelligence and knowledge exploration
principles of distributed systems
principles of distributed systems
algorithms and architectures for par...
algorithms and architectures for parallel processing
algorithms and architectures for par...
algorithms and architectures for parallel processing
critical information infrastructures...
critical information infrastructures security
behavior and social computing
behavior and social computing
current trends in web engineering
current trends in web engineering
algorithms and computation
algorithms and computation
web and internet economics
web and internet economics
pattern recognition and machine inte...
pattern recognition and machine intelligence
middleware 2013
middleware 2013
information retrieval technology
information retrieval technology
chinese lexical semantics
chinese lexical semantics
information systems security
information systems security
logic for programming, artificial in...
logic for programming, artificial intelligence, and reasoning
cryptography and coding
cryptography and coding
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xii
engineering multi-agent systems
engineering multi-agent systems
molecular biology
molecular biology
user-level workflow design
user-level workflow design
ubiquitous social media analysis
ubiquitous social media analysis
computer aided systems theory - euro...
computer aided systems theory - eurocast 2013
computer aided systems theory - euro...
computer aided systems theory - eurocast 2013
transactions on computational collec...
transactions on computational collective intelligence xii
advanced data mining and applications
advanced data mining and applications
advanced data mining and applications
advanced data mining and applications
ada 2012 reference manual
ada 2012 reference manual
digital-forensics and watermarking :
digital-forensics and watermarking :
multimedia modeling
multimedia modeling
logical foundations of computer science
logical foundations of computer science
distributed computing and internet t...
distributed computing and internet technology
theory of cryptography
theory of cryptography
theory of cryptography
theory of cryptography
verification, model checking, and ab...
verification, model checking, and abstract interpretation
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxiii
multimedia modeling
multimedia modeling
practical aspects of declarative lan...
practical aspects of declarative languages
artificial life and computational in...
artificial life and computational intelligence
advances in network science
advances in network science
quantum interaction
quantum interaction
topics in theoretical computer science
topics in theoretical computer science
statistical atlases and computationa...
statistical atlases and computational models of the heart
trustworthy global computing
trustworthy global computing
formal aspects of component software
formal aspects of component software
smart health
smart health
sofsem 2016
sofsem 2016
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxiv
transactions on computational scienc...
transactions on computational science xxvi
post-quantum cryptography
post-quantum cryptography
image and video technology
image and video technology
topics in cryptology - ct-rsa 2016
topics in cryptology - ct-rsa 2016
engineering trustworthy software systems
engineering trustworthy software systems
languages and compilers for parallel...
languages and compilers for parallel computing
algorithmic aspects of cloud computing
algorithmic aspects of cloud computing
computer-assisted and robotic endoscopy
computer-assisted and robotic endoscopy
graphical models for security
graphical models for security
language and automata theory and app...
language and automata theory and applications
public-key cryptography - pkc 2016
public-key cryptography - pkc 2016
public-key cryptography - pkc 2016
public-key cryptography - pkc 2016
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxv
big data benchmarks, performance opt...
big data benchmarks, performance optimization, and emerging hardware
big data analytics in the social and...
big data analytics in the social and ubiquitous context
lightweight cryptography for securit...
lightweight cryptography for security and privacy
cryptography and information securit...
cryptography and information security in the balkans
algorithms and discrete applied math...
algorithms and discrete applied mathematics
formal methods: foundations and appl...
formal methods: foundations and applications
functional and logic programming
functional and logic programming
verified software
verified software
information and communications security
information and communications security
mathematical and engineering methods...
mathematical and engineering methods in computer science
data privacy management, and securit...
data privacy management, and security assurance
technology and practice of passwords
technology and practice of passwords
foundations of information and knowl...
foundations of information and knowledge systems
walcom
walcom
requirements engineering
requirements engineering
image and video technology - psivt 2...
image and video technology - psivt 2015 workshops
foundations and practice of security
foundations and practice of security
applied reconfigurable computing
applied reconfigurable computing
open data for education
open data for education
passive and active measurement
passive and active measurement
genetic programming
genetic programming
advances in information retrieval
advances in information retrieval
architecture of computing systems - ...
architecture of computing systems - arcs 2016
evolutionary computation in combinat...
evolutionary computation in combinatorial optimization
theory and practice of formal methods
theory and practice of formal methods
engineering secure software and systems
engineering secure software and systems
information security and cryptology ...
information security and cryptology - icisc 2015
brainlesion
brainlesion
list of successes that can change th...
list of successes that can change the world
evolutionary and biologically inspir...
evolutionary and biologically inspired music, sound, art and design
applications of evolutionary computation
applications of evolutionary computation
applications of evolutionary computation
applications of evolutionary computation
structured object-oriented formal la...
structured object-oriented formal language and method
smart card research and advanced app...
smart card research and advanced applications
selected areas in cryptography - sac...
selected areas in cryptography - sac 2015
performance evaluation and benchmarking
performance evaluation and benchmarking
multi-agent based simulation xvi
multi-agent based simulation xvi
privacy technologies and policy
privacy technologies and policy
worldwide language service infrastru...
worldwide language service infrastructure
artificial evolution
artificial evolution
persuasive technology
persuasive technology
trusted systems
trusted systems
measurement, modelling and evaluatio...
measurement, modelling and evaluation of dependable computer and communication systems
critical information infrastructures...
critical information infrastructures security
semantic technology
semantic technology
bioinformatics and biomedical engine...
bioinformatics and biomedical engineering
clinical image-based procedures
clinical image-based procedures
intelligence and security informatics
intelligence and security informatics
information security applications
information security applications
digital-forensics and watermarking
digital-forensics and watermarking
database systems for advanced applic...
database systems for advanced applications
database systems for advanced applic...
database systems for advanced applications
new codebreakers
new codebreakers
intelligent information and database...
intelligent information and database systems
intelligent information and database...
intelligent information and database systems
programming languages and systems
programming languages and systems
transactions on computational collec...
transactions on computational collective intelligence xxi
latin 2016
latin 2016
transactions on computational collec...
transactions on computational collective intelligence xxii
foundations of software science and ...
foundations of software science and computation structures
principles of security and trust
principles of security and trust
fundamental approaches to software e...
fundamental approaches to software engineering
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxvi
progress in cryptology - africacrypt...
progress in cryptology - africacrypt 2016
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
scientific computing, computer arith...
scientific computing, computer arithmetic, and validated numerics
risks and security of internet and s...
risks and security of internet and systems
human centered computing
human centered computing
research in computational molecular ...
research in computational molecular biology
hybrid artificial intelligent systems
hybrid artificial intelligent systems
database systems for advanced applic...
database systems for advanced applications
parallel processing and applied math...
parallel processing and applied mathematics
parallel processing and applied math...
parallel processing and applied mathematics
discrete geometry for computer imagery
discrete geometry for computer imagery
model checking software
model checking software
semantic web collaborative spaces
semantic web collaborative spaces
mathematical aspects of computer and...
mathematical aspects of computer and information sciences
ontology engineering
ontology engineering
conformal and probabilistic predicti...
conformal and probabilistic prediction with applications
future and emergent trends in langua...
future and emergent trends in language technology
multi-agent systems and agreement te...
multi-agent systems and agreement technologies
web services, formal methods, and be...
web services, formal methods, and behavioral types
open problems in network security
open problems in network security
tools and algorithms for the constru...
tools and algorithms for the construction and analysis of systems
advances in cryptology - eurocrypt 2016
advances in cryptology - eurocrypt 2016
advances in cryptology - eurocrypt 2016
advances in cryptology - eurocrypt 2016
transactions on computational scienc...
transactions on computational science xxvii
service-oriented computing - icsoc 2...
service-oriented computing - icsoc 2015 workshops
critical information infrastructures...
critical information infrastructures security
integer programming and combinatoria...
integer programming and combinatorial optimization
abstract state machines, alloy, b, t...
abstract state machines, alloy, b, tla, vdm, and z
image and signal processing
image and signal processing
integrated formal methods
integrated formal methods
integration of ai and or techniques ...
integration of ai and or techniques in constraint programming
advances in artificial intelligence
advances in artificial intelligence
semantic web
semantic web
software reuse
software reuse
bioinformatics research and applications
bioinformatics research and applications
web engineering
web engineering
experimental algorithms
experimental algorithms
information security and cryptology
information security and cryptology
communication technologies for vehicles
communication technologies for vehicles
green, pervasive, and cloud computing
green, pervasive, and cloud computing
reliable software technologies - ada...
reliable software technologies - ada-europe 2016
trends in functional programming
trends in functional programming
new frontiers in mining complex patterns
new frontiers in mining complex patterns
advances in practical applications o...
advances in practical applications of scalable multi-agent systems
artificial intelligence and soft com...
artificial intelligence and soft computing
artificial intelligence and soft com...
artificial intelligence and soft computing
coordination models and languages
coordination models and languages
formal techniques for distributed ob...
formal techniques for distributed objects components, and systems
distributed applications and interop...
distributed applications and interoperable systems
inclusive smart cities and digital h...
inclusive smart cities and digital health
hybrid metaheuristics
hybrid metaheuristics
advanced information systems enginee...
advanced information systems engineering workshops
web-age information management
web-age information management
web-age information management
web-age information management
transactions on edutainment xii
transactions on edutainment xii
reliability, safety, and security of...
reliability, safety, and security of railway systems
formal methods for the quantitative ...
formal methods for the quantitative evaluation of collective adaptive systems
algorithms for computational biology
algorithms for computational biology
application and theory of petri nets...
application and theory of petri nets and concurrency
cellular automata and discrete compl...
cellular automata and discrete complex systems
human aspects of information securit...
human aspects of information security, privacy, and trust
hci in business, government, and org...
hci in business, government, and organizations
hci in business, government, and org...
hci in business, government, and organizations
computational topology in image context
computational topology in image context
learning and collaboration technologies
learning and collaboration technologies
human-computer interaction
human-computer interaction
human-computer interaction
human-computer interaction
human-computer interaction
human-computer interaction
applied cryptography and network sec...
applied cryptography and network security
intelligent tutoring systems
intelligent tutoring systems
smart cities
smart cities
management and security in the age o...
management and security in the age of hyperconnectivity
distributed, ambient, and pervasive ...
distributed, ambient, and pervasive interactions
virtual, augmented and mixed reality
virtual, augmented and mixed reality
social computing and social media
social computing and social media
human aspects of it for the aged pop...
human aspects of it for the aged population
human aspects of it for the aged pop...
human aspects of it for the aged population
foundations of augmented cognition
foundations of augmented cognition
foundations of augmented cognition
foundations of augmented cognition
engineering psychology and cognitive...
engineering psychology and cognitive ergonomics
cross-cultural design
cross-cultural design
pursuit of the universal
pursuit of the universal
games and learning alliance
games and learning alliance
automated reasoning
automated reasoning
universal access in human-computer i...
universal access in human-computer interaction
universal access in human-computer i...
universal access in human-computer interaction
digital human modeling
digital human modeling
universal access in human-computer i...
universal access in human-computer interaction
information security and privacy
information security and privacy
e-learning and games
e-learning and games
human interface and the management o...
human interface and the management of information
design, user experience, and usability
design, user experience, and usability
high performance computing in scienc...
high performance computing in science and engineering
coalgebraic methods in computer science
coalgebraic methods in computer science
towards autonomous robotic systems
towards autonomous robotic systems
security of industrial control syste...
security of industrial control systems and cyber physical systems
human interface and the management o...
human interface and the management of information
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
ad-hoc, mobile, and wireless network
ad-hoc, mobile, and wireless network
graph transformation
graph transformation
inductive logic programming
inductive logic programming
reversible computation
reversible computation
provenance and annotation of data an...
provenance and annotation of data and processes
augmented reality, virtual reality, ...
augmented reality, virtual reality, and computer graphics
nasa formal methods
nasa formal methods
augmented reality, virtual reality, ...
augmented reality, virtual reality, and computer graphics
theory and applications of satisfiab...
theory and applications of satisfiability testing - sat 2016
graph-based representation and reasoning
graph-based representation and reasoning
tests and proofs
tests and proofs
blended learning
blended learning
unconventional computation and natur...
unconventional computation and natural computation
high performance computing
high performance computing
image analysis and recognition
image analysis and recognition
breast imaging
breast imaging
computational processing of the port...
computational processing of the portuguese language
advances in data mining
advances in data mining
biomedical data management and graph...
biomedical data management and graph online querying
perspectives of system informatics
perspectives of system informatics
software engineering and formal methods
software engineering and formal methods
artificial general intelligence
artificial general intelligence
natural language processing and info...
natural language processing and information systems
machine learning and data mining in ...
machine learning and data mining in pattern recognition
rule technologies
rule technologies
modelling foundations and applications
modelling foundations and applications
theory and practice of model transfo...
theory and practice of model transformations
computational science and its applic...
computational science and its applications - iccsa 2016
computational science and its applic...
computational science and its applications - iccsa 2016
transactions on computational collec...
transactions on computational collective intelligence xxiii
high performance computing and appli...
high performance computing and applications
information security and privacy
information security and privacy
advances in neural networks - isnn 2016
advances in neural networks - isnn 2016
implementation and application of au...
implementation and application of automata
algorithmic aspects in information a...
algorithmic aspects in information and management
computers helping people with specia...
computers helping people with special needs
computers helping people with specia...
computers helping people with special needs
data and applications security and p...
data and applications security and privacy xxx
controlled natural language
controlled natural language
computer aided verification
computer aided verification
computer aided verification
computer aided verification
solving large scale learning tasks
solving large scale learning tasks
articulated motion and deformable ob...
articulated motion and deformable objects
trends in applied knowledge-based sy...
trends in applied knowledge-based systems and data science
medical computer vision: algorithms ...
medical computer vision: algorithms for big data
computational science and its applic...
computational science and its applications - iccsa 2016
computational science and its applic...
computational science and its applications - iccsa 2016
computational science and its applic...
computational science and its applications - iccsa 2016
intelligent computing theories and t...
intelligent computing theories and technology
intelligent computing theories and t...
intelligent computing theories and technology
intelligent computing methodologies
intelligent computing methodologies
haptics
haptics
haptics
haptics
diagrammatic representation and infe...
diagrammatic representation and inference
computational social networks
computational social networks
biomimetic and biohybrid systems
biomimetic and biohybrid systems
mathematical software - icms 2016
mathematical software - icms 2016
intelligent computer mathematics
intelligent computer mathematics
big data computing and communications
big data computing and communications
computing and combinatorics
computing and combinatorics
coordination, organizations, institu...
coordination, organizations, institutions, and norms in agent systems xi
cultural robotics
cultural robotics
trends and applications in knowledge...
trends and applications in knowledge discovery and data mining
economics of grids, clouds, systems,...
economics of grids, clouds, systems, and services
constructive side-channel analysis a...
constructive side-channel analysis and secure design
human language technology challenges...
human language technology challenges for computer science and linguistics
computational intelligence methods f...
computational intelligence methods for bioinformatics and biostatistics
fast software encryption
fast software encryption
advances in cryptology - crypto 2016
advances in cryptology - crypto 2016
advances in cryptology - crypto 2016
advances in cryptology - crypto 2016
advances in cryptology - crypto 2016
advances in cryptology - crypto 2016
transactions on computational scienc...
transactions on computational science xxviii
developments in language theory
developments in language theory
current developments in web based le...
current developments in web based learning
knowledge management and acquisition...
knowledge management and acquisition for intelligent systems
wireless algorithms, systems, and ap...
wireless algorithms, systems, and applications
pricai 2016
pricai 2016
foundations of security analysis and...
foundations of security analysis and design viii
interactive theorem proving
interactive theorem proving
quantitative evaluation of systems
quantitative evaluation of systems
from animals to animats 14
from animals to animats 14
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
euro-par 2016
euro-par 2016
algorithms in bioinformatics
algorithms in bioinformatics
medical imaging and augmented reality
medical imaging and augmented reality
analytical and stochastic modeling t...
analytical and stochastic modeling techniques and applications
big data analytics and knowledge dis...
big data analytics and knowledge discovery
information technology in bio- and m...
information technology in bio- and medical informatics
interactive collaborative robotics
interactive collaborative robotics
speech and computer
speech and computer
dna computing and molecular programming
dna computing and molecular programming
research and advanced technology for...
research and advanced technology for digital libraries
advances in databases and informatio...
advances in databases and information systems
electronic government and the inform...
electronic government and the information systems perspective
mobile web and intelligent informati...
mobile web and intelligent information systems
trust, privacy, and security in digi...
trust, privacy, and security in digital business
cellular automata
cellular automata
database and expert systems applications
database and expert systems applications
database and expert systems applications
database and expert systems applications
advanced analysis and learning on te...
advanced analysis and learning on temporal data
electronic government
electronic government
swarm intelligence
swarm intelligence
service-oriented and cloud computing
service-oriented and cloud computing
combinatorial algorithms
combinatorial algorithms
experimental ir meets multilingualit...
experimental ir meets multilinguality, multimodality, and interaction
security and cryptography for networks
security and cryptography for networks
artificial intelligence
artificial intelligence
artificial neural networks and machi...
artificial neural networks and machine learning - icann 2016
artificial neural networks and machi...
artificial neural networks and machine learning - icann 2016
rewriting logic and its applications
rewriting logic and its applications
prima 2016
prima 2016
formal modeling and analysis of time...
formal modeling and analysis of timed systems
computational logistics
computational logistics
human-centered and error-resilient s...
human-centered and error-resilient systems development
principles and practice of constrain...
principles and practice of constraint programming
electronic participation
electronic participation
social media
social media
web reasoning and rule systems
web reasoning and rule systems
privacy in statistical databases
privacy in statistical databases
computer safety, reliability, and se...
computer safety, reliability, and security
availability, reliability, and secur...
availability, reliability, and security in information systems
trust and trustworthy computing
trust and trustworthy computing
parallel problem solving from nature...
parallel problem solving from nature - ppsn xiv
scalable uncertainty management
scalable uncertainty management
information security
information security
pattern recognition
pattern recognition
software engineering for resilient s...
software engineering for resilient systems
internet science
internet science
logic, language, information, and co...
logic, language, information, and computation
descriptive set theoretic methods in...
descriptive set theoretic methods in automata theory
formal grammar
formal grammar
cryptographic hardware and embedded ...
cryptographic hardware and embedded systems - ches 2016
graph-theoretic concepts in computer...
graph-theoretic concepts in computer science
algorithmic game theory
algorithmic game theory
financial cryptography and data security
financial cryptography and data security
static analysis
static analysis
advances in information and computer...
advances in information and computer security
advances in artificial intelligence
advances in artificial intelligence
privacy technologies and policy
privacy technologies and policy
collaboration and technology
collaboration and technology
discrete optimization and operations...
discrete optimization and operations research
adaptive and adaptable learning
adaptive and adaptable learning
machine learning and interpretation ...
machine learning and interpretation in neuroimaging
computational methods in systems biology
computational methods in systems biology
computational collective intelligence
computational collective intelligence
computational collective intelligence
computational collective intelligence
programming languages
programming languages
business process management
business process management
computer information systems and ind...
computer information systems and industrial management
computer safety, reliability, and se...
computer safety, reliability, and security
text, speech, and dialogue
text, speech, and dialogue
model and data engineering
model and data engineering
openmp
openmp
belief functions
belief functions
combinatorial optimization
combinatorial optimization
computer algebra in scientific computing
computer algebra in scientific computing
modeling decisions for artificial in...
modeling decisions for artificial intelligence
research in attacks, intrusions, and...
research in attacks, intrusions, and defenses
geographic information science
geographic information science
computer security - esorics 2016
computer security - esorics 2016
computer security - esorics 2016
computer security - esorics 2016
web technologies and applications
web technologies and applications
web technologies and applications
web technologies and applications
serious games
serious games
multiagent system technologies
multiagent system technologies
usability- and accessibility-focused...
usability- and accessibility-focused requirements engineering
statistical language and speech proc...
statistical language and speech processing
information security theory and practice
information security theory and practice
internet and distributed computing s...
internet and distributed computing systems
critical systems
critical systems
reachability problems
reachability problems
string processing and information re...
string processing and information retrieval
ki 2016
ki 2016
entertainment computing - icec 2016
entertainment computing - icec 2016
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
networked systems
networked systems
artificial neural networks in patter...
artificial neural networks in pattern recognition
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
intelligent data engineering and aut...
intelligent data engineering and automated learning - ideal 2016
graphical models for security
graphical models for security
music, mind, and embodiment
music, mind, and embodiment
service-oriented computing
service-oriented computing
network and system security
network and system security
internet of things, smart spaces, an...
internet of things, smart spaces, and next generation networks and systems
advances in intelligent data analysis xv
advances in intelligent data analysis xv
computer vision and graphics
computer vision and graphics
computer performance engineering
computer performance engineering
computer vision - eccv 2016
computer vision - eccv 2016
computer vision - eccv 2016
computer vision - eccv 2016
computer vision - eccv 2016
computer vision - eccv 2016
computer vision - eccv 2016
computer vision - eccv 2016
computer vision - eccv 2016
computer vision - eccv 2016
scala
scala
computer vision - eccv 2016
computer vision - eccv 2016
computer vision - eccv 2016
computer vision - eccv 2016
computer vision - eccv 2016
computer vision - eccv 2016
transactions on foundations for mast...
transactions on foundations for mastering change i
foundational and practical aspects o...
foundational and practical aspects of resource analysis
security and trust management
security and trust management
computer vision - eccv 2016 workshops
computer vision - eccv 2016 workshops
system analysis and modeling
system analysis and modeling
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
informatics in schools
informatics in schools
similarity search and applications
similarity search and applications
autonomous agents and multiagent systems
autonomous agents and multiagent systems
autonomous agents and multiagent systems
autonomous agents and multiagent systems
databases theory and applications
databases theory and applications
transactions on modularity and compo...
transactions on modularity and composition i
runtime verification
runtime verification
data privacy management and security...
data privacy management and security assurance
brain informatics and health
brain informatics and health
search based software engineering
search based software engineering
rough sets
rough sets
transactions on petri nets and other...
transactions on petri nets and other models of concurrency xi
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxvii
distributed computing
distributed computing
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxviii
transactions on computational collec...
transactions on computational collective intelligence xxiv
graph-theoretic concepts in computer...
graph-theoretic concepts in computer science
transactions on computational collec...
transactions on computational collective intelligence xxv
high performance computing
high performance computing
entertainment computing and serious ...
entertainment computing and serious games
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2016
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2016
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2016
current trends in web engineering
current trends in web engineering
web-age information management
web-age information management
leveraging applications of formal me...
leveraging applications of formal methods, verification and validation
leveraging applications of formal me...
leveraging applications of formal methods, verification and validation
innovative security solutions for in...
innovative security solutions for information technology and communications
decision and game theory for security
decision and game theory for security
social robotics
social robotics
testing software and systems
testing software and systems
secure it systems
secure it systems
semantic web
semantic web
modelling and simulation for autonom...
modelling and simulation for autonomous systems
3d research challenges in cultural h...
3d research challenges in cultural heritage ii
knowledge science, engineering and m...
knowledge science, engineering and management
intelligent virtual agents
intelligent virtual agents
chinese computational linguistics an...
chinese computational linguistics and natural language processing based on naturally annotated big data
dependable software engineering
dependable software engineering
advances in conceptual modeling
advances in conceptual modeling
formal methods and software engineering
formal methods and software engineering
social informatics
social informatics
social informatics
social informatics
advances in artificial intelligence ...
advances in artificial intelligence - iberamia 2016
programming languages and systems
programming languages and systems
health information science
health information science
on the move to meaningful internet s...
on the move to meaningful internet systems
digital heritage
digital heritage
advanced concepts for intelligent vi...
advanced concepts for intelligent vision systems
cryptology and network security
cryptology and network security
digital heritage
digital heritage
hardware and software
hardware and software
transactions on rough sets xx
transactions on rough sets xx
theory of cryptography
theory of cryptography
theory of cryptography
theory of cryptography
principles of practice in multi-agen...
principles of practice in multi-agent systems
structural information and communica...
structural information and communication complexity
discrete and computational geometry ...
discrete and computational geometry and graphs
web information systems engineering ...
web information systems engineering - wise 2016
web information systems engineering ...
web information systems engineering - wise 2016
ubiquitous computing and ambient int...
ubiquitous computing and ambient intelligence
ubiquitous computing and ambient int...
ubiquitous computing and ambient intelligence
verified software. theories, tools, ...
verified software. theories, tools, and experiments
computer vision - eccv 2016 workshops
computer vision - eccv 2016 workshops
advances in multimedia information p...
advances in multimedia information processing - pcm 2016
advances in multimedia information p...
advances in multimedia information processing - pcm 2016
swarm, evolutionary, and mimetic com...
swarm, evolutionary, and mimetic computing
fm 2016
fm 2016
software architecture
software architecture
knowledge engineering and knowledge ...
knowledge engineering and knowledge management
structural, syntactic, and statistic...
structural, syntactic, and statistical pattern recognition
product-focused software process imp...
product-focused software process improvement
security standardisation research
security standardisation research
ai*ia 2016 advances in artificial in...
ai*ia 2016 advances in artificial intelligence
security, privacy and anonymity in c...
security, privacy and anonymity in computation, communication and storage
security, privacy, and anonymity in ...
security, privacy, and anonymity in computation, communication, and storage
information security practice and ex...
information security practice and experience
advances in speech and language tech...
advances in speech and language technologies for iberian languages
information theoretic security
information theoretic security
advances in services computing
advances in services computing
stabilization, safety, and security ...
stabilization, safety, and security of distributed systems
digital libraries
digital libraries
multi-disciplinary trends in artific...
multi-disciplinary trends in artificial intelligence
computer vision - eccv 2016 workshops
computer vision - eccv 2016 workshops
algorithm engineering
algorithm engineering
chinese lexical semantics
chinese lexical semantics
algorithms and architectures for par...
algorithms and architectures for parallel processing
advanced data mining and applications
advanced data mining and applications
advances in brain inspired cognitive...
advances in brain inspired cognitive systems
big data benchmarking
big data benchmarking
algorithms and models for the web graph
algorithms and models for the web graph
information systems security
information systems security
formal methods
formal methods
algorithms and architectures for par...
algorithms and architectures for parallel processing
information and communications security
information and communications security
semantic technology
semantic technology
ai 2016
ai 2016
games and learning alliance
games and learning alliance
software technologies
software technologies
collective online platforms for fina...
collective online platforms for financial and environmental awareness
swarm intelligence based optimization
swarm intelligence based optimization
learning and intelligent optimization
learning and intelligent optimization
logical aspects of computational lin...
logical aspects of computational linguistics
advances in cryptology - asiacrypt 2016
advances in cryptology - asiacrypt 2016
advances in cryptology - asiacrypt 2016
advances in cryptology - asiacrypt 2016
cyber-physical systems of systems
cyber-physical systems of systems
deductive software verification - th...
deductive software verification - the key book
advanced visual interfaces
advanced visual interfaces
graph drawing and network visualization
graph drawing and network visualization
data mining and constraint programming
data mining and constraint programming
mobile, secure, and programmable net...
mobile, secure, and programmable networking
machine learning for health informatics
machine learning for health informatics
natural language understanding and i...
natural language understanding and intelligent applications
advances in visual computing
advances in visual computing
advances in visual computing
advances in visual computing
brain-inspired computing
brain-inspired computing
computers and games
computers and games
engineering multi-agent systems
engineering multi-agent systems
openshmem and related technologies
openshmem and related technologies
spectral and shape analysis in medic...
spectral and shape analysis in medical imaging
multiple access communications
multiple access communications
machine learning, optimization, and ...
machine learning, optimization, and big data
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxix
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxx
web and internet economics
web and internet economics
internet of vehicles - technologies ...
internet of vehicles - technologies and services
computational methods and clinical a...
computational methods and clinical applications for spine imaging
arithmetic of finite fields
arithmetic of finite fields
brainlesion
brainlesion
semantics, analytics, visualization
semantics, analytics, visualization
smart graphics
smart graphics
computer vision - accv 2016
computer vision - accv 2016
computer vision - accv 2016
computer vision - accv 2016
computer vision - accv 2016
computer vision - accv 2016
computer vision - accv 2016
computer vision - accv 2016
computer vision - accv 2016
computer vision - accv 2016
enterprise security
enterprise security
computer vision - accv 2016 workshops
computer vision - accv 2016 workshops
computer vision - accv 2016 workshops
computer vision - accv 2016 workshops
computer vision - accv 2016 workshops
computer vision - accv 2016 workshops
computational modeling of objects pr...
computational modeling of objects presented in images
smart card research and advanced app...
smart card research and advanced applications
information security and cryptology
information security and cryptology
risks and security of internet and s...
risks and security of internet and systems
architecture of computing systems - ...
architecture of computing systems - arcs 2017
persuasive technology
persuasive technology
evolutionary computation in combinat...
evolutionary computation in combinatorial optimization
codes, cryptology and information se...
codes, cryptology and information security
genetic programming
genetic programming
database systems for advanced applic...
database systems for advanced applications
database systems for advanced applic...
database systems for advanced applications
lightweight cryptography for securit...
lightweight cryptography for security and privacy
computational intelligence in music,...
computational intelligence in music, sound, art and design
database systems for advanced applic...
database systems for advanced applications
applications of evolutionary computation
applications of evolutionary computation
applications of evolutionary computation
applications of evolutionary computation
on the move to meaningful internet s...
on the move to meaningful internet systems
computational color imaging
computational color imaging
data management on new hardware
data management on new hardware
applied reconfigurable computing
applied reconfigurable computing
information security applications
information security applications
video analytics
video analytics
transactions on edutainment xiii
transactions on edutainment xiii
principles of security and trust
principles of security and trust
fundamental approaches to software e...
fundamental approaches to software engineering
transactions on computational scienc...
transactions on computational science xxix
tools and algorithms for the constru...
tools and algorithms for the construction and analysis of systems
tools and algorithms for the constru...
tools and algorithms for the construction and analysis of systems
new frontiers in artificial intelligence
new frontiers in artificial intelligence
reproducible research in pattern rec...
reproducible research in pattern recognition
advances in information retrieval
advances in information retrieval
engineering trustworthy software systems
engineering trustworthy software systems
interoperability and open-source sol...
interoperability and open-source solutions for the internet of things
communication technologies for vehicles
communication technologies for vehicles
research in computational molecular ...
research in computational molecular biology
ambient intelligence
ambient intelligence
algorithmic aspects of cloud computing
algorithmic aspects of cloud computing
numerical analysis and its applications
numerical analysis and its applications
conflict resolution in decision making
conflict resolution in decision making
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
algorithms and complexity
algorithms and complexity
formal aspects of component software
formal aspects of component software
structured object-oriented formal la...
structured object-oriented formal language and method
love and sex with robots
love and sex with robots
data management and analytics for me...
data management and analytics for medicine and healthcare
symbiotic interaction
symbiotic interaction
risk assessment and risk-driven qual...
risk assessment and risk-driven quality assurance
mining intelligence and knowledge ex...
mining intelligence and knowledge exploration
semantic web
semantic web
semantic web
semantic web
social computing and social media, h...
social computing and social media, human behavior
cellular automata and discrete compl...
cellular automata and discrete complex systems
knowledge engineering and knowledge ...
knowledge engineering and knowledge management
end-user development
end-user development
computer science - theory and applic...
computer science - theory and applications
scale space and variational methods ...
scale space and variational methods in computer vision
euro-par 2016
euro-par 2016
graph-based representations in patte...
graph-based representations in pattern recognition
digital education
digital education
artificial intelligence and soft com...
artificial intelligence and soft computing
artificial intelligence and soft com...
artificial intelligence and soft computing
computer information systems and ind...
computer information systems and industrial management
combinatorial image analysis
combinatorial image analysis
image analysis
image analysis
image analysis
image analysis
designing the digital transformation
designing the digital transformation
pattern recognition
pattern recognition
multimodal pattern recognition of so...
multimodal pattern recognition of social signals in human-computer-interaction
blended learning
blended learning
functional imaging and modelling of ...
functional imaging and modelling of the heart
advanced information systems engineering
advanced information systems engineering
bioinformatics research and applications
bioinformatics research and applications
networked systems
networked systems
integration of ai and or techniques ...
integration of ai and or techniques in constraint programming
smart health
smart health
information security and privacy
information security and privacy
information security and privacy
information security and privacy
web engineering
web engineering
reliable software technologies - ada...
reliable software technologies - ada-europe 2017
financial cryptography and data security
financial cryptography and data security
e-learning and games
e-learning and games
research in attacks, intrusions, and...
research in attacks, intrusions, and defenses
trends and applications in knowledge...
trends and applications in knowledge discovery and data mining
privacy technologies and policy
privacy technologies and policy
internet of things, smart spaces, an...
internet of things, smart spaces, and next generation networks and systems
multi-agent based simulation xvii
multi-agent based simulation xvii
ubiquitous computing and ambient int...
ubiquitous computing and ambient intelligence
high performance computing
high performance computing
mobile, secure, and programmable net...
mobile, secure, and programmable networking
computational intelligence methods f...
computational intelligence methods for bioinformatics and biostatistics
mathematical methods for curves and ...
mathematical methods for curves and surfaces
smart health
smart health
economics of grids, clouds, systems,...
economics of grids, clouds, systems, and services
computer vision, graphics, and image...
computer vision, graphics, and image processing
service-oriented computing - icsoc 2...
service-oriented computing - icsoc 2016 workshops
automated technology for verificatio...
automated technology for verification and analysis
semantic web - iswc 2017
semantic web - iswc 2017
semantic web - iswc 2017
semantic web - iswc 2017
computer vision systems
computer vision systems
geometric science of information
geometric science of information
statistical language and speech proc...
statistical language and speech processing
computational logistics
computational logistics
cloud computing and security
cloud computing and security
image analysis and processing - icia...
image analysis and processing - iciap 2017
image analysis and processing - icia...
image analysis and processing - iciap 2017
artificial neural networks and machi...
artificial neural networks and machine learning - icann 2017
artificial neural networks and machi...
artificial neural networks and machine learning - icann 2017
provable security
provable security
electronic voting
electronic voting
formal methods and software engineering
formal methods and software engineering
information retrieval
information retrieval
decision and game theory for security
decision and game theory for security
knowledge graphs and language technology
knowledge graphs and language technology
simulated evolution and learning
simulated evolution and learning
advances in intelligent data analysi...
advances in intelligent data analysis xvi
web information systems engineering ...
web information systems engineering - wise 2017
web information systems engineering ...
web information systems engineering - wise 2017
robocup 2016
robocup 2016
intelligent data engineering and aut...
intelligent data engineering and automated learning - ideal 2017
topics in theoretical computer science
topics in theoretical computer science
fundamentals of software engineering
fundamentals of software engineering
chinese computational linguistics an...
chinese computational linguistics and natural language processing based on naturally annotated big data
stabilization, safety, and security ...
stabilization, safety, and security of distributed systems
prima 2017
prima 2017
intelligent, secure, and dependable ...
intelligent, secure, and dependable systems in distributed and cloud environments
advanced data mining and applications
advanced data mining and applications
health information science
health information science
innovative security solutions for in...
innovative security solutions for information technology and communications
future and emerging trends in langua...
future and emerging trends in language technology
learning and intelligent optimization
learning and intelligent optimization
selected areas in cryptography - sac...
selected areas in cryptography - sac 2016
multi-disciplinary trends in artific...
multi-disciplinary trends in artificial intelligence
on the move to meaningful internet s...
on the move to meaningful internet systems
on the move to meaningful internet s...
on the move to meaningful internet systems
cyberspace safety and security
cyberspace safety and security
dependable software engineering
dependable software engineering
next generation computer animation t...
next generation computer animation techniques
towards integrative machine learning...
towards integrative machine learning and knowledge extraction
conceptual modeling
conceptual modeling
biometric recognition
biometric recognition
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxxiv
transactions on computational scienc...
transactions on computational science xxx
learning and collaboration technologies
learning and collaboration technologies
transactions on computational collec...
transactions on computational collective intelligence xxvi
multi-agent systems and agreement te...
multi-agent systems and agreement technologies
natural language processing and info...
natural language processing and information systems
hybrid artificial intelligent systems
hybrid artificial intelligent systems
image analysis and recognition
image analysis and recognition
post-quantum cryptography
post-quantum cryptography
advances in practical applications o...
advances in practical applications of cyber-physical multi-agent systems
advances in artificial intelligence
advances in artificial intelligence
advances in artificial intelligence
advances in artificial intelligence
grand timely topics in software engi...
grand timely topics in software engineering
cyber security cryptography and mach...
cyber security cryptography and machine learning
social, cultural, and behavioral mod...
social, cultural, and behavioral modeling
descriptional complexity of formal s...
descriptional complexity of formal systems
foundations of intelligent systems
foundations of intelligent systems
trends in artificial intelligence
trends in artificial intelligence
security of networks and services in...
security of networks and services in an all-connected world
data analytics
data analytics
rough sets
rough sets
rough sets
rough sets
detection of intrusions and malware,...
detection of intrusions and malware, and vulnerability assessment
augmented reality, virtual reality, ...
augmented reality, virtual reality, and computer graphics
augmented reality, virtual reality, ...
augmented reality, virtual reality, and computer graphics
case-based reasoning research and de...
case-based reasoning research and development
reasoning web
reasoning web
medical computer vision and bayesian...
medical computer vision and bayesian and graphical models for biomedical imaging
applied cryptography and network sec...
applied cryptography and network security
serviceology for services
serviceology for services
rules and reasoning
rules and reasoning
wired/wireless internet communications
wired/wireless internet communications
artificial intelligence in education
artificial intelligence in education
analytical and stochastic modelling ...
analytical and stochastic modelling techniques and applications
security of industrial control syste...
security of industrial control systems and cyber-physical systems
tests and proofs
tests and proofs
graph transformation
graph transformation
theory and practice of model transfo...
theory and practice of model transformation
modelling foundations and applications
modelling foundations and applications
symbolic and quantitative approaches...
symbolic and quantitative approaches to reasoning with uncertainty
logic programming and nonmonotonic r...
logic programming and nonmonotonic reasoning
intelligent computer mathematics
intelligent computer mathematics
engineering secure software and systems
engineering secure software and systems
advances in data mining
advances in data mining
ubiquitous networking
ubiquitous networking
spatial cognition x
spatial cognition x
queueing theory and network applications
queueing theory and network applications
cloud computing and security
cloud computing and security
graph-theoretic concepts in computer...
graph-theoretic concepts in computer science
web and big data
web and big data
serious games
serious games
information retrieval technology
information retrieval technology
ai*ia 2017
ai*ia 2017
digital libraries
digital libraries
financial cryptography and data security
financial cryptography and data security
internet science
internet science
secure it systems
secure it systems
advanced concepts for intelligent vi...
advanced concepts for intelligent vision systems
hardware and software
hardware and software
semantic web
semantic web
theory of cryptography
theory of cryptography
theory of cryptography
theory of cryptography
advances in conceptual modeling
advances in conceptual modeling
transactions on computational collec...
transactions on computational collective intelligence xxvii
semantic technology
semantic technology
advances in cryptology - asiacrypt 2017
advances in cryptology - asiacrypt 2017
advances in cryptology - asiacrypt 2017
advances in cryptology - asiacrypt 2017
advances in cryptology - asiacrypt 2017
advances in cryptology - asiacrypt 2017
brain informatics
brain informatics
formal methods
formal methods
agents and multi-agent systems for h...
agents and multi-agent systems for health care
interactive storytelling
interactive storytelling
security protocols xxv
security protocols xxv
artificial intelligence xxxiv
artificial intelligence xxxiv
programming languages and systems
programming languages and systems
critical information infrastructures...
critical information infrastructures security
informatics in schools
informatics in schools
security, privacy, and applied crypt...
security, privacy, and applied cryptography engineering
data analytics for renewable energy ...
data analytics for renewable energy integration: informing the generation and distribution of renewable energy
progress in cryptology - indocrypt 2017
progress in cryptology - indocrypt 2017
autonomous agents and multiagent systems
autonomous agents and multiagent systems
autonomous agents and multiagent systems
autonomous agents and multiagent systems
mathematics and computation in music
mathematics and computation in music
web and internet wconomics
web and internet wconomics
games and learning alliance
games and learning alliance
personal analytics and privacy
personal analytics and privacy
intelligent human computer interaction
intelligent human computer interaction
information theoretic security
information theoretic security
internet of vehicles
internet of vehicles
big data analytics
big data analytics
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxxv
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxxvi
financial cryptography and data security
financial cryptography and data security
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
machine learning and knowledge disco...
machine learning and knowledge discovery in databases
analytical and computational methods...
analytical and computational methods in probability theory
image and graphics
image and graphics
image and graphics
image and graphics
image and graphics
image and graphics
advances in computer games
advances in computer games
recent trends in algebraic developme...
recent trends in algebraic development techniques
structural information and communica...
structural information and communication complexity
verified software
verified software
virtual reality and augmented reality
virtual reality and augmented reality
information security practice and ex...
information security practice and experience
security, privacy, and anonymity in ...
security, privacy, and anonymity in computation, communication, and storage
security, privacy, and anonymity in ...
security, privacy, and anonymity in computation, communication, and storage
mathematical aspects of computer and...
mathematical aspects of computer and information sciences
information systems security
information systems security
algorithms for sensor systems
algorithms for sensor systems
software engineering for self-adapti...
software engineering for self-adaptive systems.
new trends in image analysis and pro...
new trends in image analysis and processing - iciap 2017
theory and models for cyber situatio...
theory and models for cyber situation awareness
paradigms in cryptology - mycrypt 2016
paradigms in cryptology - mycrypt 2016
new frontiers in mining complex patterns
new frontiers in mining complex patterns
new frontiers in artificial intelligence
new frontiers in artificial intelligence
job scheduling strategies for parall...
job scheduling strategies for parallel processing
economics of grids, clouds, systems,...
economics of grids, clouds, systems, and services
high performance computing for compu...
high performance computing for computational science - vecpar 2016
radio frequency identification and i...
radio frequency identification and iot security
security protocols xxiv
security protocols xxiv
algorithms and data structures
algorithms and data structures
computing and combinatorics
computing and combinatorics
computational science and its applic...
computational science and its applications - iccsa 2017
computational science and its applic...
computational science and its applications - iccsa 2017
computational science and its applic...
computational science and its applications - iccsa 2017
computational science and its applic...
computational science and its applications - iccsa 2017
computational science and its applic...
computational science and its applications - iccsa 2017
computational science and its applic...
computational science and its applications - iccsa 2017
machine learning and data mining in ...
machine learning and data mining in pattern recognition
developments in language theory
developments in language theory
ai 2017
ai 2017
automated deduction - cade 26
automated deduction - cade 26
collaboration technologies and socia...
collaboration technologies and social computing
logic-based program synthesis and tr...
logic-based program synthesis and transformation
software engineering in health care
software engineering in health care
intelligent computing theories and a...
intelligent computing theories and application
intelligent computing theories and a...
intelligent computing theories and application
intelligent computing methodologies
intelligent computing methodologies
inductive logic programming
inductive logic programming
computer aided verification
computer aided verification
computer aided verification
computer aided verification
numerical software verification
numerical software verification
biomimetic and biohybrid systems
biomimetic and biohybrid systems
collaboration and technology
collaboration and technology
towards autonomous robotic systems
towards autonomous robotic systems
constructive side-channel analysis a...
constructive side-channel analysis and secure design
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxxii
challenges and opportunity with big data
challenges and opportunity with big data
advances in soft computing
advances in soft computing
advances in soft computing
advances in soft computing
web and big data
web and big data
web and big data
web and big data
advances in cryptology - crypto 2017
advances in cryptology - crypto 2017
model-based safety and assessment
model-based safety and assessment
big data analytics and knowledge dis...
big data analytics and knowledge discovery
theoretical computer science and dis...
theoretical computer science and discrete mathematics
database and expert systems applications
database and expert systems applications
electronic government
electronic government
business process management
business process management
computer network security
computer network security
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
progress in artificial intelligence
progress in artificial intelligence
algorithms and architectures for par...
algorithms and architectures for parallel processing
scaling openmp for exascale performa...
scaling openmp for exascale performance and portability
formal modeling and analysis of time...
formal modeling and analysis of timed systems
experimental ir meets multilingualit...
experimental ir meets multilinguality, multimodality, and interaction
software architecture
software architecture
software engineering for resilient s...
software engineering for resilient systems
interactive theorem proving
interactive theorem proving
principles and practice of constrain...
principles and practice of constraint programming
frontiers of combining systems
frontiers of combining systems
verification and evaluation of compu...
verification and evaluation of computer and communication systems
enhanced quality of life and smart l...
enhanced quality of life and smart living
software engineering and formal methods
software engineering and formal methods
theory and applications of satisfiab...
theory and applications of satisfiability testing - sat 2017
computer safety, reliability, and se...
computer safety, reliability, and security
discrete geometry for computer imagery
discrete geometry for computer imagery
coding theory and applications
coding theory and applications
search based software engineering
search based software engineering
quantitative evaluation of systems
quantitative evaluation of systems
combinatorics on words
combinatorics on words
computer security - esorics 2017
computer security - esorics 2017
computer security - esorics 2017
computer security - esorics 2017
speech and computer
speech and computer
interactive collaborative robotics
interactive collaborative robotics
computer performance engineering
computer performance engineering
coordination, organizations, institu...
coordination, organizations, institutions, and norms in agent systems xii
algorithmic game theory
algorithmic game theory
static analysis
static analysis
entertainment computing - icec 2017
entertainment computing - icec 2017
dna computing and molecular programming
dna computing and molecular programming
machine learning and knowledge extra...
machine learning and knowledge extraction
automated reasoning with analytic ta...
automated reasoning with analytic tableaux and related methods
reachability problems
reachability problems
critical systems
critical systems
data management and analytics for me...
data management and analytics for medicine and healthcare
intelligent virtual agents
intelligent virtual agents
patch-based techniques in medical im...
patch-based techniques in medical imaging
logic, rationality, and interaction
logic, rationality, and interaction
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxxiii
fundamentals of computation theory
fundamentals of computation theory
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2017
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2017
medical image computing and computer...
medical image computing and computer-assisted intervention - miccai 2017
computer safety, reliability, and se...
computer safety, reliability, and security
evaluation in the crowd
evaluation in the crowd
data driven approaches in digital ed...
data driven approaches in digital education
model and data engineering
model and data engineering
research and advanced technology for...
research and advanced technology for digital libraries
computational collective intelligence
computational collective intelligence
computational collective intelligence
computational collective intelligence
connectomics in neuroimaging
connectomics in neuroimaging
ki 2017
ki 2017
social informatics
social informatics
communication systems and networks
communication systems and networks
social informatics
social informatics
machine learning in medical imaging
machine learning in medical imaging
modeling decisions for artificial in...
modeling decisions for artificial intelligence
string processing and information re...
string processing and information retrieval
runtime verification
runtime verification
intravascular imaging and computer a...
intravascular imaging and computer assisted stenting, and large-scale annotation of biomedical data and expert label synthesis
computer assisted and robotic endosc...
computer assisted and robotic endoscopy and clinical image-based procedures
testing software and systems
testing software and systems
imaging for patient-customized simul...
imaging for patient-customized simulations and systems for point-of-care ultrasound
deep learning in medical image analy...
deep learning in medical image analysis and multimodal learning for clinical decision support
fetal, infant and ophthalmic medical...
fetal, infant and ophthalmic medical image analysis
molecular imaging, reconstruction an...
molecular imaging, reconstruction and analysis of moving body organs, and stroke imaging and treatment
scalable uncertainty management
scalable uncertainty management
brain function assessment in learning
brain function assessment in learning
graphs in biomedical image analysis,...
graphs in biomedical image analysis, computational anatomy and imaging genetics
human-computer interaction - interac...
human-computer interaction - interact 2017
human-computer interaction - interac...
human-computer interaction - interact 2017
theoretical aspects of computing - i...
theoretical aspects of computing - ictac 2017
bridging people and sound
bridging people and sound
human-computer interaction - interac...
human-computer interaction - interact 2017
intelligence science and big data en...
intelligence science and big data engineering
discovery science
discovery science
algorithms and models for the web graph
algorithms and models for the web graph
data privacy management, cryptocurre...
data privacy management, cryptocurrencies and blockchain technology
ad-hoc, mobile, and wireless networks
ad-hoc, mobile, and wireless networks
advanced parallel processing technol...
advanced parallel processing technologies
comparative genomics
comparative genomics
sdl 2017
sdl 2017
formal aspects of component software
formal aspects of component software
human-computer interaction - interac...
human-computer interaction - interact 2017
security and trust management
security and trust management
simulation and synthesis in medical ...
simulation and synthesis in medical imaging
databases theory and applications
databases theory and applications
similarity search and applications
similarity search and applications
transactions on petri nets and other...
transactions on petri nets and other models of concurrency xii
language and automata theory and app...
language and automata theory and applications
post-quantum cryptography
post-quantum cryptography
latin 2018
latin 2018
architecture of computing systems - ...
architecture of computing systems - arcs 2018
intersections in simulation and gaming
intersections in simulation and gaming
nasa formal methods
nasa formal methods
topics in cryptology - ct-rsa 2018
topics in cryptology - ct-rsa 2018
transactions on edutainment xiv
transactions on edutainment xiv
fundamental approaches to software e...
fundamental approaches to software engineering
tools and algorithms for the constru...
tools and algorithms for the construction and analysis of systems
new frontiers in mining complex patterns
new frontiers in mining complex patterns
bidirectional transformations
bidirectional transformations
graph structures for knowledge repre...
graph structures for knowledge representation and reasoning
theory and applications of formal ar...
theory and applications of formal argumentation
modelling and simulation for autonom...
modelling and simulation for autonomous systems
passive and active measurement
passive and active measurement
transactions on computational scienc...
transactions on computational science xxxii
supercomputing frontiers
supercomputing frontiers
computational linguistics and intell...
computational linguistics and intelligent text processing
information security and cryptology ...
information security and cryptology - icisc 2017
evolutionary computation in combinat...
evolutionary computation in combinatorial optimization
genetic programming
genetic programming
parallel processing and applied math...
parallel processing and applied mathematics
energy minimization methods in compu...
energy minimization methods in computer vision and pattern recognition
artificial evolution
artificial evolution
inductive logic programming
inductive logic programming
persuasive technology
persuasive technology
computational intelligence in music,...
computational intelligence in music, sound, art and design
applications of evolutionary computation
applications of evolutionary computation
internet science
internet science
statistical atlases and computationa...
statistical atlases and computational models of the heart
computational linguistics and intell...
computational linguistics and intelligent text processing
public-key cryptography - pkc 2018
public-key cryptography - pkc 2018
transforming digital worlds
transforming digital worlds
parallel processing and applied math...
parallel processing and applied mathematics
foundations of software science and ...
foundations of software science and computation structures
principles of security and trust
principles of security and trust
programming languages and systems
programming languages and systems
tools and algorithms for the constru...
tools and algorithms for the construction and analysis of systems
research in computational molecular ...
research in computational molecular biology
combinatorial algorithms
combinatorial algorithms
trends in functional programming
trends in functional programming
structured object-oriented formal la...
structured object-oriented formal language and method
transactions on computational collec...
transactions on computational collective intelligence xxix
communication technologies for vehicles
communication technologies for vehicles
functional and logic programming
functional and logic programming
transactions on computational collec...
transactions on computational collective intelligence xxviii
social information access
social information access
advances in multimedia information p...
advances in multimedia information processing - pcm 2017
advances in multimedia information p...
advances in multimedia information processing - pcm 2017
database systems for advanced applic...
database systems for advanced applications
database systems for advanced applic...
database systems for advanced applications
bioinspired optimization methods and...
bioinspired optimization methods and their applications
engineering multi-agent systems
engineering multi-agent systems
database systems for advanced applic...
database systems for advanced applications
understanding human activities throu...
understanding human activities through 3d sensors
databases theory and applications
databases theory and applications
designing for a digital and globaliz...
designing for a digital and globalized world
multi-agent based simulation xviii
multi-agent based simulation xviii
abstract state machines, alloy, b, t...
abstract state machines, alloy, b, tla, vdm, and z
digital cultural heritage
digital cultural heritage
symbiotic interaction
symbiotic interaction
artificial intelligence and soft com...
artificial intelligence and soft computing
artificial intelligence and soft com...
artificial intelligence and soft computing
web engineering
web engineering
natural language processing and info...
natural language processing and information systems
simulation gaming
simulation gaming
advances in neural networks - isnn 2018
advances in neural networks - isnn 2018
application and theory of petri nets...
application and theory of petri nets and concurrency
autonomous control for a reliable in...
autonomous control for a reliable internet of services
global thoughts, local designs
global thoughts, local designs
formal techniques for distributed ob...
formal techniques for distributed objects, components, and systems
algorithms and models for the web graph
algorithms and models for the web graph
intelligent tutoring systems
intelligent tutoring systems
semantic web
semantic web
advanced information systems engineering
advanced information systems engineering
high performance computing
high performance computing
machines, computations, and universality
machines, computations, and universality
haptics
haptics
haptics
haptics
latent variable analysis and signal ...
latent variable analysis and signal separation
image and video technology
image and video technology
integration of constraint programmin...
integration of constraint programming, artificial intelligence, and operations research
hybrid artificial intelligent systems
hybrid artificial intelligent systems
data mining and big data
data mining and big data
applied cryptography and network sec...
applied cryptography and network security
computational science - iccs 2018
computational science - iccs 2018
computational science - iccs 2018
computational science - iccs 2018
wireless algorithms, systems, and ap...
wireless algorithms, systems, and applications
service-oriented computing - icsoc 2...
service-oriented computing - icsoc 2017 workshops
pattern recognition applications and...
pattern recognition applications and methods
human language technology
human language technology
advances in swarm intelligence
advances in swarm intelligence
advances in swarm intelligence
advances in swarm intelligence
model checking software
model checking software
cyber security cryptography and mach...
cyber security cryptography and machine learning
internet of things - iciot 2018
internet of things - iciot 2018
edge computing - edge 2018
edge computing - edge 2018
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
image analysis and recognition
image analysis and recognition
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
web services - icws 2018
web services - icws 2018
cloud computing - cloud 2018
cloud computing - cloud 2018
cognitive computing - iccc 2018
cognitive computing - iccc 2018
engineering secure software and systems
engineering secure software and systems
advances in practical applications o...
advances in practical applications of agents, multi-agent systems, and complexity
detection of intrusions and malware,...
detection of intrusions and malware, and vulnerability assessment
big data - bigdata 2018
big data - bigdata 2018
services computing - scc 2018
services computing - scc 2018
artificial intelligence in education
artificial intelligence in education
agents and artificial intelligence
agents and artificial intelligence
artificial intelligence and mobile s...
artificial intelligence and mobile services - aims 2018
information security applications
information security applications
services - services 2018
services - services 2018
theory and applications of satisfiab...
theory and applications of satisfiability testing - sat 2018
logic, language, information, and co...
logic, language, information, and computation
social, cultural and behavioral modeling
social, cultural and behavioral modeling
computational science - iccs 2018
computational science - iccs 2018
advances in knowledge discovery and ...
advances in knowledge discovery and data mining
artificial intelligence in education
artificial intelligence in education
information security theory and practice
information security theory and practice
information security and privacy
information security and privacy
new frontiers in artificial intelligence
new frontiers in artificial intelligence
image and signal processing
image and signal processing
computers helping people with specia...
computers helping people with special needs
computers helping people with specia...
computers helping people with special needs
computing and combinatorics
computing and combinatorics
blockchain - icbc 2018
blockchain - icbc 2018
articulated motion and deformable ob...
articulated motion and deformable objects
computational science and its applic...
computational science and its applications - iccsa 2018
computational science and its applic...
computational science and its applications - iccsa 2018
mathematical software - icms 2018
mathematical software - icms 2018
high performance computing in scienc...
high performance computing in science and engineering
combinatorial optimization
combinatorial optimization
web and big data
web and big data
principles of modeling
principles of modeling
web and big data
web and big data
computer aided verification
computer aided verification
machine learning for dynamic softwar...
machine learning for dynamic software analysis
computational science and its applic...
computational science and its applications - iccsa 2018
formal methods
formal methods
computer aided verification
computer aided verification
towards autonomous robotic systems
towards autonomous robotic systems
sailing routes in the world of compu...
sailing routes in the world of computation
internet and distributed computing s...
internet and distributed computing systems
knowledge management and acquisition...
knowledge management and acquisition for intelligent systems
formal grammar 2018
formal grammar 2018
mobile web and intelligent informati...
mobile web and intelligent information systems
pricai 2018
pricai 2018
advances in databases and informatio...
advances in databases and information systems
pricai 2018
pricai 2018
intelligent computer mathematics
intelligent computer mathematics
from animals to animats 15
from animals to animats 15
artificial general intelligence
artificial general intelligence
semantic web
semantic web
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxxvii
medical imaging systems
medical imaging systems
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
combinatorial algorithms
combinatorial algorithms
interactive theorem proving
interactive theorem proving
computational science and its applic...
computational science and its applications - iccsa 2018
computational science and its applic...
computational science and its applications - iccsa 2018
advances in data mining
advances in data mining
biomimetic and biohybrid systems
biomimetic and biohybrid systems
machine learning and data mining in ...
machine learning and data mining in pattern recognition
machine learning and data mining in ...
machine learning and data mining in pattern recognition
logic-based program synthesis and tr...
logic-based program synthesis and transformation
data and applications security and p...
data and applications security and privacy xxxii
bioinformatics research and applications
bioinformatics research and applications
descriptional complexity of formal s...
descriptional complexity of formal systems
augmented reality, virtual reality, ...
augmented reality, virtual reality, and computer graphics
augmented reality, virtual reality, ...
augmented reality, virtual reality, and computer graphics
computer security
computer security
biometric recognition
biometric recognition
database and expert systems applications
database and expert systems applications
computer security
computer security
knowledge science, engineering and m...
knowledge science, engineering and management
knowledge science, engineering and m...
knowledge science, engineering and management
natural language processing and chin...
natural language processing and chinese computing
natural language processing and chin...
natural language processing and chinese computing
rough sets
rough sets
electronic participation
electronic participation
big data analytics and knowledge dis...
big data analytics and knowledge discovery
database and expert systems applications
database and expert systems applications
experimental ir meets multilingualit...
experimental ir meets multilinguality, multimodality, and interaction
integrated formal methods
integrated formal methods
principles and practice of constrain...
principles and practice of constraint programming
search-based software engineering
search-based software engineering
lifelong technology-enhanced learning
lifelong technology-enhanced learning
machine learning and knowledge extra...
machine learning and knowledge extraction
rules and reasoning
rules and reasoning
inductive logic programming
inductive logic programming
innovative technologies and learning
innovative technologies and learning
dependable software engineering
dependable software engineering
formal modeling and analysis of time...
formal modeling and analysis of timed systems
computational collective intelligence
computational collective intelligence
computational collective intelligence
computational collective intelligence
collaboration technologies and socia...
collaboration technologies and social computing
quantitative evaluation of systems
quantitative evaluation of systems
computational methods in systems biology
computational methods in systems biology
collaboration and technology
collaboration and technology
algorithmic game theory
algorithmic game theory
artificial intelligence and symbolic...
artificial intelligence and symbolic computation
artificial intelligence
artificial intelligence
static analysis
static analysis
formal methods for industrial critic...
formal methods for industrial critical systems
ad-hoc, mobile, and wireless networks
ad-hoc, mobile, and wireless networks
parallel problem solving from nature...
parallel problem solving from nature - ppsn xv
parallel problem solving from nature...
parallel problem solving from nature - ppsn xv
braverman readings in machine learning
braverman readings in machine learning
reversible computation
reversible computation
artificial neural networks in patter...
artificial neural networks in pattern recognition
business process management
business process management
graph-theoretic concepts in computer...
graph-theoretic concepts in computer science
developments in language theory
developments in language theory
computer safety, reliability, and se...
computer safety, reliability, and security
information security
information security
computer safety, reliability, and se...
computer safety, reliability, and security
computer algebra in scientific computing
computer algebra in scientific computing
cellular automata
cellular automata
adventures between lower bounds and ...
adventures between lower bounds and higher altitudes
entertainment computing - icec 2018
entertainment computing - icec 2018
service-oriented and cloud computing
service-oriented and cloud computing
digital libraries for open knowledge
digital libraries for open knowledge
provenance and annotation of data an...
provenance and annotation of data and processes
programming with actors
programming with actors
data privacy management, cryptocurre...
data privacy management, cryptocurrencies and blockchain technology
research in attacks, intrusions, and...
research in attacks, intrusions, and defenses
testing software and systems
testing software and systems
belief functions
belief functions
privacy in statistical databases
privacy in statistical databases
text, speech, and dialogue
text, speech, and dialogue
rewriting logic and its applications
rewriting logic and its applications
critical information infrastructures...
critical information infrastructures security
speech and computer
speech and computer
interactive collaborative robotics
interactive collaborative robotics
comparative genomics
comparative genomics
similarity search and applications
similarity search and applications
advances in brain inspired cognitive...
advances in brain inspired cognitive systems
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
formal aspects of component software
formal aspects of component software
modeling decisions for artificial in...
modeling decisions for artificial intelligence
statistical language and speech proc...
statistical language and speech processing
studies on speech production
studies on speech production
robocup 2017
robocup 2017
machine learning for medical image r...
machine learning for medical image reconstruction
simulation and synthesis in medical ...
simulation and synthesis in medical imaging
image analysis for moving organ, bre...
image analysis for moving organ, breast, and thoracic images
cloud computing and security
cloud computing and security
cloud computing and security
cloud computing and security
predictive intelligence in medicine
predictive intelligence in medicine
medical image computing and computer...
medical image computing and computer assisted intervention - miccai 2018
medical image computing and computer...
medical image computing and computer assisted intervention - miccai 2018
computer vision and graphics
computer vision and graphics
computational pathology and ophthalm...
computational pathology and ophthalmic medical image analysis
patch-based techniques in medical im...
patch-based techniques in medical imaging
data driven treatment response asses...
data driven treatment response assessment and preterm, perinatal, and paediatric image analysis
medical image computing and computer...
medical image computing and computer assisted intervention - miccai 2018
medical image computing and computer...
medical image computing and computer assisted intervention - miccai 2018
machine learning in medical imaging
machine learning in medical imaging
simulation, image processing, and ul...
simulation, image processing, and ultrasound systems for assisted diagnosis and navigation
graphs in biomedical image analysis ...
graphs in biomedical image analysis and integrating medical imaging and non-imaging modalities
transactions on computational scienc...
transactions on computational science xxxiii
information security practice and ex...
information security practice and experience
advances in multimedia information p...
advances in multimedia information processing - pcm 2018
software architecture
software architecture
advances in multimedia information p...
advances in multimedia information processing - pcm 2018
connectomics in neuroimaging
connectomics in neuroimaging
advances in multimedia information p...
advances in multimedia information processing - pcm 2018
information retrieval
information retrieval
coalgebraic methods in computer science
coalgebraic methods in computer science
deep learning in medical image analy...
deep learning in medical image analysis and multimodal learning for clinical decision support
computational logistics
computational logistics
social informatics
social informatics
social informatics
social informatics
cooperative design, visualization, a...
cooperative design, visualization, and engineering
health information science
health information science
cloud computing and security
cloud computing and security
progress in artificial intelligence ...
progress in artificial intelligence and pattern recognition
scalable uncertainty management
scalable uncertainty management
transactions on computational collec...
transactions on computational collective intelligence xxx
electronic voting
electronic voting
advanced concepts for intelligent vi...
advanced concepts for intelligent vision systems
cloud computing and security
cloud computing and security
conceptual modeling
conceptual modeling
artificial neural networks and machi...
artificial neural networks and machine learning - icann 2018
artificial neural networks and machi...
artificial neural networks and machine learning - icann 2018
cloud computing and security
cloud computing and security
declarative programming and knowledg...
declarative programming and knowledge management
internet of things, smart spaces, an...
internet of things, smart spaces, and next generation networks and systems
symposium on real-time and hybrid sy...
symposium on real-time and hybrid systems
automated technology for verificatio...
automated technology for verification and analysis
dna computing and molecular programming
dna computing and molecular programming
string processing and information re...
string processing and information retrieval
semantic web - iswc 2018
semantic web - iswc 2018
semantic web - iswc 2018
semantic web - iswc 2018
security and trust management
security and trust management
2.0 context-aware operating theaters...
2.0 context-aware operating theaters, computer assisted robotic endoscopy, clinical image-based procedures, and skin image analysis
artificial neural networks and machi...
artificial neural networks and machine learning - icann 2018
system analysis and modeling
system analysis and modeling
case-based reasoning research and de...
case-based reasoning research and development
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
provable security
provable security
chinese computational linguistics an...
chinese computational linguistics and natural language processing based on naturally annotated big data
informatics in schools
informatics in schools
multi-agent systems and agreement te...
multi-agent systems and agreement technologies
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
computer vision - eccv 2018
advances in conceptual modeling
advances in conceptual modeling
cloud computing and security
cloud computing and security
ai approaches to the complexity of l...
ai approaches to the complexity of legal systems
on the move to meaningful internet s...
on the move to meaningful internet systems
theoretical aspects of computing - i...
theoretical aspects of computing - ictac 2018
web and big data
web and big data
structural information and communica...
structural information and communication complexity
intravascular imaging and computer a...
intravascular imaging and computer assisted stenting and large-scale annotation of biomedical data and expert label synthesis
semantics, analytics, visualization
semantics, analytics, visualization
discovery science
discovery science
foundations of intelligent systems
foundations of intelligent systems
information and communications security
information and communications security
formal methods and software engineering
formal methods and software engineering
pattern recognition and computer vision
pattern recognition and computer vision
understanding and interpreting machi...
understanding and interpreting machine learning in medical image computing applications
on the move to meaningful internet s...
on the move to meaningful internet systems
internet and distributed computing s...
internet and distributed computing systems
serious games
serious games
web information systems engineering ...
web information systems engineering - wise 2018
web information systems engineering ...
web information systems engineering - wise 2018
ambient intelligence
ambient intelligence
prima 2018
prima 2018
stabilization, safety, and security ...
stabilization, safety, and security of distributed systems
pattern recognition and computer vision
pattern recognition and computer vision
computational linguistics and intell...
computational linguistics and intelligent text processing
pattern recognition and computer vision
pattern recognition and computer vision
pattern recognition and computer vision
pattern recognition and computer vision
leveraging applications of formal me...
leveraging applications of formal methods, verification and validation
leveraging applications of formal me...
leveraging applications of formal methods, verification and validation
leveraging applications of formal me...
leveraging applications of formal methods, verification and validation
leveraging applications of formal me...
leveraging applications of formal methods, verification and validation
emerging technologies for education
emerging technologies for education
smart health
smart health
theory of cryptography
theory of cryptography
computational linguistics and intell...
computational linguistics and intelligent text processing
immersive analytics
immersive analytics
digital heritage
digital heritage
digital heritage
digital heritage
runtime verification
runtime verification
intelligent data engineering and aut...
intelligent data engineering and automated learning - ideal 2018
cryptology and network security
cryptology and network security
intelligence science and big data en...
intelligence science and big data engineering
advances in visual computing
advances in visual computing
intelligent human computer interaction
intelligent human computer interaction
engineering trustworthy software systems
engineering trustworthy software systems
maturity and innovation in digital l...
maturity and innovation in digital libraries
information retrieval technology
information retrieval technology
semantic technology
semantic technology
data analytics for renewable energy ...
data analytics for renewable energy integration
web information systems and applications
web information systems and applications
science of cyber security
science of cyber security
software analysis, testing, and evol...
software analysis, testing, and evolution
security standardisation research
security standardisation research
internet of vehicles
internet of vehicles
combinatorial image analysis
combinatorial image analysis
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxxviii
shape in medical imaging
shape in medical imaging
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxxix
transactions on petri nets and other...
transactions on petri nets and other models of concurrency xiii
graphics recognition
graphics recognition
music technology with swing
music technology with swing
security protocols xxvi
security protocols xxvi
verified software
verified software
emerging technologies for authorizat...
emerging technologies for authorization and authentication
chinese lexical semantics
chinese lexical semantics
interactive storytelling
interactive storytelling
artificial intelligence xxxv
artificial intelligence xxxv
algorithmic aspects in information a...
algorithmic aspects in information and management
social robotics
social robotics
current trends in web engineering
current trends in web engineering
approximation and online algorithms
approximation and online algorithms
from database to cyber security
from database to cyber security
ai 2018
ai 2018
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
web and internet economics
web and internet economics
theory of cryptography
theory of cryptography
intelligent data engineering and aut...
intelligent data engineering and automated learning - ideal 2018
ai*ia 2018 - advances in artificial ...
ai*ia 2018 - advances in artificial intelligence
advances in artificial intelligence ...
advances in artificial intelligence - iberamia 2018
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
software technologies
software technologies
progress in cryptology - indocrypt 2018
progress in cryptology - indocrypt 2018
security, privacy, and applied crypt...
security, privacy, and applied cryptography engineering
smart blockchain
smart blockchain
security, privacy, and anonymity in ...
security, privacy, and anonymity in computation, communication, and storage
smart multimedia
smart multimedia
smart computing and communication
smart computing and communication
advances in computational intelligence
advances in computational intelligence
advances in computational intelligence
advances in computational intelligence
high performance computing
high performance computing
algorithms and architectures for par...
algorithms and architectures for parallel processing
algorithms and architectures for par...
algorithms and architectures for parallel processing
brain informatics
brain informatics
information systems security
information systems security
trends and applications in knowledge...
trends and applications in knowledge discovery and data mining
network and system security
network and system security
graph drawing and network visualization
graph drawing and network visualization
mining intelligence and knowledge ex...
mining intelligence and knowledge exploration
wired/wireless internet communications
wired/wireless internet communications
advanced data mining and applications
advanced data mining and applications
algorithms and architectures for par...
algorithms and architectures for parallel processing
algorithms and architectures for par...
algorithms and architectures for parallel processing
privacy technologies and policy
privacy technologies and policy
arithmetic of finite fields
arithmetic of finite fields
algorithms and architectures for par...
algorithms and architectures for parallel processing
network and parallel computing
network and parallel computing
transactions on computational collec...
transactions on computational collective intelligence xxxi
analysis of images, social networks ...
analysis of images, social networks and texts
advances in computational intelligence
advances in computational intelligence
advances in soft computing
advances in soft computing
communication technologies for vehic...
communication technologies for vehicles :
cyber physical systems
cyber physical systems
engineering trustworthy software systems
engineering trustworthy software systems
internet science
internet science
programming and performance visualiz...
programming and performance visualization tools
trends in functional programming
trends in functional programming
database systems for advanced applic...
database systems for advanced applications
database systems for advanced applic...
database systems for advanced applications
database systems for advanced applic...
database systems for advanced applications
policy-based autonomic data governance
policy-based autonomic data governance
web engineering
web engineering
data quality and trust in big data
data quality and trust in big data
transactions on edutainment xv
transactions on edutainment xv
molecular logic and computational sy...
molecular logic and computational synthetic biology
algorithmic aspects of cloud computing
algorithmic aspects of cloud computing
bioinformatics and biomedical engine...
bioinformatics and biomedical engineering
bioinformatics and biomedical engine...
bioinformatics and biomedical engineering
integer programming and combinatoria...
integer programming and combinatorial optimization
foundations and practice of security
foundations and practice of security
advances in artificial intelligence
advances in artificial intelligence
advances in computational intelligence
advances in computational intelligence
advances in computational intelligence
advances in computational intelligence
advances in cryptology - crypto 2017
advances in cryptology - crypto 2017
advances in cryptology - crypto 2017
advances in cryptology - crypto 2017
advances in cryptology - eurocrypt 2017
advances in cryptology - eurocrypt 2017
advances in cryptology - eurocrypt 2017
advances in cryptology - eurocrypt 2017
advances in cryptology - eurocrypt 2017
advances in cryptology - eurocrypt 2017
advances in databases and informatio...
advances in databases and information systems
advances in information and computer...
advances in information and computer security
advances in neural networks - isnn 2017
advances in neural networks - isnn 2017
advances in neural networks - isnn 2017
advances in neural networks - isnn 2017
advances in spatial and temporal dat...
advances in spatial and temporal databases
advances in swarm intelligence
advances in swarm intelligence
advances in swarm intelligence
advances in swarm intelligence
advances in visual informatics
advances in visual informatics
advances in web-based learning - icw...
advances in web-based learning - icwl 2017
algorithmic decision theory
algorithmic decision theory
algorithms for computational biology
algorithms for computational biology
application and theory of petri nets...
application and theory of petri nets and concurrency
artificial general intelligence
artificial general intelligence
artificial intelligence in medicine
artificial intelligence in medicine
artificial life and computational in...
artificial life and computational intelligence
augmented cognition
augmented cognition
augmented cognition
augmented cognition
bioinformatics and biomedical engine...
bioinformatics and biomedical engineering
bioinformatics and biomedical engine...
bioinformatics and biomedical engineering
biomedical applications based on nat...
biomedical applications based on natural and artificial computing
combinatorial optimization and appli...
combinatorial optimization and applications
combinatorial optimization and appli...
combinatorial optimization and applications
computability and complexity
computability and complexity
computational and corpus-based phras...
computational and corpus-based phraseology
computational methods in systems biology
computational methods in systems biology
computer algebra in scientific computing
computer algebra in scientific computing
computer analysis of images and ptterns
computer analysis of images and ptterns
computer analysis of images and patterns
computer analysis of images and patterns
cooperative design, visualization, a...
cooperative design, visualization, and engineering
coordination models and languages
coordination models and languages
cross-cultural design
cross-cultural design
cryptographic hardware and embedded ...
cryptographic hardware and embedded systems - ches 2017
cryptography and coding
cryptography and coding
data and applications security and p...
data and applications security and privacy xxxi
data integration in the life sciences
data integration in the life sciences
data mining and big data
data mining and big data
database and expert systems applications
database and expert systems applications
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
digital forensics and watermarking
digital forensics and watermarking
digital human modeling
digital human modeling
digital human modeling
digital human modeling
digital nations -- smart cities, inn...
digital nations -- smart cities, innovation, and sustainability
distributed applications and interop...
distributed applications and interoperable systems
distributed, ambient and pervasive i...
distributed, ambient and pervasive interactions
electronic government and the inform...
electronic government and the information systems perspective
electronic participation
electronic participation
engineering psychology and cognitive...
engineering psychology and cognitive ergonomics
engineering psychology and cognitive...
engineering psychology and cognitive ergonomics
euro-par 2017
euro-par 2017
flexible query answering systems
flexible query answering systems
formal concept analysis
formal concept analysis
formal techniques for distributed ob...
formal techniques for distributed objects, components, and systems
foundations of software science and ...
foundations of software science and computation structures
frontiers in algorithmics
frontiers in algorithmics
future data and security engineering
future data and security engineering
hci in business, government and orga...
hci in business, government and organizations. interacting with information systems
hci in business, government and orga...
hci in business, government and organizations. interacting with information systems
high performance computing
high performance computing
human aspects of information securit...
human aspects of information security, privacy and trust
human aspects of it for the aged pop...
human aspects of it for the aged population
human aspects of it for the aged pop...
human aspects of it for the aged population
human interface and the management o...
human interface and the management of information
human interface and the management o...
human interface and the management of information
human-computer interaction
human-computer interaction
human-computer interaction
human-computer interaction
implementation and application of au...
implementation and application of automata
industrial applications of holonic a...
industrial applications of holonic and multi-agent systems
information processing in medical im...
information processing in medical imaging
information security
information security
information technology in bio- and m...
information technology in bio- and medical informatics
integer programming and combinatoria...
integer programming and combinatorial optimization
integrated formal methods
integrated formal methods
intelligence and security informatics
intelligence and security informatics
intelligent information and database...
intelligent information and database systems
intelligent information and database...
intelligent information and database systems
knowledge science, engineering and m...
knowledge science, engineering and management
language, data, and knowledge
language, data, and knowledge
learning and collaboration technologies
learning and collaboration technologies
logic, language, information, and co...
logic, language, information, and computation
mastering scale and complexity in so...
mastering scale and complexity in software reuse
mathematical morphology and its appl...
mathematical morphology and its applications to signal and image processing
mining intelligence and knowledge ex...
mining intelligence and knowledge exploration
mobile web and intelligent informati...
mobile web and intelligent information systems
modeled, tested, trusted
modeled, tested, trusted
modeling and using context
modeling and using context
models, algorithms, logics and tools
models, algorithms, logics and tools
multiagent system technologies
multiagent system technologies
nasa formal methods
nasa formal methods
natural and artificial computation f...
natural and artificial computation for biomedicine and neuroscience
network and parallel computing
network and parallel computing
network and system security
network and system security
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
neural information processing
parallel computing technologies
parallel computing technologies
passive and active measurement
passive and active measurement
pattern recognition
pattern recognition
pattern recognition and image analysis
pattern recognition and image analysis
pattern recognition and machine inte...
pattern recognition and machine intelligence
programming languages and systems
programming languages and systems
progress in cryptology - africacrypt...
progress in cryptology - africacrypt 2017
relational and algebraic methods in ...
relational and algebraic methods in computer science
reliability, safety, and security of...
reliability, safety, and security of railway systems
reversible computation
reversible computation
service-oriented and cloud computing
service-oriented and cloud computing
service-oriented computing
service-oriented computing
smart cities
smart cities
social computing and social media. a...
social computing and social media. applications and analytics
social robotics
social robotics
text, speech, and dialogue
text, speech, and dialogue
theory and applications of models of...
theory and applications of models of computation
theory and practice of natural computing
theory and practice of natural computing
trust, privacy and security in digit...
trust, privacy and security in digital business
unconventional computation and natur...
unconventional computation and natural computation
universal access in human-computer i...
universal access in human-computer interaction
universal access in human-computer i...
universal access in human-computer interaction
universal access in human-computer i...
universal access in human-computer interaction
unveiling dynamics and complexity
unveiling dynamics and complexity
virtual, augmented and mixed reality
virtual, augmented and mixed reality
web and wireless geographical inform...
web and wireless geographical information systems
wireless algorithms, systems, and ap...
wireless algorithms, systems, and applications
machine learning for networking
machine learning for networking
digital education
digital education
massively multi-agent systems ii
massively multi-agent systems ii
information processing in medical im...
information processing in medical imaging
logic programming and nonmonotonic r...
logic programming and nonmonotonic reasoning
computer vision - accv 2018
computer vision - accv 2018
semantic web
semantic web
computer vision - accv 2018
computer vision - accv 2018
computer vision - accv 2018
computer vision - accv 2018
artificial intelligence and soft com...
artificial intelligence and soft computing
understanding the brain function and...
understanding the brain function and emotions
from bioinspired systems and biomedi...
from bioinspired systems and biomedical applications to machine learning
information security theory and practice
information security theory and practice
image analysis
image analysis
bioinformatics research and applications
bioinformatics research and applications
nasa formal methods
nasa formal methods
computational modeling of objects pr...
computational modeling of objects presented in images
computer vision - accv 2018
computer vision - accv 2018
artificial intelligence and soft com...
artificial intelligence and soft computing
multimodal pattern recognition of so...
multimodal pattern recognition of social signals in human-computer-interaction
logics in artificial intelligence
logics in artificial intelligence
computer vision - accv 2018
computer vision - accv 2018
advanced information systems engineering
advanced information systems engineering
applied cryptography and network sec...
applied cryptography and network security
functional imaging and modeling of t...
functional imaging and modeling of the heart
intelligent tutoring systems
intelligent tutoring systems
computer vision - accv 2018
computer vision - accv 2018
formal techniques for distributed ob...
formal techniques for distributed objects, components, and systems
services computing - scc 2019
services computing - scc 2019
multi-agent-based simulation xix
multi-agent-based simulation xix
artificial intelligence and mobile s...
artificial intelligence and mobile services - aims 2019
scale space and variational methods ...
scale space and variational methods in computer vision
mobile, secure, and programmable net...
mobile, secure, and programmable networking
artificial intelligence in education
artificial intelligence in education
artificial intelligence in education
artificial intelligence in education
natural language processing and info...
natural language processing and information systems
wireless algorithms, systems, and ap...
wireless algorithms, systems, and applications
transactions on computational collec...
transactions on computational collective intelligence xxxiii
computational science - iccs 2019
computational science - iccs 2019
computational science - iccs 2019
computational science - iccs 2019
computational science - iccs 2019
computational science - iccs 2019
blockchain - icbc 2019
blockchain - icbc 2019
logic, language, information, and co...
logic, language, information, and computation
graph-based representation and reasoning
graph-based representation and reasoning
models, mindsets, meta
models, mindsets, meta
advances in neural networks - isnn 2019
advances in neural networks - isnn 2019
recent trends in algebraic developme...
recent trends in algebraic development techniques
advances in practical applications o...
advances in practical applications of survivable agents and multi-agent systems
computational science - iccs 2019
computational science - iccs 2019
computational science - iccs 2019
computational science - iccs 2019
detection of intrusions and malware,...
detection of intrusions and malware, and vulnerability assessment
rough sets
rough sets
advances in computer graphics
advances in computer graphics
advances in neural networks - isnn 2019
advances in neural networks - isnn 2019
advances and trends in artificial in...
advances and trends in artificial intelligence
computational science and its applic...
computational science and its applications - iccsa 2019
computational science and its applic...
computational science and its applications - iccsa 2019
computational science and its applic...
computational science and its applications - iccsa 2019
coordination models and languages
coordination models and languages
towards autonomous robotic systems
towards autonomous robotic systems
reproducible research in pattern rec...
reproducible research in pattern recognition
theory and applications of satisfiab...
theory and applications of satisfiability testing - sat 2019
computational science and its applic...
computational science and its applications - iccsa 2019
computational science and its applic...
computational science and its applications - iccsa 2019
computational science and its applic...
computational science and its applications - iccsa 2019
graph transformation
graph transformation
progress in cryptology - africacrypt...
progress in cryptology - africacrypt 2019
cyber physical systems
cyber physical systems
distributed applications and interop...
distributed applications and interoperable systems
mathematical optimization theory and...
mathematical optimization theory and operations research
social, cultural, and behavioral mod...
social, cultural, and behavioral modeling
internet of things - iciot 2019
internet of things - iciot 2019
edge computing - edge 2019
edge computing - edge 2019
services - services 2019
services - services 2019
web services - icws 2019
web services - icws 2019
cloud computing - cloud 2019
cloud computing - cloud 2019
computer vision - accv 2018 workshops
computer vision - accv 2018 workshops
artificial intelligence in medicine
artificial intelligence in medicine
privacy technologies and policy
privacy technologies and policy
reuse in the big data era
reuse in the big data era
cognitive computing - iccc 2019
cognitive computing - iccc 2019
big data - bigdata 2019
big data - bigdata 2019
models, languages, and tools for con...
models, languages, and tools for concurrent and distributed programming
language, logic, and computation
language, logic, and computation
biomimetic and biohybrid systems
biomimetic and biohybrid systems
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
universal access in human-computer i...
universal access in human-computer interaction
intelligent robotics and applications
intelligent robotics and applications
hybrid systems biology
hybrid systems biology
intelligent robotics and applications
intelligent robotics and applications
numerical software verification
numerical software verification
security, privacy, and anonymity in ...
security, privacy, and anonymity in computation, communication, and storage
security, privacy, and anonymity in ...
security, privacy, and anonymity in computation, communication, and storage
algorithms and models for the web graph
algorithms and models for the web graph
structural information and communica...
structural information and communication complexity
computer aided verification
computer aided verification
computer aided verification
computer aided verification
engineering multi-agent systems
engineering multi-agent systems
post-quantum cryptography
post-quantum cryptography
combinatorial algorithms
combinatorial algorithms
towards autonomous robotic systems
towards autonomous robotic systems
e-learning and games
e-learning and games
artificial intelligence and security
artificial intelligence and security
artificial intelligence and security
artificial intelligence and security
artificial intelligence and security
artificial intelligence and security
artificial intelligence and security
artificial intelligence and security
communication technologies for vehicles
communication technologies for vehicles
advances in swarm intelligence
advances in swarm intelligence
advances in swarm intelligence
advances in swarm intelligence
progress in cryptology - latincrypt 2017
progress in cryptology - latincrypt 2017
code-based cryptography
code-based cryptography
developments in language theory
developments in language theory
computing and combinatorics
computing and combinatorics
web and big data
web and big data
web and big data
web and big data
augmented reality, virtual reality, ...
augmented reality, virtual reality, and computer graphics
augmented reality, virtual reality, ...
augmented reality, virtual reality, and computer graphics
intelligent computing theories and a...
intelligent computing theories and application
intelligent computing methodologies
intelligent computing methodologies
dna computing and molecular programming
dna computing and molecular programming
artificial general intelligence
artificial general intelligence
algorithms and data structures
algorithms and data structures
intelligent computing theories and a...
intelligent computing theories and application
fundamentals of computation theory
fundamentals of computation theory
parallel computing technologies
parallel computing technologies
formal grammar
formal grammar
algorithmic aspects in information a...
algorithmic aspects in information and management
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
at the intersection of language, log...
at the intersection of language, logic, and information
artificial neural nets problem solvi...
artificial neural nets problem solving methods
scientific engineering of distribute...
scientific engineering of distributed java applications
mechanizing mathematical reasoning
mechanizing mathematical reasoning
combinatorial geometry and graph theory
combinatorial geometry and graph theory
hybrid artificial intelligence systems
hybrid artificial intelligence systems
optical supercomputing
optical supercomputing
adaptive multimedial retrieval: retr...
adaptive multimedial retrieval: retrieval, user, and semantics
sharing data, information and knowledge
sharing data, information and knowledge
information security and privacy
information security and privacy
artificial neural networks in patter...
artificial neural networks in pattern recognition
logic, language, information and com...
logic, language, information and computation
informatics education - supporting c...
informatics education - supporting computational thinking
smart homes and health telematics
smart homes and health telematics
data integration in the life sciences
data integration in the life sciences
image analysis and recognition
image analysis and recognition
computing and combinatorics
computing and combinatorics
structural information and communica...
structural information and communication complexity
verified software: theories, tools, ...
verified software: theories, tools, experiments
from animals to animats 10
from animals to animats 10
multimodal technologies for percepti...
multimodal technologies for perception of humans
new stream cipher designs
new stream cipher designs
service-oriented computing
service-oriented computing
distributed computing and internet t...
distributed computing and internet technology
concurrency, security, and puzzles
concurrency, security, and puzzles
practical aspects of declarative lan...
practical aspects of declarative languages
multimedia modeling
multimedia modeling
multimedia modeling
multimedia modeling
foundations and practice of security
foundations and practice of security
logic and its applications
logic and its applications
transactions on large-scale data- an...
transactions on large-scale data- and knowledge-centered systems xxxi
data analytics for renewable energy ...
data analytics for renewable energy integration
cyber physical systems
cyber physical systems
approximation and online algorithms
approximation and online algorithms
agent based modelling of urban systems
agent based modelling of urban systems
sofsem 2017
sofsem 2017
smart computing and communication
smart computing and communication
topics in cryptology - ct-rsa 2017
topics in cryptology - ct-rsa 2017
graphic recognition
graphic recognition
unifying theories of programming
unifying theories of programming
verification, model checking, and ab...
verification, model checking, and abstract interpretation
electronic voting
electronic voting
reconstruction, segmentation, and an...
reconstruction, segmentation, and analysis of medical images
quantum interaction
quantum interaction
intelligent human computer interaction
intelligent human computer interaction
languages and compilers for parallel...
languages and compilers for parallel computing
statistical atlases and computationa...
statistical atlases and computational models of the heart
algorithms for sensor systems
algorithms for sensor systems
reasoning web
reasoning web
progress in pattern recognition, ima...
progress in pattern recognition, image analysis, computer vision, and applications
emerging technologies for education
emerging technologies for education
fuzzy logic and soft computing appli...
fuzzy logic and soft computing applications
algorithms and discrete applied math...
algorithms and discrete applied mathematics
information security and cryptology ...
information security and cryptology - icisc 2016
agents and artificial intelligence
agents and artificial intelligence
pattern recognition applications and...
pattern recognition applications and methods
digital forensics and watermarking
digital forensics and watermarking
latent variable analysis and signal ...
latent variable analysis and signal separation
semantic keyword-based search on str...
semantic keyword-based search on structured data sources
language and automata theory and app...
language and automata theory and applications
high-performance scientific computing
high-performance scientific computing
walcom
walcom
requirements engineering
requirements engineering
computer-assisted and robotic endoscopy
computer-assisted and robotic endoscopy
membrane computing
membrane computing
evolutionary multi-criterion optimiz...
evolutionary multi-criterion optimization
numerical software verification
numerical software verification
performance evaluation and benchmarking
performance evaluation and benchmarking
owl: experiences and directions - re...
owl: experiences and directions - reasoner evaluation
knowledge representation for health care
knowledge representation for health care
small dynamic complexity classes
small dynamic complexity classes
logic, language, and computation
logic, language, and computation
public-key cryptography - pkc 2017
public-key cryptography - pkc 2017
public-key cryptography - pkc 2017
public-key cryptography - pkc 2017
ki 2015: advances in artificial inte...
ki 2015: advances in artificial intelligence
knowledge graphs and big data proces...
knowledge graphs and big data processing /
augmented reality, virtual reality, ...
augmented reality, virtual reality, and computer graphics :
virtual reality and augmented reality :
virtual reality and augmented reality :
communication technologies for vehic...
communication technologies for vehicles :
software architecture
descriptional complexity of formal systems
human-centered software engineering
model checking software
service-oriented computing – icsoc 2021 workshops
information and communications security
experimental ir meets multilinguality, multimodality, and interaction
computer safety, reliability, and security
informatics in schools. a step beyond digital education
extended reality
databases theory and applications
innovative technologies and learning
extended reality
advances in databases and information systems
formal modeling and analysis of timed systems
electronic government
artificial intelligence and security
electronic voting
virtual reality and mixed reality
security and cryptography for networks
formal methods for industrial critical systems
educating for a new future: making sense of technology-enhanced learning adoption
role of digital technologies in shaping the post-pandemic world
distributed applications and interoperable systems
computer safety, reliability, and security. safecomp 2022 workshops
journey from process algebra via timed automata to model learning
artificial neural networks and machine learning – icann 2022
artificial neural networks and machine learning – icann 2022
artificial neural networks and machine learning – icann 2022
business process management
artificial neural networks and machine learning – icann 2022
logic, language, information, and computation
model-based safety and assessment
software architecture
quantitative evaluation of systems
logic-based program synthesis and transformation
algorithmic game theory
privacy in statistical databases
computational logistics
serious games
medical image computing and computer assisted intervention – miccai 2022
ophthalmic medical image analysis
linking theory and practice of digital libraries
resource-efficient medical image analysis
medical image computing and computer assisted intervention – miccai 2022
medical image computing and computer assisted intervention – miccai 2022
medical image computing and computer assisted intervention – miccai 2022
medical image computing and computer assisted intervention – miccai 2022
medical image computing and computer assisted intervention – miccai 2022
medical image computing and computer assisted intervention – miccai 2022
medical image computing and computer assisted intervention – miccai 2022
simplifying medical ultrasound
medical optical imaging and virtual microscopy image analysis
algorithmic aspects in information and management
uncertainty for safe utilization of machine learning in medical imaging
social, cultural, and behavioral modeling
advances in swarm intelligence
openmp in a modern world: from multi-device support to meta programming
cooperative design, visualization, and engineering
domain adaptation and representation transfer
predictive intelligence in medicine
medical image learning with limited and noisy data
mathematics of program construction
simulation and synthesis in medical imaging
data augmentation, labelling, and imperfections
software engineering and formal methods
perinatal, preterm and paediatric image analysis
machine learning for medical image reconstruction
computational mathematics modeling in cancer analysis
computer security – esorics 2022
pattern recognition
runtime verification
applied cryptography and network security workshops
computer security – esorics 2022
cooperative information systems
software engineering and formal methods. sefm 2021 collocated workshops
computer security – esorics 2022
post-quantum cryptography
networked systems
enterprise design, operations, and computing
similarity search and applications
cyberspace safety and security
science of cyber security
applications of medical artificial intelligence
cancer prevention through early detection
graph-theoretic concepts in computer science
hci international 2022 - late breaking papers. multimodality in advanced interaction environments
theoretical aspects of computing – ictac 2022
disinformation in open online media
hci international 2022 - late breaking papers. design, user experience and interaction
progress in cryptology - africacrypt 2022
trust, privacy and security in digital business
interpretability of machine intelligence in medical image computing
machine learning in clinical neuroimaging
deep generative models
distributed, collaborative, and federated learning, and affordable ai and healthcare for resource diverse global health
formal methods and software engineering
conceptual modeling
advances in cryptology – crypto 2022
advances in cryptology – crypto 2022
advances in cryptology – crypto 2022
reachability problems
social informatics
advances in cryptology – crypto 2022
innovative security solutions for information technology and communications
multiscale multimodal medical imaging
from data to models and back
hci international 2022 – late breaking papers: hci for health, well-being, universal access and healthy aging
semantic web – iswc 2022
algebraic informatics
leveraging applications of formal methods, verification and validation. adaptation and learning
leveraging applications of formal methods, verification and validation. practice
computer vision – eccv 2022
computer vision – eccv 2022
leveraging applications of formal methods, verification and validation. software engineering
leveraging applications of formal methods, verification and validation. verification principles
approximation and online algorithms
computer vision – eccv 2022
discrete geometry and mathematical morphology
computer vision – eccv 2022
hci international 2022 – late breaking papers: hci for today's community and economy
financial cryptography and data security
computer vision – eccv 2022
computer vision – eccv 2022
computer vision – eccv 2022
computer vision – eccv 2022
computer vision – eccv 2022
computer vision – eccv 2022
computer vision – eccv 2022
automated technology for verification and analysis
computer vision – eccv 2022
computer vision – eccv 2022
computer vision – eccv 2022
computer vision – eccv 2022
collaboration technologies and social computing
computer vision – eccv 2022
entertainment computing – icec 2022
health information science
pattern recognition and computer vision
pattern recognition and computer vision
pattern recognition and computer vision
applied reconfigurable computing. architectures, tools, and applications
computer vision – eccv 2022
computer vision – eccv 2022
swarm intelligence
latin 2022: theoretical informatics
computer vision – eccv 2022
computer vision – eccv 2022
computer vision – eccv 2022
computer vision – eccv 2022
string processing and information retrieval
analysis of images, social networks and texts
computer vision – eccv 2022
computer vision – eccv 2022
computer vision – eccv 2022
computer vision – eccv 2022
computer vision – eccv 2022
computer vision – eccv 2022
biometric recognition
formal aspects of component software
pricai 2022: trends in artificial intelligence
computer vision – eccv 2022
pricai 2022: trends in artificial intelligence
where responsibility takes you
computer vision – eccv 2022
pricai 2022: trends in artificial intelligence
computer vision – eccv 2022
computer vision – eccv 2022
web information systems engineering – wise 2022
provable and practical security
computer vision – eccv 2022
stabilization, safety, and security of distributed systems
bioinspired optimization methods and their applications
computer vision – eccv 2022
computer vision – eccv 2022
cryptology and network security
computer vision – eccv 2022
computer vision – eccv 2022
computer vision – eccv 2022
computer vision – eccv 2022
product-focused software process improvement
wireless algorithms, systems, and applications
wireless algorithms, systems, and applications
wireless algorithms, systems, and applications
search-based software engineering
information security practice and experience
artificial intelligence over infrared images for medical applications and medical image assisted biomarker discovery
advances in mobile computing and multimedia intelligence
service-oriented computing
information integration and web intelligence
combinatorial optimization
intelligent data engineering and automated learning – ideal 2022
games and learning alliance
pattern recognition and computer vision
programming languages and systems
frontiers in handwriting recognition
hci international 2022 – late breaking papers: ergonomics and product design
hci international 2022 – late breaking papers: interacting with extended reality and artificial intelligence
hci international 2022 - late breaking papers. interaction in new media, learning and games
computational diffusion mri
network and parallel computing
formal methods: foundations and applications
interactive storytelling
information security and privacy
static analysis
from born-physical to born-virtual: augmenting intelligence in digital libraries
security, privacy, and applied cryptography engineering
network and system security
web information systems and applications
web and internet economics
intertwining graphonomics with human movements
advances in visual computing
information security
imaging systems for gi endoscopy, and graphs in biomedical image analysis
big data – bigdata 2022
advances in visual computing
dependable software engineering. theories, tools, and applications
attacks and defenses for the internet-of-things
information systems security
algorithmics of wireless networks
rules and reasoning
architecture of computing systems
smart multimedia
cloud computing – cloud 2022
machine learning in medical imaging
software verification and formal methods for ml-enabled autonomous systems
supercomputing
edge computing – edge 2022
artificial intelligence and mobile services – aims 2022
web services – icws 2022
human aspects of it for the aged population. technology in everyday living
interactive collaborative robotics
artificial intelligence in neuroscience: affective analysis and health applications
bio-inspired systems and applications: from robotics to ambient intelligence
transdisciplinary reach of design science research
integer programming and combinatorial optimization
advances in cryptology – eurocrypt 2022
implementation and application of automata
virtual, augmented and mixed reality: applications in education, aviation and industry
combinatorial algorithms
high performance computing
pattern recognition and artificial intelligence
advances in cryptology – eurocrypt 2022
advances in cryptology – eurocrypt 2022
semantic web
integrated formal methods
pattern recognition and artificial intelligence
advanced information systems engineering
euro-par 2021: parallel processing workshops
integration of constraint programming, artificial intelligence, and operations research
pattern recognition
formal techniques for distributed objects, components, and systems
application and theory of petri nets and concurrency
reuse and software quality
coordination models and languages
foundations and practice of security
hci in mobility, transport, and automotive systems
universal access in human-computer interaction. novel design approaches and technologies
social computing and social media: design, user experience and impact
social computing and social media: applications in education and commerce
human-computer interaction. theoretical approaches and design methods
human-computer interaction. technological innovation
distributed, ambient and pervasive interactions. smart living, learning, well-being and health, art and creativity
culture and computing
distributed, ambient and pervasive interactions. smart environments, ecosystems, and cities
hci for cybersecurity, privacy and trust
learning and collaboration technologies. designing the learner and teacher experience
learning and collaboration technologies. novel technological environments
design, user experience, and usability: ux research, design, and assessment
design, user experience, and usability: design for emotion, well-being and health, learning, and culture
design, user experience, and usability: design thinking and practice in contemporary and emerging technologies
digital human modeling and applications in health, safety, ergonomics and risk management. health, operations management, and design
cross-cultural design. interaction design across cultures
cross-cultural design. applications in business, communication, health, well-being, and inclusiveness
human interface and the management of information: applications in complex technological environments
universal access in human-computer interaction. user and context diversity
human-computer interaction. user experience and behavior
human aspects of it for the aged population. design, interaction and technology acceptance
hci in games
adaptive instructional systems
digital human modeling and applications in health, safety, ergonomics and risk management. anthropometry, human behavior, and communication
cross-cultural design. applications in learning, arts, cultural heritage, creative industries, and virtual reality
cross-cultural design. product and service design, mobility and automotive design, cities, urban areas, and intelligent environments design
natural language processing and information systems
blended learning: engaging students in the new normal era
applied cryptography and network security
design, operation and evaluation of mobile communications
virtual, augmented and mixed reality: design and development
human interface and the management of information: visual and information design
computational science – iccs 2022
computational science – iccs 2022
participative urban health and healthy aging in the age of ai
tests and proofs
computational science – iccs 2022
computational science – iccs 2022
cyber security, cryptology, and machine learning
computer science – theory and applications
intelligent tutoring systems
detection of intrusions and malware, and vulnerability assessment
structural information and communication complexity
mathematical optimization theory and operations research
advances in swarm intelligence
reversible computation
revolutions and revelations in computability
web engineering
supercomputing frontiers
computers helping people with special needs
computers helping people with special needs
graph transformation
theoretical aspects of software engineering
artificial intelligence and security
artificial intelligence and security
logic of software. a tasting menu of formal methods
biomedical image registration
foundations of information and knowledge systems
image analysis and processing – iciap 2022
data and applications security and privacy xxxvi
image analysis and processing – iciap 2022
next generation arithmetic
socio-technical aspects in security
brainlesion: glioma, multiple sclerosis, stroke and traumatic brain injuries
computational science and its applications – iccsa 2022
computational science and its applications – iccsa 2022
computer information systems and industrial management
database systems for advanced applications. dasfaa 2022 international workshops
semantic web: eswc 2022 satellite events
brainlesion: glioma, multiple sclerosis, stroke and traumatic brain injuries
computational science and its applications – iccsa 2022 workshops
computational science and its applications – iccsa 2022 workshops
computational science and its applications – iccsa 2022 workshops
coalgebraic methods in computer science
information security and cryptology – icisc 2021
computational science and its applications – iccsa 2022 workshops
artificial intelligence in education. posters and late breaking results, workshops and tutorials, industry and innovation tracks, practitioners’ and doctoral consortium
big data analytics and knowledge discovery
medical image understanding and analysis
gaming, simulation and innovations: challenges and opportunities
artificial intelligence in education
computational science and its applications – iccsa 2022 workshops
database and expert systems applications
electronic government and the information systems perspective
rewriting logic and its applications
design and architecture for signal and image processing
euro-par 2022: parallel processing
advances in computer games
computational science and its applications – iccsa 2022 workshops
image analysis and processing. iciap 2022 workshops
computer aided verification
computer aided verification
image analysis and processing. iciap 2022 workshops
machines, computations, and universality
image analysis and processing – iciap 2022
machine learning and knowledge extraction
computer algebra in scientific computing
advances in information and computer security
cellular automata
embedded computer systems: architectures, modeling, and simulation
document analysis systems
intelligent computing theories and application
intelligent computing theories and application
mobile web and intelligent information systems
parallel problem solving from nature – ppsn xvii
requirements engineering: foundation for software quality
parallel problem solving from nature – ppsn xvii
hci in business, government and organizations
database and expert systems applications
haptic and audio interaction design
web and wireless geographical information systems
openshmem and related technologies. openshmem in the era of exascale and smart networks
reliability, safety, and security of railway systems. modelling, analysis, verification, and certification
nasa formal methods
haptics: science, technology, applications
head and neck tumor segmentation and outcome prediction
code-based cryptography
logic-based program synthesis and transformation
smart computing and communication
multimedia modeling
multimedia modeling
large-scale scientific computing
verification and evaluation of computer and communication systems
sense, feel, design
intelligent human computer interaction
persuasive technology
passive and active measurement
machine learning for networking
languages and compilers for parallel computing
kidney and kidney tumor segmentation
constructive side-channel analysis and secure design
selected areas in cryptography
foundations of software science and computation structures
programming languages and systems
fundamental approaches to software engineering
tools and algorithms for the construction and analysis of systems
tools and algorithms for the construction and analysis of systems
language, logic, and computation
modelling and simulation for autonomous systems
evolutionary computation in combinatorial optimization
advances in information retrieval
advances in information retrieval
advances in intelligent data analysis xx
cybersecurity of digital service chains
security and artificial intelligence
risks and security of internet and systems
service-oriented and cloud computing
applications of evolutionary computation
artificial intelligence in music, sound, art and design
genetic programming
database systems for advanced applications
pattern recognition and image analysis
database systems for advanced applications
database systems for advanced applications
embedded computer systems: architectures, modeling, and simulation
functional and logic programming
developments in language theory
pattern recognition
testing software and systems
pattern recognition
from born-physical to born-virtual
security, privacy, and applied cryptography engineering
network and system security
web information systems and applications
intelligent information and database systems
intelligent information and database systems
web and internet economics
advances in visual computing
imaging systems for gi endoscopy, and graphs in biomedical image analysis
big data - bigdata 2022
multi-agent systems
advances in visual computing
dependable software engineering
attacks and defenses for the internet-of-things
information systems security
algorithmics of wireless networks
rules and reasoning
architecture of computing systems
cloud computing - cloud 2022
mining intelligence and knowledge exploration
machine learning in medical imaging
advances in bioinformatics and computational biology
software verification and formal methods for ml-enabled autonomous systems
edge computing - edge 2022
artificial intelligence and mobile services - aims 2022
web services - icws 2022
artificial intelligence
artificial intelligence
interactive collaborative robotics
ethical and philosophical issues in medical imaging, multimodal learning and fusion across scales for clinical decision support, and topological data analysis for biomedical imaging
services computing - scc 2022
metaverse - metaverse 2022
theory of cryptography
theory of cryptography
theory of cryptography
blockchain - icbc 2022
principles of systems design
theory and applications of models of computation
artificial intelligence
frontiers of algorithmic wisdom
internet of things
trends in functional programming
computational theory of mind for human-machine teams
advances in conceptual modeling
computing and combinatorics
secure it systems
progress in cryptology - indocrypt 2022
structural, syntactic, and statistical pattern recognition
bioinformatics research and applications
distributed computer and communication networks
advances in computer graphics
cognitive computing - iccc 2022
human centered computing
transactions on computational science xxxix
transactions on rough sets xxiii
optimization and applications
advances in artificial intelligence - iberamia 2022
high performance computing
electronic participation
algorithms for big data
agents and artificial intelligence
transactions on computational collective intelligence xxxvii
heterogeneous data management, polystores, and analytics for healthcare
fast and low-resource semi-supervised abdominal organ segmentation
statistical atlases and computational models of the heart
big data analytics
social robotics
social robotics
learning and intelligent optimization
computer aided systems theory -- eurocast 2022
information processing in medical imaging
advanced information systems engineering
critical information infrastructures security
distributed applications and interoperable systems
formal techniques for distributed objects, components, and systems
detection of intrusions and malware, and vulnerability assessment
natural language processing and information systems
coordination models and languages
information security and privacy
web engineering
functional imaging and modeling of the heart
prolog
music in the ai era
multi-disciplinary trends in artificial intelligence
pattern recognition and image analysis
mathematical optimization theory and operations research
artificial intelligence in education
theoretical aspects of software engineering
computational science - iccs 2023
bioinformatics and biomedical engineering
bioinformatics and biomedical engineering
computational science - iccs 2023
computational science - iccs 2023
computational science and its applications - iccsa 2023 workshops
computational science and its applications - iccsa 2023 workshops
computational science and its applications - iccsa 2023 workshops
computational science and its applications - iccsa 2023 workshops
computational science and its applications - iccsa 2023 workshops
computational science and its applications - iccsa 2023 workshops
computational science and its applications - iccsa 2023 workshops
computational science - iccs 2023
computational science and its applications - iccsa 2023
computational science and its applications - iccsa 2023
computational science and its applications - iccsa 2023 workshops
computational science - iccs 2023
computational science and its applications - iccsa 2023 workshops
machine learning for networking
networked systems
advances in swarm intelligence
advances in swarm intelligence
blended learning : lessons learned and ways forward
artificial intelligence in hci
artificial intelligence in hci
design, operation and evaluation of mobile communications
cross-cultural design
cross-cultural design
cross-cultural design
digital human modeling and applications in health, safety, ergonomics and risk management
culture and computing
digital human modeling and applications in health, safety, ergonomics and risk management
data and applications security and privacy xxxvii
advances in practical applications of agents, multi-agent systems, and cognitive mimetics : the paams collection
reversible computation
comparative genomics
progress in cryptology -- africacrypt 2023
graph transformation
advances and trends in artificial intelligence : theory and applications
software architecture
computer aided verification
computer aided verification
brainlesion : glioma, multiple sclerosis, stroke and traumatic brain injuries
computer aided verification
new frontiers in artificial intelligence
advances and trends in artificial intelligence : theory and applications
unity of logic and computation
simulation and gaming for social impact
tests and proofs
3d research challenges in cultural heritage.
hci in business, government and organizations
hci in business, government and organizations
financial cryptography and data security : fc 2022 international workshops
algorithms and data structures
pattern recognition, computer vision, and image processing
electronic government and the information systems perspective
pattern recognition, computer vision, and image processing
trustworthy machine learning for healthcare
case-based reasoning research and development
advanced intelligent computing technology and applications
advanced intelligent computing technology and applications
advanced intelligent computing technology and applications
advanced intelligent computing technology and applications
advanced intelligent computing technology and applications
geometric science of information
geometric science of information
biomimetic and biohybrid systems
biomimetic and biohybrid systems
innovative technologies and learning
pattern recognition, computer vision, and image processing
logic and argumentation
mobile web and intelligent information systems
security and privacy in social networks and big data
modeling decisions for artificial intelligence
human interface and the management of information
artificial intelligence and security
security and cryptography for networks
formal methods for industrial critical systems
role of digital technologies in shaping the post-pandemic world
diagrammatic representation and inference
privacy in statistical databases
serious games
computational and corpus-based phraseology
chinese computational linguistics
interpretability of machine intelligence in medical image computing
cross-cultural design
descriptional complexity of formal systems
educating for a new future
openmp in a modern world
information security
application and theory of petri nets and concurrency
hci in mobility, transport, and automotive systems
universal access in human-computer interaction
social computing and social media
social computing and social media
human-computer interaction
human-computer interaction
culture and computing
augmented cognition
hci in games
learning and collaboration technologies
design, user experience, and usability
engineering psychology and cognitive ergonomics
design, operation and evaluation of mobile communications
universal access in human-computer interaction
human-computer interaction
distributed, ambient and pervasive interactions
distributed, ambient and pervasive interactions
hci for cybersecurity, privacy and trust
human aspects of it for the aged population
learning and collaboration technologies
adaptive instructional systems
digital human modeling and applications in health, safety, ergonomics and risk management
design, user experience, and usability
virtual, augmented and mixed reality
digital human modeling and applications in health, safety, ergonomics and risk management
cross-cultural design
cross-cultural design
human interface and the management of information
cyber security, cryptology, and machine learning
artificial intelligence and security
advances in cryptology - asiacrypt 2022
advances in cryptology - asiacrypt 2022
advances in cryptology - asiacrypt 2022
logic of software
conceptual modeling
design, user experience, and usability
cross-cultural design
hci in business, government and organizations
artificial intelligence and security
functional and logic programming
knowledge science, engineering and management
knowledge science, engineering and management
knowledge science, engineering and management
knowledge science, engineering and management
pattern recognition, computer vision, and image processing
big data analytics and knowledge discovery
post-quantum cryptography
implementation and application of automata
multi-agent programming contest 2022
network and system security
document analysis and recognition - icdar 2023 workshops
document analysis and recognition - icdar 2023 workshops
parallel computing technologies
database and expert systems applications
graph-based representation and reasoning
applicable formal methods for safe industrial products
database and expert systems applications
document analysis and recognition - icdar 2023
document analysis and recognition - icdar 2023
document analysis and recognition - icdar 2023
document analysis and recognition - icdar 2023
document analysis and recognition - icdar 2023
document analysis and recognition - icdar 2023
reproducible research in pattern recognition
electronic government
fuzzy logic and technology, and aggregation operators
transactions on computational science xl
machine learning and knowledge extraction
collaboration technologies and social computing
text, speech, and dialogue
euro-par 2023
advances in information and computer security
electronic participation
computer algebra in scientific computing
cellular automata and discrete complex systems
graph-based representations in pattern recognition
high performance computing
human-computer interaction - interact 2023
human-computer interaction - interact 2023
human-computer interaction - interact 2023
frontiers of algorithmics
human-computer interaction - interact 2023
architecture of computing systems
trends in functional programming
advances in databases and information systems
logic, language, information, and computation
hybrid artificial intelligent systems
formal modeling and analysis of timed systems
fundamentals of software engineering
responsive and sustainable educational futures
openmp : advanced task-based, device and compiler programming
intelligent computer mathematics
business process management
artificial evolution
automated deduction - cade 29
advances in bioinformatics and computational biology
algorithmic game theory
explainable and transparent ai and multi-agent systems
interactive collaborative robotics
image analysis and processing - iciap 2023
image analysis and processing - iciap 2023
extended reality
extended reality
intelligent information and database systems
intelligent information and database systems
flexible query answering systems
computational logistics
towards autonomous robotic systems
computational methods in systems biology
web information systems and applications
brain informatics
computer safety, reliability, and security
artificial intelligence and soft computing
artificial intelligence and soft computing
automated reasoning with analytic tableaux and related methods
frontiers of combining systems
quantitative evaluation of systems
job scheduling strategies for parallel processing
applied reconfigurable computing
social, cultural, and behavioral modeling
ophthalmic medical image analysis
machine learning and knowledge discovery in databases
machine learning and knowledge discovery in databases
machine learning and knowledge discovery in databases
machine learning and knowledge discovery in databases
machine learning and knowledge discovery in databases
formal methods for industrial critical systems
machine learning and knowledge discovery in databases
ki 2023
machine learning and knowledge discovery in databases
cooperative design, visualization, and engineering
testing software and systems
string processing and information retrieval
computer analysis of images and patterns
computer analysis of images and patterns
chinese computational linguistics
computer vision systems
fundamentals of computation theory
electronic voting
linking theory and practice of digital libraries
digital health transformation, smart ageing, and managing disability
artificial neural networks and machine learning - icann 2023
artificial neural networks and machine learning - icann 2023
artificial neural networks and machine learning - icann 2023
artificial neural networks and machine learning - icann 2023
artificial neural networks and machine learning - icann 2023
artificial neural networks and machine learning - icann 2023
artificial neural networks and machine learning - icann 2023
artificial neural networks and machine learning - icann 2023
artificial neural networks and machine learning - icann 2023
transactions on large-scale data- and knowledge-centered systems liv
graph-theoretic concepts in computer science
artificial neural networks and machine learning - icann 2023
big data - bigdata 2023
metaverse - metaverse 2023
logics in artificial intelligence
mining intelligence and knowledge exploration
progress in cryptology - latincrypt 2023
reliability, safety, and security of railway systems
database systems for advanced applications
web services - icws 2023
transactions on large-scale data- and knowledge-centered systems lv
artificial intelligence over infrared images for medical applications (aiiima 2023)
advances in computational intelligence
advances in computational intelligence
medical image computing and computer assisted intervention - miccai 2023
medical image computing and computer assisted intervention - miccai 2023
medical image computing and computer assisted intervention - miccai 2023
medical image computing and computer assisted intervention - miccai 2023
medical image computing and computer assisted intervention - miccai 2023
medical image computing and computer assisted intervention - miccai 2023
medical image computing and computer assisted intervention - miccai 2023
medical image computing and computer assisted intervention - miccai 2023
medical image computing and computer assisted intervention - miccai 2023
medical image computing and computer assisted intervention - miccai 2023
runtime verification
stabilization, safety, and security of distributed systems
simplifying medical ultrasound
informatics in schools
blockchain - icbc 2023
data engineering in medical imaging
artificial intelligence and mobile services - aims 2023
applied cryptography and network security workshops
reachability problems
intelligent robotics and applications
computer performance engineering and stochastic modelling
uncertainty for safe utilization of machine learning in medical imaging
simulation and synthesis in medical imaging
cancer prevention through early detection
natural language processing and chinese computing
natural language processing and chinese computing
natural language processing and chinese computing
machine learning in clinical neuroimaging
medical image learning with limited and noisy data
computational mathematics modeling in cancer analysis
discovery science
predictive intelligence in medicine
bioinformatics research and applications
graphonomics in human body movement
clinical image-based procedures, fairness of ai in medical imaging, and ethical and philosophical issues in medical imaging
intelligent robotics and applications
provable and practical security
intelligent robotics and applications
health information science
intelligent systems
intelligent systems
intelligent systems
perinatal, preterm and paediatric image analysis
service-oriented and cloud computing
intelligent robotics and applications
intelligent robotics and applications
intelligent robotics and applications
serious games
rules and reasoning
logic-based program synthesis and transformation
intelligent robotics and applications
intelligent robotics and applications
composability, comprehensibility and correctness of working software
automated technology for verification and analysis
information and communications security
semantic web
intelligent robotics and applications
security protocols xxviii
recent trends in algebraic development techniques
automated technology for verification and analysis
web information systems engineering - wise 2023
logic and engineering of natural language semantics
static analysis
logic, rationality, and interaction
learning and intelligent optimization
complex computational ecosystems
integrated uncertainty in knowledge modelling and decision making
integrated uncertainty in knowledge modelling and decision making
similarity search and applications
advances in conceptual modeling
code-based cryptography
image and graphics
image and graphics
image and graphics
image and graphics
conceptual modeling
image and graphics
security and trust management
shape in medical imaging
software engineering and formal methods
interactive storytelling
interactive storytelling
knowledge graphs and semantic web
cryptology and network security
semantic web - iswc 2023
semantic web - iswc 2023
aixia 2023 - advances in artificial intelligence
knowledge management and acquisition for intelligent systems
formal methods for an informal world
advanced data mining and applications
advanced data mining and applications
advanced data mining and applications
advanced data mining and applications
advanced data mining and applications
pattern recognition
pattern recognition
pattern recognition
embedded computer systems
haptic interaction
artificial intelligence xl
information security practice and experience
optimization and applications
advanced concepts for intelligent vision systems
disinformation in open online media
entertainment computing - icec 2023
pattern recognition and machine intelligence
intelligent data engineering and automated learning - ideal 2023
hci international 2023 - late breaking papers
hci international 2023 - late breaking papers
science of cyber security
hci international 2023 - late breaking papers
speech and computer
speech and computer
advances in mobile computing and multimedia intelligence
service-oriented computing
service-oriented computing
theoretical aspects of computing - ictac 2023
programming languages and systems
advances in web-based learning - icwl 2023
hci international 2023 - late breaking papers
virtual reality and mixed reality
hci international 2023 - late breaking papers
engineering multi-agent systems
theory of cryptography
theory of cryptography
theory of cryptography
theory of cryptography
leveraging generative intelligence in digital libraries
leveraging generative intelligence in digital libraries
medical image computing and computer assisted intervention - miccai 2023 workshops
advances in visual computing
hci international 2023 - late breaking papers
frontiers in software engineering education
information security
hci international 2023 - late breaking papers
biometric recognition
advances in visual computing
algorithmics of wireless networks
big data and artificial intelligence
information systems security
progress in artificial intelligence
progress in artificial intelligence
new sustainable horizons in artificial intelligence and digital solutions
advances in cryptology - asiacrypt 2023
advances in cryptology - asiacrypt 2023
advances in cryptology - asiacrypt 2023
advances in cryptology - asiacrypt 2023
advances in cryptology - asiacrypt 2023
advances in cryptology - asiacrypt 2023
advances in cryptology - asiacrypt 2023
advances in cryptology - asiacrypt 2023
coordination, organizations, institutions, norms, and ethics for governance of multi-agent systems xvi
advanced analytics and learning on temporal data
inductive logic programming
approximation and online algorithms
decision and game theory for security
rough sets
supercomputing
supercomputing
graph drawing and network visualization
practical aspects of declarative languages
graph drawing and network visualization
medical image computing and computer assisted intervention - miccai 2023 workshops
brainlesion
computational diffusion mri
walcom
ethics and responsible research and innovation in practice
algorithms and models for the web graph
pattern recognition
cyber security, cryptology, and machine learning
descriptional complexity of formal systems
advances in cryptology - crypto 2023
advances in cryptology - crypto 2023
advances in cryptology - crypto 2023
advances in cryptology - crypto 2023
advances in cryptology - crypto 2023
evolutionary multi-criterion optimization
scale space and variational methods in computer vision
formal concept analysis
learning and collaboration technologies
learning and collaboration technologies
distributed, ambient and pervasive interactions
distributed, ambient and pervasive interactions
adaptive instructional systems
human aspects of it for the aged population
human aspects of it for the aged population
augmented cognition
human interface and the management of information
human interface and the management of information
engineering psychology and cognitive ergonomics
human-computer interaction
human-computer interaction
human-computer interaction
human-computer interaction
hci in mobility, transport, and automotive systems
universal access in human-computer interaction
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
design, user experience, and usability
hci for cybersecurity, privacy and trust
universal access in human-computer interaction
social computing and social media
hci in games
multi-agent systems
Processing
...
Change password
Login