![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
The First International Conference on Digital Forensics and Cyber Crime (ICDF2C) was held in Albany from September 30 to October 2, 2009. The field of digital for- sics is growing rapidly with implications for several fields including law enforcement, network security, disaster recovery and accounting. This is a multidisciplinary area that requires expertise in several areas including, law, computer science, finance, networking, data mining, and criminal justice. This conference brought together pr- titioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. All the conference sessions were very well attended with vigorous discussions and strong audience interest. The conference featured an excellent program comprising high-quality paper pr- entations and invited speakers from all around the world. The first day featured a plenary session including George Philip, President of University at Albany, Harry Corbit, Suprintendent of New York State Police, and William Pelgrin, Director of New York State Office of Cyber Security and Critical Infrastructure Coordination. An outstanding keynote was provided by Miklos Vasarhelyi on continuous auditing. This was followed by two parallel sessions on accounting fraud /financial crime, and m- timedia and handheld forensics. The second day of the conference featured a mesm- izing keynote talk by Nitesh Dhanjani from Ernst and Young that focused on psyc- logical profiling based on open source intelligence from social network analysis. The third day of the conference featured both basic and advanced tutorials on open source forensics.
The use of computing technology for entertainment purposes is not a recent p- nomenon. Video game consoles, home computers and other entertainment media have been used widely for more than three decades, and people of all ages are spe- ing an increasing amount of time and money on these technologies. More recent is the rise of a vibrant research community focusing on gaming and entertainment applications. Driven by the growth and the coming of age of the g- ing industry, and by its increasing recognition in the media and the minds of the broader public, the study of computer games, game development and experiences is attracting the interest of researchers from very diverse fields: social sciences, comp- ing, electrical engineering, design, etc. Research of this kind looks to extend the boundaries of gaming technologies. In a relentless drive for innovation, it looks to create and understand an ever increasing range of experiences, and examine how games can provide value for educational, therapeutic and other 'serious' purposes. These themes were reflected in the call for participation and eventually the papers accepted for presentation. The Fun n' Games conference was the second event of a bi-annual series of c- ferences. The first event of the series was held in Preston in 2006 organized by the University of Central Lancashire. Following the success of this event it was decided to run a follow up.
Since1994, CARDIShasbeentheforemostinternationalconferencededicatedto smart card research and applications. Every two years, the scienti?c community congregates to present new ideas and discuss recent developments with both an academicandindustrialfocus.Followingtheincreasedcapabilitiesofsmartcards anddevices, CARDIS has becomea majoreventfor the discussionofthe various issuesrelatedtotheuseofsmallelectronictokensintheprocessofhuman-machine interactions.Thescopeoftheconferenceincludesnumeroussub?eldssuchasn- working, e?cientimplementations, physicalsecurity, biometrics, andso on. This year's CARDIS was held in London, UK, on September 8-11, 2008. It was organized by the Smart Card Centre, Information Security Group of the Royal Holloway, University of London. Thepresentvolumecontainsthe21papersthatwereselectedfromthe51s- missions to the conference. The 22 members of the program committee worked hard in order to evaluate each submission with at least three reviews and agree on a high quality ?nal program. Additionally, 61 external reviewers helped the committee with their expertise. Two invited talks completed the technical p- gram. The ?rst one, given by Ram Banerjee and Anki Nelaturu, was entitled "Getting Started with Java Card 3.0 Platform." The second one, given by Aline Gouget, was about "Recent Advances in Electronic Cash Design" and was c- pleted by an abstract provided in these proceedings.
The International Conference on E-commerce and Web Technologies (EC-Web) is a mature and well-established forum for researchers working in the area of electronic commerce and web technologies. These are the proceedings of the ninth conference in the series, which, like previous EC-Web conferences, was co-located with DEXA, the International Conference on Database and Expert Systems Applications, which, this year, took place in Turin, Italy. One key feature of EC-Web is its two-fold nature: it brings together both papers proposing technological solutions for e-commerce and the World Wide Web, and papers concerning the management of e-commerce, such as web marketing, the impact of e-commerce on business processes and organizations, the analysis of case studies, as well as social aspects of e-commerce (to understand the impact of e-commerce solutions on day-to-day life and the new opportunities that these behaviors open). The technical program included 12 reviewed papers and two invited papers. Each paper was reviewed by five reviewers, in order to select only the best quality papers. The program included five sessions: "Security in E-Commerce" (with two papers), "Social Aspects of E-Commerce" (with two papers), "Business Process and EC Inf- structures" (with three papers), "Recommender Systems and E-Negotiations" (with four papers) and "Web Marketing and User Profiling" (with three papers). We found the program interesting and we hope participants and readers feel the same. Furthermore, we hope the attendees enjoyed the conference and Turin. June 2008 Giuseppe Psaila Roland R. Wagner
WISE 2008 was held in Auckland, New Zealand, during September 1-3, at The Auckland University ofTechnology City Campus Conference Centre. The aim of this conferencewasto providean internationalforum for researchers, professi- als, and industrial practitioners to share their knowledge in the rapidly growing area of Web technologies, methodologies, and applications. Previous WISE c- ferences wereheld in Hong Kong, China (2000), Kyoto, Japan (2001), Singapore (2002), Rome, Italy (2003), Brisbane, Australia (2004), New York, USA (2005), Wuhan, China (2006) and Nancy, France (2007). The call for papers created considerable interest. Around 110 paper s- missions were received and the international Program Committee selected 31 papers out of the 110 submissions (an acceptance rate of 28. 2%). Of these, 17 papers were chosen for standard presentation and the remaining 14 papers for short presentation. The authors of the accepted papers range across 13 co- tries: Australia, China, Germany, Greece, Italy, Japan, Korea, New Zealand, Poland, Singapore, Spain, Switzerland and the USA. The technical track of the WISE 2008 program o?ered nine paper presentation sessions. The selected - pers covered a wide and important variety of issues in Web information systems engineering such as querying; search; ranking; trust; peer-to-peer networks; - formation ?ltering; information integration; agents and mining. A few selected papers from WISE 2008 will be published in a special issue of the World Wide Web Journal, bySpringer. Inaddition, a $1000prizewasawardedto the authors ofthepaperselectedforthe"YahikoKambayashiBestPaperAward. "Wethank all authors who submitted their papers and the Program Committee members andexternalreviewersfor their excellent work.
TheseriesofworkshopsonMachineLearningforMultimodalInteraction(MLMI) celebratesthisyearits?fthanniversary.Onthisoccasion, anumberofinnovations havebeenintroducedin the reviewingandpublicationprocedures, while keeping the focus onthe samescienti?c topics. For the ?rst time, the reviewing process has been adapted in order to p- parethe proceedings in time for the workshop, held on September 8-10,2008, in Utrecht, The Netherlands. The 47 submissions received by the Program C- mittee were ?rst reviewed by three PC members each, and then advocated by an Area Chair. Overall, 12 oral presentations (ca. 25% of all submissions) and 15 poster presentations were selected. Authors were given one month to revise their papers according to the reviews, and the ?nal versions were brie?y checked by the two Program Co-chairs. Both types of presentation have been give equal space in the present proceedings. The 32 papers gathered in this volume cover a wide range of topics - lated to human-human communication modeling and processing, as well as to human-computer interaction, using several communication modalities. A sign- icant number of papers focus on the analysis of non-verbal communication cues, such as the expression of emotions, laughter, face turning, or gestures, which demonstrates a growing interest for social signal processing. Yet, another large set of papers targets the analysis of communicative content, with a focus on the abstractionofinformationfrommeetingsintheformofsummaries, actionitems, ordialogueacts.OthertopicspresentedatMLMI2008includeaudio-visualscene analysis, speech processing, interactive systems and applica
It is a great pleasure to share with you the Springer LNCS proceedings of the Second World Summit on the Knowledge Society, WSKS 2009, organized by the Open - search Society, Ngo, http: //www.open-knowledge-society.org, and held in Samaria Hotel, in the beautiful city of Chania in Crete, Greece, September 16-18, 2009. The 2nd World Summit on the Knowledge Society (WSKS 2009) was an inter- tional scientific event devoted to promoting dialogue on the main aspects of the knowledge society towards a better world for all. The multidimensional economic and social crisis of the last couple of years has brought to the fore the need to discuss in depth new policies and strategies for a human centric developmental processes in the global context. This annual summit brings together key stakeholders involved in the worldwide development of the knowledge society, from academia, industry, and government, including policy makers and active citizens, to look at the impact and prospects of - formation technology, and the knowledge-based era it is creating, on key facets of l- ing, working, learning, innovating, and collaborating in today's hyper-complex world. The summit provides a distinct, unique forum for cross-disciplinary fertilization of research, favoring the dissemination of research on new scientific ideas relevant to - ternational research agendas such as the EU (FP7), OECD, or UNESCO. We focus on the key aspects of a new sustainable deal for a bold response to the multidimensional crisis of our times.
The security issues set by the global digitization of our society have had, and will continue to have, a crucial impact at all levels of our social organization, including, just to mention a few, privacy, economics, environmental policies, national sovereignty, medical environments. The importance of the collaborations in the various ?elds of computer s- ence to solve these problems linked with other sciences and techniques is clearly recognized. Moreover, the collaborative work to bridge the formal theory and practical applications becomes increasingly important and useful. In this context, and since France and Japan have strong academic and ind- trial backgrounds in the theory and practice of the scienti?c challenges set by this digitized world, in 2005 we started a formal French-Japanese collaboration and workshop series on computer security. The three ?rst editions of these French-Japanese Computer Security wo- shops in Tokyo, September 5-7, 2005 and December 4-5, 2006 and in Nancy, March 13-14, 2008 were very fruitful and were accompanied by several imp- tant research exchanges between France and Japan. Because of this success, we launched a call for papers dedicated to computer security from it's foundation to practice, with the goal of gathering together ?nal versions of the rich set of papers and ideas presented at the workshops, yet opening the call to everyone interested in contributing in this context. This v- ume presents the selection of papers arising from this call and this international collaboration.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This fourth issue contains five contributions in the area of digital watermarking. The first three papers deal with robust watermarking. The fourth paper introduces a new least distortion linear gain model for halftone image watermarking and the fifth contribution presents an optimal histogram pair based image reversible data hiding scheme.
This book constitutes the thoroughly refereed post-workshop proceedings of the 5th International Workshop on Agents and Peer-to-Peer Computing, AP2PC 2006, held in Hakodate, Japan, in May 2006, in the context of the 5th International Joint Conference on Autonomous Agents and Multi-Agent Systems, AAMAS 2006. The 10 revised full papers and 6 revised short papers presented together with 1 invited paper were carefully reviewed and selected from 23 submissions; they are fully revised to incorporate reviewers' comments and discussions at the workshop. The volume is organized in topical sections on P2P Infrastructure, agents in P2P, P2P search, and applications.
Welcome to the proceedings of the 9th International Conference on Intelligent Virtual Agents, held September 14-16, 2009 in Amsterdam, The Netherlands. Intelligent virtual agents (IVAs) are interactive characters that exhibit hum- like qualities and communicate with humans or with each other using natural human modalities such as speech and gesture. They are capable of real-time perception, cognition and action, allowing them to participate in a dynamic physical and social environment. IVA is an interdisciplinary annual conference and the main forum for p- senting research on modeling, developing and evaluating IVAs with a focus on communicative abilities and social behavior. The development of IVAs requires expertise in multimodal interaction and several AI ?elds such as cognitive m- eling, planning, vision and natural language processing. Computational models are typically based on experimental studies and theories of human-human and human-robot interaction; conversely, IVA technology may provide interesting lessons for these ?elds. The realization of engaging IVAs is a challenging task, so reusable modules and tools are of great value. The ?elds of application range from robot assistants, social simulation and tutoring to games and artistic - ploration.
This volume contains the proceedings of the 12th Financial Cryptography and DataSecurityInternationalConference, heldinCozumel, Mexico, January28-31 2008. Financial cryptography (FC) and data security has been for years the main international forum for research, advanced development, education, exploration, and debate regarding information assurance in the context of ?nance and commerce. Despite the strong competition from other top-tier related security conf- ences, the Program Committee received a signi?cant number of submissions, indicating a growingacceptance of FC as the premier ?nancialand data security forum. The ProgramCommittee, led by the PCChair Gene Tsudik, achievedan excellent program balance between research, practice, and panel sessions. This year the program included two new additions, namely, a short-paper track and a poster session, both extremely well received. Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadeloupe, Bermuda, and the Grand Cayman. In 2008 we continued this t- dition and the conference was located in sunny Cozumel, Mexico. The ongoing carnival, sailing, submarine trips, and Mayan ruins were just a few of the - merous exciteme
The IEEE Tutorialand ResearchWorkshopon Perceptionand InteractiveTe- nologies for Multimodal Dialogue Systems (PIT 2008) is the continuation of a successful series of workshops that started with an ISCA Tutorial and Research WorkshoponMultimodalDialogueSystemsin1999.Thisworkshopwasfollowed by a second one focusing on mobile dialogue systems (IDS 2002), a third one exploring the role of a?ect in dialogue (ADS 2004), and a fourth one focusing on perceptive interfaces (PIT 2006). Like its predecessors, PIT 2008 took place at Kloster Irsee in Bavaria. Due to the increasing interest in perceptive interfaces, we decided to hold a follow-up workshop on the themes discussed at PIT 2006, but encouraged aboveallpaperswithafocusonperceptioninmultimodaldialoguesystems.PIT 2008received37 paperscoveringthe following topics (1) multimodal and spoken dialogue systems, (2) classi?cation of dialogue acts and sound, (3) recognitionof eye gaze, head poses, mimics and speech aswellascombinationsofmodalities, (4) vocal emotion recognition, (5) human-like and social dialogue systems and (6) evaluation methods for multimodal dialogue systems. Noteworthy was the strong participation from industry at PIT 2008. Indeed, 17 of the accepted 37 papers come from industrial organizations or were written in collaboration with them. Wewouldliketothankallauthorsforthe e?ortthey madewiththeirsubm- sions, and the Program Committee - nearly 50 distinguished researchers from industry and academia - who worked very hard to meet tight deadlines and selected the best contributions for the ?nal program. Special thanks goes to our invited speaker, Anton Batliner from Friedrich-Alexander-Universit] atErlangen- N] urnberg."
Informatics Education - Supporting Computational Thinking contains papers presented at the Third International Conference on Informatics in Secondary Schools - Evolution and Perspective, ISSEP 2008, held in July 2008 in Torun, Poland. As with the proceedings of the two previous ISSEP conferences (2005 in Klag- furt, Austria, and 2006 in Vilnius, Lithuania), the papers presented in this volume address issues of informatics education transcending national boundaries and, the- fore, transcending differences in the various national legislation and organization of the educational system. Observing these issues, one might notice a trend. The p- ceedings of the First ISSEP were termed From Computer Literacy to Informatics F- damentals [1]. There, broad room was given to general education in ICT. The ECDL, the European Computer Driving License, propagated since the late 1990s, had pe- trated school at this time already on a broad scale and teachers, parents, as well as pupils were rather happy with this situation. Teachers had material that had a clear scope, was relatively easy to teach, and especially easy to examine. Parents had the assurance that their children learn "modern and relevant stuff," and for kids the c- puter was sufficiently modern so that anything that had to do with computers was c- sidered to be attractive. Moreover, the difficulties of programming marking the early days of informatics education in school seemed no longer relevant. Some colleagues had a more distant vision though.
With the widespread interest in digital entertainment and the advances in the technologies of computer graphics, multimedia and virtual reality technologies, the new area of "Edutainment" has been accepted as a union of education and computer entertainment. Edutainment is recognized as an effective way of learning through a medium, such as a computer, software, games or AR/VR applications, that both educates and entertains. The Edutainment conference series was established and followed as a special event for the new interests in e-learning and digital entertainment. The main purpose of Edutainment conferences is the discussion, presentation, and information exchange of scientific and technological developments in the new community. The Edutainment conference series is a very interesting opportunity for researchers, engineers, and graduate students who wish to communicate at these international annual events. The conference series includes plenary invited talks, workshops, tutorials, paper presen- tion tracks, and panel discussions. The Edutainment conference series was initiated in Hangzhou, China in 2006. Following the success of the first (Edutainment 2006 in Hangzhou, China), the second (Edutainment 2007 in Hong Kong, China), and the third events (Edutainment 2008 in Nanjing, China), Edutainment 2009 was held August 9-11, 2009 in Banff, Canada. This year, we received 116 submissions from 25 different countries and regions - cluding Austria, Canada, China, Denmark, Finland, France, Germany, Greece, Hong Kong, Italy, Japan, Korea, Malaysia, Mexico, The Netherlands, Norway, Portugal, Singapore, Spain, Sweden, Switzerland, Taiwan, Trinidad and Tobago, UK, and USA.
This volume contains the proceedings of UIC 2009, the 6th International C- ference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces. The UIC 2009 conference was technically co-sponsored by the IEEE and the IEEE Computer Society Technical Committee on Scalable Computing. The conference was also sponsored by the Australian Centre of - cellence in Information and Communication Technologies (NICTA). UIC 2009 was accompanied by six workshops on a variety of research challenges within the area of ubiquitous intelligence and computing. The conference was held in Brisbane, Australia, July 7-9, 2009. The event was the sixth meeting of this conference series. USW 2005 (First International Workshop on Ubiquitous Smart World), held in March 2005 in Taiwan, was the ?rst event in the series. This event was followed by UISW 2005 (Second International Symposium on Ubiquitous Intelligence and Smart Worlds) held in December 2005 in Japan. Since 2006, the conference has been held annually under the name UIC (International Conference on Ubiquitous Intelligence and Computing). UIC 2006 was held in September 2006 in Wuhan andThreeGorges, China, followedbyUIC2007heldinJuly2007inHongKong, and UIC 2008 held in June 2008 in Oslo, Norway. Ubiquitous sensors, computers, networksand informationare paving the way towardasmartworldinwhichcomputationalintelligenceisdistributedthrou- out the physical environment to provide reliable and relevant services to peop
The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The 2009 two-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, s- cial events and infrastructures. The importance of adopting systematic and systemic approaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors. The conference provided an opportunity for systems scientists, assurance researchers, owners, ope- tors and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in these challenging domains while networking with the leading researchers and solution providers. ICGS3 2009 received paper submissions from more than 20 different countries around the world. Only 28 papers were selected and were presented as full papers. The program also included three keynote lectures by leading researchers, security professionals and government representatives. June 2009 Hamid Jahankhani Ali Hessami Feng Hsu
This book constitutes the proceedings of the First International Conference on User Modeling, Adaptation, and Personalization, held in Trento, Italy, on June 22-26, 2009. This annual conference was merged from the biennial conference series User Modeling, UM, and the conference on Adaptive Hypermedia and Adaptive Web-Based Systems, AH. The 53 papers presented together with 3 invited talks were carefully reviewed and selected from 125 submissions. The tutorials and workshops were organized in topical sections on constraint-based tutoring systems; new paradigms for adaptive interaction; adaption and personalization for Web 2.0; lifelong user modeling; personalization in mobile and pervasive computing; ubiquitous user modeling; user-centered design and evaluation of adaptive systems.
Electronic voting has a young and attractive history, both in the design of basic cryptographic methods and protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, and hence how to prevent accidental or malicious abuse of electronic voting in elections. To address this problem, Volkamer structured her work into four parts: "Fundamentals" provides an introduction to the relevant issues of electronic voting. "Requirements" contributes a standardized, consistent, and exhaustive list of requirements for e-voting systems. "Evaluation" presents the proposal and discussion of a standardized evaluation methodology and certification procedure called a core Protection Profile. Finally, "Application" describes the evaluation of two available remote electronic voting systems according to the core Protection Profile. The results presented are based on theoretical considerations as well as on practical experience. In accordance with the German Society of Computer Scientists, Volkamer succeeded in specifying a "Protection Profile for a Basic Set of Security Requirements for Online Voting Products," which has been certified by the German Federal Office for Security in Information Technology. Her book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems.
This volume contains the proceedings of the Third KES Symposium on Agent and Multi-agent Systems - Technologies and Applications (KES-AMSTA 2009)--held at Uppsala University in Sweden during June 3-5, 2009. The symposium was organized by Uppsala University, KES International and its Focus Group on Agent and Multi-agent Systems. The KES-AMSTA Symposium series is a sub-series of the KES Conference series. Following the successes of the First KES Symposium on Agent and Multi-agent Systems - Technologies and Applications (KES-AMSTA 2007), held in Wroclaw, Poland, from May 31 to 1 June 2007--and the Second KES Symposium on Agent and Multi-agent Systems - Technologies and Applications (KES-AMSTA 2008) held in Incheon, Korea, March 26-28, 2008--KES-AMSTA 2009 featured keynote talks, oral and poster presentations, and a number of workshops and invited sessions, closely aligned to the themes of the conference. The aim of the symposium was to provide an international forum for scientific - search into the technologies and applications of agent and multi-agent systems. Agent and multi-agent systems are an innovative type of modern software system and have long been recognized as a promising technology for constructing autonomous, c- plex and intelligent systems. A key development in the field of agent and multi-agent systems has been the specification of agent communication languages and formali- tion of ontologies. Agent communication languages are intended to provide standard declarative mechanisms for agents to communicate knowledge and make requests of each other, whereas ontologies are intended for conceptualization of the knowledge domain.
This book constitutes the refereed proceedings of the 22nd Conference on Artificial Intelligence, Canadian AI 2009, held in Kelowna, Canada, in May 2009. The 15 revised full papers presented together with 19 revised short papers, 8 papers from the graduate student symposium and the abstracts of 3 keynote presentations were carefully reviewed and selected from 63 submissions. The papers present original high-quality research in all areas of Artificial Intelligence and apply historical AI techniques to modern problem domains as well as recent techniques to historical problem settings.
The emerging information technologies have enabled new human patterns ranging from physiological interactions to psychological interactions. Perhaps the best example is the rapid 'evolution' of our thumbs from simply holding to controlling mobile devices in just a few years recently. Taking the medical field as an example, the fast-growing technologies such as pill cameras, implantable devices, robotic surgeries, and virtual reality training methods will change the way we live and work. Human Algorithms aim to model human forms, interactions, and dynamics in this new context. Human Algorithms are engineering methods that are beyond theories. They intend to push the envelopes of multi-physics, sensing, and virtual technologies to the limit. They have become more comprehensive and inexpensive for use in real-world designs: inside monitors, connected to networks, and under the patient's skin. This book aims to reflect the state of the art of Human Algorithms. It is a survey of innovative ideas for readers who may be new to this field. The targeted groups include college students, researchers, engineers, designers, scientists, managers, and healthcare professionals. The 11 chapters are divided into three parts: Human Dynamics, Virtual Humans, and Human Forms. Part I: Human Dynamics. In the first chapter "Implantable Computing," Warwick and Gasson present an overview of the latest developments in the field of Brain to Computer Interfacing. They describe human experimentation in which neural implants have linked the human nervous system bi-directionally with technological devices and the Internet. In the chapter "Brainwave-Based Imagery Analysis," Cowell et al.
This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Financial Cryptography and Data Security, FC 2007, and the co-located 1st International Workshop on Usable Security, USEC 2007, both held in Scarborough, Trinidad/Tobago, in February 2007. The book includes 17 revised full papers, 1 system presentation paper and the transcriptions of 5 panel sessions from FC 2007. The papers, which were carefully reviewed and selected from 85 submissions, are organized in topical sections on Payment Systems, Anonymity, Authentication, Anonymity and Privacy, Cryptography and Commercial Transactions, Financial Transactions and Web Services, and Cryptography. The book concludes with 5 revised full and 5 revised short papers from the USEC 2007 workshop. This workshop brought together an interdisciplinary group of researchers and practitioners to discuss usability problems and deepen the understanding of users' capabilities and motivations in performing security tasks.
Thisyear'svolumeofAdvancesinWebMiningandWebUsageAnalysiscontains thepostworkshopproceedingsofajointevent,the9thInternationalWorkshopon Knowledge Discovery from the Web (WEBKDD 2007) and the First SNA-KDD Workshop on Social Network Analysis (SNA-KDD 2007). The joint workshop on Web Mining and Social Network Analysis took place at the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD). It attracted 23 submissions, of which 14 were accepted for presentation at the workshop. Eight of them have been extended for inclusion in this volume. WEBKDD is one of the most traditional workshops of the ACM SIGKDD internationalconference, under the auspices of which it has been organizedsince 1999. The strong interest for knowledge discovery in the Web, fostered not least by WEBKDD itself, has led to solutions for many problems in the Web's p- mature era. In the meanwhile, the Web has stepped into a new era, where it is experienced as a social medium, fostering interaction among people, enabling and promoting the sharing of knowledge, experiences and applications, char- terized by group activities, community formation, and evolution. The design of Web 2. 0 re?ects the socialcharacterof the Web, bringing new potential and new challenges. The 9th WEBKDD was devoted to the challenges and opportunities of mining for the social Web and promptly gave rise to the joint event with the First Workshop on Social Network Analysis (SNA-KDD). Social network research has advanced signi?cantly in the last few years, strongly motivated by the prevalence of online social websites and a variety of large-scale o?ine social network systems.
This volume contains the papers presented at the International Workshop on Internet and Network Economics held during December 17-20, 2008, in Sha- hai, China, for its fourth edition. WINE 2008 provided a forum for researchers from di?erent disciplines to communicate with each other and exchange their researching ?ndings in this emerging ?eld. WINE 2008hadteninvitedspeakers: FanChungGraham, MatthewJackson, Lawrence Lau, Tom Luo, Eric Maskin, Paul Milgrom, Christos Papadimitriou, Herbert Scarf, Hal Varian and Yinyu Ye. There were 126 submissions. Each submission was reviewed on average by 2. 5 Programme Committee members. The Committee decided to accept 68 papers. The programme also included 10 invited talks. This ?nal program contained papers covering topics including equilibrium, information markets, sponsored auction, network economics, mechanism - sign, socialnetworks, advertisementpricing, computationalequilibrium, network games, algorithms and complexity for games. December 2008 Christos Papadimitriou Shuzhong Zhang Organization Programme Chairs Conference Chair Herbert E. Scarf (Yale University) Program Co-chair Christos Papadimitriou (UC Berkeley) Program Co-chair Shuzhong Zhang (Chinese University of Hong Kong) Local Organizing Committee Chairs Committee Chair Yifan Xu (Fudan University) Committee Co-chair Duan Li (Chinese University of Hong Kong) Committee Co-chair ShouyangWang(ChineseAcademyofSciences) Committee Co-chair Xiaoping Zhao (SSE INFONE |
You may like...
|