ArchivesNews Springer Nature: Computer Science eBooks Textbook: Computer Science A Beginners Guide to Python 3 ProgrammingA Beginner’s Guide to Scala, Object Orientation and Functional ProgrammingA First Introduction to Quantum Computing and InformationA New Kind of Computational BiologyA Practical Approach to Compiler ConstructionA Practical Approach to High-Performance ComputingAdvanced Guide to Python 3 ProgrammingAdventures in Computer Science Agile Modeling with UMLAlgorithms for Functional ProgrammingAn Introduction to Kolmogorov Complexity and Its ApplicationsAn Introduction to Machine LearningAn Introduction to Metaheuristics for OptimizationAnalysis for Computer ScientistsAnswer Set ProgrammingApplied Logic for Computer Scientists Applied Machine Learning Applied Scientific ComputingArtificial IntelligenceArtificial Intelligence and GamesAutomotive Software ArchitecturesAutonomous Cyber DeceptionBasic Graph TheoryBasic Music TechnologyBidirectional TransformationsBig Data Analytics: Systems, Algorithms, ApplicationsBroad Learning Through FusionsBusiness Process ManagementCABology: Value of Cloud, Analytics and Big Data Trio WaveCalculus for Computer GraphicsCentral European Functional Programming SchoolCinderella’s StickCloud Service BenchmarkingComputational GeometryComputational ThinkingComputer Graphics for Java ProgrammersComputer Music InstrumentsComputer Music Instruments IIComputer VisionConcepts of Soft ComputingConcise Guide to DatabasesConcise Guide to Formal MethodsConcise Guide to Object-Oriented ProgrammingConcise Guide to Software EngineeringConcise Guide to Software TestingConformance CheckingCore Data Analysis: Summarization, Correlation, and VisualizationCryptography Made SimpleData Mining Data Science and Predictive AnalyticsData Structures and Algorithms with PythonData Structures and Algorithms with ScalaDeep Learning for NLP and Speech Recognition Deep Learning with RDesign and Development of Web Information SystemsDesigning Reliable Distributed SystemsDesigning Usable and Secure Software with IRIS and CAIRISDigital Business AnalysisDigital Image Processing : An Algorithmic Introduction Using JavaDigital Image Processing: An Algorithmic Introduction Using JavaDigital Logic for ComputingDistributed Real-Time SystemsElements of RoboticsEmbedded Operating SystemsEngineering Trustworthy Software SystemsEngineering Trustworthy Software Systems: Second International School, SETSS 2016, Chongqing, China, March 28 – April 2, 2016, Tutorial Lectures Essence of Systems Analysis and DesignEssentials of Cloud ComputingEthical and Secure ComputingEthical and Social Issues in the Information AgeEthical and Social Issues in the Information AgeExploring Robotics with ROBOTIS SystemsEye Tracking MethodologyFault-Tolerant Message-Passing Distributed SystemsFinancial Software EngineeringFirst Course in Algorithms Through PuzzlesFive Design-Sheets: Creative Design and Sketching for Computing and VisualisationFormal Languages and CompilationFormal MethodsFormal Methods for Nonmonotonic and Related LogicsFormal Methods for Nonmonotonic and Related LogicsFoundations for Designing User-Centered SystemsFoundations of Enterprise Governance and Enterprise EngineeringFoundations of Programming LanguagesFourier Analysis—A Signal Processing ApproachFundamentals of Business Process ManagementFundamentals of Business Process ManagementFundamentals of Digital ForensicsFundamentals of Discrete Math for Computer ScienceFundamentals of Discrete Math for Computer ScienceFundamentals of Image Data MiningFundamentals of Java ProgrammingFundamentals of MultimediaFundamentals of Secure System ModellingGlobal Communication and CollaborationGrammatical Picture GenerationGraph Data ManagementGuide to Competitive ProgrammingGuide to Computer Network SecurityGuide to Computer Network SecurityGuide to Data StructuresGuide to Discrete MathematicsGuide to Distributed Simulation with HLAGuide to Graph AlgorithmsGuide to Medical Image AnalysisGuide to Modeling and Simulation of Systems of SystemsGuide to Scientific Computing in C++Guide to Unconventional Computing for MusicHealth Informatics on FHIR: How HL7’s New API is Transforming Healthcare History of Cryptography and CryptanalysisHow To Write Your First ThesisHuman and Machine LearningImage Texture AnalysisImaginary Mathematics for Computer ScienceInformation Systems Reengineering and IntegrationIntegrated Business Information SystemsIntercultural User Interface DesignIntroduction to Artificial IntelligenceIntroduction to Artificial IntelligenceIntroduction to Compiler DesignIntroduction to Computational Social ScienceIntroduction to Data ScienceIntroduction to Deep LearningIntroduction to Evolutionary ComputingIntroduction to Evolutionary GenomicsIntroduction to Hybrid Intelligent NetworksIntroduction to Intelligent SurveillanceIntroduction to Intelligent SurveillanceIntroduction to Parallel ComputingIntroduction to Programming with FortranIntroduction to Programming with FortranIntroduction to Programming with FortranIntroduction to Software Design with JavaIntroductory Computer ForensicsInvesting in InformationJava in Two SemestersLaboratory Experiments in Information RetrievalLaTeX in 24 HoursLearning C# by Programming GamesLearning Java with GamesLectures on Runtime VerificationLinear Algebra for Computational Sciences and EngineeringLogics for Computer ScienceLow Level X Window Programming Machine LearningMachine Learning for Audio, Image and Video AnalysisMachine Learning for TextMachine Learning with RMathematical Foundations of Advanced InformaticsMathematics for Computer GraphicsMedical Imaging SystemsMixed Reality and Gamification for Cultural HeritageModelling and SimulationModelling Computing SystemsModelling Distributed SystemsModels of ComputationModern Language Models and ComputationNetwork Traffic Anomaly Detection and PreventionNeural Networks and Deep LearningNumbers and ComputersObject-Oriented Analysis, Design and ImplementationOn Sets and GraphsOrganic Computing – Technical Systems for Survival in the Real WorldOutlier AnalysisOutlier EnsemblesPervasive ComputingPracticing Enterprise Governance and Enterprise EngineeringPrinciples of Data MiningPrinciples of Data MiningPrivacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big DataPrivacy and Identity Management. The Smart RevolutionProbability and Statistics for Computer ScienceProgramming in HTML and PHPProgramming Language ConceptsProgramming with ScalaPython Programming FundamentalsRandom Numbers and ComputersReasoning Web. Explainable Artificial IntelligenceReasoning Web. Learning, Uncertainty, Streaming, and ScalabilityReasoning Web. Semantic Interoperability on the WebReasoning Web: Logical Foundation of Knowledge Graph Construction and Query AnsweringRecommender SystemsRefinementRepresenting Scientific KnowledgeSCION: A Secure Internet ArchitectureSequential and Parallel Algorithms and Data StructuresSimulation Algorithms for Computational Systems BiologySmart Cards, Tokens, Security and ApplicationsSnake Charming – The Musical PythonSoftware Engineering: Specification, Implementation, VerificationSoftware LanguagesSoftware Quality AssuranceSource Code ModularizationSystems Programming in Unix/LinuxThe Algorithm Design ManualThe Data Science Design ManualThe Discrete Math WorkbookThe Logic of Categorial GrammarsThe Python WorkbookThe Python WorkbookThe Student Supercomputer Challenge GuideThe Web at Graduation and BeyondTopics in Parallel and Distributed ComputingTutorials on the Foundations of CryptographyUML @ ClassroomUnderstanding CryptographyWeb Service Implementation and Composition Techniques Lecture Notes & Proceedings Abstract State Machines, Alloy, B, TLA, VDM, and ZAccelerator Programming Using DirectivesAdaptive Instructional SystemsAd-Hoc, Mobile, and Wireless NetworksAd-hoc, Mobile, and Wireless NetworksAd-hoc, Mobile, and Wireless NetworksAdolescent Brain Cognitive Development Neurocognitive PredictionAdvanced Computing Strategies for EngineeringAdvanced Computing Strategies for EngineeringAdvanced Concepts for Intelligent Vision SystemsAdvanced Concepts for Intelligent Vision SystemsAdvanced Data Mining and ApplicationsAdvanced Data Mining and ApplicationsAdvanced Data Mining and ApplicationsAdvanced Information Systems EngineeringAdvanced Information Systems EngineeringAdvanced Information Systems EngineeringAdvanced Parallel Processing TechnologiesAdvanced Parallel Processing TechnologiesAdvances and Trends in Artificial Intelligence. From Theory to PracticeAdvances in Artificial IntelligenceAdvances in Artificial IntelligenceAdvances in Artificial IntelligenceAdvances in Artificial IntelligenceAdvances in Artificial Intelligence – IBERAMIA 2018Advances in Artificial Intelligence: From Theory to PracticeAdvances in Artificial Intelligence: From Theory to PracticeAdvances in Bioinformatics and Computational BiologyAdvances in Brain Inspired Cognitive SystemsAdvances in Computational IntelligenceAdvances in Computational IntelligenceAdvances in Computational IntelligenceAdvances in Computational IntelligenceAdvances in Computational IntelligenceAdvances in Computational IntelligenceAdvances in Computational IntelligenceAdvances in Computer Entertainment TechnologyAdvances in Computer GamesAdvances in Computer GraphicsAdvances in Conceptual ModelingAdvances in Conceptual ModelingAdvances in Conceptual ModelingAdvances in Cryptology – ASIACRYPT 2017Advances in Cryptology – ASIACRYPT 2017Advances in Cryptology – ASIACRYPT 2017Advances in Cryptology – ASIACRYPT 2018Advances in Cryptology – ASIACRYPT 2018Advances in Cryptology – ASIACRYPT 2018Advances in Cryptology – ASIACRYPT 2019Advances in Cryptology – ASIACRYPT 2019Advances in Cryptology – ASIACRYPT 2019Advances in Cryptology – CRYPTO 2017Advances in Cryptology – CRYPTO 2017Advances in Cryptology – CRYPTO 2017Advances in Cryptology – CRYPTO 2018Advances in Cryptology – CRYPTO 2018Advances in Cryptology – CRYPTO 2018Advances in Cryptology – CRYPTO 2019Advances in Cryptology – CRYPTO 2019Advances in Cryptology – CRYPTO 2019Advances in Cryptology – EUROCRYPT 2017Advances in Cryptology – EUROCRYPT 2017Advances in Cryptology – EUROCRYPT 2017Advances in Cryptology – EUROCRYPT 2018Advances in Cryptology – EUROCRYPT 2018Advances in Cryptology – EUROCRYPT 2018Advances in Cryptology – EUROCRYPT 2019Advances in Cryptology – EUROCRYPT 2019Advances in Cryptology – EUROCRYPT 2019Advances in Data Mining. Applications and Theoretical AspectsAdvances in Data Mining. Applications and Theoretical AspectsAdvances in Databases and Information SystemsAdvances in Databases and Information SystemsAdvances in Databases and Information SystemsAdvances in Digital Cultural HeritageAdvances in Information and Computer SecurityAdvances in Information and Computer SecurityAdvances in Information and Computer SecurityAdvances in Information RetrievalAdvances in Information RetrievalAdvances in Information RetrievalAdvances in Information RetrievalAdvances in Intelligent Data Analysis XVIAdvances in Intelligent Data Analysis XVIIAdvances in Knowledge Discovery and Data MiningAdvances in Knowledge Discovery and Data MiningAdvances in Knowledge Discovery and Data MiningAdvances in Knowledge Discovery and Data MiningAdvances in Knowledge Discovery and Data MiningAdvances in Knowledge Discovery and Data MiningAdvances in Knowledge Discovery and Data MiningAdvances in Knowledge Discovery and Data MiningAdvances in Multimedia Information Processing – PCM 2017Advances in Multimedia Information Processing – PCM 2017Advances in Multimedia Information Processing – PCM 2018Advances in Multimedia Information Processing – PCM 2018Advances in Multimedia Information Processing – PCM 2018Advances in Neural Networks – ISNN 2017Advances in Neural Networks – ISNN 2017Advances in Neural Networks – ISNN 2018Advances in Neural Networks – ISNN 2019Advances in Neural Networks – ISNN 2019Advances in Practical Applications of Agents, Multi-Agent Systems, and Complexity: The PAAMS CollectionAdvances in Practical Applications of Cyber-Physical Multi-Agent Systems: The PAAMS CollectionAdvances in Practical Applications of Survivable Agents and Multi-Agent Systems: The PAAMS CollectionAdvances in Soft ComputingAdvances in Soft ComputingAdvances in Soft ComputingAdvances in Soft ComputingAdvances in Spatial and Temporal DatabasesAdvances in Swarm IntelligenceAdvances in Swarm IntelligenceAdvances in Swarm IntelligenceAdvances in Swarm IntelligenceAdvances in Swarm IntelligenceAdvances in Swarm IntelligenceAdvances in Visual ComputingAdvances in Visual ComputingAdvances in Visual ComputingAdvances in Visual InformaticsAdvances in Visual InformaticsAdvances in Web-Based Learning – ICWL 2017Advances in Web-Based Learning – ICWL 2018Advances in Web-Based Learning – ICWL 2019Adventures Between Lower Bounds and Higher AltitudesAdversarial and Uncertain Reasoning for Adaptive Cyber DefenseAgent Based Modelling of Urban SystemsAgents and Artificial IntelligenceAgents and Artificial IntelligenceAgents and Artificial IntelligenceAgents and Multi-Agent Systems for Health CareAgreement TechnologiesAI 2017: Advances in Artificial IntelligenceAI 2018: Advances in Artificial IntelligenceAI 2019: Advances in Artificial IntelligenceAI Approaches to the Complexity of Legal SystemsAI*IA 2017 Advances in Artificial IntelligenceAI*IA 2018 – Advances in Artificial IntelligenceAI*IA 2019 – Advances in Artificial IntelligenceAlgebraic InformaticsAlgorithmic Aspects in Information and ManagementAlgorithmic Aspects in Information and ManagementAlgorithmic Aspects of Cloud ComputingAlgorithmic Aspects of Cloud ComputingAlgorithmic Aspects of Cloud ComputingAlgorithmic Decision TheoryAlgorithmic Decision TheoryAlgorithmic Game TheoryAlgorithmic Game TheoryAlgorithmic Game TheoryAlgorithms and Architectures for Parallel ProcessingAlgorithms and Architectures for Parallel ProcessingAlgorithms and Architectures for Parallel ProcessingAlgorithms and Architectures for Parallel ProcessingAlgorithms and Architectures for Parallel ProcessingAlgorithms and Architectures for Parallel ProcessingAlgorithms and ComplexityAlgorithms and ComplexityAlgorithms and Data StructuresAlgorithms and Data StructuresAlgorithms and Discrete Applied MathematicsAlgorithms and Discrete Applied MathematicsAlgorithms and Discrete Applied MathematicsAlgorithms and Models for the Web GraphAlgorithms and Models for the Web GraphAlgorithms and Models for the Web GraphAlgorithms for Computational BiologyAlgorithms for Computational BiologyAlgorithms for Computational BiologyAlgorithms for Sensor SystemsAlgorithms for Sensor SystemsAlgorithms for Sensor SystemsAlgorithms for Sensor SystemsAmbient IntelligenceAmbient IntelligenceAmbient IntelligenceAnalysis of Experimental AlgorithmsAnalysis of Images, Social Networks and TextsAnalysis of Images, Social Networks and TextsAnalysis of Images, Social Networks and TextsAnalytical and Computational Methods in Probability TheoryAnalytical and Stochastic Modelling Techniques and ApplicationsApplication and Theory of Petri Nets and ConcurrencyApplication and Theory of Petri Nets and ConcurrencyApplication and Theory of Petri Nets and ConcurrencyApplications of Evolutionary ComputationApplications of Evolutionary ComputationApplications of Evolutionary ComputationApplications of Evolutionary ComputationApplied Cryptography and Network SecurityApplied Cryptography and Network SecurityApplied Cryptography and Network SecurityApplied Cryptography and Network Security WorkshopsApplied Reconfigurable ComputingApplied Reconfigurable ComputingApplied Reconfigurable Computing. Architectures, Tools, and ApplicationsApproximation and Online AlgorithmsApproximation and Online AlgorithmsApproximation and Online AlgorithmsArchitecture of Computing Systems – ARCS 2017Architecture of Computing Systems – ARCS 2018Architecture of Computing Systems – ARCS 2019Arithmetic of Finite FieldsArticulated Motion and Deformable ObjectsArtificial EvolutionArtificial General IntelligenceArtificial General IntelligenceArtificial General IntelligenceArtificial IntelligenceArtificial Intelligence and Mobile Services – AIMS 2018Artificial Intelligence and Mobile Services – AIMS 2019Artificial Intelligence and SecurityArtificial Intelligence and SecurityArtificial Intelligence and SecurityArtificial Intelligence and SecurityArtificial Intelligence and Soft ComputingArtificial Intelligence and Soft ComputingArtificial Intelligence and Soft ComputingArtificial Intelligence and Soft ComputingArtificial Intelligence and Soft ComputingArtificial Intelligence and Soft ComputingArtificial Intelligence and Symbolic ComputationArtificial Intelligence in EducationArtificial Intelligence in EducationArtificial Intelligence in EducationArtificial Intelligence in EducationArtificial Intelligence in EducationArtificial Intelligence in HealthArtificial Intelligence in MedicineArtificial Intelligence in MedicineArtificial Intelligence in Medicine: Knowledge Representation and Transparent and Explainable SystemsArtificial Intelligence in Radiation TherapyArtificial Intelligence XXXIVArtificial Intelligence XXXVArtificial Intelligence XXXVIArtificial Intelligence: Methodology, Systems, and ApplicationsArtificial Life and Computational IntelligenceArtificial Neural Networks and Machine Learning – ICANN 2017Artificial Neural Networks and Machine Learning – ICANN 2017Artificial Neural Networks and Machine Learning – ICANN 2018Artificial Neural Networks and Machine Learning – ICANN 2018Artificial Neural Networks and Machine Learning – ICANN 2018Artificial Neural Networks and Machine Learning – ICANN 2019: Deep LearningArtificial Neural Networks and Machine Learning – ICANN 2019: Image ProcessingArtificial Neural Networks and Machine Learning – ICANN 2019: Text and Time SeriesArtificial Neural Networks and Machine Learning – ICANN 2019: Theoretical Neural ComputationArtificial Neural Networks and Machine Learning – ICANN 2019: Workshop and Special SessionsArtificial Neural Networks in Pattern RecognitionAt the Intersection of Language, Logic, and InformationAugmented CognitionAugmented Cognition. Enhancing Cognition and Behavior in Complex Human EnvironmentsAugmented Cognition. Neurocognition and Machine LearningAugmented Cognition: Intelligent TechnologiesAugmented Cognition: Users and ContextsAugmented Reality, Virtual Reality, and Computer GraphicsAugmented Reality, Virtual Reality, and Computer GraphicsAugmented Reality, Virtual Reality, and Computer GraphicsAugmented Reality, Virtual Reality, and Computer GraphicsAugmented Reality, Virtual Reality, and Computer GraphicsAugmented Reality, Virtual Reality, and Computer GraphicsAutomated Deduction – CADE 26Automated Deduction – CADE 27Automated ReasoningAutomated Reasoning with Analytic Tableaux and Related MethodsAutomated Reasoning with Analytic Tableaux and Related MethodsAutomated Technology for Verification and AnalysisAutomated Technology for Verification and AnalysisAutomated Technology for Verification and AnalysisAutonomous Agents and Multiagent SystemsAutonomous Agents and Multiagent SystemsAutonomous Control for a Reliable Internet of ServicesBehavioral Analytics in Social and Ubiquitous EnvironmentsBelief Functions: Theory and ApplicationsBenchmarking, Measuring, and OptimizingBidirectional TransformationsBig Data – BigData 2018Big Data – BigData 2019Big Data AnalyticsBig Data AnalyticsBig Data AnalyticsBig Data Analytics and Knowledge DiscoveryBig Data Analytics and Knowledge DiscoveryBig Data Analytics and Knowledge DiscoveryBig Scientific Data ManagementBioinformatics and Biomedical EngineeringBioinformatics and Biomedical EngineeringBioinformatics and Biomedical EngineeringBioinformatics and Biomedical EngineeringBioinformatics and Biomedical EngineeringBioinformatics and Biomedical EngineeringBioinformatics Research and ApplicationsBioinformatics Research and ApplicationsBioinformatics Research and ApplicationsBioinspired Optimization Methods and Their ApplicationsBiomedical Applications Based on Natural and Artificial ComputingBiomedical Image RegistrationBiometric RecognitionBiometric RecognitionBiometric RecognitionBiomimetic and Biohybrid SystemsBiomimetic and Biohybrid SystemsBiomimetic and Biohybrid SystemsBlended Learning. Enhancing Learning SuccessBlended Learning. New Challenges and Innovative PracticesBlended Learning: Educational Innovation for Personalized LearningBlockchain – ICBC 2018Blockchain – ICBC 2019Brain Function Assessment in LearningBrain InformaticsBrain InformaticsBrain InformaticsBrainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain InjuriesBrainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain InjuriesBrainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain InjuriesBraverman Readings in Machine Learning. Key Ideas from Inception to Current StateBridging People and SoundBusiness Process ManagementBusiness Process ManagementBusiness Process ManagementCase-Based Reasoning Research and DevelopmentCase-Based Reasoning Research and DevelopmentCase-Based Reasoning Research and DevelopmentCellular AutomataCellular Automata and Discrete Complex SystemsCellular Automata and Discrete Complex SystemsCellular Automata and Discrete Complex SystemsCentral European Functional Programming SchoolChallenges and Opportunities in the Digital EraChallenges and Opportunity with Big DataChinese Computational LinguisticsChinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big DataChinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big DataChinese Lexical SemanticsChinese Lexical SemanticsCloud Computing – CLOUD 2018Cloud Computing – CLOUD 2019Cloud Computing and SecurityCloud Computing and SecurityCloud Computing and SecurityCloud Computing and SecurityCloud Computing and SecurityCloud Computing and SecurityCloud Computing and SecurityCloud Computing and SecurityCoalgebraic Methods in Computer ScienceCode-Based CryptographyCodes, Cryptology and Information SecurityCodes, Cryptology and Information SecurityCoding Theory and ApplicationsCognitive Computing – ICCC 2018Cognitive Computing – ICCC 2019Collaboration and TechnologyCollaboration and TechnologyCollaboration Technologies and Social ComputingCollaboration Technologies and Social ComputingCollaboration Technologies and Social ComputingCombinatorial AlgorithmsCombinatorial AlgorithmsCombinatorial AlgorithmsCombinatorial Image AnalysisCombinatorial Image AnalysisCombinatorial OptimizationCombinatorial Optimization and ApplicationsCombinatorial Optimization and ApplicationsCombinatorial Optimization and ApplicationsCombinatorial Optimization and ApplicationsCombinatorics on WordsCombinatorics on WordsCommunication Systems and NetworksCommunication Technologies for VehiclesCommunication Technologies for VehiclesCommunication Technologies for VehiclesComparative GenomicsComparative GenomicsComputability and ComplexityComputational and Corpus-Based PhraseologyComputational and Corpus-Based PhraseologyComputational Collective IntelligenceComputational Collective IntelligenceComputational Collective IntelligenceComputational Collective IntelligenceComputational Collective IntelligenceComputational Collective IntelligenceComputational Color ImagingComputational Color ImagingComputational Data and Social NetworksComputational Data and Social NetworksComputational Intelligence in Music, Sound, Art and DesignComputational Intelligence in Music, Sound, Art and DesignComputational Intelligence in Music, Sound, Art and DesignComputational Intelligence Methods for Bioinformatics and BiostatisticsComputational Intelligence Methods for Bioinformatics and BiostatisticsComputational Linguistics and Intelligent Text ProcessingComputational Linguistics and Intelligent Text ProcessingComputational Linguistics and Intelligent Text ProcessingComputational Linguistics and Intelligent Text ProcessingComputational LogisticsComputational LogisticsComputational LogisticsComputational Methods and Clinical Applications for Spine ImagingComputational Methods and Clinical Applications in Musculoskeletal ImagingComputational Methods in Systems BiologyComputational Methods in Systems BiologyComputational Methods in Systems BiologyComputational Modeling of Objects Presented in Images. Fundamentals, Methods, and ApplicationsComputational Modeling of Objects Presented in Images. Fundamentals, Methods, and ApplicationsComputational Pathology and Ophthalmic Medical Image AnalysisComputational Processing of the Portuguese LanguageComputational Science – ICCS 2018Computational Science – ICCS 2018Computational Science – ICCS 2018Computational Science – ICCS 2019Computational Science – ICCS 2019Computational Science – ICCS 2019Computational Science – ICCS 2019Computational Science – ICCS 2019Computational Science and Its Applications – ICCSA 2017Computational Science and Its Applications – ICCSA 2017Computational Science and Its Applications – ICCSA 2017Computational Science and Its Applications – ICCSA 2017Computational Science and Its Applications – ICCSA 2017Computational Science and Its Applications – ICCSA 2017Computational Science and Its Applications – ICCSA 2018Computational Science and Its Applications – ICCSA 2018Computational Science and Its Applications – ICCSA 2018Computational Science and Its Applications – ICCSA 2018Computational Science and Its Applications – ICCSA 2018Computational Science and Its Applications – ICCSA 2019Computational Science and Its Applications – ICCSA 2019Computational Science and Its Applications – ICCSA 2019Computational Science and Its Applications – ICCSA 2019Computational Science and Its Applications – ICCSA 2019Computational Science and Its Applications – ICCSA 2019Computer Aided Systems Theory – EUROCAST 2017Computer Aided Systems Theory – EUROCAST 2017Computer Aided VerificationComputer Aided VerificationComputer Aided VerificationComputer Aided VerificationComputer Aided VerificationComputer Aided VerificationComputer Algebra in Scientific ComputingComputer Algebra in Scientific ComputingComputer Algebra in Scientific ComputingComputer Analysis of Images and PatternsComputer Analysis of Images and PatternsComputer Analysis of Images and PatternsComputer Analysis of Images and PatternsComputer Assisted and Robotic Endoscopy and Clinical Image-Based ProceduresComputer Information Systems and Industrial ManagementComputer Information Systems and Industrial ManagementComputer Information Systems and Industrial ManagementComputer Network SecurityComputer Performance EngineeringComputer Performance EngineeringComputer Safety, Reliability, and SecurityComputer Safety, Reliability, and SecurityComputer Safety, Reliability, and SecurityComputer Safety, Reliability, and SecurityComputer Safety, Reliability, and SecurityComputer Safety, Reliability, and SecurityComputer Science – Theory and ApplicationsComputer Science – Theory and ApplicationsComputer Science – Theory and ApplicationsComputer SecurityComputer SecurityComputer SecurityComputer Security – ESORICS 2017Computer Security – ESORICS 2017Computer Security – ESORICS 2019Computer Security – ESORICS 2019Computer Vision – ACCV 2016Computer Vision – ACCV 2016Computer Vision – ACCV 2016Computer Vision – ACCV 2016Computer Vision – ACCV 2016Computer Vision – ACCV 2016 WorkshopsComputer Vision – ACCV 2016 WorkshopsComputer Vision – ACCV 2016 WorkshopsComputer Vision – ACCV 2018Computer Vision – ACCV 2018Computer Vision – ACCV 2018Computer Vision – ACCV 2018Computer Vision – ACCV 2018Computer Vision – ACCV 2018Computer Vision – ACCV 2018 WorkshopsComputer Vision – ECCV 2018Computer Vision – ECCV 2018Computer Vision – ECCV 2018Computer Vision – ECCV 2018Computer Vision – ECCV 2018Computer Vision – ECCV 2018Computer Vision – ECCV 2018Computer Vision – ECCV 2018Computer Vision – ECCV 2018Computer Vision – ECCV 2018Computer Vision – ECCV 2018Computer Vision – ECCV 2018Computer Vision – ECCV 2018Computer Vision – ECCV 2018Computer Vision – ECCV 2018Computer Vision – ECCV 2018Computer Vision and GraphicsComputer Vision SystemsComputer Vision SystemsComputer Vision, Graphics, and Image ProcessingComputer-Assisted and Robotic EndoscopyComputers Helping People with Special NeedsComputers Helping People with Special NeedsComputing and CombinatoricsComputing and CombinatoricsComputing and CombinatoricsComputing and Software ScienceComputing with Foresight and IndustryConceptual ModelingConceptual ModelingConceptual ModelingConcurrency, Security, and PuzzlesConflict Resolution in Decision MakingConnectomics in NeuroImagingConnectomics in NeuroImagingConnectomics in NeuroImagingConstructive Side-Channel Analysis and Secure DesignConstructive Side-Channel Analysis and Secure DesignConstructive Side-Channel Analysis and Secure DesignCooperative Design, Visualization, and EngineeringCooperative Design, Visualization, and EngineeringCooperative Design, Visualization, and EngineeringCoordination Models and LanguagesCoordination Models and LanguagesCoordination Models and LanguagesCoordination, Organizations, Institutions, and Norms in Agent Systems XIICritical Information Infrastructures SecurityCritical Information Infrastructures SecurityCritical Systems: Formal Methods and Automated VerificationCross-Cultural DesignCross-Cultural Design. Applications in Cultural Heritage, Creativity and Social DevelopmentCross-Cultural Design. Culture and SocietyCross-Cultural Design. Methods, Tools and User ExperienceCross-Cultural Design. Methods, Tools, and UsersCryptographic Hardware and Embedded Systems – CHES 2017Cryptography and CodingCryptography and CodingCryptology and Network SecurityCryptology and Network SecurityCryptology and Network SecurityCurrent Trends in Web EngineeringCurrent Trends in Web EngineeringCyber Physical Systems. Design, Modeling, and EvaluationCyber Physical Systems. Design, Modeling, and EvaluationCyber Physical Systems. Model-Based DesignCyber Security Cryptography and Machine LearningCyber Security Cryptography and Machine LearningCyber Security Cryptography and Machine LearningCyberParks – The Interface Between People, Places and TechnologyCyber-Physical Systems of SystemsCyberspace Safety and SecurityCyberspace Safety and SecurityCyberspace Safety and SecurityCyberspace Safety and SecurityData AnalyticsData Analytics for Renewable Energy IntegrationData Analytics for Renewable Energy Integration. Technologies, Systems and SocietyData Analytics for Renewable Energy Integration: Informing the Generation and Distribution of Renewable EnergyData and Applications Security and Privacy XXXIData and Applications Security and Privacy XXXIIData and Applications Security and Privacy XXXIIIData Driven Approaches in Digital EducationData Driven Treatment Response Assessment and Preterm, Perinatal, and Paediatric Image AnalysisData Integration in the Life SciencesData Management and Analytics for Medicine and HealthcareData Management and Analytics for Medicine and HealthcareData Management on New HardwareData Mining and Big DataData Mining and Big DataData Privacy Management, Cryptocurrencies and Blockchain TechnologyData Privacy Management, Cryptocurrencies and Blockchain TechnologyData Privacy Management, Cryptocurrencies and Blockchain TechnologyData Quality and Trust in Big DataDatabase and Expert Systems ApplicationsDatabase and Expert Systems ApplicationsDatabase and Expert Systems ApplicationsDatabase and Expert Systems ApplicationsDatabase and Expert Systems ApplicationsDatabase and Expert Systems ApplicationsDatabase Systems for Advanced ApplicationsDatabase Systems for Advanced ApplicationsDatabase Systems for Advanced ApplicationsDatabase Systems for Advanced ApplicationsDatabase Systems for Advanced ApplicationsDatabase Systems for Advanced ApplicationsDatabase Systems for Advanced ApplicationsDatabase Systems for Advanced ApplicationsDatabase Systems for Advanced ApplicationsDatabases Theory and ApplicationsDatabases Theory and ApplicationsDecision and Game Theory for SecurityDecision and Game Theory for SecurityDecision and Game Theory for SecurityDeclarative Programming and Knowledge ManagementDeep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision SupportDeep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision SupportDependable Software Engineering. Theories, Tools, and ApplicationsDependable Software Engineering. Theories, Tools, and ApplicationsDependable Software Engineering. Theories, Tools, and ApplicationsDescription Logic, Theory Combination, and All ThatDescriptional Complexity of Formal SystemsDescriptional Complexity of Formal SystemsDescriptional Complexity of Formal SystemsDesign, User Experience, and Usability. Application DomainsDesign, User Experience, and Usability. Design Philosophy and TheoryDesign, User Experience, and Usability. Practice and Case StudiesDesign, User Experience, and Usability. User Experience in Advanced Technological EnvironmentsDesign, User Experience, and Usability: Designing InteractionsDesign, User Experience, and Usability: Designing Pleasurable ExperiencesDesign, User Experience, and Usability: Theory and PracticeDesign, User Experience, and Usability: Theory, Methodology, and ManagementDesign, User Experience, and Usability: Understanding Users and ContextsDesign, User Experience, and Usability: Users, Contexts and Case StudiesDesigning for a Digital and Globalized WorldDesigning the Digital TransformationDetection of Intrusions and Malware, and Vulnerability AssessmentDetection of Intrusions and Malware, and Vulnerability AssessmentDetection of Intrusions and Malware, and Vulnerability AssessmentDevelopments in Language TheoryDevelopments in Language TheoryDevelopments in Language TheoryDiagrammatic Representation and InferenceDigital Cultural HeritageDigital Education: At the MOOC Crossroads Where the Interests of Academia and Business ConvergeDigital Education: Out to the World and Back to the CampusDigital Forensics and WatermarkingDigital Forensics and WatermarkingDigital Heritage. Progress in Cultural Heritage: Documentation, Preservation, and ProtectionDigital Heritage. Progress in Cultural Heritage: Documentation, Preservation, and ProtectionDigital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. Healthcare ApplicationsDigital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. Human Body and MotionDigital Human Modeling. Applications in Health, Safety, Ergonomics, and Risk ManagementDigital Human Modeling. Applications in Health, Safety, Ergonomics, and Risk Management: Ergonomics and DesignDigital Human Modeling. Applications in Health, Safety, Ergonomics, and Risk Management: Health and SafetyDigital Libraries at the Crossroads of Digital Information for the FutureDigital Libraries for Open KnowledgeDigital Libraries for Open KnowledgeDigital Libraries: Data, Information, and Knowledge for Digital LivesDigital Nations – Smart Cities, Innovation, and SustainabilityDigital PathologyDigital Transformation for a Sustainable Society in the 21st CenturyDiscovery ScienceDiscovery ScienceDiscovery ScienceDiscrete Geometry for Computer ImageryDiscrete Geometry for Computer ImageryDistributed Applications and Interoperable SystemsDistributed Applications and Interoperable SystemsDistributed Applications and Interoperable SystemsDistributed Computer and Communication NetworksDistributed Computing and Internet TechnologyDistributed Computing and Internet TechnologyDistributed, Ambient and Pervasive InteractionsDistributed, Ambient and Pervasive InteractionsDistributed, Ambient and Pervasive Interactions: Technologies and ContextsDistributed, Ambient and Pervasive Interactions: Understanding HumansDNA Computing and Molecular ProgrammingDNA Computing and Molecular ProgrammingDNA Computing and Molecular ProgrammingDomain Adaptation and Representation Transfer and Medical Image Learning with Less Labels and Imperfect DataDynamic Logic. New Trends and ApplicationsECML PKDD 2018 WorkshopsECML PKDD 2018 WorkshopsEconomics of Grids, Clouds, Systems, and ServicesEconomics of Grids, Clouds, Systems, and ServicesEconomics of Grids, Clouds, Systems, and ServicesEconomics of Grids, Clouds, Systems, and ServicesEdge Computing – EDGE 2018Edge Computing – EDGE 2019E-Learning and GamesE-Learning and GamesElectronic GovernmentElectronic GovernmentElectronic GovernmentElectronic Government and the Information Systems PerspectiveElectronic Government and the Information Systems PerspectiveElectronic Government and the Information Systems PerspectiveElectronic ParticipationElectronic ParticipationElectronic ParticipationElectronic VotingElectronic VotingElectronic VotingElectronic VotingEmbedded Computer Systems: Architectures, Modeling, and SimulationEmerging Technologies for Authorization and AuthenticationEmerging Technologies for EducationEmerging Technologies for EducationEmerging Technologies for EducationEnd-User DevelopmentEnd-User DevelopmentEnergy Minimization Methods in Computer Vision and Pattern RecognitionEngineering Multi-Agent SystemsEngineering Multi-Agent SystemsEngineering Psychology and Cognitive ErgonomicsEngineering Psychology and Cognitive ErgonomicsEngineering Psychology and Cognitive Ergonomics: Cognition and DesignEngineering Psychology and Cognitive Ergonomics: Performance, Emotion and Situation AwarenessEngineering Secure Software and SystemsEngineering Secure Software and SystemsEngineering Trustworthy Software SystemsEngineering Trustworthy Software SystemsEngineering Trustworthy Software SystemsEnhanced Quality of Life and Smart LivingEnjoying Natural ComputingEnterprise SecurityEntertainment Computing – ICEC 2017Entertainment Computing – ICEC 2018Entertainment Computing and Serious GamesEuro-Par 2016: Parallel Processing WorkshopsEuro-Par 2017: Parallel ProcessingEuro-Par 2017: Parallel Processing WorkshopsEuro-Par 2018: Parallel ProcessingEuro-Par 2019: Parallel ProcessingEvaluation in the Crowd. Crowdsourcing and Human-Centered ExperimentsEvolutionary Computation in Combinatorial OptimizationEvolutionary Computation in Combinatorial OptimizationEvolutionary Computation in Combinatorial OptimizationEvolutionary Multi-Criterion OptimizationEvolutionary Multi-Criterion OptimizationEvolving OpenMP for Evolving ArchitecturesExperimental IR Meets Multilinguality, Multimodality, and InteractionExperimental IR Meets Multilinguality, Multimodality, and InteractionExperimental IR Meets Multilinguality, Multimodality, and InteractionExplainable AI: Interpreting, Explaining and Visualizing Deep LearningExplainable, Transparent Autonomous Agents and Multi-Agent SystemsExtending the Boundaries of Design Science Theory and PracticeFetal, Infant and Ophthalmic Medical Image AnalysisFinancial Cryptography and Data SecurityFinancial Cryptography and Data SecurityFinancial Cryptography and Data SecurityFinancial Cryptography and Data SecurityFinancial Cryptography and Data SecurityFinancial Cryptography and Data SecurityFlexible Query Answering SystemsFlexible Query Answering SystemsFormal Aspects of Component SoftwareFormal Aspects of Component SoftwareFormal Aspects of Component SoftwareFormal Concept AnalysisFormal Concept AnalysisFormal GrammarFormal GrammarFormal Grammar 2018Formal MethodsFormal Methods – The Next 30 YearsFormal Methods and Software EngineeringFormal Methods and Software EngineeringFormal Methods and Software EngineeringFormal Methods for Industrial Critical SystemsFormal Methods for Industrial Critical SystemsFormal Methods TeachingFormal Methods: Foundations and ApplicationsFormal Methods: Foundations and ApplicationsFormal Modeling and Analysis of Timed SystemsFormal Modeling and Analysis of Timed SystemsFormal Modeling and Analysis of Timed SystemsFormal Techniques for Distributed Objects, Components, and SystemsFormal Techniques for Distributed Objects, Components, and SystemsFormal Techniques for Distributed Objects, Components, and SystemsFoundations and Practice of SecurityFoundations and Practice of SecurityFoundations and Practice of SecurityFoundations of Information and Knowledge SystemsFoundations of Intelligent SystemsFoundations of Intelligent SystemsFoundations of Security, Protocols, and Equational ReasoningFoundations of Software Science and Computation StructuresFoundations of Software Science and Computation StructuresFoundations of Software Science and Computation StructuresFrom Animals to Animats 15From Bioinspired Systems and Biomedical Applications to Machine LearningFrom Database to Cyber SecurityFrom Reactive Systems to Cyber-Physical SystemsFrom Software Engineering to Formal Methods and Tools, and BackFrontiers in AlgorithmicsFrontiers in AlgorithmicsFrontiers in AlgorithmicsFrontiers of Combining SystemsFrontiers of Combining SystemsFunctional and Constraint Logic ProgrammingFunctional and Logic ProgrammingFunctional Imaging and Modeling of the HeartFunctional Imaging and Modelling of the HeartFundamental Approaches to Software EngineeringFundamental Approaches to Software EngineeringFundamental Approaches to Software EngineeringFundamentals of Computation TheoryFundamentals of Computation TheoryFundamentals of Software EngineeringFundamentals of Software EngineeringFuture and Emerging Trends in Language Technology. Machine Learning and Big DataFuture Data and Security EngineeringFuture Data and Security EngineeringFuture Data and Security EngineeringFuzzy Logic and ApplicationsFuzzy Logic and Soft Computing ApplicationsGames and Learning AllianceGames and Learning AllianceGenetic ProgrammingGenetic ProgrammingGenetic ProgrammingGeometric Science of InformationGeometric Science of InformationGlobal Thoughts, Local DesignsGrand Timely Topics in Software EngineeringGraph Drawing and Network VisualizationGraph Drawing and Network VisualizationGraph Drawing and Network VisualizationGraph Learning in Medical ImagingGraph Structures for Knowledge Representation and ReasoningGraph TransformationGraph TransformationGraph TransformationGraph Transformation, Specifications, and NetsGraph-Based Representation and ReasoningGraph-Based Representation and ReasoningGraph-Based Representations in Pattern RecognitionGraph-Based Representations in Pattern RecognitionGraphic Recognition. Current Trends and ChallengesGraphical Models for SecurityGraphical Models for SecurityGraphical Models for SecurityGraphics Recognition. Current Trends and EvolutionsGraphs in Biomedical Image Analysis and Integrating Medical Imaging and Non-Imaging ModalitiesGraphs in Biomedical Image Analysis, Computational Anatomy and Imaging GeneticsGraph-Theoretic Concepts in Computer ScienceGraph-Theoretic Concepts in Computer ScienceGreen, Pervasive, and Cloud ComputingGreen, Pervasive, and Cloud ComputingGreen, Pervasive, and Cloud ComputingHaptics: Science, Technology, and ApplicationsHaptics: Science, Technology, and ApplicationsHardware and Software: Verification and TestingHCI for Cybersecurity, Privacy and TrustHCI in Business, Government and Organizations. eCommerce and Consumer BehaviorHCI in Business, Government and Organizations. Information Systems and AnalyticsHCI in Business, Government and Organizations. Interacting with Information SystemsHCI in Business, Government and Organizations. Supporting BusinessHCI in Business, Government, and OrganizationsHCI in GamesHCI in Mobility, Transport, and Automotive SystemsHCI International 2019 – Late Breaking PapersHealth Information ScienceHealth Information ScienceHealth Information ScienceHeterogeneous Data Management, Polystores, and Analytics for HealthcareHeterogeneous Data Management, Polystores, and Analytics for HealthcareHigh Performance ComputingHigh Performance ComputingHigh Performance ComputingHigh Performance ComputingHigh Performance ComputingHigh Performance ComputingHigh Performance Computing for Computational Science – VECPAR 2016High Performance Computing for Computational Science – VECPAR 2018High Performance Computing in Science and EngineeringHigh Performance Computing Systems. Performance Modeling, Benchmarking, and SimulationHigh-Performance Modelling and Simulation for Big Data ApplicationsHigh-Performance Scientific ComputingHow AI Impacts Urban Living and Public HealthHuman Aspects of Information Security, Privacy and TrustHuman Aspects of IT for the Aged Population. Acceptance, Communication and ParticipationHuman Aspects of IT for the Aged Population. Aging, Design and User ExperienceHuman Aspects of IT for the Aged Population. Applications in Health, Assistance, and EntertainmentHuman Aspects of IT for the Aged Population. Applications, Services and ContextsHuman Aspects of IT for the Aged Population. Design for the Elderly and Technology AcceptanceHuman Aspects of IT for the Aged Population. Social Media, Games and Assistive EnvironmentsHuman Centered ComputingHuman Centered ComputingHuman Centered ComputingHuman Interface and the Management of Information. Information in Applications and ServicesHuman Interface and the Management of Information. Information in Intelligent SystemsHuman Interface and the Management of Information. Interaction, Visualization, and AnalyticsHuman Interface and the Management of Information. Visual Information and Knowledge ManagementHuman Interface and the Management of Information: Information, Knowledge and Interaction DesignHuman Interface and the Management of Information: Supporting Learning, Decision-Making and CollaborationHuman Language Technology. Challenges for Computer Science and LinguisticsHuman-Computer Interaction – INTERACT 2017Human-Computer Interaction – INTERACT 2017Human-Computer Interaction – INTERACT 2017Human-Computer Interaction – INTERACT 2017Human-Computer Interaction – INTERACT 2019Human-Computer Interaction – INTERACT 2019Human-Computer Interaction – INTERACT 2019Human-Computer Interaction – INTERACT 2019Human-Computer Interaction. Design Practice in Contemporary SocietiesHuman-Computer Interaction. Interaction ContextsHuman-Computer Interaction. Interaction in ContextHuman-Computer Interaction. Interaction TechnologiesHuman-Computer Interaction. Perspectives on DesignHuman-Computer Interaction. Recognition and Interaction TechnologiesHuman-Computer Interaction. Theories, Methods, and Human IssuesHuman-Computer Interaction. User Interface Design, Development and MultimodalityHybrid Artificial Intelligent SystemsHybrid Artificial Intelligent SystemsHybrid Artificial Intelligent SystemsHybrid Systems BiologyImage AnalysisImage AnalysisImage AnalysisImage Analysis and Processing – ICIAP 2017 Image Analysis and Processing – ICIAP 2017 Image Analysis and Processing – ICIAP 2019Image Analysis and Processing – ICIAP 2019Image Analysis and RecognitionImage Analysis and RecognitionImage Analysis and RecognitionImage Analysis and RecognitionImage Analysis for Moving Organ, Breast, and Thoracic ImagesImage and GraphicsImage and GraphicsImage and GraphicsImage and GraphicsImage and GraphicsImage and GraphicsImage and Signal ProcessingImage and Video TechnologyImage and Video TechnologyImage and Video TechnologyImaging for Patient-Customized Simulations and Systems for Point-of-Care UltrasoundImmersive AnalyticsImplementation and Application of AutomataImplementation and Application of AutomataImplementation and Application of AutomataInductive Logic ProgrammingInductive Logic ProgrammingInductive Logic ProgrammingIndustrial Applications of Holonic and Multi-Agent SystemsIndustrial Applications of Holonic and Multi-Agent SystemsInformatics in Schools. Fundamentals of Computer Science and Software EngineeringInformatics in Schools: Focus on Learning ProgrammingInformation and Communications SecurityInformation and Communications SecurityInformation in Contemporary SocietyInformation Processing in Medical ImagingInformation Processing in Medical ImagingInformation RetrievalInformation RetrievalInformation RetrievalInformation Retrieval TechnologyInformation Retrieval TechnologyInformation SecurityInformation SecurityInformation SecurityInformation Security and CryptologyInformation Security and CryptologyInformation Security and CryptologyInformation Security and Cryptology – ICISC 2016Information Security and Cryptology – ICISC 2017Information Security and PrivacyInformation Security and PrivacyInformation Security and PrivacyInformation Security and PrivacyInformation Security ApplicationsInformation Security ApplicationsInformation Security ApplicationsInformation Security Practice and ExperienceInformation Security Practice and ExperienceInformation Security Practice and ExperienceInformation Security Theory and PracticeInformation Security Theory and PracticeInformation Systems SecurityInformation Systems SecurityInformation Systems SecurityInformation Technology in Bio- and Medical InformaticsInformation Theoretic SecurityInnovative Security Solutions for Information Technology and CommunicationsInnovative Security Solutions for Information Technology and CommunicationsInnovative Technologies and LearningInnovative Technologies and LearningInteger Programming and Combinatorial OptimizationInteger Programming and Combinatorial OptimizationIntegrated Formal MethodsIntegrated Formal MethodsIntegrated Formal MethodsIntegrated Uncertainty in Knowledge Modelling and Decision MakingIntegrated Uncertainty in Knowledge Modelling and Decision MakingIntegration of AI and OR Techniques in Constraint ProgrammingIntegration of Constraint Programming, Artificial Intelligence, and Operations ResearchIntegration of Constraint Programming, Artificial Intelligence, and Operations ResearchIntelligence and Security InformaticsIntelligence Science and Big Data EngineeringIntelligence Science and Big Data EngineeringIntelligence Science and Big Data Engineering. Big Data and Machine LearningIntelligence Science and Big Data Engineering. Visual Data EngineeringIntelligent Computer MathematicsIntelligent Computer MathematicsIntelligent Computer MathematicsIntelligent Computing MethodologiesIntelligent Computing MethodologiesIntelligent Computing MethodologiesIntelligent Computing Theories and ApplicationIntelligent Computing Theories and ApplicationIntelligent Computing Theories and ApplicationIntelligent Computing Theories and ApplicationIntelligent Computing Theories and ApplicationIntelligent Computing Theories and ApplicationIntelligent Data Engineering and Automated Learning – IDEAL 2017Intelligent Data Engineering and Automated Learning – IDEAL 2018Intelligent Data Engineering and Automated Learning – IDEAL 2018Intelligent Data Engineering and Automated Learning – IDEAL 2019Intelligent Data Engineering and Automated Learning – IDEAL 2019Intelligent Human Computer InteractionIntelligent Human Computer InteractionIntelligent Human Computer InteractionIntelligent Information and Database SystemsIntelligent Information and Database SystemsIntelligent Information and Database SystemsIntelligent Information and Database SystemsIntelligent Information and Database SystemsIntelligent Information and Database SystemsIntelligent Robotics and ApplicationsIntelligent Robotics and ApplicationsIntelligent Robotics and ApplicationsIntelligent Robotics and ApplicationsIntelligent Robotics and ApplicationsIntelligent Robotics and ApplicationsIntelligent Robotics and ApplicationsIntelligent Robotics and ApplicationsIntelligent Robotics and ApplicationsIntelligent Robotics and ApplicationsIntelligent Robotics and ApplicationsIntelligent Tutoring SystemsIntelligent Tutoring SystemsIntelligent Virtual AgentsIntelligent, Secure, and Dependable Systems in Distributed and Cloud EnvironmentsIntelligent, Secure, and Dependable Systems in Distributed and Cloud EnvironmentsInteractive Collaborative RoboticsInteractive Collaborative RoboticsInteractive Collaborative RoboticsInteractive StorytellingInteractive StorytellingInteractive StorytellingInteractive Theorem ProvingInteractive Theorem ProvingInternet and Distributed Computing SystemsInternet and Distributed Computing SystemsInternet and Distributed Computing SystemsInternet of Things – ICIOT 2018Internet of Things – ICIOT 2019Internet of Things, Smart Spaces, and Next Generation Networks and SystemsInternet of Things, Smart Spaces, and Next Generation Networks and SystemsInternet of Things, Smart Spaces, and Next Generation Networks and SystemsInternet of Vehicles. Technologies and Services for Smart CitiesInternet of Vehicles. Technologies and Services Towards Smart CityInternet ScienceInternet ScienceInternet ScienceInternet ScienceInternet ScienceInteroperability and Open-Source Solutions for the Internet of ThingsInterpretability of Machine Intelligence in Medical Image Computing and Multimodal Learning for Clinical Decision SupportIntersections in Simulation and GamingIntravascular Imaging and Computer Assisted Stenting and Large-Scale Annotation of Biomedical Data and Expert Label SynthesisIntravascular Imaging and Computer Assisted Stenting, and Large-Scale Annotation of Biomedical Data and Expert Label SynthesisIt’s All About CoordinationJob Scheduling Strategies for Parallel ProcessingJob Scheduling Strategies for Parallel ProcessingKI 2017: Advances in Artificial IntelligenceKI 2018: Advances in Artificial IntelligenceKI 2019: Advances in Artificial IntelligenceKnowledge Engineering and Knowledge ManagementKnowledge Engineering and Knowledge ManagementKnowledge Graphs and Language TechnologyKnowledge Management and Acquisition for Intelligent SystemsKnowledge Management and Acquisition for Intelligent SystemsKnowledge Representation for Health CareKnowledge Science, Engineering and ManagementKnowledge Science, Engineering and ManagementKnowledge Science, Engineering and ManagementKnowledge Science, Engineering and ManagementKnowledge Science, Engineering and ManagementLanguage and Automata Theory and ApplicationsLanguage and Automata Theory and ApplicationsLanguage and Automata Theory and ApplicationsLanguage Technologies for the Challenges of the Digital AgeLanguage, Data, and KnowledgeLanguage, Logic, and ComputationLanguages and Compilers for Parallel ComputingLanguages and Compilers for Parallel ComputingLanguages and Compilers for Parallel ComputingLarge-Scale Annotation of Biomedical Data and Expert Label Synthesis and Hardware Aware Learning for Medical Imaging and Computer Assisted InterventionLarge-Scale Scientific ComputingLatent Variable Analysis and Signal SeparationLatent Variable Analysis and Signal SeparationLATIN 2018: Theoretical InformaticsLearning and Collaboration Technologies. Design, Development and Technological InnovationLearning and Collaboration Technologies. Designing Learning ExperiencesLearning and Collaboration Technologies. Learning and TeachingLearning and Collaboration Technologies. Novel Learning EcosystemsLearning and Collaboration Technologies. Technology in EducationLearning and Collaboration Technologies. Ubiquitous and Virtual Environments for Learning and CollaborationLearning and Intelligent OptimizationLectures on Runtime VerificationLeveraging Applications of Formal Methods, Verification and Validation. Distributed SystemsLeveraging Applications of Formal Methods, Verification and Validation. Industrial PracticeLeveraging Applications of Formal Methods, Verification and Validation. ModelingLeveraging Applications of Formal Methods, Verification and Validation. VerificationLifelong Technology-Enhanced LearningLightweight Cryptography for Security and PrivacyLogic and Its ApplicationsLogic and Its ApplicationsLogic Programming and Nonmonotonic ReasoningLogic Programming and Nonmonotonic ReasoningLogic, Language, and ComputationLogic, Language, Information, and ComputationLogic, Language, Information, and ComputationLogic, Language, Information, and ComputationLogic, Rationality, and InteractionLogical Foundations of Computer ScienceLogic-Based Program Synthesis and TransformationLogic-Based Program Synthesis and TransformationLogic-Based Program Synthesis and TransformationLogics in Artificial IntelligenceLove and Sex with RobotsLove and Sex with RobotsMachine Learning and Data Mining for Sports AnalyticsMachine Learning and Data Mining in Pattern RecognitionMachine Learning and Data Mining in Pattern RecognitionMachine Learning and Data Mining in Pattern RecognitionMachine Learning and Knowledge Discovery in DatabasesMachine Learning and Knowledge Discovery in DatabasesMachine Learning and Knowledge Discovery in DatabasesMachine Learning and Knowledge ExtractionMachine Learning and Knowledge ExtractionMachine Learning and Knowledge ExtractionMachine Learning and Medical Engineering for Cardiovascular Health and Intravascular Imaging and Computer Assisted StentingMachine Learning for Cyber SecurityMachine Learning for Dynamic Software Analysis: Potentials and LimitsMachine Learning for Medical Image ReconstructionMachine Learning for Medical Image ReconstructionMachine Learning for NetworkingMachine Learning in Medical ImagingMachine Learning in Medical ImagingMachine Learning in Medical ImagingMachine Learning, Optimization, and Big DataMachine Learning, Optimization, and Data ScienceMachine Learning, Optimization, and Data ScienceMachines, Computations, and UniversalityMastering Scale and Complexity in Software ReuseMathematical and Computational OncologyMathematical Aspects of Computer and Information SciencesMathematical Methods for Curves and SurfacesMathematical Morphology and Its Applications to Signal and Image ProcessingMathematical Morphology and Its Applications to Signal and Image ProcessingMathematical Optimization Theory and Operations ResearchMathematical Software – ICMS 2018Mathematics and Computation in MusicMathematics and Computation in MusicMathematics of Program ConstructionMaturity and Innovation in Digital LibrariesMeasurement, Modelling and Evaluation of Computing SystemsMedical Computer Vision and Bayesian and Graphical Models for Biomedical ImagingMedical Image Computing and Computer Assisted Intervention − MICCAI 2017Medical Image Computing and Computer Assisted Intervention − MICCAI 2017Medical Image Computing and Computer Assisted Intervention – MICCAI 2018Medical Image Computing and Computer Assisted Intervention – MICCAI 2018Medical Image Computing and Computer Assisted Intervention – MICCAI 2018Medical Image Computing and Computer Assisted Intervention – MICCAI 2018Medical Image Computing and Computer Assisted Intervention – MICCAI 2019Medical Image Computing and Computer Assisted Intervention – MICCAI 2019Medical Image Computing and Computer Assisted Intervention – MICCAI 2019Medical Image Computing and Computer Assisted Intervention – MICCAI 2019Medical Image Computing and Computer Assisted Intervention – MICCAI 2019Medical Image Computing and Computer Assisted Intervention – MICCAI 2019Medical Image Computing and Computer-Assisted Intervention − MICCAI 2017Medical Imaging SystemsMembrane ComputingMembrane ComputingMining Intelligence and Knowledge ExplorationMining Intelligence and Knowledge ExplorationMining Intelligence and Knowledge ExplorationMobile Web and Intelligent Information SystemsMobile Web and Intelligent Information SystemsMobile Web and Intelligent Information SystemsMobile, Secure, and Programmable NetworkingMobile, Secure, and Programmable NetworkingMobility Analytics for Spatio-Temporal and Social DataModel and Data EngineeringModel and Data EngineeringModel and Data EngineeringModel Checking SoftwareModel Checking SoftwareModel-Based Safety and AssessmentModel-Based Safety and AssessmentModelEd, TestEd, TrustEdModeling and Using ContextModeling and Using ContextModeling Decisions for Artificial IntelligenceModeling Decisions for Artificial IntelligenceModeling Decisions for Artificial IntelligenceModelling and Simulation for Autonomous SystemsModelling and Simulation for Autonomous SystemsModelling Foundations and ApplicationsModelling Foundations and ApplicationsModels, Algorithms, Logics and ToolsModels, Languages, and Tools for Concurrent and Distributed ProgrammingModels, Mindsets, Meta: The What, the How, and the Why Not?Molecular Imaging, Reconstruction and Analysis of Moving Body Organs, and Stroke Imaging and TreatmentMolecular Logic and Computational Synthetic BiologyMulti-Agent Based Simulation XVIIMulti-Agent Based Simulation XVIIIMultiagent System TechnologiesMulti-Agent SystemsMulti-Agent Systems and Agreement TechnologiesMulti-Agent Systems and Agreement TechnologiesMulti-Agent-Based Simulation XIXMulti-disciplinary Trends in Artificial IntelligenceMulti-disciplinary Trends in Artificial IntelligenceMulti-disciplinary Trends in Artificial IntelligenceMultiMedia ModelingMultiMedia ModelingMultiMedia ModelingMultiMedia ModelingMultimodal Brain Image Analysis and Mathematical Foundations of Computational AnatomyMultimodal Pattern Recognition of Social Signals in Human-Computer-InteractionMultimodal Pattern Recognition of Social Signals in Human-Computer-InteractionMusic Technology with SwingNASA Formal MethodsNASA Formal MethodsNASA Formal MethodsNatural and Artificial Computation for Biomedicine and NeuroscienceNatural Language Processing and Chinese ComputingNatural Language Processing and Chinese ComputingNatural Language Processing and Chinese ComputingNatural Language Processing and Chinese ComputingNatural Language Processing and Chinese ComputingNatural Language Processing and Information SystemsNatural Language Processing and Information SystemsNatural Language Processing and Information SystemsNetwork and Parallel ComputingNetwork and Parallel ComputingNetwork and Parallel ComputingNetwork and System SecurityNetwork and System SecurityNetwork and System SecurityNetworked SystemsNetworked SystemsNeural Information ProcessingNeural Information ProcessingNeural Information ProcessingNeural Information ProcessingNeural Information ProcessingNeural Information ProcessingNeural Information ProcessingNeural Information ProcessingNeural Information ProcessingNeural Information ProcessingNeural Information ProcessingNeural Information ProcessingNeural Information ProcessingNeural Information ProcessingNeural Information ProcessingNeural Information ProcessingNew Frontiers in Artificial IntelligenceNew Frontiers in Artificial IntelligenceNew Frontiers in Artificial IntelligenceNew Frontiers in Artificial IntelligenceNew Frontiers in Mining Complex PatternsNew Frontiers in Mining Complex PatternsNew Opportunities for Software ReuseNew Trends in Image Analysis and Processing – ICIAP 2017New Trends in Image Analysis and Processing – ICIAP 2019Next Generation Computer Animation TechniquesNII Testbeds and Community for Information Access ResearchNumber-Theoretic Methods in CryptologyNumerical Analysis and Its ApplicationsNumerical Software VerificationNumerical Software VerificationNumerical Software VerificationOn the Move to Meaningful Internet Systems. OTM 2017 ConferencesOn the Move to Meaningful Internet Systems. OTM 2017 ConferencesOn the Move to Meaningful Internet Systems. OTM 2017 WorkshopsOn the Move to Meaningful Internet Systems. OTM 2018 ConferencesOn the Move to Meaningful Internet Systems. OTM 2018 ConferencesOn the Move to Meaningful Internet Systems: OTM 2016 WorkshopsOn the Move to Meaningful Internet Systems: OTM 2018 WorkshopsOn the Move to Meaningful Internet Systems: OTM 2019 ConferencesOpenMP: Conquering the Full Hardware SpectrumOpenSHMEM and Related Technologies. Big Compute and Big Data ConvergenceOpenSHMEM and Related Technologies. OpenSHMEM in the Era of Extreme HeterogeneityOphthalmic Medical Image AnalysisOR 2.0 Context-Aware Operating Theaters and Machine Learning in Clinical NeuroimagingOR 2.0 Context-Aware Operating Theaters, Computer Assisted Robotic Endoscopy, Clinical Image-Based Procedures, and Skin Image AnalysisOWL: Experiences and Directions – Reasoner EvaluationParadigms in Cryptology – Mycrypt 2016. Malicious and Exploratory CryptologyParallel Computing TechnologiesParallel Computing TechnologiesParallel Problem Solving from Nature – PPSN XVParallel Problem Solving from Nature – PPSN XVParallel Processing and Applied MathematicsParallel Processing and Applied MathematicsPassive and Active MeasurementPassive and Active MeasurementPassive and Active MeasurementPatch-Based Techniques in Medical ImagingPatch-Based Techniques in Medical ImagingPattern RecognitionPattern RecognitionPattern RecognitionPattern RecognitionPattern RecognitionPattern RecognitionPattern Recognition and Computer VisionPattern Recognition and Computer VisionPattern Recognition and Computer VisionPattern Recognition and Computer VisionPattern Recognition and Computer VisionPattern Recognition and Computer VisionPattern Recognition and Computer VisionPattern Recognition and Image AnalysisPattern Recognition and Image AnalysisPattern Recognition and Image AnalysisPattern Recognition and Machine IntelligencePattern Recognition and Machine IntelligencePattern Recognition and Machine IntelligencePattern Recognition Applications and MethodsPattern Recognition Applications and MethodsPerformance Evaluation and Benchmarking for the Analytics EraPerformance Evaluation and Benchmarking. Traditional – Big Data – Internet of ThingsPersonal Analytics and Privacy. An Individual and Collective PerspectivePerspectives of System InformaticsPerspectives of System InformaticsPersuasive TechnologyPersuasive Technology: Development and Implementation of Personalized Technologies to Change Attitudes and BehaviorsPersuasive Technology: Development of Persuasive and Behavior Change Support SystemsPhysiological Computing SystemsPolicy-Based Autonomic Data GovernancePost-Quantum CryptographyPost-Quantum CryptographyPost-Quantum CryptographyPractical Aspects of Declarative LanguagesPractical Aspects of Declarative LanguagesPredictive Intelligence in MedicinePRedictive Intelligence in MEdicinePRICAI 2018: Trends in Artificial IntelligencePRICAI 2018: Trends in Artificial IntelligencePRICAI 2019: Trends in Artificial IntelligencePRICAI 2019: Trends in Artificial IntelligencePRICAI 2019: Trends in Artificial IntelligencePRIMA 2017: Principles and Practice of Multi-Agent SystemsPRIMA 2018: Principles and Practice of Multi-Agent SystemsPRIMA 2019: Principles and Practice of Multi-Agent SystemsPrinciples and Practice of Constraint ProgrammingPrinciples and Practice of Constraint ProgrammingPrinciples and Practice of Constraint ProgrammingPrinciples of ModelingPrinciples of Security and TrustPrinciples of Security and TrustPrinciples of Security and TrustPrivacy in Statistical DatabasesPrivacy Technologies and PolicyPrivacy Technologies and PolicyPrivacy Technologies and PolicyProcessing and Analysis of Biomedical InformationProduct-Focused Software Process ImprovementProduct-Focused Software Process ImprovementProduct-Focused Software Process ImprovementProgramming and Performance Visualization ToolsProgramming Languages and SystemsProgramming Languages and SystemsProgramming Languages and SystemsProgramming Languages and SystemsProgramming Languages and SystemsProgramming Languages and SystemsProgramming with ActorsProgress in Artificial IntelligenceProgress in Artificial IntelligenceProgress in Artificial IntelligenceProgress in Artificial Intelligence and Pattern RecognitionProgress in Cryptology – AFRICACRYPT 2017Progress in Cryptology – AFRICACRYPT 2018Progress in Cryptology – AFRICACRYPT 2019Progress in Cryptology – INDOCRYPT 2017Progress in Cryptology – INDOCRYPT 2018Progress in Cryptology – INDOCRYPT 2019Progress in Cryptology – LATINCRYPT 2017Progress in Cryptology – LATINCRYPT 2019Progress in Pattern Recognition, Image Analysis, Computer Vision, and ApplicationsProgress in Pattern Recognition, Image Analysis, Computer Vision, and ApplicationsProgress in Pattern Recognition, Image Analysis, Computer Vision, and ApplicationsProgress in Pattern Recognition, Image Analysis, Computer Vision, and ApplicationsProvable SecurityProvable SecurityProvable SecurityProvenance and Annotation of Data and ProcessesPublic-Key Cryptography – PKC 2017Public-Key Cryptography – PKC 2017Public-Key Cryptography – PKC 2018Public-Key Cryptography – PKC 2018Public-Key Cryptography – PKC 2019Public-Key Cryptography – PKC 2019Quantitative Evaluation of SystemsQuantitative Evaluation of SystemsQuantitative Evaluation of SystemsQuantum InteractionQuantum InteractionQuantum Technology and Optimization ProblemsQueueing Theory and Network ApplicationsQueueing Theory and Network ApplicationsQueueing Theory and Network ApplicationsRadio Frequency Identification and IoT SecurityReachability ProblemsReachability ProblemsReachability ProblemsReasoning Web. Explainable Artificial IntelligenceReasoning Web. Learning, Uncertainty, Streaming, and ScalabilityReasoning Web. Semantic Interoperability on the WebReasoning Web: Logical Foundation of Knowledge Graph Construction and Query AnsweringRecent Trends and Future Technology in Applied IntelligenceRecent Trends in Algebraic Development TechniquesRecent Trends in Algebraic Development TechniquesReconstruction, Segmentation, and Analysis of Medical ImagesRelational and Algebraic Methods in Computer ScienceRelational and Algebraic Methods in Computer ScienceReliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and CertificationReliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and CertificationReliable Software Technologies – Ada-Europe 2017Reliable Software Technologies – Ada-Europe 2018Reproducible Research in Pattern RecognitionReproducible Research in Pattern RecognitionRequirements Engineering: Foundation for Software QualityRequirements Engineering: Foundation for Software QualityRequirements Engineering: Foundation for Software QualityResearch and Advanced Technology for Digital LibrariesResearch in Attacks, Intrusions, and DefensesResearch in Attacks, Intrusions, and DefensesResearch in Computational Molecular BiologyResearch in Computational Molecular BiologyResearch in Computational Molecular BiologyReuse in the Big Data EraReversible ComputationReversible ComputationReversible ComputationRewriting Logic and Its ApplicationsRisk Assessment and Risk-Driven Quality AssuranceRisks and Security of Internet and SystemsRisks and Security of Internet and SystemsRoboCup 2016: Robot World Cup XXRoboCup 2017: Robot World Cup XXIRoboCup 2018: Robot World Cup XXIIRoboCup 2019: Robot World Cup XXIIIRough SetsRough SetsRough SetsRough SetsRules and ReasoningRules and ReasoningRules and ReasoningRuntime VerificationRuntime VerificationRuntime VerificationSailing Routes in the World of ComputationScalable Uncertainty ManagementScalable Uncertainty ManagementScalable Uncertainty ManagementScale Space and Variational Methods in Computer VisionScale Space and Variational Methods in Computer VisionScaling OpenMP for Exascale Performance and PortabilityScience of Cyber SecurityScience of Cyber SecuritySDL 2017: Model-Driven Engineering for Future InternetSearch Based Software EngineeringSearch-Based Software EngineeringSearch-Based Software EngineeringSecure IT SystemsSecure IT SystemsSecure IT SystemsSecurity and Cryptography for NetworksSecurity and Safety Interplay of Intelligent Software SystemsSecurity and Trust ManagementSecurity and Trust ManagementSecurity and Trust ManagementSecurity of Industrial Control Systems and Cyber-Physical SystemsSecurity of Networks and Services in an All-Connected WorldSecurity Protocols XXIVSecurity Protocols XXVSecurity Protocols XXVISecurity Standardisation ResearchSecurity, Privacy, and Anonymity in Computation, Communication, and StorageSecurity, Privacy, and Anonymity in Computation, Communication, and StorageSecurity, Privacy, and Anonymity in Computation, Communication, and StorageSecurity, Privacy, and Anonymity in Computation, Communication, and StorageSecurity, Privacy, and Anonymity in Computation, Communication, and StorageSecurity, Privacy, and Applied Cryptography EngineeringSecurity, Privacy, and Applied Cryptography EngineeringSecurity, Privacy, and Applied Cryptography EngineeringSelected Areas in Cryptography – SAC 2016Selected Areas in Cryptography – SAC 2017Semantic Keyword-Based Search on Structured Data SourcesSemantic Keyword-Based Search on Structured Data SourcesSemantic Systems. The Power of AI and Knowledge GraphsSemantic TechnologySemantic TechnologySemantics, Analytics, VisualizationSerious GamesSerious GamesServiceology for ServicesService-Oriented and Cloud ComputingService-Oriented and Cloud ComputingService-Oriented ComputingService-Oriented ComputingService-Oriented ComputingService-Oriented Computing – ICSOC 2016 WorkshopsService-Oriented Computing – ICSOC 2017 WorkshopsService-Oriented Computing – ICSOC 2018 WorkshopsServices – SERVICES 2018Services – SERVICES 2019Services Computing – SCC 2018Services Computing – SCC 2019Shape in Medical ImagingSimilarity Search and ApplicationsSimilarity Search and ApplicationsSimilarity Search and ApplicationsSimulated Evolution and LearningSimulation and Synthesis in Medical ImagingSimulation and Synthesis in Medical ImagingSimulation and Synthesis in Medical ImagingSimulation Gaming. Applications for Sustainable Cities and Smart InfrastructuresSimulation, Image Processing, and Ultrasound Systems for Assisted Diagnosis and NavigationSmall Dynamic Complexity ClassesSmart BlockchainSmart BlockchainSmart Card Research and Advanced ApplicationsSmart Card Research and Advanced ApplicationsSmart Card Research and Advanced ApplicationsSmart CitiesSmart Computing and CommunicationSmart Computing and CommunicationSmart Computing and CommunicationSmart Computing and CommunicationSmart GraphicsSmart HealthSmart HealthSmart HealthSmart HealthSmart Homes and Health Telematics, Designing a Better Future: Urban Assisted LivingSmart MultimediaSmart Ultrasound Imaging and Perinatal, Preterm and Paediatric Image AnalysisSocial Computing and Social Media. Applications and AnalyticsSocial Computing and Social Media. Communication and Social CommunitiesSocial Computing and Social Media. Design, Human Behavior and AnalyticsSocial Computing and Social Media. Human BehaviorSocial Computing and Social Media. Technologies and AnalyticsSocial Computing and Social Media. User Experience and BehaviorSocial InformaticsSocial InformaticsSocial InformaticsSocial InformaticsSocial InformaticsSocial Information AccessSocial RoboticsSocial RoboticsSocial RoboticsSocial, Cultural, and Behavioral ModelingSocial, Cultural, and Behavioral ModelingSocial, Cultural, and Behavioral ModelingSOFSEM 2017: Theory and Practice of Computer ScienceSOFSEM 2018: Theory and Practice of Computer ScienceSoftware Analysis, Testing, and EvolutionSoftware ArchitectureSoftware ArchitectureSoftware ArchitectureSoftware Engineering and Formal MethodsSoftware Engineering and Formal MethodsSoftware Engineering and Formal MethodsSoftware Engineering and Formal MethodsSoftware Engineering for Resilient SystemsSoftware Engineering for Resilient SystemsSoftware Engineering for Self-Adaptive Systems III. AssurancesSoftware Engineering in Health CareSoftware Technologies: Applications and FoundationsSoftware Technologies: Applications and FoundationsSoftware Technology: Methods and ToolsSpatial Cognition XSpatial Cognition XISpeech and ComputerSpeech and ComputerSpeech and ComputerStabilization, Safety, and Security of Distributed SystemsStabilization, Safety, and Security of Distributed SystemsStabilization, Safety, and Security of Distributed SystemsStatic AnalysisStatic AnalysisStatic AnalysisStatistical Atlases and Computational Models of the Heart. ACDC and MMWHS ChallengesStatistical Atlases and Computational Models of the Heart. Atrial Segmentation and LV Quantification ChallengesStatistical Atlases and Computational Models of the Heart. Imaging and Modelling ChallengesStatistical Language and Speech ProcessingStatistical Language and Speech ProcessingStatistical Language and Speech ProcessingString Processing and Information RetrievalString Processing and Information RetrievalString Processing and Information RetrievalStructural Information and Communication ComplexityStructural Information and Communication ComplexityStructural Information and Communication ComplexityStructural, Syntactic, and Statistical Pattern RecognitionStructured Object-Oriented Formal Language and MethodStructured Object-Oriented Formal Language and MethodStructured Object-Oriented Formal Language and MethodStudies on Speech ProductionSupercomputing FrontiersSupercomputing FrontiersSwarm IntelligenceSymbiotic InteractionSymbiotic InteractionSymbolic and Quantitative Approaches to Reasoning with UncertaintySymbolic and Quantitative Approaches to Reasoning with UncertaintySymposium on Real-Time and Hybrid SystemsSystem Analysis and Modeling. Languages, Methods, and Tools for Industry 4.0System Analysis and Modeling. Languages, Methods, and Tools for Systems EngineeringTesting Software and SystemsTesting Software and SystemsTesting Software and SystemsTests and ProofsTests and ProofsTests and ProofsText ProcessingText, Speech, and DialogueText, Speech, and DialogueText, Speech, and DialogueThe Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and PrivacyThe Multi-Agent Programming Contest 2018The Semantic WebThe Semantic WebThe Semantic WebThe Semantic WebThe Semantic Web – ISWC 2017The Semantic Web – ISWC 2017The Semantic Web – ISWC 2018The Semantic Web – ISWC 2018The Semantic Web – ISWC 2019The Semantic Web – ISWC 2019The Semantic Web: ESWC 2017 Satellite EventsThe Semantic Web: ESWC 2018 Satellite EventsThe Semantic Web: ESWC 2019 Satellite EventsTheoretical Aspects of Computing – ICTAC 2017Theoretical Aspects of Computing – ICTAC 2018Theoretical Aspects of Computing – ICTAC 2019Theoretical Computer Science and Discrete MathematicsTheory and Applications of Formal ArgumentationTheory and Applications of Models of ComputationTheory and Applications of Models of ComputationTheory and Applications of Satisfiability Testing – SAT 2017Theory and Applications of Satisfiability Testing – SAT 2018Theory and Applications of Satisfiability Testing – SAT 2019Theory and Models for Cyber Situation AwarenessTheory and Practice of Model TransformationTheory and Practice of Model TransformationTheory and Practice of Natural ComputingTheory and Practice of Natural ComputingTheory and Practice of Natural ComputingTheory of CryptographyTheory of CryptographyTheory of CryptographyTheory of CryptographyTheory of CryptographyTheory of CryptographyTools and Algorithms for the Construction and Analysis of SystemsTools and Algorithms for the Construction and Analysis of SystemsTools and Algorithms for the Construction and Analysis of SystemsTools and Algorithms for the Construction and Analysis of SystemsTools and Algorithms for the Construction and Analysis of SystemsTools and Algorithms for the Construction and Analysis of SystemsTools and Algorithms for the Construction and Analysis of SystemsTopics in Cryptology – CT-RSA 2017Topics in Cryptology – CT-RSA 2018Topics in Cryptology – CT-RSA 2019Topics in Theoretical Computer ScienceTowards Autonomous Robotic SystemsTowards Autonomous Robotic SystemsTowards Autonomous Robotic SystemsTowards Autonomous Robotic SystemsTowards Integrative Machine Learning and Knowledge ExtractionTransactions on Computational Collective Intelligence XXIXTransactions on Computational Collective Intelligence XXVITransactions on Computational Collective Intelligence XXVIITransactions on Computational Collective Intelligence XXVIIITransactions on Computational Collective Intelligence XXXTransactions on Computational Collective Intelligence XXXITransactions on Computational Collective Intelligence XXXIIITransactions on Computational Collective Intelligence XXXIVTransactions on Computational Science XXIXTransactions on Computational Science XXXTransactions on Computational Science XXXITransactions on Computational Science XXXIITransactions on Computational Science XXXIIITransactions on Computational Science XXXIVTransactions on Edutainment XIIITransactions on Edutainment XIVTransactions on Edutainment XVTransactions on High-Performance Embedded Architectures and Compilers VTransactions on Large-Scale Data- and Knowledge-Centered Systems XLITransactions on Large-Scale Data- and Knowledge-Centered Systems XLIITransactions on Large-Scale Data- and Knowledge-Centered Systems XXXITransactions on Large-Scale Data- and Knowledge-Centered Systems XXXIITransactions on Large-Scale Data- and Knowledge-Centered Systems XXXIIITransactions on Large-Scale Data- and Knowledge-Centered Systems XXXIVTransactions on Large-Scale Data- and Knowledge-Centered Systems XXXIXTransactions on Large-Scale Data- and Knowledge-Centered Systems XXXVTransactions on Large-Scale Data- and Knowledge-Centered Systems XXXVITransactions on Large-Scale Data- and Knowledge-Centered Systems XXXVIITransactions on Large-Scale Data- and Knowledge-Centered Systems XXXVIIITransactions on Pattern Languages of Programming IVTransactions on Petri Nets and Other Models of Concurrency XIITransactions on Petri Nets and Other Models of Concurrency XIIITransactions on Petri Nets and Other Models of Concurrency XIVTransactions on Rough Sets XXITransforming Digital WorldsTransforming Learning with Meaningful TechnologiesTrends and Applications in Knowledge Discovery and Data MiningTrends and Applications in Knowledge Discovery and Data MiningTrends and Applications in Knowledge Discovery and Data MiningTrends in Artificial Intelligence: PRICAI 2016 WorkshopsTrends in Functional ProgrammingTrends in Functional ProgrammingTrends in Functional ProgrammingTrust, Privacy and Security in Digital BusinessTrust, Privacy and Security in Digital BusinessTrust, Privacy and Security in Digital BusinessUbiquitous Computing and Ambient IntelligenceUbiquitous NetworkingUbiquitous NetworkingUncertainty for Safe Utilization of Machine Learning in Medical Imaging and Clinical Image-Based ProceduresUnconventional Computation and Natural ComputationUnconventional Computation and Natural ComputationUnconventional Computation and Natural ComputationUnderstanding and Interpreting Machine Learning in Medical Image Computing ApplicationsUnderstanding Human Activities Through 3D SensorsUnderstanding the Brain Function and EmotionsUnifying Theories of ProgrammingUnifying Theories of ProgrammingUniversal Access in Human–Computer Interaction. Design and Development Approaches and MethodsUniversal Access in Human–Computer Interaction. Designing Novel InteractionsUniversal Access in Human–Computer Interaction. Human and Technological EnvironmentsUniversal Access in Human-Computer Interaction. Methods, Technologies, and UsersUniversal Access in Human-Computer Interaction. Multimodality and Assistive EnvironmentsUniversal Access in Human-Computer Interaction. Theory, Methods and ToolsUniversal Access in Human-Computer Interaction. Virtual, Augmented, and Intelligent EnvironmentsUnveiling Dynamics and ComplexityVariable Neighborhood SearchVerification and Evaluation of Computer and Communication SystemsVerification and Evaluation of Computer and Communication SystemsVerification and Evaluation of Computer and Communication SystemsVerification, Model Checking, and Abstract InterpretationVerification, Model Checking, and Abstract InterpretationVerified Software. Theories, Tools, and ExperimentsVerified Software. Theories, Tools, and ExperimentsVideo Analytics. Face and Facial Expression Recognition and Audience MeasurementVirtual Reality and Augmented RealityVirtual Reality and Augmented RealityVirtual Reality and Augmented RealityVirtual, Augmented and Mixed RealityVirtual, Augmented and Mixed Reality. Applications and Case StudiesVirtual, Augmented and Mixed Reality. Multimodal InteractionVirtual, Augmented and Mixed Reality: Applications in Health, Cultural Heritage, and IndustryVirtual, Augmented and Mixed Reality: Interaction, Navigation, Visualization, Embodiment, and SimulationWALCOM: Algorithms and ComputationWALCOM: Algorithms and ComputationWALCOM: Algorithms and ComputationWeb and Big DataWeb and Big DataWeb and Big DataWeb and Big DataWeb and Big DataWeb and Big DataWeb and Big DataWeb and Big DataWeb and Big DataWeb and Internet EconomicsWeb and Internet EconomicsWeb and Internet EconomicsWeb and Wireless Geographical Information SystemsWeb and Wireless Geographical Information SystemsWeb and Wireless Geographical Information SystemsWeb EngineeringWeb EngineeringWeb EngineeringWeb Information Systems and ApplicationsWeb Information Systems and ApplicationsWeb Information Systems Engineering – WISE 2017Web Information Systems Engineering – WISE 2017Web Information Systems Engineering – WISE 2018Web Information Systems Engineering – WISE 2018Web Information Systems Engineering – WISE 2019Web Services – ICWS 2018Web Services – ICWS 2019Wired/Wireless Internet CommunicationsWired/Wireless Internet CommunicationsWired/Wireless Internet CommunicationsWireless Algorithms, Systems, and ApplicationsWireless Algorithms, Systems, and ApplicationsWireless Algorithms, Systems, and Applications Accelerator Programming Using DirectivesAgents and Artificial IntelligenceCommunication Systems and NetworksComputational Methods and Clinical Applications in Musculoskeletal ImagingComputational Topology in Image ContextComputer SecurityComputer Vision – ECCV 2018 WorkshopsComputer Vision – ECCV 2018 WorkshopsComputer Vision – ECCV 2018 WorkshopsComputer Vision – ECCV 2018 WorkshopsComputer Vision – ECCV 2018 WorkshopsComputer Vision – ECCV 2018 WorkshopsCritical Information Infrastructures SecurityData Integration in the Life SciencesDatabases Theory and ApplicationsDigital Forensics and WatermarkingDistributed Computing and Internet TechnologyDistributed Computing by Mobile EntitiesEnhanced Living EnvironmentsEuro-Par 2018: Parallel Processing WorkshopsFinite Difference Methods. Theory and ApplicationsGames and Learning AllianceHuman-Centered Software EngineeringHybrid MetaheuristicsInformation and Operational Technology Security SystemsInformation Security and Cryptology – ICISC 2018Job Scheduling Strategies for Parallel ProcessingLearning and Intelligent OptimizationMachine Learning and Knowledge Discovery in DatabasesMachine Learning and Knowledge Discovery in DatabasesMachine Learning and Knowledge Discovery in DatabasesMembrane ComputingMobile, Secure, and Programmable NetworkingMultiMedia ModelingMultiMedia ModelingNetworked SystemsNumerical Methods and ApplicationsPattern Recognition and Information ForensicsPattern Recognition Applications and MethodsPerformance Evaluation and Benchmarking for the Era of Artificial IntelligencePractical Aspects of Declarative LanguagesRisks and Security of Internet and SystemsSelected Areas in Cryptography – SAC 2018SOFSEM 2019: Theory and Practice of Computer ScienceSoftware Engineering Aspects of Continuous Development and New Paradigms of Software Production and DeploymentThe Future of Digital DemocracyTransactions on Computational Collective Intelligence XXXIITransactions on Large-Scale Data- and Knowledge-Centered Systems XLVerification, Model Checking, and Abstract InterpretationVideo Analytics. Face and Facial Expression Recognition