Search results

Jump to: navigation, search
  • * Network and IT security issues in developing countries Abdelfettah Belghith, National School of Computer Sciences (ENSI), Tunisia;
    9 KB (1,127 words) - 17:19, 26 April 2011
  • ...tes to attend sessions in any conference participating in the Australasian Computer Science Week. * Privacy and Security in Databases.
    2 KB (308 words) - 23:08, 14 October 2008
  • primary and international forum for applied computer scientists, computer engineering, and other computer related professionals to gather, interact, present,
    7 KB (1,006 words) - 23:08, 14 October 2008
  • non-functional system properties (e.g. availability, reliability, security, performance, by using the Springer Lecture Notes in Computer Science (LNCS) style
    7 KB (791 words) - 23:09, 14 October 2008
  • Security, Personalization Department of Computer Science, University of California-Santa Cruz,
    3 KB (437 words) - 23:20, 14 October 2008
  • ...will be included in a separate workshop proceedings published by the IEEE Computer Society Press. * Mining and link analysis in networked settings: web, social and computer networks, and online communities
    5 KB (634 words) - 15:36, 14 December 2008
  • * Security techniques * Concurrent engineering and computer integrated manufacturing
    29 KB (4,077 words) - 18:04, 18 August 2023
  • * Privacy and security issues ...ns of the conference. The conference proceedings will be published by IEEE Computer Society. The extended version of the best papers would also be invited for
    3 KB (452 words) - 23:09, 14 October 2008
  • ...t/event.showcfp?eventid=2563&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]
    589 bytes (67 words) - 23:09, 14 October 2008
  • - Human-Computer Interaction - Security and Access Control
    4 KB (595 words) - 23:09, 14 October 2008
  • * mobile database security Institute of Computer Science IV, University of Bonn
    7 KB (875 words) - 23:09, 14 October 2008
  • * Flexible techniques for security and intrusion detection in Information Systems and Databases ...ers, formatted following the formatting instructions available on the IEEE Computer Society web site; the LaTeX style files can be dowloaded here as well. Pape
    7 KB (917 words) - 23:09, 14 October 2008
  • Information systems and database systems have always been a central topic of computer science. Additionally the * Data and Information Privacy and Security
    4 KB (457 words) - 16:14, 16 December 2020
  • * Security, reliability and availability in distributed storage systems, .../servlet/event.showcfp?eventid=2250&copyownerid=598 WikiCFP][[Category:Computer networking]]
    5 KB (644 words) - 23:10, 14 October 2008
  • - security and privacy All accepted papers, between 5 and 11 pages long, will be published by IEEE Computer Society.
    4 KB (539 words) - 23:10, 14 October 2008
  • Sponsored by: Database Society, Chinese Computer Federation; Natural Science Foundation of China - Database security
    10 KB (1,376 words) - 23:10, 14 October 2008
  • ...nce proceedings, as in previous years, by Springer in the Lecture Notes in Computer Science (LNCS) series. * Data security, privacy and trust
    4 KB (593 words) - 23:10, 14 October 2008
  • · Security control in grid workflow systems ...Indexed). Selected papers will be invited to a special issue in Journal of Computer and System Sciences.
    7 KB (886 words) - 23:10, 14 October 2008
  • * Data analysis for network traffic estimation and security ...fp/servlet/event.showcfp?eventid=1749&copyownerid=2 WikiCFP][[Category:Computer networking]]
    3 KB (332 words) - 23:10, 14 October 2008
  • * Privacy and security in Auto ID systems ...fp/servlet/event.showcfp?eventid=1118&copyownerid=2 WikiCFP][[Category:Computer networking]]
    4 KB (471 words) - 23:10, 14 October 2008

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)