Search results

Jump to: navigation, search
  • | Title = Third International Conference on Bio-Inspired Models of Network, Information and Computing Systems 3rd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems
    5 KB (694 words) - 23:11, 14 October 2008
  • + Security for CE Communications Multimedia Information Processing on Wireless Sensor Networks
    5 KB (584 words) - 09:43, 4 September 2023
  • ...be held in Bangkok, Thailand. The ISPACS presents every possibility on new information technologies. The ISPACS 2008 will include many regular sessions on the top 7. Security Signal Processing
    4 KB (496 words) - 23:12, 14 October 2008
  • Security/privacy in wireless systems Wireless net. information theory
    2 KB (244 words) - 23:12, 14 October 2008
  • 5. Information and Communication Technologies (ICT) 5 .54 Network Security
    2 KB (250 words) - 23:12, 14 October 2008
  • ...ospective tutorial presenters should contact the Tutorials Chair. For more information please visit the conference web page (see below). - Network Security
    3 KB (465 words) - 23:13, 14 October 2008
  • ...rage contributions on policy-based techniques in support of management and security of all types of wireless networks: cellular, Wi-Fi, Mobile Ad Hoc, hybrids, ...ource allocation, autonomic computing, systems management, QoS adaptation, security
    5 KB (667 words) - 23:13, 14 October 2008
  • * Computer Networks and Security * Information Theory and Coding
    2 KB (283 words) - 23:13, 14 October 2008
  • * Security and resilience of networked systems For more information and submission guidelines, please see
    4 KB (528 words) - 23:13, 14 October 2008
  • Information and Communication Technologies continue to rapidly transform how business i ...values, the real-world impact of e-Business research, and customer-centric information systems respectively. With this year?s workshop being located in Europe, we
    3 KB (430 words) - 23:13, 14 October 2008
  • *Security and privacy in Web search and mining *Information extraction, slot-filling
    2 KB (237 words) - 12:23, 11 September 2020
  • | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.
    4 KB (457 words) - 23:13, 14 October 2008
  • ...published work that demonstrate current research in all areas of Web based information systems and their applications in science, technology, business and commerc Web Services Security
    3 KB (494 words) - 23:16, 14 October 2008
  • ...os, audio recordings) in bibliometrics (publication patterns), in homeland security (terrorist networks). * Mining social data for multimedia information retrieval
    3 KB (453 words) - 23:14, 14 October 2008
  • networks, including user behavior models, security and trust, P2P, - "How salesforce.com Changes Information Technology"
    7 KB (813 words) - 23:14, 14 October 2008
  • * Security Challenges for Web Services * Extended Web Services Specifications (security, QoS, other properties)
    8 KB (1,158 words) - 23:14, 14 October 2008
  • * Data Models for Web Information Systems * Web Information Extraction...
    3 KB (250 words) - 23:14, 14 October 2008
  • * Security, privacy, and trust ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to
    6 KB (869 words) - 23:14, 14 October 2008
  • | Title = IEEE Information Theory Workshop on Networking and Information Theory | Field = Information theory
    3 KB (308 words) - 23:15, 14 October 2008
  • * Security, robustness, and fault-tolerance in networked environments ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to
    8 KB (1,093 words) - 23:15, 14 October 2008

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)