Search results
Create the page "Information Security" on this wiki! See also the search results found.
- | Title = Third International Conference on Bio-Inspired Models of Network, Information and Computing Systems 3rd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems5 KB (694 words) - 23:11, 14 October 2008
- + Security for CE Communications Multimedia Information Processing on Wireless Sensor Networks5 KB (584 words) - 09:43, 4 September 2023
- ...be held in Bangkok, Thailand. The ISPACS presents every possibility on new information technologies. The ISPACS 2008 will include many regular sessions on the top 7. Security Signal Processing4 KB (496 words) - 23:12, 14 October 2008
- Security/privacy in wireless systems Wireless net. information theory2 KB (244 words) - 23:12, 14 October 2008
- 5. Information and Communication Technologies (ICT) 5 .54 Network Security2 KB (250 words) - 23:12, 14 October 2008
- ...ospective tutorial presenters should contact the Tutorials Chair. For more information please visit the conference web page (see below). - Network Security3 KB (465 words) - 23:13, 14 October 2008
- ...rage contributions on policy-based techniques in support of management and security of all types of wireless networks: cellular, Wi-Fi, Mobile Ad Hoc, hybrids, ...ource allocation, autonomic computing, systems management, QoS adaptation, security5 KB (667 words) - 23:13, 14 October 2008
- * Computer Networks and Security * Information Theory and Coding2 KB (283 words) - 23:13, 14 October 2008
- * Security and resilience of networked systems For more information and submission guidelines, please see4 KB (528 words) - 23:13, 14 October 2008
- Information and Communication Technologies continue to rapidly transform how business i ...values, the real-world impact of e-Business research, and customer-centric information systems respectively. With this year?s workshop being located in Europe, we3 KB (430 words) - 23:13, 14 October 2008
- *Security and privacy in Web search and mining *Information extraction, slot-filling2 KB (237 words) - 12:23, 11 September 2020
- | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.4 KB (457 words) - 23:13, 14 October 2008
- ...published work that demonstrate current research in all areas of Web based information systems and their applications in science, technology, business and commerc Web Services Security3 KB (494 words) - 23:16, 14 October 2008
- ...os, audio recordings) in bibliometrics (publication patterns), in homeland security (terrorist networks). * Mining social data for multimedia information retrieval3 KB (453 words) - 23:14, 14 October 2008
- networks, including user behavior models, security and trust, P2P, - "How salesforce.com Changes Information Technology"7 KB (813 words) - 23:14, 14 October 2008
- * Security Challenges for Web Services * Extended Web Services Specifications (security, QoS, other properties)8 KB (1,158 words) - 23:14, 14 October 2008
- * Data Models for Web Information Systems * Web Information Extraction...3 KB (250 words) - 23:14, 14 October 2008
- * Security, privacy, and trust ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to6 KB (869 words) - 23:14, 14 October 2008
- | Title = IEEE Information Theory Workshop on Networking and Information Theory | Field = Information theory3 KB (308 words) - 23:15, 14 October 2008
- * Security, robustness, and fault-tolerance in networked environments ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to8 KB (1,093 words) - 23:15, 14 October 2008