Search results
Create the page "Network security" on this wiki! See also the search results found.
- | Title = The First ACM Computer Security Architecture Workshop | Field = Computer security and reliability5 KB (619 words) - 23:19, 14 October 2008
- | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability6 KB (736 words) - 23:20, 14 October 2008
- | Title = Information Security South Africa (ISSA) Conference 2008 | Field = Computer security and reliability4 KB (465 words) - 23:20, 14 October 2008
- | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security | Field = Computer security and reliability4 KB (565 words) - 23:20, 14 October 2008
- | Title = IEEE Symposium on Security and Privacy | Field = Computer security and reliability2 KB (262 words) - 23:20, 14 October 2008
- |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability6 KB (689 words) - 10:39, 21 August 2020
- | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability4 KB (502 words) - 23:20, 14 October 2008
- - Mobile Network Traffic Engineering, Performance & Optimization - Wireless & Mobile Network Management and Service Infrastructure10 KB (1,262 words) - 23:20, 14 October 2008
- Service Security, Privacy and Trust Service Network Economic Structures and Effects18 KB (2,352 words) - 23:23, 14 October 2008
- * Information Security * Ubiquitous and Sensor Network3 KB (415 words) - 23:23, 14 October 2008
- | Field = Computer security and reliability ...des research at all design levels: circuit, architecture, compiler, OS and network. This workshop aims to become a forum for academia and industry to discuss5 KB (598 words) - 01:12, 31 May 2012
- RAID, and network-storage system designs). ...s increasingly important as boundaries between hardware/software and local/network3 KB (406 words) - 17:39, 30 September 2016
- ...SETI@Home?s "BOINC" computational Grid; BitTorrent?s Content Distribution Network; and ppLive, and ppStream in China, as well as Zattoo in Europe, all of thr * Security and Trust in Distributed Systems6 KB (761 words) - 03:28, 6 January 2009
- resources such as processing, network bandwidth and storage capacity - Networking and Security5 KB (577 words) - 23:27, 14 October 2008
- * Hardware support for security * Network processor and router architectures2 KB (259 words) - 10:14, 29 May 2016
- ...d their own properties with respect to traffic load, congestion situation, network topology, and wireless channel propagation etc. However, cognitive radio wi ...s that report the latest research advances in this field from physical and network layers to practical applications.3 KB (409 words) - 23:27, 14 October 2008
- ...a broad forum an outstanding opportunity for researchers, academicians and network engineers to discuss new and emerging technologies in the field of computer - Network management and performance3 KB (413 words) - 23:28, 14 October 2008
- Computational Intelligence: Artificial neural network, Fuzzy systems, Genetic algorithm, Evolutionary computing, Machine learning ...energy, Waste management, Waste treatment and recycling, Water network and security, Sensor technologies, Intelligent Micro-grids4 KB (561 words) - 23:29, 14 October 2008
- of real-time embedded systems, such as timeliness, safety, security, - COMPOSITIONAL DISTRIBUTED SYSTEMS: composition of network protocol6 KB (707 words) - 23:29, 14 October 2008
- |Field=Computer Science, Embedded systems, Embedded Network Sensor Systems, Sensor Systems Sensor network architecture and protocols Sensor network algorithms such as localization, routing, time synchronization, clustering,6 KB (771 words) - 16:09, 16 September 2019