Search results

Jump to: navigation, search
  • • Neural networks based control systems Computer System, Information Security and Networks
    3 KB (319 words) - 17:07, 27 February 2009
  • ...ts Simulation of Agent-Environment Interaction /Intelligent Agents, Neural Networks and Simulation, Simulation of Collective Behaviour and Emergent Phenomena, ...tems; Telecommunication devices and systems; Intelligent telecommunication networks; ISDN; ATM communications.
    38 KB (4,832 words) - 17:07, 27 February 2009
  • ...rocessing/compression technology and the wide deployment of wired/wireless networks, there is an increasing demand for multimedia communication services. Howe ...ages the characteristics of multimedia signal processing and communication networks, how to optimize the QoS subject to available resources, and, in particular
    4 KB (505 words) - 17:08, 27 February 2009
  • It has evolved from a small number of interconnected computer networks to a and share knowledge over a network of heterogeneous networks. In the future,
    11 KB (1,440 words) - 17:08, 27 February 2009
  • ...net, autonomous and spontaneous management will be a key feature of future networks and information systems. In this context, security is an essential property ...cation must be dynamic and adapt itself to the changing environment. Those networks and systems must be able to interoperate securely when they respective secu
    3 KB (480 words) - 17:08, 27 February 2009
  •  Security and Privacy in Wired, Wireless, Mobile, Sensor Ad Hoc NetworksWireless Network Architecture and Technologies Systems
    5 KB (578 words) - 10:21, 20 November 2020
  • ...nternational Symposium on Image/Video Communications over fixed and mobile networks is coming back to Rabat. ISIVC 2010 aims at bringing together the various c * Transmission over fixed and wireless networks
    5 KB (630 words) - 11:13, 1 November 2009
  • | Title = 2nd IFIP Wireless Days | Homepage = www.wireless-days.org
    4 KB (540 words) - 11:32, 2 August 2009
  • ...practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioner • Network and Wireless Network Security
    3 KB (339 words) - 11:32, 2 August 2009
  • | Title = 6th International Conference on Wireless Communications, Networking and Mobile Computing ...nd the world to exchange their research results and address open issues in Wireless Communications, Network Technologies, Services and Application.
    2 KB (230 words) - 11:32, 2 August 2009
  • | Title = The Second International Conference on Communication Systems and Networks ...ary 2009, the SECOND International Conference on COMmunication Systems and NETworkS (COMSNETS) will be held in Bangalore, India from 6 January 2010 to 10 Janua
    7 KB (1,054 words) - 16:43, 27 December 2015
  • | Title = 7th IEEE, IET International Symposium on COMMUNICATION SYSTEMS, NETWORKS AND DIGITAL SIGNAL PROCESSING ...om all over the world on advances in communication systems, communications networks, digital signal processing and other related areas and to provide a focus f
    9 KB (1,233 words) - 11:34, 2 August 2009
  • ...omputing applications, secured data sharing and processing in sensor networks, environmental monitoring and transportation, etc. Although substantial * Data management in wireless networks
    5 KB (530 words) - 11:34, 2 August 2009
  • ...sruption Tolerant Network), Optical Network, P2P and WEB Searching, Social Networks, etc. The topics include but are not limited to:
    2 KB (245 words) - 11:34, 2 August 2009
  •  Security and Privacy in Wired, Wireless, Mobile, Sensor Ad Hoc NetworksWireless Network Architecture and Technologies Systems
    5 KB (599 words) - 10:21, 20 November 2020
  • ...r networks; Security in wireless multimedia systems; Security in different networks (mesh, personal, local, metropolitan, GSM, Bluetooth, WiMax, IEEE 802.x, et ...ta confidentiality and integrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service discovery; Sec
    6 KB (746 words) - 11:35, 2 August 2009
  • ...sumption elements that the broad spectrum of smart, information-intensive, sensor-enabled pervasive applications depend on, such as remote habitat monitoring ...nals, and application developers working on QoI and QoS in wireless sensor networks for pervasive computing.
    5 KB (734 words) - 11:35, 2 August 2009
  • I. COMMUNICATION NETWORKS • Peer-to-Peer, Overlay and Content Delivery Networks
    3 KB (417 words) - 10:54, 1 November 2009
  • | Title = Mobile, Multimedia, Ad Hoc and Sensor Networks International Journal of Communication Networks and Distributed Systems (IJCNDS)
    7 KB (950 words) - 11:35, 2 August 2009
  • ...9th ACM/IEEE International Conference on Information Processing in Sensor Networks The 9th ACM/IEEE Conference on Information Processing in Sensor Networks
    8 KB (1,119 words) - 09:57, 27 February 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)