Search results

Jump to: navigation, search
  • ...ity when compared to traditional critical systems, where dependability and security are fairly well understood as complementary concepts and a variety of prove ...lopment tools with middleware, traditional dependability, fault tolerance, security, and adaptivity concepts, together with social and psychological aspects, t
    8 KB (952 words) - 23:31, 14 October 2008
  • Security in distributed systems Network-based Computing
    5 KB (702 words) - 23:31, 14 October 2008
  • ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.
    5 KB (580 words) - 10:32, 12 May 2020
  • ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more.
    4 KB (577 words) - 09:28, 12 May 2020
  • *Big Data platforms with applications to network management, security, measurements *Design, analysis, and evaluation of network architectures
    4 KB (514 words) - 12:03, 6 April 2020
  • ...ternet technologies, multimedia, wireless communications, data privacy and security, authentification, authorization and federation. ...tem analysis and control, HVDC and FACTS, Power market, Power distribution network and automation, Power protection, SCADA, EMS, WAMS and substation automatio
    4 KB (504 words) - 23:33, 14 October 2008
  • ?Semantic Web ?Semantic Search and Query ?Semantic Link Network ?Semantic Normalization ?Semantic Interoperability ?Semantic Visualization ...lf-Organized Intelligence ?Service-oriented Computing ?Mobile Grid ?Social Network ?Community Discovery
    3 KB (367 words) - 23:35, 14 October 2008
  • | Title = SANS Network Security 2007
    492 bytes (57 words) - 23:36, 14 October 2008
  • | Title = The First International Conference on Security and Privacy in Mobile Information and Communication Systems ...edge researchers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymaker
    4 KB (451 words) - 23:37, 14 October 2008
  • * foundations of security * security and trust issues in services
    6 KB (682 words) - 10:18, 14 April 2020
  • of billions of sensing devices. While a single sensor network typically - Sensor network protocols
    4 KB (483 words) - 23:37, 14 October 2008
  • �?� Network architectures for sensor networks SECURITY
    11 KB (1,533 words) - 23:38, 14 October 2008
  • ...ield of computer and data communication networks. We invite submissions on network architecture, design, implementation, operations, analysis, measurement, pe * Network applications & services
    3 KB (380 words) - 19:34, 17 November 2008
  • ...obile. The implementation of such a paradigm requires advances in wireless network technologies and devices, development of infrastructures supporting cogniti * Information Security and Cryptography
    3 KB (386 words) - 23:39, 14 October 2008
  • ...nd security, systems health management, and related areas. Collaborate and network with scientists, engineers, developers and customers, in a balance of forma
    1 KB (164 words) - 23:39, 14 October 2008
  • ...tures and compilers for graphics/gaming, embedded processors, DSPs, ASIPs (network, multimedia, wireless, etc.) * Microarchitecture support for reliability, dependability, and security
    3 KB (326 words) - 17:43, 8 November 2008
  • ...cast network, home network, mobile multimedia QoS, mobile security, ad hoc network ...system), personal information management, data integration and federation, security, privacy
    2 KB (303 words) - 23:42, 14 October 2008
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...management /locator-location paradigm/; Recovering and fault-tolerance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Cont ...Scalability; User and service mobility; Wireless QoS; Traffic engineering; Network planning; Intermittent services; Virtualization; Self-management and contr
    7 KB (883 words) - 17:35, 7 January 2021
  • ...raw observations that are used in our experiments. Examples might include network measurement or capturing data such as seismic measurements. Middleware is r * Virtual organization and security issues of instruments and sensors on the Grid
    4 KB (642 words) - 21:17, 9 December 2008

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)