Search results
Create the page "Information Security" on this wiki! See also the search results found.
- |Title=The IEEE 22nd International Conference on Advanced Information Networking and Applications ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-08) will be held in Ginowan City , Okinaw8 KB (1,037 words) - 22:20, 10 January 2018
- |Title=The IEEE 21st International Conference on Advanced Information Networking and Applications (AINA-07) ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-07) will be held in Niagara Falls, Canada9 KB (1,189 words) - 22:20, 10 January 2018
- |Title=The IEEE 20th International Conference on Advanced Information Networking and Applications on Advanced Information Networking and Applications (AINA2006) will26 KB (3,456 words) - 22:20, 10 January 2018
- |Title=The IEEE 19th International Conference on Advanced Information Networking and Applications ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA 2005) will be held in Tamkang University,10 KB (1,263 words) - 22:20, 10 January 2018
- |Title=The 18th International Conference on Advanced Information Networking and Applications (AINA 2004) The International Conference on Advanced Information Networking and Applications (AINA 2004) will be held in Fukuoka, Kyushu, Ja12 KB (1,537 words) - 22:19, 10 January 2018
- |Title=The International Conference on Advanced Information Networking and Applications The International Conference on Advanced Information Networking and Application will be held in Xi'an, China in March 27-29, 2008 KB (1,040 words) - 22:20, 10 January 2018
- Users will be able to retrieve, publish, and manage information, - Wireless security and dependability4 KB (495 words) - 09:22, 22 August 2023
- ...traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. - Trust-related Security and Privacy: Trust-related secure architecture, framework, policy, intrusio9 KB (1,216 words) - 17:32, 14 October 2008
- * Security assessment and enhancement * Games of imperfect or asymmetric information6 KB (722 words) - 17:32, 14 October 2008
- ...raction and representation, shape and motion primitives, texture and color information, statistical, structural and syntactic pattern recognition, neural networks ...multimedia databases, digital and video libraries, compression and coding, security over the network.2 KB (268 words) - 17:47, 14 October 2008
- Persuasive Technology is all about using Information and Communications Technology to change what we think and do. We are just e * Security and privacy8 KB (989 words) - 20:13, 22 February 2009
- Geographical Information Systems/ Global Navigation Satellite Systems Security and Information Assurance4 KB (503 words) - 11:36, 18 October 2008
- - System management and security; For more information visit the conference web site at http://www.computingfrontiers.org4 KB (591 words) - 17:48, 14 October 2008
- ...n the areas of RFID technologies, their supporting large-scale distributed information systems and their applications. * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques3 KB (431 words) - 17:48, 14 October 2008
- • Information-theoretic aspects of wireless communications • Wireless network security and privacy6 KB (731 words) - 10:33, 14 August 2023
- ...ireless communications and networking employed to support the needs of the Information Society. This sixth symposium, intends to bring together various wireless c * Wireless privacy and security3 KB (456 words) - 18:10, 14 October 2008
- session that includes the ACM Student Research Competition. More information on these activities, including submission * Security, privacy, and trustworthiness of mobile and wireless systems7 KB (974 words) - 12:28, 3 August 2023
- ...uming but also error-prone. The systematic and timely capture of the above information may accurately keep track of the various stages that data go through and he ...ware engineering, workflow system, information retrieval, web service, and security research. At the same time, it also requires understanding of problems from3 KB (416 words) - 17:48, 14 October 2008
- Information theory: distributed network coding, Shannon's entropy, Nash equilibrium Internet security enforcement and validation11 KB (1,385 words) - 17:48, 14 October 2008
- * legal and quasi-legal applications of AI and other advanced information technologies * Conceptual or model-based legal information retrieval7 KB (998 words) - 17:48, 14 October 2008