Search results

Jump to: navigation, search
  • ...ess calculi, programming language semantics, proof theory, reasoning about security, rewriting, specifications, type systems and type theory, and verification. All deadlines are firm; late submissions will not be considered. Detailed information about electronic paper submission via EasyChair will be posted at the LICS
    2 KB (285 words) - 15:11, 7 November 2016
  • Information Security and Cryptography Information Systems
    3 KB (412 words) - 19:34, 12 November 2020
  • ...ring the past decade. They come in diverse forms: business support, public security, entertainment, welfare and many more. Video streaming, video conferencing, - Side information refinement
    4 KB (567 words) - 23:24, 14 October 2008
  • | Title = 8th International Workshop on Pattern Recognition in Information Systems Pattern Recognition in Information Systems
    4 KB (550 words) - 23:25, 14 October 2008
  • ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design Security and protection systems
    11 KB (1,492 words) - 23:26, 14 October 2008
  • * Security ...Web form, which will be available here soon. The Web form asks for contact information for the paper and allows for the submission of your full paper file in PDF
    4 KB (547 words) - 23:26, 14 October 2008
  • | Field = Computer security and reliability ...ith at least 10pt font. Submission instructions and other workshop related information will appear here.
    5 KB (598 words) - 01:12, 31 May 2012
  • * Security and Trust in Distributed Systems ** [[has general chair::Sam Joseph]], Dept of Information and Computer Sciences, University of Hawaii at Manoa, Email: srjoseph@hawai
    6 KB (761 words) - 03:28, 6 January 2009
  • - Information Services - Networking and Security
    5 KB (577 words) - 23:27, 14 October 2008
  • * Hardware support for security For more information on the conference and submission instructions, please visit the conference
    2 KB (259 words) - 10:14, 29 May 2016
  • ...ns and required attributes, such as reliability, availability, safety, and security, as well as human factors. * Architecture and protocols for security.
    4 KB (528 words) - 23:27, 14 October 2008
  • ...energy, Waste management, Waste treatment and recycling, Water network and security, Sensor technologies, Intelligent Micro-grids ...n, transmission, processing, fusion, management, simulation and display of information for aerospace systems
    4 KB (561 words) - 23:29, 14 October 2008
  • Data, information, and signal processing Security and privacy
    6 KB (771 words) - 16:09, 16 September 2019
  • suitability to each conference. PLEASE SEE BELOW for topic information 10) Networked embedded systems and security
    11 KB (1,352 words) - 00:33, 15 October 2008
  • reliability, security and survivability in RT systems; scheduling further information.
    7 KB (870 words) - 23:30, 14 October 2008
  • ...es, social networks, Web services, distributed computing, Web engineering, information systems, natural language processing, multimedia, and human-computer intera ...hould not exceed 15 pages in length and must be formatted according to the information for LNCS authors.
    4 KB (573 words) - 23:31, 14 October 2008
  • * Information extraction from the Deep Web, especially from E-commerce sites * Security and privacy issues of Deep Web content extraction and annotation
    2 KB (225 words) - 23:31, 14 October 2008
  • ...cooperation and goal seeking through sharing policy and ontology, safety & security in systems, other QoS issues, and so on. ...es relating to architecture, implementation, coordination, service levels, security, etc. of semantic or otherwise agents.
    10 KB (1,391 words) - 23:31, 14 October 2008
  • .... corporate culture), psychological (perceived dependability), managerial (information management and processes), and economical. Fostering learning is a key, and ...ity when compared to traditional critical systems, where dependability and security are fairly well understood as complementary concepts and a variety of prove
    8 KB (952 words) - 23:31, 14 October 2008
  • Security in distributed systems Autonomic access control and security issues
    5 KB (702 words) - 23:31, 14 October 2008

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)