Search results

Jump to: navigation, search
  • ...proaches provide important enhancements to the ways gateways interact with information services, provide rich user interactivity, and build social networks. Exami * Portal security models and solutions;
    3 KB (378 words) - 23:34, 14 October 2008
  • | Field = Information science ...of Knowledge Grid ?Large-Scale Distributed Knowledge Management ?Ontology Information/Knowledge/Service Integration ?Knowledge Flow ?Internet-based Knowledge Eng
    3 KB (367 words) - 23:35, 14 October 2008
  • ...tle = The First International Conference on Security and Privacy in Mobile Information and Communication Systems ...edge researchers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymaker
    4 KB (451 words) - 23:37, 14 October 2008
  • [This information is being posted to multiple lists - we apologise if you get it several times. Please, pass the information to whom it may benefit. Thank
    6 KB (682 words) - 10:18, 14 April 2020
  • ...these general themes, DEON2008 will encourage a special focus on the topic Security and Trust. Specific Security and Trust themes
    5 KB (587 words) - 23:37, 14 October 2008
  • provides access to information of a limited geographical area and - Security
    4 KB (483 words) - 23:37, 14 October 2008
  • ...xpensive sensor nodes to create flexible and robust networks for gathering information is central to this vibrant field. Research is being undertaken to develop SECURITY
    11 KB (1,533 words) - 23:38, 14 October 2008
  • | Title = Twelfth International Workshop on Cooperative Information Agents An intelligent information agent is a computational software entity
    9 KB (1,215 words) - 23:38, 14 October 2008
  • * Security, trust, & privacy * Techical Program Vice-Chair for Information Systems (EDAS)
    3 KB (380 words) - 19:34, 17 November 2008
  • * Information Security and Cryptography * Information Systems
    3 KB (386 words) - 23:39, 14 October 2008
  • ...as now become the mainstream technology for High Performance Computing and Information Technology. - Security and Reliability
    5 KB (606 words) - 14:17, 8 April 2021
  • ...about novel and emergent applications in smart sensors, biology, homeland security, systems health management, and related areas. Collaborate and network with For additional information, please visit the Sensors Applications Symposium website at www.sensorapps.
    1 KB (164 words) - 23:39, 14 October 2008
  • ...perating systems, storage, networking, languages and language engineering, security, dependability, and manageability. We are also interested in contributions ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to
    6 KB (781 words) - 23:39, 14 October 2008
  • # Security challenges and solutions for interoperability/interoperation of # Experiences with Grid information interoperability (XML, RDF, etc.)
    7 KB (959 words) - 23:40, 14 October 2008
  • WORKSHOP INFORMATION: * Security in Biomedical Data Grids
    7 KB (876 words) - 23:40, 14 October 2008
  • | Field = Computer security and reliability * Integrated system reliability, availability, security, safety, and timing analysis and evaluation methods
    6 KB (748 words) - 14:43, 27 December 2015
  • Security Assessment Security of Supply
    8 KB (1,082 words) - 23:40, 14 October 2008
  • | Title = Information Security and Cryptology Conference
    519 bytes (56 words) - 23:41, 14 October 2008
  • | Title = Fourth International Workshop on the Value of Security through Collaboration ...ties of the ecosystem where the nodes operate may be guaranteed. Thus, the security property of the ecosystem may be driven by self-organizing mechanisms. Depe
    3 KB (420 words) - 23:42, 14 October 2008
  • ...ers in a hospital ward are, by the very nature of their work, mobile. The information that nurses, doctors and other health ward data management. The use of a mobile wireless infrastructure can lead to security and reliability problems. Mobile devices often have usability
    6 KB (771 words) - 23:42, 14 October 2008

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)