Search results

Jump to: navigation, search
  • | Title = Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML08)
    6 KB (837 words) - 23:21, 14 October 2008
  • · Forensic Studies and Security Issues [[Category:Computer graphics]]
    3 KB (364 words) - 23:21, 14 October 2008
  • | Field = Computer security and reliability
    545 bytes (61 words) - 23:22, 14 October 2008
  • | Field = Computer security and reliability
    612 bytes (70 words) - 23:22, 14 October 2008
  • | Field = Computer security and reliability
    409 bytes (42 words) - 21:40, 16 October 2008
  • * Functional Programming and Security [[Category:Computer science]]
    5 KB (636 words) - 23:22, 14 October 2008
  • | Field = Computer science | Homepage = conferences.computer.org/scc/2008
    18 KB (2,352 words) - 23:23, 14 October 2008
  • | Field = Computer science This Conference is to bring together computer scientists, applied mathematicians, engineers in different disciplines and
    3 KB (357 words) - 23:23, 14 October 2008
  • | Title = IEEE 8th International Conference on Computer and Information Technology | Field = Computer science
    3 KB (415 words) - 23:23, 14 October 2008
  • |Title=23rd Annual IEEE Symposium on Logic in Computer Science ...ess calculi, programming language semantics, proof theory, reasoning about security, rewriting, specifications, type systems and type theory, and verification.
    2 KB (285 words) - 15:11, 7 November 2016
  • | Field = Computer networking Information Security and Cryptography
    3 KB (412 words) - 19:34, 12 November 2020
  • | Field = Computer graphics ...ring the past decade. They come in diverse forms: business support, public security, entertainment, welfare and many more. Video streaming, video conferencing,
    4 KB (567 words) - 23:24, 14 October 2008
  • | Field = Computer graphics ...g in a wide range of areas, as diverse as medicine, robotics, defense, and security. As a rule, the processed data are discrete; therefore, the "discrete appro
    6 KB (814 words) - 23:25, 14 October 2008
  • ..., computer vision, image analysis, signal processing, statistics, computer security, etc. The purpose of this conference is to provide a scientific forum for r * computer vision
    3 KB (325 words) - 23:50, 14 October 2008
  • | Field = Computer graphics ...ntification techniques playing a key role in human-computer interfaces for security and restricted-access systems.
    4 KB (550 words) - 23:25, 14 October 2008
  • ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design Security and protection systems
    11 KB (1,492 words) - 23:26, 14 October 2008
  • | Field = Computer security and reliability Current computer technology trends present to the hardware and software designer novel oppor
    5 KB (598 words) - 01:12, 31 May 2012
  • ...isciplinary conference for research that spans the boundaries of hardware, computer has captured some of the major computer systems innovations of the past two decades (e.g., RISC and VLIW
    3 KB (406 words) - 17:39, 30 September 2016
  • * Security and Trust in Distributed Systems ...tion will be published in the Conference Proceedings published by the IEEE Computer Society.
    6 KB (761 words) - 03:28, 6 January 2009
  • | Field = Computer architecture The IEEE Computer Society Technical Committee on Scalable Computing
    5 KB (577 words) - 23:27, 14 October 2008

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)