Search results
Create the page "Computer Security" on this wiki! See also the search results found.
- | Title = Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML08)6 KB (837 words) - 23:21, 14 October 2008
- · Forensic Studies and Security Issues [[Category:Computer graphics]]3 KB (364 words) - 23:21, 14 October 2008
- | Field = Computer security and reliability545 bytes (61 words) - 23:22, 14 October 2008
- | Field = Computer security and reliability612 bytes (70 words) - 23:22, 14 October 2008
- | Field = Computer security and reliability409 bytes (42 words) - 21:40, 16 October 2008
- * Functional Programming and Security [[Category:Computer science]]5 KB (636 words) - 23:22, 14 October 2008
- | Field = Computer science | Homepage = conferences.computer.org/scc/200818 KB (2,352 words) - 23:23, 14 October 2008
- | Field = Computer science This Conference is to bring together computer scientists, applied mathematicians, engineers in different disciplines and3 KB (357 words) - 23:23, 14 October 2008
- | Title = IEEE 8th International Conference on Computer and Information Technology | Field = Computer science3 KB (415 words) - 23:23, 14 October 2008
- |Title=23rd Annual IEEE Symposium on Logic in Computer Science ...ess calculi, programming language semantics, proof theory, reasoning about security, rewriting, specifications, type systems and type theory, and verification.2 KB (285 words) - 15:11, 7 November 2016
- | Field = Computer networking Information Security and Cryptography3 KB (412 words) - 19:34, 12 November 2020
- | Field = Computer graphics ...ring the past decade. They come in diverse forms: business support, public security, entertainment, welfare and many more. Video streaming, video conferencing,4 KB (567 words) - 23:24, 14 October 2008
- | Field = Computer graphics ...g in a wide range of areas, as diverse as medicine, robotics, defense, and security. As a rule, the processed data are discrete; therefore, the "discrete appro6 KB (814 words) - 23:25, 14 October 2008
- ..., computer vision, image analysis, signal processing, statistics, computer security, etc. The purpose of this conference is to provide a scientific forum for r * computer vision3 KB (325 words) - 23:50, 14 October 2008
- | Field = Computer graphics ...ntification techniques playing a key role in human-computer interfaces for security and restricted-access systems.4 KB (550 words) - 23:25, 14 October 2008
- ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design Security and protection systems11 KB (1,492 words) - 23:26, 14 October 2008
- | Field = Computer security and reliability Current computer technology trends present to the hardware and software designer novel oppor5 KB (598 words) - 01:12, 31 May 2012
- ...isciplinary conference for research that spans the boundaries of hardware, computer has captured some of the major computer systems innovations of the past two decades (e.g., RISC and VLIW3 KB (406 words) - 17:39, 30 September 2016
- * Security and Trust in Distributed Systems ...tion will be published in the Conference Proceedings published by the IEEE Computer Society.6 KB (761 words) - 03:28, 6 January 2009
- | Field = Computer architecture The IEEE Computer Society Technical Committee on Scalable Computing5 KB (577 words) - 23:27, 14 October 2008