Search results
Create the page "Information Security" on this wiki! See also the search results found.
- | Title = The 3rd International Conference on Ubiquitous Information Management and Communication ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network2 KB (303 words) - 23:42, 14 October 2008
- - Privacy, security and trust - Gregory Yovanof, Athens Information Technology, Greece6 KB (763 words) - 23:42, 14 October 2008
- |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols13 KB (1,617 words) - 19:03, 24 November 2008
- ...c./; Context-aware and context recognition; Data-centers and nano-centers; Information processing /distribution, discovery, sharing/; Virtualization; Overlay infr ...ion; All-IP versus protocol translation; IP simplified network management; Security, trust, and privacy; Network stability under topology change; Delay-toleran7 KB (883 words) - 17:35, 7 January 2021
- ...nts together to produce a platform for data gathering or the management of information related to data collection that helps researchers demonstrate the validity * Virtual organization and security issues of instruments and sensors on the Grid4 KB (642 words) - 21:17, 9 December 2008
- The scope of the journal ranges from theories of data, information, semantics and knowledge to innovative methods, tools and domain-specific a ...Networks, HCI, Agents, Data Semantics, Medical, Healthcare, Entertainment, Security.3 KB (440 words) - 12:20, 12 December 2008
- reliability, security and trust). Such quantities play a central role in quantitative information such as time and probabilities either directly in the6 KB (823 words) - 14:28, 14 December 2008
- ...f Academic Excellence in Information Assurance Education from the National Security Agency.2 KB (331 words) - 05:33, 5 January 2009
- * Security and privacy for RTSOAA based CPS ==Paper Submission Information==7 KB (922 words) - 00:58, 9 January 2009
- |Title=Web Information Systems Modeling Modern Web Information Systems need to fulfill a large number of8 KB (1,101 words) - 15:16, 12 January 2009
- ** Privacy and security ** Information/communication applications11 KB (1,366 words) - 16:44, 14 January 2009
- |Field=Internet security Conference registration information will be posted by February 1 at www.ccdcoe.org.2 KB (219 words) - 17:25, 14 January 2009
- * Model-driven development of process-aware information systesm, * Security issues of web-based processes,4 KB (602 words) - 14:34, 17 January 2009
- ...bilistic analysis for RT systems; quality of service support; reliability, security and survivability in RT systems; scheduling and schedulability analysis; wo website later for further information.5 KB (720 words) - 14:46, 17 January 2009
- - Security - Distributed Intelligent Information Systems6 KB (812 words) - 12:55, 18 January 2009
- ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Information Management and Dissemination5 KB (526 words) - 01:02, 2 February 2009
- * Information and Knowledge Management Track (Chair(s): Ralf Kutsche - Bich-Thuy Dong) o Integrated information systems5 KB (567 words) - 12:58, 18 January 2009
- Trust, Privacy & Security in Digital Business (TrustBus'09) Security patterns have arrived to a stage where there are a significant6 KB (740 words) - 12:58, 18 January 2009
- o Prediction/information markets o Economics of information9 KB (1,221 words) - 12:58, 18 January 2009
- part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...elected journals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.5 KB (633 words) - 12:58, 18 January 2009