Search results
Create the page "Security systems" on this wiki! See also the search results found.
- | Title = Third Embedded Systems Week (jointly CODES+ISSS, EMSOFT, and CASES) | Field = Embedded systems11 KB (1,352 words) - 00:33, 15 October 2008
- ...PLAN/SIGBED 2008 Conference on Languages Compilers, and Tools for Embedded Systems | Field = Embedded systems5 KB (673 words) - 23:30, 14 October 2008
- | Title = 20th EuroMicro Conference on Real-Time Systems | Field = Embedded systems7 KB (870 words) - 23:30, 14 October 2008
- | Field = Embedded systems developing systems in a time and cost effective way. Central in this4 KB (537 words) - 23:30, 14 October 2008
- ...etworks, Web services, distributed computing, Web engineering, information systems, natural language processing, multimedia, and human-computer interaction. Trust, Provenance, Security, Privacy, Identity and the Semantic Web4 KB (573 words) - 23:31, 14 October 2008
- | Title = 3rd IEEE International Workshop on Engineering Semantic Agent Systems ...Research and Development of Software Agents, Mobile Agents and Multi-Agent Systems towards INTEGRATING THE DISTRIBUTED WORLDS.10 KB (1,391 words) - 23:31, 14 October 2008
- | Title = The 3rd International Workshop on Real Overlays And Distributed Systems ...place to share new experiences, and work in progress, with an emphasis on systems that actually run in the wide-area Internet.4 KB (577 words) - 23:31, 14 October 2008
- | Title = Track on Dependable and Adaptive Distributed Systems at SAC | Track on Dependable and Adaptive Distributed Systems (DADS) |8 KB (952 words) - 23:31, 14 October 2008
- Distributed OO systems Distributed operating systems5 KB (702 words) - 23:31, 14 October 2008
- | Title = First IEEE/ACM Workshop on Applied Ontologies in Distributed Systems First IEEE/ACM Workshop on Applied Ontologies in Distributed Systems (WAODS)4 KB (523 words) - 23:31, 14 October 2008
- workflow systems are increasingly being developed to enable Although existing workflow systems are able to support complex6 KB (750 words) - 23:31, 14 October 2008
- ...ication, design, verification, validation, testing, maintenance, system of systems, etc. ...ting, sensor networks, inter-operability, security, trusted and dependable systems, fault tolerance, virtual subnets for ORC.3 KB (377 words) - 23:31, 14 October 2008
- - Type systems and program logics - Debugging techniques and tools - Checking or improving the safety, security, or correctness of programs5 KB (667 words) - 14:18, 25 November 2016
- ...and practical implementation techniques such as rule-based transformation systems. In addition, the scope of PEPM covers manipulation and transformations of ...sis, binding-time analysis, dynamic analysis, constraint solving, and type systems.4 KB (468 words) - 23:32, 14 October 2008
- ...ication, design, analysis, and implementation of programming languages and systems. ESOP 2009 is the eighteenth edition in this series and seeks contributions ...semantics, program verification, static analysis, testing, language-based security.6 KB (824 words) - 23:32, 14 October 2008
- ...he conference covers optimization for parallelism, performance, power, and security, where that optimization occurs in the mapping from an input (including API ...Thread extraction and thread-level speculation, especially for multi-core systems3 KB (342 words) - 23:32, 14 October 2008
- ...ng together researchers in the fields of microarchitecture, compilers, and systems for technical exchange. The MICRO community has enjoyed having close intera ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser5 KB (580 words) - 10:32, 12 May 2020
- |Has host organization=USENIX The Advanced Computing Systems Association ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more.4 KB (577 words) - 09:28, 12 May 2020
- * probabilistic systems * real-time systems5 KB (656 words) - 11:29, 27 August 2020
- * Specifications and correctness criteria for programs and systems * Hybrid systems and embedded systems verification2 KB (291 words) - 11:09, 20 November 2020