Search results

Jump to: navigation, search
  • |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)
    6 KB (793 words) - 15:12, 1 October 2020
  • ...and network systems gradually become the fundamental infrastructure of our information society, many multidisciplinary research topics emerge to reflect the featu * Bio-inspired information and communication systems
    6 KB (767 words) - 13:01, 18 January 2009
  • * Data mining and information extraction * Data security, privacy and trust
    4 KB (568 words) - 13:01, 18 January 2009
  • ...ociety have formed into the world we live in, however the emergence of the information technologies that ...ital systems that support useful functionality by making socially produced information available to physical things.
    3 KB (446 words) - 13:02, 18 January 2009
  • | Title = Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Device Use | Field = Computer security and reliability
    11 KB (1,539 words) - 13:02, 18 January 2009
  • | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)
    6 KB (852 words) - 13:02, 18 January 2009
  • | Title = The 1st International Workshop on Information Assurance in Wireless Sensor Networks ...place in conjunction with the 3rd International Conference on Information Security and Assurance, Seoul, Korea http://www.sersc.org/ISA2009.
    3 KB (450 words) - 13:02, 18 January 2009
  • Department of Information Technologies of University of Milan in conjunction Security in Knowledge-based Multimedia Systems
    6 KB (693 words) - 13:03, 18 January 2009
  • |Title=32nd International Convention on Information and Communication Technology, Electronics and Microelectronics With the 32nd International Convention MIPRO, devoted to information and communication technology, electronics and microelectronics, we enter th
    4 KB (524 words) - 17:20, 12 February 2009
  • ...Service composition, Functional and Non Functional Requirements (NFR: QoS, security), and management and diagnosis, who investigate concepts, methods, techniq * NFR (quality, security, robustness, adaptability) management in choreographed and/or
    7 KB (960 words) - 16:33, 27 February 2009
  • ...to the great needs of economic globalization and the rapid advancement of information technology, Natural Language Processing based on Knowledge Engineering has B-04 Information Retrieval
    4 KB (459 words) - 16:33, 27 February 2009
  • | Title = The 4th International ICST Conference on Scalable Information Systems in terms of information access, storage and retrieval.
    4 KB (512 words) - 16:33, 27 February 2009
  • o Security and privacy issues of UWB-based body-centric networking for personal health ...peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the IJUWBCS web page (http://www.ind
    5 KB (664 words) - 17:20, 5 July 2020
  • * security in distributed computing, cryptographic protocols (5) information whether the paper is a regular submission, or a brief
    7 KB (890 words) - 15:05, 27 December 2015
  • * Knowledge Representation, Distributed Models and Reasoning, Information visualization ...temas, Wireless communications, Technologies and applications, Information security
    8 KB (977 words) - 16:33, 27 February 2009
  • | Title = Second International ICST Symposium on Global Information Second International ICST Symposium on Global Information Governance (ISGIG)
    4 KB (557 words) - 16:33, 27 February 2009
  • - Web Information Filtering and Retrieval - Web Security
    4 KB (630 words) - 16:33, 27 February 2009
  • | Title = IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09) IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09)
    2 KB (229 words) - 16:33, 27 February 2009
  • * Security aspects of using virtualization in a distributed environment For more information:
    5 KB (576 words) - 16:34, 27 February 2009
  • Process Architectures), FAST (Formal Aspects in Security and Trust), information on FMweek,
    8 KB (1,079 words) - 17:05, 27 February 2009

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)