Search results

Jump to: navigation, search
  • ...een them. They can be used to perceive the network conditions, or the user behavior, in order to dynamically plan, adapt, decide, take the appropriate actions, ...rchers are encouraged to submit papers focused on the design, development, analysis or optimization of smart communication protocols or algorithms at any commu
    6 KB (833 words) - 15:16, 24 September 2020
  • * Texture Models, Analysis, and Synthesis * Social Behavior
    6 KB (725 words) - 11:44, 1 July 2011
  • ...ure, society and technology– can be utilized in the design, modeling and analysis of current and future computing systems. Being a particularly promising dom * Applications of percolation theory to the analysis of robustness in (interdependent) communication networks
    6 KB (766 words) - 11:19, 26 October 2011
  • Design, implementation and analysis of security hardware, i.e., hardware with cryptographic and security functi Effects of trustworthy systems upon user, corporate, and governmental behavior
    4 KB (451 words) - 12:27, 30 November 2011
  • ...ns. Here, a challenge is often to predict and control the resulting global behavior. • Self-* Behavior in Communication Networks
    7 KB (969 words) - 04:02, 17 January 2012
  • * Enterprise Architecture Design, Modeling, Analysis, Development * Business Collaboration Architecture Design, Modeling, Analysis, Development
    10 KB (1,232 words) - 18:10, 5 March 2012
  • * Document (Text) Analysis * Citation Analysis and Scientometrics
    6 KB (825 words) - 10:31, 24 March 2020
  • ...ithm design and analysis, economic implications, and in-depth experimental analysis of accuracy and performance. * Query analysis and query processing
    4 KB (508 words) - 15:49, 14 May 2020
  • ...theories and foundations, algorithms and applications, and evaluation and analysis. The conference and program chairs invite those working in areas related to * Queries and Query Analysis (e.g., query intent, query understanding, query suggestion and prediction,
    8 KB (1,024 words) - 09:57, 13 May 2020
  • Texture Models, Analysis, and Synthesis Social Behavior
    6 KB (726 words) - 16:22, 19 June 2012
  • *Intrusion and cybersecurity threat detection and analysis<br> *Crime analysis and prevention<br>
    5 KB (575 words) - 10:16, 1 August 2019
  • Co-sponsorship with International Network of Social Network Analysis (INSNA) ...cience, economics, business, human-coupled complex systems, human factors, behavior modeling, neural science, linguistics, security, criminal intelligence, hea
    6 KB (728 words) - 01:01, 25 August 2012
  • - Life-cycle analysis of IT equipment - Reliability, thermal behavior and control
    4 KB (491 words) - 22:39, 28 August 2012
  • ● Design, implementation and analysis of security hardware • Effects of trustworthy systems upon user, corporate, and governmental behavior
    5 KB (677 words) - 15:19, 19 December 2012
  • ...forum for scientists, engineers and practitioners interested in the study, analysis, design, modeling and implementation of evolvable systems, both theoretical Co-evolution and collective behavior
    3 KB (330 words) - 18:28, 4 March 2013
  • ...forum for scientists, engineers and practitioners interested in the study, analysis, design, modeling and implementation of neural computing systems, both theo
    3 KB (363 words) - 18:32, 4 March 2013
  • Semantics based Analysis - Image and video analysis
    5 KB (609 words) - 11:08, 26 July 2016
  • * Modeling and prediction of user behavior * Social media analysis
    8 KB (1,041 words) - 12:52, 9 August 2019
  • ...A 2017 : IEEE International Conference on Identity, Security and Behavior Analysis |Field=biometrics, security, pattern recognition, behavior analysis
    441 bytes (53 words) - 13:49, 25 September 2016
  • - Transportation behavior analysis and prediction - City utility consumption and economic analysis
    4 KB (565 words) - 09:46, 7 February 2017

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)