Search results
Create the page "Information Security" on this wiki! See also the search results found.
- ...ause they allow for capturing architectural, functional and non-functional information about such complex systems in precise, domain-specific models. The techniqu ...ional aspects (such as performance, quality of service, real-time aspects, security, etc.)5 KB (598 words) - 17:05, 24 February 2016
- Security and emergency applications ...to register and present their demo at the conference. Please also provide information in the email message with the submission (not in the extended abstract itse6 KB (809 words) - 16:26, 28 September 2011
- The 2012 International Conference of Information Engineering The 2012 International Conference of Information Security and Internet Engineering7 KB (909 words) - 16:30, 10 September 2020
- |Field=Information and Communication Technology ...ss communication has fundamentally changed our daily communication and how information flows in commercial and private networks. New issues came up with this tren5 KB (669 words) - 14:40, 20 December 2011
- |Title=The 2012 International Conference of Information Engineering |Field=Information Engineering8 KB (1,085 words) - 16:28, 6 February 2012
- |Title=International Conference on Information Society ...d researchers to share existing and generate new knowledge in the field of information society.5 KB (595 words) - 05:03, 15 January 2012
- - Security, Privacy and Trust ...dered for possible publication in the International Journal of Cooperative Information Systems (IJCIS).6 KB (745 words) - 15:27, 1 November 2016
- Chair Professor in Department of Information Engineering and Computer Science, Feng Chia University, Taiwan Associate Professor, Department of Information Systems, Vilnius Gedinimas Technical University, Lithuania11 KB (1,490 words) - 11:59, 27 January 2012
- ...rge. The doctors and nurses of today will access the electronic record for information rather than consult a colleague, go to the web for images rather than to th ...ng together researchers and practitioners interested in the application of information and communication technologies (ICT) to healthcare and Biomedical Engineeri9 KB (1,186 words) - 17:44, 24 February 2012
- ...bringing together researchers and practitioners who are interested in both Information and Communication Technology and the ecological impact of computing on th ...ost scientists would attribute a key role to technology in achieving this. Information technology, in particular, can provide monitoring facilities, control syste10 KB (1,297 words) - 17:49, 24 February 2012
- ...venth International Workshop on Frontiers in Availability, Reliability and Security |Field=Computer security and reliability2 KB (221 words) - 16:12, 29 February 2012
- |Title=The Fourth International Workshop on Organizational Security Aspects |Field=Computer security and reliability3 KB (368 words) - 16:16, 29 February 2012
- ...ore.ieee.org/Xplorehelp/Help_Publishing_and_Indexing_Partners.htm for more information about indexing. - Middleware of SON: self-localization, security, data fusion, etc.5 KB (633 words) - 14:08, 2 March 2012
- ...ore.ieee.org/Xplorehelp/Help_Publishing_and_Indexing_Partners.htm for more information about indexing. ...s, the efficiency denotes the time cost of transmission processes, and the security denotes the protection of the transmitted media content. Recently, various5 KB (726 words) - 15:28, 2 March 2012
- DNS resolvers; Scheduling streamed information; Adaptive streaming; TCP-based streaming; Impatience in cellular networks; ...t; Communications networks security; Information security; IPR and network security;13 KB (1,580 words) - 19:35, 18 February 2021
- |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security4 KB (581 words) - 18:48, 24 February 2020
- |Title=29th ACM International Conference on Information and Knowledge Management |Field=Information and Knowledge Management5 KB (653 words) - 13:04, 3 August 2023
- ...erse fields including (but not limited to) art, anthropology, computer and information sciences, communication, criminology, economics, geography, health sciences ...rity & Trust: Safeguarding and governance of the Web and/or AI; anonymity, security and trust for Web access; false news; data for the public good; and crime o6 KB (910 words) - 12:04, 31 January 2020
- *Information extraction and summarization *Search and information retrieval4 KB (535 words) - 21:32, 11 February 2020
- *Search and information retrieval *Security, privacy, and trust4 KB (500 words) - 17:29, 6 January 2021