Search results
Create the page "Ubiquitous Computing Security Systems" on this wiki! See also the search results found.
- | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability4 KB (502 words) - 23:20, 14 October 2008
- | Title = The 2008 International Symposium on Ubiquitous Multimedia Computing The 2008 International Symposium on Ubiquitous Multimedia Computing (UMC-08) will be held in Australia4 KB (573 words) - 23:20, 14 October 2008
- ...and the years to come will witness a proliferation in the use of advanced systems. ...iscuss and exchange ideas, results and experiences in the area of advanced computing for problems in science and engineering applications and inter-disciplinary3 KB (357 words) - 23:23, 14 October 2008
- ...existing computer technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in existing IT services. * High Performance Computing3 KB (415 words) - 23:23, 14 October 2008
- | Title = Advance computing and communication journal ...the most recent results in the development of system aspects of ubiquitous computing. Researchers and practitioners working in this area are expected to take th3 KB (412 words) - 19:34, 12 November 2020
- | Title = The Fourth International Conference on Systems | Field = Systems11 KB (1,492 words) - 23:26, 14 October 2008
- *Big Data platforms with applications to network management, security, measurements *Experience and lessons learned by deploying large-scale networked systems4 KB (514 words) - 12:03, 6 April 2020
- The second event on "Social and Legal Aspects Under Emerging Computing Topics of legal and social aspects of information systems include but are not limited to:8 KB (1,075 words) - 23:52, 14 October 2008
- | Title = Ubiquitous Computing and Communication Journal ...ing cognitive environments, and discovery and identification of ubiquitous computing applications and services.3 KB (386 words) - 23:39, 14 October 2008
- | Title = Workshop on High Performance and Grid Computing in Medicine and Biology | Field = Grid computing7 KB (876 words) - 23:40, 14 October 2008
- ...However, there remains the open question of how and when to use ubiquitous computing for ward data management. The use of a mobile wireless infrastructure can lead to security and reliability problems. Mobile devices often have usability6 KB (771 words) - 23:42, 14 October 2008
- | Title = The 3rd International Conference on Ubiquitous Information Management and Communication ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network2 KB (303 words) - 23:42, 14 October 2008
- | Title = Third International Workshop on Pervasive Systems | Field = Ubiquitous computing6 KB (763 words) - 23:42, 14 October 2008
- |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols13 KB (1,617 words) - 19:03, 24 November 2008
- ...digm/; Recovering and fault-tolerance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Context-aware and context recognition; ...y-tolerant IP networks; Trustworthy Internet; Mobile computing; Ubiquitous computing; Reliability; Resilience; Scalability; User and service mobility; Wireless7 KB (883 words) - 17:35, 7 January 2021
- | Title = IEEE-RIVF International Conference on Computing and Communication Technologies The conference solicits submission of research papers in all major areas of computing, especially results of inter-disciplinary research work combining state-of-5 KB (567 words) - 12:58, 18 January 2009
- part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...nals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.5 KB (633 words) - 12:58, 18 January 2009
- | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)16 KB (2,178 words) - 12:59, 18 January 2009
- ...e 1st International Workshop on Security, Reliability and Quality in Cloud Computing Cloud computing gained prominence in 2007 and is picking up momentum as the next “big5 KB (624 words) - 13:00, 18 January 2009
- Ubiquitous Intelligence and Computing (UIC-09) the Internet of Things. The Ubiquitous Computing community has already6 KB (798 words) - 13:01, 18 January 2009