Search results
Create the page "System" on this wiki! See also the search results found.
- • IP multimedia system operations and management ...ission for FMN´09 will only be accepted through the EDAS Paper Submission System accessible from the link on the website. Only papers in PDF will be accepte11 KB (1,463 words) - 17:07, 27 February 2009
- • Knowledge-based system applications • Software agents for intelligent control system3 KB (319 words) - 17:07, 27 February 2009
- - Power system and industrial applications3 KB (377 words) - 17:07, 27 February 2009
- * Information System Development Methodology ...author(s). Authors should submit their paper via the electronic submission system of ISD2009.5 KB (665 words) - 17:07, 27 February 2009
- * System Performance Understanding * Integrated System for Interaction Support2 KB (283 words) - 15:21, 25 February 2021
- ...ve Comparisons between Originals and their Simulations, Simulation of User-System Interaction. Simulating SLAM (Simultaneous Localisation and Mapping) in rob Systems research, Operating systems, File System, Storage.38 KB (4,832 words) - 17:07, 27 February 2009
- * What kind of displays and system management tools are needed in smart environments?5 KB (670 words) - 17:08, 27 February 2009
- | Title = Special Issue on Decision Support System Technology518 bytes (62 words) - 17:08, 27 February 2009
- ...s your PC. Less money than a linear system, More controlable than a linear system, Less space than an editing appliance like a casablanca, and upgradeable. W11 KB (1,563 words) - 06:56, 12 April 2012
- drive the need for continuous innovation and expansion. As a result, these system/ consequence, testing and tuning these system/applications is becoming6 KB (817 words) - 17:08, 27 February 2009
- ...nal policies, procedures and regulations implemented within an information system to control for the unauthorized use of, access to, or release of personal i Security addresses the various components of an information system that safeguard the data and associated infrastructure from unauthorized act12 KB (1,690 words) - 17:08, 27 February 2009
- We solicit papers in all areas related to characterization of computing system * Characterization of system behavior, including4 KB (589 words) - 17:08, 27 February 2009
- through the EBICC2009 Conference Management System web site at6 KB (795 words) - 15:02, 27 December 2015
- applicability (e.g., image retrieval system), the architecture,6 KB (854 words) - 17:08, 27 February 2009
- ...ent Paper Award. This award aims to highlight outstanding contributions to system research made by young researchers.3 KB (386 words) - 17:08, 27 February 2009
- - Assuming our surroundings will be filled with smart objects, how does a system address the added complexity of personalization and what are the possible s5 KB (711 words) - 17:08, 27 February 2009
- aware system design will be considered, but submission - tools for resource-constrained system development4 KB (504 words) - 16:43, 27 December 2015
- middleware. Middleware is a distributed-system software that resides well understood system abstraction.8 KB (1,144 words) - 20:59, 27 February 2009
- START conference management system.3 KB (349 words) - 11:44, 3 August 2020
- of their domain and experiences in using existing provenance system. providers (computer scientists) and the users of the provenance system4 KB (504 words) - 17:08, 27 February 2009