Search results

Jump to: navigation, search
  • • IP multimedia system operations and management ...ission for FMN´09 will only be accepted through the EDAS Paper Submission System accessible from the link on the website. Only papers in PDF will be accepte
    11 KB (1,463 words) - 17:07, 27 February 2009
  • • Knowledge-based system applications • Software agents for intelligent control system
    3 KB (319 words) - 17:07, 27 February 2009
  • - Power system and industrial applications
    3 KB (377 words) - 17:07, 27 February 2009
  • * Information System Development Methodology ...author(s). Authors should submit their paper via the electronic submission system of ISD2009.
    5 KB (665 words) - 17:07, 27 February 2009
  • * System Performance Understanding * Integrated System for Interaction Support
    2 KB (283 words) - 15:21, 25 February 2021
  • ...ve Comparisons between Originals and their Simulations, Simulation of User-System Interaction. Simulating SLAM (Simultaneous Localisation and Mapping) in rob Systems research, Operating systems, File System, Storage.
    38 KB (4,832 words) - 17:07, 27 February 2009
  • * What kind of displays and system management tools are needed in smart environments?
    5 KB (670 words) - 17:08, 27 February 2009
  • | Title = Special Issue on Decision Support System Technology
    518 bytes (62 words) - 17:08, 27 February 2009
  • ...s your PC. Less money than a linear system, More controlable than a linear system, Less space than an editing appliance like a casablanca, and upgradeable. W
    11 KB (1,563 words) - 06:56, 12 April 2012
  • drive the need for continuous innovation and expansion. As a result, these system/ consequence, testing and tuning these system/applications is becoming
    6 KB (817 words) - 17:08, 27 February 2009
  • ...nal policies, procedures and regulations implemented within an information system to control for the unauthorized use of, access to, or release of personal i Security addresses the various components of an information system that safeguard the data and associated infrastructure from unauthorized act
    12 KB (1,690 words) - 17:08, 27 February 2009
  • We solicit papers in all areas related to characterization of computing system * Characterization of system behavior, including
    4 KB (589 words) - 17:08, 27 February 2009
  • through the EBICC2009 Conference Management System web site at
    6 KB (795 words) - 15:02, 27 December 2015
  • applicability (e.g., image retrieval system), the architecture,
    6 KB (854 words) - 17:08, 27 February 2009
  • ...ent Paper Award. This award aims to highlight outstanding contributions to system research made by young researchers.
    3 KB (386 words) - 17:08, 27 February 2009
  • - Assuming our surroundings will be filled with smart objects, how does a system address the added complexity of personalization and what are the possible s
    5 KB (711 words) - 17:08, 27 February 2009
  • aware system design will be considered, but submission - tools for resource-constrained system development
    4 KB (504 words) - 16:43, 27 December 2015
  • middleware. Middleware is a distributed-system software that resides well understood system abstraction.
    8 KB (1,144 words) - 20:59, 27 February 2009
  • START conference management system.
    3 KB (349 words) - 11:44, 3 August 2020
  • of their domain and experiences in using existing provenance system. providers (computer scientists) and the users of the provenance system
    4 KB (504 words) - 17:08, 27 February 2009

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)