Search results

Jump to: navigation, search
  • ...applications, service-oriented computing, middleware, networking, agents, data management and services, all with special focus on mobility and ubiquitous * Security, privacy and social issues of mobile and ubiquitous systems
    5 KB (599 words) - 23:15, 14 October 2008
  • ...in different aspects of the field, ranging from accuracy and robustness to data security and user interface. o Fusion schemes/Data quality estimation/Qualitative-based fusion
    4 KB (526 words) - 23:17, 14 October 2008
  • + Data Management for e-Business TRACK - Data and knowledge engineering for e-Business
    5 KB (594 words) - 16:29, 25 March 2020
  • | Field = Data mining the 25th International Conference on Data Engineering ICDE'09,
    5 KB (592 words) - 23:18, 14 October 2008
  • |Title=The Ninth SIAM International Conference on Data Mining |Field=Data mining
    4 KB (520 words) - 20:02, 26 February 2020
  • | Field = Data mining ...uch as user modeling, machine learning, intelligent information retrieval, data and text mining, statistics, computational intelligence, human-computer int
    4 KB (570 words) - 23:19, 14 October 2008
  • | Title = The 2nd International Workshop on Domain Driven Data Mining | Field = Data mining
    4 KB (510 words) - 23:19, 14 October 2008
  • data mining. Unlike in traditional data mining scenarios, data does not emerge from a small number of (heterogeneous) data sources, but virtually
    5 KB (646 words) - 23:19, 14 October 2008
  • | Title = Practical Privacy - Preserving Data Mining | Field = Data mining
    5 KB (721 words) - 23:19, 14 October 2008
  • applied cryptography intrusion detection data and application security database security privacy-enhancing technology security in IT outsourcing
    5 KB (637 words) - 23:20, 14 October 2008
  • Confidentiality, Data and system integrity Privacy, contract agreements, and payment systems
    4 KB (502 words) - 23:20, 14 October 2008
  • Due to constant changing environments, limited battery life and diverse data types, Mobile - Database and Data Management Mobile Computing
    10 KB (1,262 words) - 23:20, 14 October 2008
  • - Distributed Database and Data Mining - Security, Privacy and Trust
    3 KB (357 words) - 23:23, 14 October 2008
  • * sensor design and data acquisition Biometric Security and Privacy
    3 KB (325 words) - 23:50, 14 October 2008
  • ...cation and networking, embedded systems and hardware, distributed systems, data management, and applications, so we welcome cross-disciplinary work. Data, information, and signal processing
    6 KB (771 words) - 16:09, 16 September 2019
  • * Tools and Methodologies for Large Scale Semantic Web Data - Management Trust, Provenance, Security, Privacy, Identity and the Semantic Web
    4 KB (573 words) - 23:31, 14 October 2008
  • Semantic Annotation of Data Semantic Web Trust, Privacy, Security and Intellectual Property Rights
    2 KB (266 words) - 11:46, 28 May 2016
  • * Online social networks: privacy, reputation, content sharing, search * Cloud computing and data center networks
    4 KB (577 words) - 23:31, 14 October 2008
  • ...application specific fixed function, programmable, reconfigurable, near- data and in-memory accelerators, etc. * Architectural support for security, side-channel attacks and mitigation, privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security
    5 KB (580 words) - 10:32, 12 May 2020
  • * Algorithms and data structures, * Theoretical aspects of areas such as networks, privacy, information retrieval, computational biology, and databases.
    2 KB (283 words) - 18:05, 4 March 2021

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)