Search results

Jump to: navigation, search
  • ...nhanced business information systems, e-education specialists, Information security, and other Web related technologies. The aim of NWeSP'08 is to serve as a f Web Services Security
    3 KB (494 words) - 23:16, 14 October 2008
  • ...os, audio recordings) in bibliometrics (publication patterns), in homeland security (terrorist networks). * Social network analysis
    3 KB (453 words) - 23:14, 14 October 2008
  • networks, including user behavior models, security and trust, P2P, the Network Society"
    7 KB (813 words) - 23:14, 14 October 2008
  • * Networking and network services * Security, privacy, and trust
    6 KB (869 words) - 23:14, 14 October 2008
  • * Security of WiMAX in NGN * Network architecture infrastructure integration of WiMAX in NGN
    1 KB (181 words) - 23:14, 14 October 2008
  • ...ant research dialog, or pushes the architectural boundaries of large-scale network services. We solicit papers describing original and previously unpublished * Security, robustness, and fault-tolerance in networked environments
    8 KB (1,093 words) - 23:15, 14 October 2008
  • ...itionally offered predominantly passive experiences, continual advances in network and computer technologies are providing tools for implementing greater inte * QoS and Security Support for Entertainment
    8 KB (1,011 words) - 23:15, 14 October 2008
  • | Title = IEEE 3rd International Workshop on Distributed Autonomous Network Management Systems 3rd International Workshop on Distributed Autonomous Network
    6 KB (663 words) - 23:15, 14 October 2008
  • * Security, privacy and trust management in collaborative networks, systems, and appli * Workflow management for collaborative network/system
    8 KB (1,093 words) - 23:15, 14 October 2008
  • | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)
    5 KB (628 words) - 23:15, 14 October 2008
  • 3-08 Network routing and communication algorithms 4. Security and Privacy
    5 KB (623 words) - 23:15, 14 October 2008
  • ...ng difficult social and policy issues such as those related to privacy and security The third generation of social networking technologies has hit the Web. This network serve increasingly
    8 KB (1,003 words) - 23:15, 14 October 2008
  • | Title = 4th IEEE Workshop on Secure Network Protocols 4th workshop on Secure Network Protocols (NPSec 2008)
    4 KB (493 words) - 23:15, 14 October 2008
  • * Giuseppe Persiano: Security of networks of low capability devices Network information management is a growing area of research at the attention
    4 KB (563 words) - 23:15, 14 October 2008
  • * Measurement-based network management such as traffic engineering * Network applications such as WWW, multimedia streaming, and gaming
    3 KB (313 words) - 23:15, 14 October 2008
  • ...lumes, mainly because of converged type of traffic resulted from converged network operation under converged services and applications. Moreover, wireless acc * New Teletraffic and Network Traffic Challenges and Paradigms
    5 KB (598 words) - 10:18, 29 May 2016
  • ...act may both be mobile. Their implementation requires advances in wireless network technologies and devices, development of infrastructures supporting cogniti * Ad hoc and sensor network support for ubiquitous computing
    5 KB (599 words) - 23:15, 14 October 2008
  • | Title = 18th International workshop on Network and Operating Systems Support for Digital Audio and Video In-network stream processing
    3 KB (322 words) - 23:15, 14 October 2008
  • |Title=6th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    509 bytes (65 words) - 14:00, 6 November 2020
  • |Title=7th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    509 bytes (62 words) - 14:01, 6 November 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)