Search results

Jump to: navigation, search
  • ...s (up to DoD Secret) relevant to communications and information processing system technologies and capabilities. Industry, academic, and government organizat * Quality-of-Service Architectures
    5 KB (526 words) - 01:02, 2 February 2009
  • | Title = 3rd International Conference on Network and System Security 3rd International Conference on Network and System Security (NSS 2009)
    12 KB (1,669 words) - 12:58, 18 January 2009
  • - Service-oriented architecture - Quality-of-service
    5 KB (633 words) - 12:58, 18 January 2009
  • Director of Information and Networked System Security Research, Macquarie University, and security in networks; interoperability, service levels and quality issues in such
    16 KB (2,178 words) - 12:59, 18 January 2009
  • with Special Issue of Journal of Computer and System Sciences (http://www.elsevier.com/locate/jcss), Elsevier (http://www.elsevi ...ll be invited for submission to a special issue of Journal on Computer and System Sciences (http://www.elsevier.com/locate/jcss), Elsevier (http://www.elsevi
    7 KB (1,030 words) - 13:00, 18 January 2009
  • * Content-based image retrieval * Quality of service and system performance
    6 KB (687 words) - 13:00, 18 January 2009
  • information systems and other kinds of IT-based support systems to that follow. Recently, novel methods and techniques based on
    3 KB (465 words) - 13:01, 18 January 2009
  • Global Earth Observation System of Systems (GEOSS) Geospatial Web Services and service quality
    7 KB (968 words) - 13:01, 18 January 2009
  • * Cognitive Radio Based Networking and System (CRN) o System architectures
    14 KB (1,518 words) - 13:01, 18 January 2009
  • ...development activities from the US and Europe to a skilled labour force in service-providing countries. This transformation has been driven by the demands of ...OOLS EUROPE, so the use of object technology, component-based and/or model-based software development in globally distributed settings is a synergistic them
    6 KB (857 words) - 13:01, 18 January 2009
  • ...as passwords, addresses, or PIN codes between the phone, its user, and the service they want to use. Additionally, mobile devices often lack powerful user int Sensor-, context-, and location-based authentication methods
    11 KB (1,539 words) - 13:02, 18 January 2009
  • - System architectures and platforms - Service discovery mechanisms and protocols
    7 KB (976 words) - 23:35, 28 January 2009
  • |Title=The Seventh International Workshop on SERVICE-ORIENTED COMPUTING: AGENTS, SEMANTICS, AND ENGINEERING ...ation construction and management, focusing on critical challenges such as service quality assurance, reliability, and adaptability.
    5 KB (642 words) - 16:32, 9 February 2009
  • * IT-based business models * A-to-Z steps to building and launching a new web product/service
    2 KB (299 words) - 16:33, 27 February 2009
  • devices, service oriented computing, grid computing, agent based service oriented computing, pervasive computing, P2P computing, agent
    6 KB (800 words) - 22:11, 27 February 2009
  • * Denial of service * Service overlays
    4 KB (559 words) - 17:06, 27 February 2009
  • * Denial of Service detection and prevention * IP based (Mobile) TV services
    4 KB (621 words) - 17:06, 27 February 2009
  • In recent years rule based technologies have enjoyed remarkable adoption in Semantic Web and Service-oriented technologies, which aim to turn the Web
    7 KB (883 words) - 17:06, 27 February 2009
  • The Fourth International Conference on COMmunication System softWAre pervasive and ubiquitous computing were based on the ad-hoc
    6 KB (861 words) - 17:07, 27 February 2009
  • ...Ecosystems promote collaboration instead of unbridled competition and ICT based catalyst effect in a number of domains to produce networked enriched commun Service-oriented Collaborative Platforms
    7 KB (941 words) - 17:07, 27 February 2009

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)