Search results

Jump to: navigation, search
  • ...rd of {{SITENAME}} to advance the platform and the transparency of science in general. In order to become and {{SITENAME}} category editor:
    6 KB (714 words) - 12:19, 11 December 2020
  • |Title=7th International Conference on Network and Computing Technologies ...nference on Network and Computing Technologies (ICNCT 2019), will be held in Nagoya Institute of Technology, Nagoya, Japan on April 12-15, 2019.<br>
    5 KB (571 words) - 09:22, 19 July 2019
  • ...th industry and academia. Prospective authors are invited to submit papers in any of the following areas (not limited to): * High-speed Communication and Network
    34 KB (4,565 words) - 22:20, 10 January 2018
  • ...th industry and academia. Prospective authors are invited to submit papers in any of the following areas: * High-speed Communication and Network
    8 KB (1,037 words) - 22:20, 10 January 2018
  • ...th industry and academia. Prospective authors are invited to submit papers in any of the following areas (not limited to): * High-speed Communication and Network
    9 KB (1,189 words) - 22:20, 10 January 2018
  • be held in Vienna University of Technology, Vienna, Austria, Prospective authors are invited to propose papers in any of the following
    26 KB (3,456 words) - 22:20, 10 January 2018
  • ...Advanced Information Networking and Applications (AINA 2005) will be held in Tamkang University, Taiwan, March 28 - March 30, 2005. The conference cover Prospective authors are invited to propose papers in any of the following areas:
    10 KB (1,263 words) - 22:20, 10 January 2018
  • ...orking and Applications (AINA 2004) will be held in Fukuoka, Kyushu, Japan in March 29 - 31, 2004. It will include sessions on all aspects of theory, des Prospective authors are invited to propose papers in any of the following areas:
    12 KB (1,537 words) - 22:19, 10 January 2018
  • ...vanced Information Networking and Application will be held in Xi'an, China in March 27-29, 2003. It will include sessions on all aspects of theory, desig Prospective authors are invited to propose papers in any of the following areas:
    8 KB (1,040 words) - 22:20, 10 January 2018
  • - QoS for voice and video in wireless networks - Network management and troubleshooting
    4 KB (495 words) - 09:22, 22 August 2023
  • ...ions, networks, services, and applications. Potential topics are solicited in, but are not limited to, the following categories: • Network estimation and processing techniques
    6 KB (731 words) - 10:33, 14 August 2023
  • ...a key technology in determining future research and development activities in many academic and industrial branches, especially when the solution of larg ...and Communications(HPCC). It provides a forum for engineers and scientists in academia, industry, and government to address the resulting profound challe
    19 KB (2,503 words) - 13:25, 28 October 2020
  • and discuss recent developments and challenges in vehicular networking * In-vehicle communications
    3 KB (378 words) - 14:22, 24 August 2016
  • ...lay and game design. Previously known as Academic Days on Game Development in Computer Science Education (GDCSE 08), this year's conference expands its s ...e ship, departing from and returning to Port Canaveral, FL with port calls in the Bahamas and at Disney's private island, Castaway Cay. FDG 2009 will inc
    9 KB (1,275 words) - 14:46, 27 December 2015
  • |Title=1st Workshop on Data and Services Management in Mobile Environments ...mobile environments will have to provide different levels of availability. In addition, they will have to be adaptive, scalable, robust and efficient for
    2 KB (324 words) - 16:49, 16 December 2020
  • ...s. Such networking is essential for safety, security and economic vitality in missions and their priorities. In order to operate effectively, the deployed networks should
    5 KB (549 words) - 17:15, 5 July 2020
  • industry professionals, and academics interested in the latest development industry and regulatory bodies. In 2008, IEEE WCNC will be held in Las
    3 KB (343 words) - 10:31, 14 August 2023
  • *Security and privacy in Web search and mining *Discovery-driven Web and social network mining
    2 KB (237 words) - 12:23, 11 September 2020
  • ...lumes, mainly because of converged type of traffic resulted from converged network operation under converged services and applications. Moreover, wireless acc ...r attractions, the wealth of history of East and West can be seen and felt in this beautiful city.
    5 KB (598 words) - 10:18, 29 May 2016
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • ...rum for scientists and engineers to present their latest research findings in these rapidly changing fields. It RAID, and network-storage system designs).
    3 KB (406 words) - 17:39, 30 September 2016
  • ...experiences in computer architecture. This year's conference will be held in Beijing, China, where technical discussions will mix with rich culture and * Hardware support for security
    2 KB (259 words) - 10:14, 29 May 2016
  • |Field=Computer Science, Embedded systems, Embedded Network Sensor Systems, Sensor Systems ...gle-track forum for the presentation of research results on systems issues in the area of embedded, networked sensors. Distributed systems based on netwo
    6 KB (771 words) - 16:09, 16 September 2019
  • ...m to continue and strengthen this longstanding tradition at the 53rd MICRO in Athens, Greece. ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser
    5 KB (580 words) - 10:32, 12 May 2020
  • ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more. The full program and registration will be available in April.
    4 KB (577 words) - 09:28, 12 May 2020
  • |Title=Current Trends in Theory and Practice of Computer Science Current Trends in Theory and Practice of Computer Science
    6 KB (682 words) - 10:18, 14 April 2020
  • |Title=The First International Conference on Advances in Future Internet ...management /locator-location paradigm/; Recovering and fault-tolerance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Cont
    7 KB (883 words) - 17:35, 7 January 2021
  • | Title = The 11th ACM workshop on Multimedia and Security The 11th ACM workshop on Multimedia and Security will be held in Princeton, New Jersey, USA on September 7th and 8th of 2009.
    3 KB (303 words) - 17:06, 24 February 2016
  • Advances in Wireless Video Security in wireless networks
    3 KB (320 words) - 16:40, 27 December 2015
  • ...hange and discuss their experiences, new ideas, and results about research in the areas related to parallel and distributed processing. ...d on state-of-the-art research and projects due to the tremendous advances in multi-core architecture, wireless networks, mobile computing, sensor networ
    4 KB (490 words) - 17:05, 27 December 2015
  • |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)
    6 KB (793 words) - 15:12, 1 October 2020
  • | Title = Special Issue on Applications of Ultra Wideband Systems in Biomedicine, International Journal of Ultra Wideband Communications and Sys ...s of UWB systems in biomedicine, which will bring together the latest work in this growing interdisciplinary field.
    5 KB (664 words) - 17:20, 5 July 2020
  • ...he objective of ISPA-09 is to provide a forum for scientists and engineers in academia and industry to exchange and discuss their experiences, new ideas, · Network routing and communication algorithms
    8 KB (1,050 words) - 18:04, 5 January 2017
  • To be held in conjunction with ICALP 2009. ...ensive, coordinated technical research and development efforts, especially in power aware, scalable, robust wireless distributed protocols, due to the un
    6 KB (750 words) - 16:50, 27 December 2015
  • |Title=19th International Conference on Perspectives in Business Informatics Research ...rence on Perspectives in Business Informatics Research (BIR), taking place in Vienna, Austria.
    4 KB (571 words) - 12:58, 9 March 2020
  • |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security
    5 KB (578 words) - 10:21, 20 November 2020
  • |Title=5th European Conference on Computer Network Defence |Field=Computer security and reliability
    4 KB (530 words) - 15:02, 27 December 2015
  • ...r/atdm/ A first workshop] on the same topic already took place in May 2006 in Hakodate, Japan during the Fifth International Joint Conference on Autonomo ...resources, should be able to coordinate their efforts in a flexible manner in order to prevent further problems or to effectively manage the aftermath of
    6 KB (783 words) - 17:04, 27 December 2015
  • ...l Conference on COMmunication Systems and NETworkS (COMSNETS) will be held in Bangalore, India from 6 January 2010 to 10 January 2010. ...national conference dedicated to addressing emerging topics and challenges in Networking and Communications Systems. The goal of the conference is to cr
    7 KB (1,054 words) - 16:43, 27 December 2015
  • to be published in International Journal of Electronic Business (IJEB) ...ts, industry experts and students to present and discuss a range of topics in the areas of Web Technology, eBusiness & inter related emerging areas.
    4 KB (564 words) - 12:01, 6 November 2020
  • |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security
    5 KB (599 words) - 10:21, 20 November 2020
  • |Title=The 9th ACM/IEEE International Conference on Information Processing in Sensor Networks The 9th ACM/IEEE Conference on Information Processing in Sensor Networks
    8 KB (1,119 words) - 09:57, 27 February 2020
  • Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org Please note the Poster Forum and Work in Progress options.
    14 KB (1,651 words) - 15:56, 15 February 2017
  • |Title=The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems
    3 KB (338 words) - 16:53, 27 December 2015
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (429 words) - 08:55, 1 August 2019
  • |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    9 KB (1,092 words) - 09:35, 1 August 2019
  • |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress
    2 KB (217 words) - 16:50, 19 November 2020
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • |Title=The Third International Workshop on Systems and Network Telemetry and Analytics (SNTA2020) |Field=systems and network telemetry, Machine learning, data science, High-performance computing, Dist
    4 KB (584 words) - 17:42, 13 March 2020
  • |Title=19th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN) ...academia, industry, and government to present and discuss recent advances in both theoretical and experimental research. Its scope includes signal and i
    3 KB (412 words) - 09:52, 27 February 2020
  • * Combinatorics in Computer Science * Foundations of Privacy, Trust and Reputation in Network
    4 KB (602 words) - 06:44, 26 August 2020
  • |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium
    3 KB (343 words) - 16:31, 6 May 2020
  • ...Joint Conference on Neural Networks (IJCNN) covers a wide range of topics in the field of neural networks, from biological neural networks to artificial NEURAL NETWORK MODELS
    5 KB (574 words) - 15:58, 6 March 2020
  • * Security in distributed computing, cryptographic protocols * System-on-chip and network-on-chip architectures
    3 KB (344 words) - 11:30, 21 April 2020
  • |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)
    5 KB (609 words) - 17:01, 5 July 2020
  • ...essionals and brings to its readers the latest and most important findings in computer networks. • Network Architectures and Protocols • Network Coding
    3 KB (318 words) - 16:46, 5 July 2020
  • ...shed papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. Security in network, systems, and applications<br>
    4 KB (554 words) - 12:34, 14 October 2020
  • ...shed papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. Security in network, systems, and applications<br>
    4 KB (556 words) - 12:33, 14 October 2020
  • ...shed papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. Security in network, systems, and applications<br>
    4 KB (554 words) - 10:24, 6 July 2020
  • ...shed papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. Security in network, systems, and applications<br>
    4 KB (554 words) - 12:33, 14 October 2020
  • |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability
    2 KB (217 words) - 16:57, 27 December 2015
  • In conjunction with IEEE ICC 2012 ...ecial Issue on Smart Protocols and Algorithms of the International Journal Network Protocols and Algorithms (ISSN 1943-3581)
    6 KB (833 words) - 15:16, 24 September 2020
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...lection, archiving, maintenance, handling and analysis of digital evidence in order to prevent damage to data integrity. Such issues combined with the co
    3 KB (462 words) - 11:51, 22 March 2020
  • ...cademic and industrial researchers, practitioners, and students interested in future techniques relating to the satellite communications, networking, tec ...fense personal services such as tracking, visualization and virtualization in a highly secure communication environment.
    9 KB (1,218 words) - 16:06, 1 October 2020
  • - SOFTNETWORKING: Advances in Software Defined Networking and Network ICN 2021 is scheduled to be April 18 - 22, 2021 in Porto, Portugal under
    6 KB (725 words) - 19:58, 22 November 2020
  • AICT 2021 is scheduled to be May 30 - June 03, 2021 in Valencia, Spain under the DataSys 2021 umbrella. - regular papers [in the proceedings, digital library]
    13 KB (1,580 words) - 19:35, 18 February 2021
  • |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security
    4 KB (581 words) - 18:48, 24 February 2020
  • We encourage submissions of high-quality research papers on all topics in the general areas of databases, information retrieval, and knowledge manage ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modelling)
    5 KB (653 words) - 13:04, 3 August 2023
  • |Title=19th International Conference on Applied Cryptography and Network Security |Field=computer security
    870 bytes (109 words) - 19:16, 22 January 2021
  • ...’19) provides a forum on the use of ontologies, rules and data semantics in novel applications. Of particular relevance to ODBASE are papers that bridg ...ctor-specific or international standards for interoperable data governance in AI applications.
    6 KB (872 words) - 23:11, 24 February 2020
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • ...nal Semantic Technology Conference (JIST) is to bring together researchers in Semantic Technology research community and other areas of semantic related ** Relation extraction, prediction in knowledge graph
    5 KB (711 words) - 19:02, 7 March 2020
  • ...ill be invited to submit extended versions of their papers for publication in special issues of some prestigious international journals such as Fundamena ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.
    3 KB (422 words) - 12:09, 24 April 2016
  • |Title=Computational Intelligence in Information Systems The main goals of Computational Intelligence in Information Systems (CIIS) are to understand better these technologies and
    3 KB (309 words) - 17:11, 18 February 2021
  • ...ide great value to organisations as they encounter subtle technical issues in any stage of implementation. The expertise gained by SEMANTiCS attendees ha * Data Science (Data Mining, Machine Learning, Network Analytics)
    10 KB (1,347 words) - 15:01, 26 September 2016
  • ...ciety. Big Data can make important contributions to the technical progress in our societal key sectors and help shape business. What is needed are innova ...ralized supply with renewable energies or the optimization of traffic flow in large cities.
    3 KB (412 words) - 08:53, 24 September 2016
  • ...submit extended versions of their papers for consideration for publication in a special issue of the Springer Journal on Data Semantics (JoDS). ...of research and practical experience papers concerning scalability issues in ontology management, information integration, and information extraction, a
    9 KB (1,131 words) - 23:18, 24 February 2020
  • ...inal research papers, state-of-the-art reviews are invited for publication in all areas of Electrical, Electronics and Instrumentation Engineering. ...veying works and industrial experiences that describe significant advances in the following areas, but are not limited to:
    2 KB (197 words) - 16:16, 10 November 2016
  • ...’20) provides a forum on the use of ontologies, rules and data semantics in novel applications. Of particular relevance to ODBASE are papers that bridg ...ctor-specific or international standards for interoperable data governance in AI applications.
    6 KB (877 words) - 23:06, 24 February 2020
  • Management (CIKM 2014) will be held from Nov 3-7, 2014 in Shanghai, China. CIKM is a top-tier ACM conference in the areas of information retrieval,
    12 KB (1,565 words) - 04:15, 5 August 2023
  • |Title=The Eleventh International Conference on Advances in Information Mining and Management |Field=data mining, network, mechanisms&methods
    10 KB (1,305 words) - 00:29, 12 December 2020
  • |Title=SMGSSP 2017: Smart Micro-Grid Systems Security and Privacy |Field=privacy, security, smart micro-grids, cyber-physical systems
    2 KB (246 words) - 09:12, 3 September 2017
  • ...etical foundations to novel models and algorithms for data mining problems in science, business, medicine, and engineering. Visionary papers on new and e Papers submitted to the Research Track are solicited in all areas of data mining, knowledge discovery, and large-scale data analyti
    2 KB (282 words) - 10:48, 8 February 2020
  • ...etical foundations to novel models and algorithms for data mining problems in science, business, medicine, and engineering. Visionary papers on new and e Papers submitted to the Research Track are solicited in all areas of data mining, knowledge discovery, and large-scale data analyti
    2 KB (270 words) - 10:49, 8 February 2020
  • ...The conference addresses a wide scientific community and experts involved in the development of business computing applications.'' * security and privacy
    9 KB (1,190 words) - 10:12, 5 June 2019
  • ...The impact ranges from incremental applications to dramatical breakthrough in the society. Users rely heavily on broadcast technology, social media, mobi ...of research that will prepare them to apply new technologies to their work in teaching, research and educational development amid this rapidly evolving l
    5 KB (588 words) - 18:00, 21 January 2017
  • service problems. Coping with emerging challenges in engineering diverse technologies and solutions in smart sensing/devices/materials, IoT, networking,
    4 KB (565 words) - 09:46, 7 February 2017
  • Enabling Technologies in Robotics Sensors (http://www.dirf.org/intech/sensors-for-robotics/) Architectures and solutions for security and dependable services in the Internet of things and Internet of everything (http://www.dirf.org/inte
    5 KB (631 words) - 15:09, 10 April 2017
  • ...ffer a collaborative platform to address the emerging issues and solutions in digital information science and technology. ...ranging from real/live streams and simulations to analytics data analysis, in support of mining of knowledge. The conference will feature original resear
    4 KB (528 words) - 18:46, 29 August 2017
  • ...The conference addresses a wide scientific community and experts involved in the development of business computing applications. *smart machines, artifical intelligence, and cognitive computing in business systems and applications
    10 KB (1,309 words) - 10:29, 5 June 2019
  • ...elligent Web, to examine performance characteristics of various approaches in Web-based intelligent information technology, and to cross-fertilize their ...esent their contributions to the state of the art research and development in Web technology and applications
    18 KB (2,394 words) - 16:28, 29 January 2018
  • ontologies, rules and data semantics in novel applications. Of particular application of semantic methods and technologies in corporate environments
    6 KB (798 words) - 23:16, 24 February 2020
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • in conjunction with the 13th IEEE WiMob 2017 ...kshop on e-Health Pervasive Wireless Applications and Services e-HPWAS'17 (in conjunction with the prestigious 13h IEEE WiMob conference) targets providi
    4 KB (509 words) - 11:36, 8 August 2017
  • As in the previous years, SEMANTiCS’17 proceedings will be published by in data science and its intersection with Linked Data to present their
    6 KB (759 words) - 15:52, 5 December 2018
  • of the important applications in Cloud Computing. The academia, the industry and how to efficiently process large amount of sensor data in real-time using Cloud
    4 KB (532 words) - 13:28, 28 July 2017
  • through the global network. Further, the conference considers as essential the link to Services Science, acknowledging the service-orientation in most current
    7 KB (1,009 words) - 13:39, 3 September 2017

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)