Search results

Jump to: navigation, search

Page title matches

Page text matches

  • |Title=International Conference on Autonomous Agents and Multi-Agent Systems AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS (AAMAS-09)
    10 KB (1,371 words) - 16:14, 12 November 2020
  • ...=The Twelfth International Conference on Advances in Databases, Knowledge, and Data Applications ...d/or forward to the appropriate groups the following opportunity to submit and publish original scientific results to:
    11 KB (1,371 words) - 12:28, 18 May 2020
  • ...=The IEEE 23rd International Conference on Advanced Information Networking and Applications (AINA-09) ...conference will include keynote addresses with speakers from both industry and academia. Prospective authors are invited to submit papers in any of the fo
    34 KB (4,565 words) - 22:20, 10 January 2018
  • ...=The IEEE 22nd International Conference on Advanced Information Networking and Applications ...conference will include keynote addresses with speakers from both industry and academia. Prospective authors are invited to submit papers in any of the fo
    8 KB (1,037 words) - 22:20, 10 January 2018
  • ...=The IEEE 21st International Conference on Advanced Information Networking and Applications (AINA-07) ...conference will include keynote addresses with speakers from both industry and academia. Prospective authors are invited to submit papers in any of the fo
    9 KB (1,189 words) - 22:20, 10 January 2018
  • ...=The IEEE 20th International Conference on Advanced Information Networking and Applications on Advanced Information Networking and Applications (AINA2006) will
    26 KB (3,456 words) - 22:20, 10 January 2018
  • ...le = The 11th IEEE International Conference on High Performance Computing and Communications ...ny academic and industrial branches, especially when the solution of large and complex problems must cope with very tight timing schedules.
    19 KB (2,503 words) - 13:25, 28 October 2020
  • ...neering, information systems, natural language processing, soft computing, and human-computer interaction. ...epeatability of their experiments, and share with the community their data and test harnesses. Topics include, but are not limited to, the following.
    6 KB (854 words) - 12:05, 28 May 2016
  • ...ces through intelligent and intuitive interfaces embedded in these objects and devices, which in turn will be sensitive to what people need. ...ue therefore aspires to amalgamate ongoing research in distributed systems and complex multi-agent systems with the aim of strengthening the synergy betwe
    4 KB (536 words) - 17:55, 10 February 2021
  • |Title=International Conference on Autonomous Agents and Multi-Agent Systems methodological, engineering and application papers across a broad
    2 KB (334 words) - 17:14, 12 November 2020
  • ...ssible domain. Prospective authors are encouraged to consider novel topics and approaches rather than proposing incremental improvements of existing resul § Access Methods and Physical Design
    3 KB (305 words) - 08:44, 31 July 2020
  • |Title=ICDE Workshop on Data Engineering for Blogs, Social Media, and Web 2.0 ...models of these new information sources, understanding how to manage them, and developing techniques to extract useful information from them are topics of
    3 KB (370 words) - 16:06, 16 December 2020
  • |Title=19th International Conference on Autonomous Agents and Multi Agent Systems ...onference of the non-profit International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS).
    6 KB (659 words) - 17:41, 11 February 2021
  • is an international forum for researchers and practitioners from different areas of computer science and management science
    5 KB (594 words) - 16:29, 25 March 2020
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • Ontology Alignment (mapping, matching, merging, mediation and reconciliation) Ontology Learning and Metadata Generation (e.g., HLT and ML approaches)
    2 KB (266 words) - 11:46, 28 May 2016
  • ...oud and edge computing, security, privacy, and trust, mobile and wireless, and more. The full program and registration will be available in April.
    4 KB (577 words) - 09:28, 12 May 2020
  • |Title=Current Trends in Theory and Practice of Computer Science Current Trends in Theory and Practice of Computer Science
    6 KB (682 words) - 10:18, 14 April 2020
  • | Field = Computer security and reliability ...odels for high assurance systems development, verification and validation, and assessment are welcome.
    6 KB (748 words) - 14:43, 27 December 2015
  • ...(2) aid those developing devices by sharing designs (3) debate of ethical and social issues that are unique to devices that operate below or upon awarene ...iComp attendees. Submissions describing work-in-progress and early designs and systems are welcome. At the workshop's conclusion participants will vote to
    6 KB (790 words) - 15:11, 27 December 2015
  • ...n-demand, cloud/etc./; Context-aware and context recognition; Data-centers and nano-centers; Information processing /distribution, discovery, sharing/; Vi ...ceBook; Knowledge dissemination and discovery; Distributed gaming; Web 2.0 and Semantic Web; Interactive television; Virtual 3-D videoconferencing; Telepr
    7 KB (883 words) - 17:35, 7 January 2021
  • |Title=International Journal of Customer Relationship Marketing and Management ...this scholarly journal. The following describes the mission, the coverage, and the guidelines for submission to IJCRMM.
    2 KB (335 words) - 15:56, 15 February 2017
  • ...a (2004), New York, USA (2005), Wuhan, China (2006), Nancy, France (2007), and Auckland, New Zealand (2008). Complex Event Processing and Event-driven Systems
    2 KB (240 words) - 17:46, 21 July 2016
  • |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)
    6 KB (793 words) - 15:12, 1 October 2020
  • ...ireless distributed protocols, due to the unusual application requirements and the severe resource constraints of the sensor devices. ...ures, pose new interesting abstract modeling, algorithmic design, analysis and implementation challenges of great practical impact.
    6 KB (750 words) - 16:50, 27 December 2015
  • |Title=The Second International Workshop on Next Generation of Wireless and Mobile Networks * Handoff and mobility management
    1 KB (148 words) - 10:22, 29 May 2016
  • |Title=International Workshop on P2P, Parallel, Grid and Internet Computing Fourth International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC-2010)
    7 KB (912 words) - 17:36, 5 November 2020
  • |Title=The Fifth International Conference on Internet Monitoring and Protectio ICIMP 2010: The Fifth International Conference on Internet Monitoring and Protection
    14 KB (1,651 words) - 15:56, 15 February 2017
  • ...ternational KES Symposium on Agents and Multi-agent Systems - Technologies and Applications Call for Papers and Invited Sessions Proposals
    6 KB (733 words) - 18:19, 24 September 2020
  • |Title=21st ACM Conference on Economics and Computation The 21st ACM Conference on Economics and Computation (EC) 2020
    5 KB (718 words) - 12:00, 11 September 2020
  • |Title=20th ACM Conference on Economics and Computation ...day through Thursday June 25-27, 2019 with Tutorials on Monday, June 24th, and Workshops on Friday, June 28th.
    3 KB (330 words) - 13:12, 27 February 2020
  • |Title=19th ACM Conference on Economics and Computation The nineteenth ACM conference on Economics and Computation (ACM EC’18) will be held on June 18-22, 2018 at Cornell in It
    3 KB (316 words) - 14:07, 27 February 2020
  • |Title=International Colloquium on Automata Languages and Programming The 47th International Colloquium on Automata, Languages and Programming (ICALP) 2020
    4 KB (602 words) - 06:44, 26 August 2020
  • ''The conference continued its tradition as the premiere venue for innovative and rigorous research across the whole spectrum of Information Systems Engineer * Camera ready of all papers and summary by workshop chairs: TBA
    3 KB (395 words) - 15:14, 24 September 2020
  • ...s of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems. ...echanisms for enforcing them, and the architectural principles of software and hardware system implementing them.
    5 KB (609 words) - 17:01, 5 July 2020
  • ...of interest to network professionals and brings to its readers the latest and most important findings in computer networks. ...ny more. Our International Editors are working on establishing ISI listing and a good impact factor for IJCN.
    3 KB (318 words) - 16:46, 5 July 2020
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • ...omputing, grid computing, networking, service science, management science, and software engineering. ...resentations, keynote presentations, workshops, demonstrations, tutorials, and a PhD track. Please refer to www.icsoc.org for more details about these ass
    6 KB (745 words) - 15:27, 1 November 2016
  • ...d/or forward to the appropriate groups the following opportunity to submit and publish original scientific results to: ..., research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished
    13 KB (1,580 words) - 19:35, 18 February 2021
  • ...industrial systems has become real but also emphasizes particular privacy and security issues to be overcome, especially when interconnected with Interne ...on the various security aspects of next-generation networking technologies and service management frameworks.
    4 KB (581 words) - 18:48, 24 February 2020
  • ...Web be reimagined for the public good? Can it be made more human-centric, and if so, how? ...nd critical dialogue with the aim of understanding the Web and its impacts and reflecting on the most pressing questions facing the Web.
    6 KB (910 words) - 12:04, 31 January 2020
  • *Advanced database and Web applications *Data archive and digital library
    4 KB (535 words) - 21:32, 11 February 2020
  • *Advanced database and Web applications *Probabilistic and uncertain data
    4 KB (500 words) - 17:29, 6 January 2021
  • |Title=22nd International Conference on Knowledge Engineering and Knowledge Management ...er Science, Free University of Bozen-Bolzano, Research Centre on Knowledge and Data (KRDB)
    5 KB (579 words) - 13:18, 17 February 2020
  • |Title=ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering '''27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE)''' (ESEC 20
    6 KB (738 words) - 11:21, 6 July 2020
  • * Enterprise Knowledge Graphs, Graph Data Management and Deep Semantics * Data Mining and Knowledge Discovery
    6 KB (872 words) - 14:00, 22 February 2020
  • ...h community and other related areas to present innovative research results and novel applications for Knowledge Graphs. * Knowledge Graph Population and Information Extraction
    4 KB (531 words) - 14:14, 22 February 2020
  • |Title=ACM International Conference on Web Search and Data Mining ...s one of the premier conferences on web-inspired research involving search and data mining. The 13th ACM International WSDM Conference will take place in
    4 KB (508 words) - 15:49, 14 May 2020
  • |Title=18th International Conference on Ontologies, DataBases, and Applications of Semantics ...d and mobile systems, data and information retrieval, knowledge discovery, and computational linguistics.
    6 KB (872 words) - 23:11, 24 February 2020
  • ...is to bring together researchers in Semantic Technology research community and other areas of semantic related technologies to present their innovative re ...ts long sandy beaches, surfing spots and elaborate system of inland canals and waterways.
    5 KB (663 words) - 14:34, 5 December 2018
  • |Has coordinator=JSAI-SIG on Semantic Web and Ontology, JIST Steering Committee ...o bring together researchers in the Semantic Technology research community and other areas of semantic-related technologies to present their innovative re
    5 KB (699 words) - 14:57, 5 December 2018
  • |Field=Psychology and Behavioral Sciences ...l connectedness in the transcendental sense provides meaning in our lives; and moral connectedness, being true to our values helps us to maintain our inte
    4 KB (496 words) - 11:31, 17 September 2020
  • Special Theme: "Society, Environment and Trust: Towards Sustainable Systems of Governance" ...and we also encourage sessions within and across a variety of disciplines and fields related to the Social Sciences, including the following streams:
    2 KB (291 words) - 19:26, 2 March 2021
  • |Field=Computer security and reliability ...information system security meet to learn and to exchange practical ideas and experiences.
    2 KB (264 words) - 15:32, 7 January 2021
  • ...n of SCI indexed journals, including International Journal on Semantic Web and Information Systems (IJSWIS). More journals will be added soon. ...is to bring together researchers in Semantic Technology research community and other areas of semantic related technologies to present their innovative re
    5 KB (711 words) - 19:02, 7 March 2020
  • |Title=1st International Conference on Security and Privacy in Vehicular Networks |Field=Security and Privacy in Vehicular Networks
    2 KB (233 words) - 06:32, 20 September 2016
  • |Title=International Conference on Knowledge Engineering and Semantic Web ...nd the Middle East) topresent and share ideas related to the Semantic Web, and popularize the area in these regions.
    6 KB (898 words) - 14:42, 24 September 2016
  • ...l in the domain of Web, information systems, data analytics, and knowledge and data engineering. The decision on acceptance/rejection of workshop proposal * Big Data Techniques and Applications
    2 KB (230 words) - 00:37, 28 May 2016
  • ...CFP for the IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2017)
    379 bytes (49 words) - 15:07, 17 August 2016
  • |Title=20th International Conference on Knowledge Engineering and Knowledge Management ...Yet the world is rarely static: everything changes, including the models, and real world systems need to evolve along with the surrounding world. Also, w
    8 KB (1,067 words) - 12:26, 7 July 2018
  • |Title=AsianHOST 2016 : IEEE Asian Hardware-Oriented Security and Trust Symposium 2016
    435 bytes (53 words) - 16:59, 19 December 2016
  • |Title=19th International Conference on Ontologies, DataBases, and Applications of Semantics ...d and mobile systems, data and information retrieval, knowledge discovery, and computational linguistics.
    6 KB (877 words) - 23:06, 24 February 2020
  • |Title=SNSPT 2016 : Summer School on Social Networks Security, Privacy, and Trust |Field=social networks, security, privacy, trust
    419 bytes (54 words) - 16:21, 8 July 2016
  • |Title=IPM 2017 : Special Issue: In (Big) Data we trust: Value Creation in Knowledge Organizations .../information-processing-and-management/news/call-for-papers-in-big-data-we-trust-value-creation-in-knowl
    512 bytes (55 words) - 15:09, 17 August 2016
  • |Title=SMGSSP 2017: Smart Micro-Grid Systems Security and Privacy Smart grids offer a cost-effective approach to fair and equitable power provisioning in urban areas.
    2 KB (246 words) - 09:12, 3 September 2017
  • ...e gap between academia and industry with regards to research collaboration and awareness of current evelopment in secure information management in the dig - Protocols and Standards
    5 KB (641 words) - 22:32, 29 July 2016
  • |Title=Ninth International Conference on Adaptive and Self-Adaptive Systems and Applications |Field=self-adaptive systems, adaptive mechanisms, trust, robot systems
    425 bytes (44 words) - 17:47, 14 January 2021
  • - Four formats for submissions: HTML, ODT, DOCX, and PDF - LNCS Proceedings and Data Science Journal Special Issue
    8 KB (1,086 words) - 13:37, 11 January 2017
  • ..., mobile devices, video games and other innovations to enrich the learning and adoption process. ...prepare them to apply new technologies to their work in teaching, research and educational development amid this rapidly evolving landscape.
    5 KB (588 words) - 18:00, 21 January 2017
  • |Title=Workshop on Linked Enterprise Data Services, Provenance, Linking and QualitY Workshop on Linked Enterprise Data Services, Provenance, Linking and QualitY @ INFORMATIK2017
    5 KB (701 words) - 10:48, 6 August 2017
  • ...ven Approaches for Analyzing and Managing Scholarly Data: Systems, Methods and Applications ...s well as to develop new concepts and applications for managing, analyzing and visualizing scholarly data.
    4 KB (491 words) - 13:32, 10 April 2017
  • |Title=8th International Conference on Knowledge Engineering and Semantic Web ===RESEARCH AND INDUSTRY TRACK===
    7 KB (988 words) - 09:50, 14 August 2019
  • |Title=8th International Conference on Web Intelligence, Mining and Semantics ...ics of various approaches in Web-based intelligent information technology, and to cross-fertilize their ideas on the development of Web-based intelligent
    18 KB (2,394 words) - 16:28, 29 January 2018
  • [[ Research and application full papers ]] [[ Short papers, vision papers, and late breaking results papers ]]
    7 KB (942 words) - 16:53, 8 January 2018
  • very critical and important for every organization. This poses several privacy-sensitive data, privacy preserving data integration and
    7 KB (887 words) - 15:22, 15 July 2017
  • However, the actual time and effort required to achieve this new form and ensuring that research outcomes become understandable, interpretable,
    5 KB (719 words) - 10:18, 16 July 2017
  • And the 8th Question Answering over Linked Data (QALD) Challenge ...purposes. Recent progresses in speech recognition technologies (e.g., Siri and Google Voice) also demonstrate the usefulness of a natural language interfa
    5 KB (693 words) - 10:36, 16 July 2017
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • |Title=CLOSER 2018 : 8th International Conference on Cloud Computing and Services Science 8th International Conference on Cloud Computing and Services Science CLOSER
    7 KB (1,009 words) - 13:39, 3 September 2017
  • easily added on as a patch, post-development, and sometimes even after the Team (US-CERT), "most successful attacks result from targeting and exploiting
    4 KB (562 words) - 12:05, 3 September 2017
  • |Title=CODASPY 2018 : Conference on Data and Application Security and Privacy 8th ACM Conference on Data and Application Security and Privacy will be held on
    6 KB (807 words) - 13:40, 3 September 2017
  • ...SESS 2017: 2017 8th IEEE International Conference on Software Engineering and Service Science 2017 8th International Conference on Software Engineering and Service Science
    5 KB (673 words) - 09:53, 3 September 2017
  • ...e=FoIKS 2018 : 10th International Symposium on Foundations of Information and Knowledge Systems Please consider to contribute to and/or forward to the appropriate groups
    9 KB (1,118 words) - 13:41, 3 September 2017
  • SCOPE AND TOPICS devoted to the publication of high quality papers on theoretical and practical
    3 KB (347 words) - 10:20, 20 November 2020
  • is devoted to the publication of high quality papers on theoretical and practical aspects of computer science and computer Engineering.The goal of this
    3 KB (346 words) - 17:32, 18 February 2021
  • provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Networks & Data Communications.
    4 KB (486 words) - 11:57, 8 August 2017
  • Theme and Scope: objects containing embedded technologies to collect, communicate, sense, and
    5 KB (722 words) - 10:00, 21 August 2017
  • ...nternational Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus remarkable event which brings together professors, researchers and students in
    2 KB (308 words) - 11:50, 3 September 2017
  • |Title=ASPMI 2018 : Advances in Security and Privacy of Multimodal Interfaces Advances in Security and Privacy of Multimodal Interfaces
    4 KB (592 words) - 13:34, 28 July 2017
  • |Title=SPIoT 2017 : The 6th International Symposium on Security and Privacy on Internet of Things |Homepage=http://trust.gzhu.edu.cn/conference/SPIoT2017/
    3 KB (379 words) - 12:01, 3 September 2017
  • |Title=LHNA@SITIS 2017 : Track Large, Heterogeneous Networks and their Applications (LHNA) at IEEE SITIS 2017 |Homepage=http://www.sitis-conf.org/en/large-heterogeneous-networks-and-their-applications.php
    4 KB (442 words) - 10:00, 21 August 2017
  • ...e=SEUNet 2017 : The Second IEEE WiMob 2017 Workshop on Smart Environments and Urban Networking The continuous and unplanned urbanization has recently been considered as a
    5 KB (696 words) - 11:36, 8 August 2017
  • |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)
    5 KB (640 words) - 13:34, 28 July 2017
  • bring together researchers in Semantic Technology research community and other on Semantic Web and Information Systems (IJSWIS), for fast-track publication in
    7 KB (903 words) - 13:23, 28 July 2017
  • IEEE Indonesia Section. ICON-SONICS focuses on both theory and applications mainly covering the topics of smart cities, automation and Intelligent Computing
    4 KB (508 words) - 13:23, 28 July 2017
  • ...curity and Authentication of Electronic Health Record (EHR): Opportunities and Challenges Special Issue On: Emerging Technologies for Security and Authentication of
    5 KB (650 words) - 13:24, 28 July 2017
  • |Title=The Eleventh International Conference on Web Search and Data Mining ...s one of the premier conferences on web inspired research involving search and data mining. The 11th ACM International WSDM Conference will take place in
    8 KB (1,069 words) - 08:17, 6 February 2020
  • This includes hacking, virus propagation, spyware and more. to corporate image and reputation, perhaps even weakening its competitiveness in
    5 KB (611 words) - 11:47, 8 August 2017
  • ...CISSP 2018 : 4th International Conference on Information Systems Security and Privacy 4th International Conference on Information Systems Security and Privacy ICISSP
    3 KB (380 words) - 12:30, 3 September 2017

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)