Search results

Jump to: navigation, search

Page title matches

Page text matches

  • ...puting has been a primary gathering forum for applied computer scientists, computer engineers, software engineers, and application developers from around the w ...ting with classic Web Services. Finally, features like Quality of Service, security and dependability need to be taken seriously into account, and this investi
    7 KB (957 words) - 15:15, 11 August 2008
  • |Title=Annual Computer Security Applications Conference
    297 bytes (35 words) - 16:50, 16 February 2021
  • ** Privacy, safety and security ** Privacy, safety, and security
    6 KB (777 words) - 22:54, 14 August 2008
  • === Computer sciences=== ==== Computer communications (networks)====
    6 KB (714 words) - 12:19, 11 December 2020
  • | title = Transactions on Information and System Security | Field = Computer security and reliability
    272 bytes (32 words) - 16:33, 18 August 2008
  • |Field=computer science *Network Security
    5 KB (571 words) - 09:22, 19 July 2019
  • |Title=1st International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    522 bytes (65 words) - 13:51, 6 November 2020
  • |Title=2nd International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    535 bytes (66 words) - 14:23, 6 November 2020
  • |Title=3rd International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    482 bytes (60 words) - 13:55, 6 November 2020
  • |Title=4th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    470 bytes (56 words) - 13:57, 6 November 2020
  • |Title=5th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    474 bytes (60 words) - 13:58, 6 November 2020
  • | Title= Conference on Computer and Communications Security 1997 | Field = Computer security and reliability
    334 bytes (35 words) - 20:56, 4 October 2016
  • |Field=Computer and Communications Security
    272 bytes (33 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    256 bytes (30 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    251 bytes (30 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    264 bytes (32 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    264 bytes (32 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    278 bytes (33 words) - 17:56, 4 October 2016
  • |Title=International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    322 bytes (46 words) - 08:58, 13 February 2021
  • | Title = Conference on Computer and Communications Security | Field = Computer security and reliability
    141 bytes (16 words) - 00:24, 22 August 2008
  • * IEEE, IEEE Computer Society * Trust, security and privacy issues in pervasive systems
    12 KB (1,560 words) - 15:03, 27 August 2008
  • |Field=Computer science ...ocus on the frontier topics in the theoretical and applied engineering and computer science subjects. The WCE conferences serve as good platforms for our membe
    3 KB (454 words) - 12:34, 8 October 2020
  • This is the twelfth IEEE Computer Society symposium dealing with the inter-operability, security, trusted and dependable systems, fault
    5 KB (715 words) - 17:43, 11 September 2008
  • - privacy and security Keith S. Decker, Dept. of Computer and Information Sciences,
    10 KB (1,371 words) - 16:14, 12 November 2020
  • |Field=Computer networking * Security issues of data management in wireless networks
    5 KB (611 words) - 15:43, 16 September 2008
  • ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d Additionally, P2P systems require special attention from the security point of view. Trust, reputation, copyrights, and intellectual property are
    18 KB (2,408 words) - 02:37, 16 December 2008
  • ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.) The DB 2009 Proceedings will be published by IEEE Computer Society Press and on-line via IEEE XPlore Digital Library. IEEE will index
    11 KB (1,446 words) - 18:26, 13 October 2008
  • |Field=Computer science ** Testing, assuring and certifying F/OSS quality and security
    10 KB (1,349 words) - 16:42, 24 September 2008
  • Software Security Human-Computer Interaction
    2 KB (293 words) - 10:35, 24 June 2011
  • |Field=Computer networking ...May 26-29, 2009. The conference covers theory, design and application of computer networks and distributed computing systems. Aside from the regular presenta
    34 KB (4,565 words) - 22:20, 10 January 2018
  • |Field=Computer networking ...March 25-28, 2008. The conference covers theory,design and application of computer networks and distributed computing systems. Aside from the regular presenta
    8 KB (1,037 words) - 22:20, 10 January 2018
  • |Field=Computer networking ..., May 21-23, 2007. The conference covers theory, design and application of computer networks and distributed computing systems. Aside from the regular presenta
    9 KB (1,189 words) - 22:20, 10 January 2018
  • |Field=Computer networking the TCDP of the IEEE Computer Society, the International Conference
    26 KB (3,456 words) - 22:20, 10 January 2018
  • |Field=Computer networking ...- March 30, 2005. The conference covers theory, design and application of computer networks and distributed computing systems. Aside from the regular presenta
    10 KB (1,263 words) - 22:20, 10 January 2018
  • |Field=Computer networking ...will include sessions on all aspects of theory, design and application of computer networks and distributed computing systems. Aside the regular presentation,
    12 KB (1,537 words) - 22:19, 10 January 2018
  • |Field=Computer networking * Security and Privacy
    8 KB (1,040 words) - 22:20, 10 January 2018
  • * General computer systems issues in operating systems, architecture, memory hierarchy, compil ...issues such as workload modeling, performance metrics, power consumption, security, usability, and experience with real systems and failures
    5 KB (777 words) - 05:50, 14 October 2008
  • - Wireless security and dependability ...fp/servlet/event.showcfp?eventid=3852&copyownerid=2 WikiCFP][[Category:Computer networking]]
    4 KB (495 words) - 09:22, 22 August 2023
  • ...traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. - Trust-related Security and Privacy: Trust-related secure architecture, framework, policy, intrusio
    9 KB (1,216 words) - 17:32, 14 October 2008
  • | Field = Computer networking communication networks, computer networks, social networks, biological
    6 KB (722 words) - 17:32, 14 October 2008
  • ...multimedia databases, digital and video libraries, compression and coding, security over the network. ...e, OCR and document analysis, mobile robots and visual navigation, network security, remote sensing and environment control, video surveillance and intelligent
    2 KB (268 words) - 17:47, 14 October 2008
  • | Field = Computer networking o Security aspects in cross-layer designs
    3 KB (424 words) - 17:47, 14 October 2008
  • ===Design, Human Computer Interaction=== * Security and privacy
    8 KB (989 words) - 20:13, 22 February 2009
  • | Title = The seventh ACS/IEEE International Conference on Computer Systems and Applications | Field = Computer science
    4 KB (503 words) - 11:36, 18 October 2008
  • | Field = Computer architecture ...vanced technologies and radically new solutions relevant to development of computer systems and aims to foster communication among scientists and engineers to
    4 KB (591 words) - 17:48, 14 October 2008
  • | Field = Computer networking * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques
    3 KB (431 words) - 17:48, 14 October 2008
  • | Field = Computer networking • Wireless network security and privacy
    6 KB (731 words) - 10:33, 14 August 2023
  • | Field = Computer networking * Wireless privacy and security
    3 KB (456 words) - 18:10, 14 October 2008
  • |Field=Computer networking * Security, privacy, and trustworthiness of mobile and wireless systems
    7 KB (974 words) - 12:28, 3 August 2023
  • |Field=Informatics, Computer Science, COP * Computer Science Security.
    3 KB (317 words) - 18:42, 7 October 2011
  • * Trust, reputation, security, and privacy in MBC ...sent the work. Papers should not exceed 15 pages in LNCS (Lecture Notes in Computer Science) format: http://www.springer.de/comp/lncs/authors.html
    5 KB (647 words) - 22:05, 14 October 2008
  • ...d functionalities, provenance has only recently attracted the attention of computer scientists. Provenance poses many fundamental challenges, such as performan ...ware engineering, workflow system, information retrieval, web service, and security research. At the same time, it also requires understanding of problems from
    3 KB (416 words) - 17:48, 14 October 2008
  • ...nd panel sessions. The INTERNET 2009 Proceedings will be published by IEEE Computer Society and posted on Xplore IEEE system. A best paper award will be grante Internet security enforcement and validation
    11 KB (1,385 words) - 17:48, 14 October 2008
  • | Title = IEEE International Conference on Intelligence and Security Informatics | Field = Computer security and reliability
    438 bytes (45 words) - 21:41, 16 October 2008
  • * Computer-assisted legal drafting and document management ...legal norm-governed systems (e.g. e-commerce rules, organization rules and security regulations)
    7 KB (998 words) - 17:48, 14 October 2008
  • | Title = The First International Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability
    7 KB (960 words) - 17:48, 14 October 2008
  • | Field = Computer networking * Trust, security and privacy
    19 KB (2,503 words) - 13:25, 28 October 2020
  • |Field=Computer science * Security and privacy in vehicular networks
    3 KB (378 words) - 14:22, 24 August 2016
  • * Security, Privacy, Safety and Legal Issues Computer Science (LNCS, EI indexed). At least one author of each accepted
    7 KB (942 words) - 20:05, 14 October 2008
  • | Title = The 3rd International Symposium on Security and Multimodality in Pervasive Environments | Field = Computer science
    3 KB (393 words) - 21:18, 14 October 2008
  • | Field = Computer security and reliability
    3 KB (467 words) - 21:39, 16 October 2008
  • - Security and privacy in SPSs - SPS exploiting emerging computer architectures (multi-core, cell)
    3 KB (490 words) - 20:05, 14 October 2008
  • + Security and information assurance Biography: Dr. Divyakant Agrawal is a Professor of Computer
    7 KB (907 words) - 21:51, 14 October 2008
  • | Field = Computer networking • Security, Survivability and Fault Tolerance
    2 KB (244 words) - 20:05, 14 October 2008
  • | Field = Computer networking ...seeks papers describing significant research contributions to the field of computer and data communication networks. We invite submissions on various aspects o
    3 KB (353 words) - 20:31, 14 October 2008
  • | Field = Computer networking * › Security Aspects of Mobile Software
    9 KB (1,219 words) - 20:05, 14 October 2008
  • Computer Vision • Ethical, Social, Privacy, Security and moral Issues in an e-societ
    5 KB (530 words) - 10:27, 24 June 2011
  • Human-Computer Interface & Visualization Computer-aided Design/manufacturing
    3 KB (332 words) - 20:06, 14 October 2008
  • |Field=Computer security and reliability ...(railways, airlines, road), life related (health, emergency response, and security), manufacturing (chips, computers, cars) or financial (credit cards, on-lin
    15 KB (2,175 words) - 21:03, 19 March 2013
  • Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability USER INTERFACE and HUMAN COMPUTER INTERACTION
    3 KB (354 words) - 20:06, 14 October 2008
  • - Data Security Issues - IS Security Issues
    6 KB (780 words) - 20:06, 14 October 2008
  • The Faculty of computer and information science organizes this important conference.this conferenc * Computer Networks
    2 KB (193 words) - 20:06, 14 October 2008
  • Computer Vision Intelligent Networks and Security
    3 KB (359 words) - 20:06, 14 October 2008
  • | Field = Computer networking o Security and Privacy
    2 KB (303 words) - 20:06, 14 October 2008
  • | Field = Computer networking ...mic experts to present and discuss communications quality, reliability and security issues as they relate to real world issues. The output from the workshops a
    4 KB (505 words) - 22:15, 14 October 2008
  • | Field = Computer networking * Security
    6 KB (686 words) - 20:06, 14 October 2008
  • Homeland Security Human-Computer Interaction
    6 KB (708 words) - 22:49, 14 October 2008
  • | Title = The 11th European Conference on Computer Supported Co-operative Work | Field = Human-computer interaction
    2 KB (261 words) - 22:45, 14 October 2008
  • | Field = Human-computer interaction * Security and privacy in pervasive healthcare
    6 KB (732 words) - 22:45, 14 October 2008
  • | Field = Human-computer interaction the International Computer Sciences, and Social Informatics and Telecommunications Engineering (ICST)
    6 KB (674 words) - 22:45, 14 October 2008
  • | Field = Human-computer interaction - Privacy and security issues
    6 KB (890 words) - 22:53, 14 October 2008
  • | Field = Human-computer interaction ...ionals, educators and students of various HCI-related disciplines, such as Computer Science, Psychology, Ergonomics and Graphic Design, among others.
    3 KB (502 words) - 22:53, 14 October 2008
  • | Title = 18th annual international conference on computer science and software engineering - Security and Privacy: cryptography; access control; security in
    9 KB (1,193 words) - 22:53, 14 October 2008
  • | Field = Human-computer interaction computer science education) to present original research on software
    3 KB (355 words) - 22:53, 14 October 2008
  • | Field = Human-computer interaction �?� Multi-resolution and other efficient computer graphics, visualization algorithms for cooperative visualization
    4 KB (468 words) - 22:54, 14 October 2008
  • | Title = Human Computer Interaction 2008 | Field = Human-computer interaction
    3 KB (322 words) - 22:41, 4 February 2009
  • 5. Human-Computer Interaction Database Security and Transaction Support
    9 KB (1,240 words) - 22:56, 14 October 2008
  • ...08), this year's conference expands its scope to encompass all aspects of Computer Science focused game research, along with game-oriented education research, ...ame studies/game design, e) graphics and interfaces and f ) networking and security. Papers that fall outside these topic areas are strongly encouraged and sho
    9 KB (1,275 words) - 14:46, 27 December 2015
  • ...bringing together researchers from the fields of modal logics, theoretical computer science and multi-agent systems as well as researchers who are interested i * security, privacy and trust issues in multi-agent systems
    5 KB (670 words) - 23:04, 14 October 2008
  • | Title = European Conference on Intelligence and Security Informatics | Field = Computer security and reliability
    592 bytes (64 words) - 23:04, 14 October 2008
  • ...ntelligence. Because of its ubiquity, logic has acquired a central role in Computer Science education. - Foundations of security
    5 KB (799 words) - 21:49, 26 February 2020
  • ...nformation systems, natural language processing, soft computing, and human-computer interaction. ** Representing and reasoning about trust, privacy, and security
    6 KB (854 words) - 12:05, 28 May 2016
  • Notes in Computer Science�?? (LNCS). share research results in Computer Science and Informatics as well as
    13 KB (1,775 words) - 23:04, 14 October 2008
  • - Computer vision - AI and Human-computer interaction
    6 KB (827 words) - 23:04, 14 October 2008
  • * Cryptography and Network Security * Voice-over-IP and Security
    2 KB (167 words) - 23:05, 14 October 2008
  • | Acronym = Computer Journal 2008 the Computer Journal
    4 KB (536 words) - 17:55, 10 February 2021
  • * models of concurrency, security, and mobility * type and category theory in computer science
    8 KB (1,085 words) - 18:01, 12 February 2009
  • b. Security/accreditation c. Cyber Security
    16 KB (2,200 words) - 20:51, 18 February 2021
  • | Title = 5th IFIP International Conference on Theoretical Computer Science 5th IFIP International Conference on Theoretical Computer Science
    5 KB (698 words) - 23:08, 14 October 2008
  • data; security; semi-structured data; spatial data; temporal data; LaTeX2e style llncs for Lecture Notes in Computer Science, which is
    5 KB (660 words) - 14:52, 2 March 2012

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)