Search results
Create the page "Data security" on this wiki! See also the search results found.
Page title matches
- 23 bytes (2 words) - 11:54, 8 August 2017
- 25 bytes (2 words) - 13:40, 3 September 2017
- ...ICDIS 2018 : 2018 First International Conference on Data Intelligence and Security |Field=big data4 KB (484 words) - 10:00, 21 August 2017
- 26 bytes (2 words) - 13:40, 3 September 2017
Page text matches
- |Title=The 10th International Conference on Mobile Data Mangement (MDM'09): Systems, Services and Middleware in mobile data management. The conference provides unique opportunities for researchers,13 KB (1,468 words) - 01:23, 22 August 2008
- ...prehensively represented this includes future events as well as historical data about e.g. about acceptance rates of the main conferences in the field ====Computer security and reliability====6 KB (714 words) - 12:19, 11 December 2020
- *Network Security *Data Warehousing, Ontologies and Databases5 KB (571 words) - 09:22, 19 July 2019
- The 2011 International Conference of Computational Statistics and Data Engineering The 2011 International Conference of Data Mining and Knowledge Engineering3 KB (454 words) - 12:34, 8 October 2020
- Data management constitutes the essential enabling technology for several diverse purposes. Established data management solutions9 KB (1,189 words) - 14:53, 28 August 2008
- ...Temporal data; Concurrency and recovery; Transaction management; Views and data warehousing.5 KB (753 words) - 18:59, 25 June 2012
- |Title=International Workshop on Data Management as well as directions for future research directions on data5 KB (611 words) - 15:43, 16 September 2008
- ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d ...articular requirements. On the one hand, there are aspects of programming, data handling, and intensive computing applications; on the other hand, there ar18 KB (2,408 words) - 02:37, 16 December 2008
- * Data warehouse and multidimensional modelling, analysis and mining * Security issues in information systems7 KB (763 words) - 12:25, 6 October 2011
- ...Twelfth International Conference on Advances in Databases, Knowledge, and Data Applications |Field=data, software, automation11 KB (1,371 words) - 12:28, 18 May 2020
- ...substantial improvements for content processing, information indexing, and data, process and knowledge mining. The push came from Web services, artificial ...s on databases, evolution of relation between databases and other domains, data base technologies and content processing, as well as specifics in applicati11 KB (1,446 words) - 18:26, 13 October 2008
- * Security, Privacy and Trust * Distributed Database and Data Mining34 KB (4,565 words) - 22:20, 10 January 2018
- * Security, Privacy and Trust * Distributed Database and Data Mining8 KB (1,037 words) - 22:20, 10 January 2018
- * Security, Privacy and Trust * Distributed Database and Data Mining9 KB (1,189 words) - 22:20, 10 January 2018
- * Security, Privacy and Trust * Distributed Database and Data Mining26 KB (3,456 words) - 22:20, 10 January 2018
- ...issues such as workload modeling, performance metrics, power consumption, security, usability, and experience with real systems and failures ...losive growth in storage and the increasing need to store, find and manage data for long periods5 KB (777 words) - 05:50, 14 October 2008
- ◦ Data Distribution, Load Balancing & Scaling ◦ Security and Reliability4 KB (452 words) - 17:47, 7 April 2021
- ...lds such as embedded systems, distributed systems, data management, system security and applications. The conference places emphasis on layers well above the t * Security, Privacy & Trust4 KB (519 words) - 16:13, 14 October 2008
- IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009) IEEE Symposium on Computational Intelligence and Data Mining (CIDM 2009)3 KB (376 words) - 17:47, 14 October 2008
- * Security and privacy New tools for measurement and data collection8 KB (989 words) - 20:13, 22 February 2009
- Database and Data Mining Security and Information Assurance4 KB (503 words) - 11:36, 18 October 2008
- * Data mining and knowledge discovery for MBC * RFID and sensor data management for MBC5 KB (647 words) - 22:05, 14 October 2008
- | Title = 1st International Workshop on Data and Process Provenance ...-produce experiments as well as to greatly assist in the interpretation of data-analyses outcomes. These are all crucial for knowledge discovery.3 KB (416 words) - 17:48, 14 October 2008
- ...re defined radio networks, wireless networks, sensor networks, or Internet data streaming and mining. Internet and data streaming/mining algorithms11 KB (1,385 words) - 17:48, 14 October 2008
- | Title = IEEE International Conference on Intelligence and Security Informatics | Field = Computer security and reliability438 bytes (45 words) - 21:41, 16 October 2008
- * Database applications and data mining * Trust, security and privacy19 KB (2,503 words) - 13:25, 28 October 2020
- * Security and privacy in vehicular networks * Architecture, algorithms and protocols for data dissemination in vehicular networks3 KB (378 words) - 14:22, 24 August 2016
- - Persistence support and integration of stored data in SPSs - Data mining and knowledge discovery in SPSs3 KB (490 words) - 20:05, 14 October 2008
- Conference on Data Engineering in Shanghai, China) rent out network presence, computation power, and data storage space7 KB (907 words) - 21:51, 14 October 2008
- # Data Semantics and Linked Data Semantic Web data4 KB (450 words) - 20:05, 14 October 2008
- ...describing significant research contributions to the field of computer and data communication networks. We invite submissions on various aspects of network * Network security, vulnerability, and defenses3 KB (353 words) - 20:31, 14 October 2008
- * › Mobile Agents Support for Data Networks * › Security Aspects of Mobile Software9 KB (1,219 words) - 20:05, 14 October 2008
- Privacy, Trust, and Security is Distributed Systems Data Placement and Storage in Distributed and Mobile Environments2 KB (208 words) - 20:05, 14 October 2008
- ...ithm engineering techniques in the design and evaluation of algorithms and data structures. Submissions should present significant contributions supported * Cryptography and Security2 KB (216 words) - 20:05, 14 October 2008
- Data Mining and Knowledge Discovery Computer and Network Security3 KB (332 words) - 20:06, 14 October 2008
- |Field=Computer security and reliability ...n and information systems. Moreover, there are other dedicated systems for data mining, recommenders, sensing, conflict detection, intrusion detection, or15 KB (2,175 words) - 21:03, 19 March 2013
- Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability SECURITY and RIGHTS MANAGEMENT3 KB (354 words) - 20:06, 14 October 2008
- - Data Security Issues - Electronic Data Interchange (EDI)6 KB (780 words) - 20:06, 14 October 2008
- * Data Warehousing and Data Mining * Security Technologies2 KB (193 words) - 20:06, 14 October 2008
- Data mining Intelligent Networks and Security3 KB (359 words) - 20:06, 14 October 2008
- o Data Management and Data Centers o Security and Privacy2 KB (303 words) - 20:06, 14 October 2008
- ...ction, logistics and networking to complex event processing in finance and security. The event based paradigm has gathered momentum as witnessed by current eff ...ages for event correlation and patterns, streaming and continuous queries, data fusion6 KB (829 words) - 15:30, 29 January 2021
- * Security * Data dissemination and Peer-to-Peer systems6 KB (686 words) - 20:06, 14 October 2008
- * Data fusion in pervasive healthcare environments * Physiological models for interpreting medical sensor data6 KB (732 words) - 22:45, 14 October 2008
- * Data management and middleware support for collaborative information systems * Security and trust management in collaborative networks, systems, and applications6 KB (674 words) - 22:45, 14 October 2008
- ...t provided a suitable model to collect, represent, process and manage such data. Current advances like the Contextualized Attention Metadata Schema (CAM) o ...ing, information retrieval, database systems, digital libraries, metadata, data mining, user modelling, social networks, psychology and cognitive science,6 KB (890 words) - 22:53, 14 October 2008
- semi-structured data; data mining; knowledge discovery; schema migration; digital libraries; data warehousing9 KB (1,193 words) - 22:53, 14 October 2008
- -Visualization of data and processes in applications -Visualization of data base schemes3 KB (355 words) - 22:53, 14 October 2008
- �?� Large scale, massive data storage, access, exploration, and manipulation, for cooperative visualizati ...ent process modeling, product modeling, reference models, business models, data representations and standards.4 KB (468 words) - 22:54, 14 October 2008
- Coupling and Integrating Heterogeneous Data Sources Database Security and Transaction Support9 KB (1,240 words) - 22:56, 14 October 2008
- ...ame studies/game design, e) graphics and interfaces and f ) networking and security. Papers that fall outside these topic areas are strongly encouraged and sho ...istributed database techniques and consistency models for networked games; data management for games that cross physical and virtual worlds.9 KB (1,275 words) - 14:46, 27 December 2015
- |Title=13th Pacific-Asia Conference on Knowledge Discovery and Data Mining |Field=Data mining2 KB (295 words) - 12:03, 18 October 2008
- - Data Mining - Security and Reputation18 KB (2,457 words) - 23:04, 14 October 2008
- ...ent repeatability of their experiments, and share with the community their data and test harnesses. Topics include, but are not limited to, the following. * Management of Semantic Web Data6 KB (854 words) - 12:05, 28 May 2016
- �?� Bases de Datos, Data Warehouses y Minería de Datos �?� Networks and Data Communications13 KB (1,775 words) - 23:04, 14 October 2008
- ...search and different scientific communities, such as Software Engineering, Data Bases, Distributed Systems, Information Systems, Information Retrieval, Ser - Data mining and data analysis6 KB (827 words) - 23:04, 14 October 2008
- * Error tolerance, security and robustness * Data gathering, aggregation and dissemination2 KB (316 words) - 23:05, 14 October 2008
- * Cryptography and Network Security * Data Mining and Knownledge Discovery2 KB (167 words) - 23:05, 14 October 2008
- ...t the field of MT continues to grow and attract more and more researchers. Data-driven approaches have become particularly fashionable in recent years. The Advances in data-driven MT (Statistical MT, Example-based MT, etc.)16 KB (2,200 words) - 20:51, 18 February 2021
- | Title = The Alberto Mendelzon Workshop on Foundations of Data Management THE ALBERTO MENDELZON WORKSHOP ON FOUNDATIONS OF DATA MANAGEMENT5 KB (660 words) - 14:52, 2 March 2012
- ...providing new insights in the specification, design, or implementation of data management tools are called for. ...data; security; semantic Web; semi-structured data; spatial data; temporal data; transactions; updates; views; Web services; workflows; XML.3 KB (457 words) - 13:09, 7 December 2016
- |Title=2009 ACM SIGMOD International Conference on Management of Data 2009 ACM SIGMOD International Conference on Management of Data7 KB (851 words) - 05:29, 15 October 2008
- * Data mining/knowledge discovery. * Data warehousing.2 KB (308 words) - 23:08, 14 October 2008
- Data Privacy and Security Data Warehousing, Data Cubes, and7 KB (1,006 words) - 23:08, 14 October 2008
- | Title = 14th International Conference on Management of Data areas but also adds emphasis on Web, Information Retrieval and Data Mining.5 KB (661 words) - 16:23, 11 December 2008
- | Title = 1st Social Data on the Web workshop CfP: 1st Social Data on the Web workshop (SDoW2008)5 KB (709 words) - 23:08, 14 October 2008
- | Title = 10th ACM International Workshop on Web Information and Data Management and Data Management (WIDM 2008)3 KB (437 words) - 23:20, 14 October 2008
- | Title = The 8th IEEE International Conference on Data Mining | Field = Data mining5 KB (634 words) - 15:36, 14 December 2008
- |Title=ACM Eleventh International Workshop on Data Warehousing and OLAP ACM Eleventh International Workshop on Data Warehousing and OLAP10 KB (1,288 words) - 11:52, 18 October 2008
- ...n disciplines such as databases, artificial intelligence, semantic web, or data extraction. Also, ODBASE'08 encourages the submission of papers that examin ...stributed Applications), and IS'08 (International Symposium on Information Security).8 KB (1,081 words) - 08:21, 22 December 2011
- ...rch on information and knowledge management, as well as recent advances on data and knowledge bases. The purpose of the conference is to identify challengi * Automatic acquisition of data and knowledge bases (especially raw text)29 KB (4,077 words) - 18:04, 18 August 2023
- * Data quality, integration, warehousing and mining * Privacy and security issues3 KB (452 words) - 23:09, 14 October 2008
- | Title = 5th VLDB Workshop on Secure Data Management ...t/event.showcfp?eventid=2563&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]589 bytes (67 words) - 23:09, 14 October 2008
- - Data and Information Quality Management - Data Grids, Data and Information Quality4 KB (595 words) - 23:09, 14 October 2008
- | Title = 7th ACM International Workshop on Data Engineering for Wireless and Mobile Access as a bridge between the data management, wireless networking, and7 KB (875 words) - 23:09, 14 October 2008
- ...tructured (XML) or unstructured (textual) documents are becoming important data sources for enterprises and organizations. ...typical question is �??how to take advantage from such large volumes of data, in order to extract useful information for decision making, for discoverin7 KB (917 words) - 23:09, 14 October 2008
- * Data quality, semantics and integration * Data privacy and security6 KB (840 words) - 23:10, 14 October 2008
- ...ics, including traditional database management, as well new challenges for data management in any possible domain. Prospective authors are encouraged to co DATA WAREHOUSING AND KNOWLEDGE DISCOVERY3 KB (305 words) - 08:44, 31 July 2020
- integration of intelligence and data justifies its today's attractiveness. Since 1990 DEXA is an annual internat * Data and Information Modelling4 KB (457 words) - 16:14, 16 December 2020
- | Title = Second Workshop on Scalable Data Management, Applications and Systems Second International Workshop on Scalable Data Management Applications and Systems5 KB (644 words) - 23:10, 14 October 2008
- stronger over the years as data management research marched through many a data model, with logic keeping up and providing the foundations every step5 KB (647 words) - 23:10, 14 October 2008
- | Title = 3rd Workshop on Data Storage Devices and Systems DS2 2008, the 3rd International Workshop on Data Storage Devices and Systems, will be held at the University of Perugia, Per4 KB (539 words) - 23:10, 14 October 2008
- ...d tools for querying, retrieving, integrating, analyzing, and managing the data on the Web. ...s, results, experience, techniques and tools related to all aspects of Web data management. The conference invites original research and industrial papers10 KB (1,376 words) - 23:10, 14 October 2008
- The theme of BNCOD 2008, the 25th in the series, is "Sharing Data, Information and Knowledge". * Data integration and interoperability4 KB (593 words) - 23:10, 14 October 2008
- · Workflow description languages targeting computation, data and transaction intensive tasks · Security control in grid workflow systems7 KB (886 words) - 23:10, 14 October 2008
- Attacks against De-identified Data Data Anonymity2 KB (193 words) - 23:10, 14 October 2008
- ...y. Our belief is that XML is the main means towards this new generation of data management systems. Following the experience of previous editions of DataX * Interchange and integration of XML data3 KB (475 words) - 23:10, 14 October 2008
- ...es (and vice versa), to network monitoring systems that depend on advanced data management and analysis capabilities�?? suggests a blurring of the bounda * Data models, query models, and query languages for networking3 KB (332 words) - 23:10, 14 October 2008
- | Title = International Workshop on RFID Data Management International Workshop on RFID Data Management4 KB (471 words) - 23:10, 14 October 2008
- | Title = 3rd Int. Workshop on Dependability Aspects on Data WArehousing and Mining Applications tremendous opportunities for data sharing, integration, and analysis7 KB (908 words) - 23:10, 14 October 2008
- ...layers of middleware, e.g., for managing Grid resources, computing tasks, data, and information, form the basic framework for realising an e-Science envir * Security control in managing workflow4 KB (560 words) - 23:10, 14 October 2008
- |Title=1st Workshop on Data and Services Management in Mobile Environments ...nt techniques. Therefore, these techniques are evolving and leading to new data and services management systems that consider variable user capabilities an2 KB (324 words) - 16:49, 16 December 2020
- * Data mining and Pattern Recognition in e-learning * Security and privacy;4 KB (503 words) - 23:11, 14 October 2008
- * Architectures for Voice/Data Services * Network Data Mining3 KB (339 words) - 23:11, 14 October 2008
- 7. Security Signal Processing 1. Analog Circuits, Filters and Data Conversion4 KB (496 words) - 23:12, 14 October 2008
- 1 .9 Data Communications 5 .54 Network Security2 KB (250 words) - 23:12, 14 October 2008
- ...SIGCOMM is the flagship annual conference of the Special Interest Group on Data Communications, a special interest group of the Association for Computing M ...describing significant research contributions to the field of computer and data communication networks. We invite submissions on network architecture, desi3 KB (352 words) - 23:12, 14 October 2008
- ...est research results and to exchange new ideas and practical experience in data and computer communications, optical fiber communications, microwaves, ante ...peaceful country in a turbulent area, enjoys extreme levels of safety and security. Jordanian people are internationally known for generosity, hospitality and2 KB (260 words) - 23:13, 14 October 2008
- * Computer Networks and Security * Data Mining and Database Applications2 KB (283 words) - 23:13, 14 October 2008
- * Security * Data dissemination and Peer-to-Peer systems3 KB (413 words) - 23:13, 14 October 2008