Search results

Jump to: navigation, search
  • as it was the case of the special tracks presented in AAMAS-08 and - privacy and security
    10 KB (1,371 words) - 16:14, 12 November 2020
  • ...(AINA 2004) will be held in Fukuoka, Kyushu, Japan in March 29 - 31, 2004. It will include sessions on all aspects of theory, design and application of c * Security and Privacy
    12 KB (1,537 words) - 22:19, 10 January 2018
  • ...working and Application will be held in Xi'an, China in March 27-29, 2003. It will include sessions on all aspects of theory, design and application of c * Security and Privacy
    8 KB (1,040 words) - 22:20, 10 January 2018
  • ...ful International Conference on High Performance and Communications(HPCC). It provides a forum for engineers and scientists in academia, industry, and go * Trust, security and privacy
    19 KB (2,503 words) - 13:25, 28 October 2020
  • * Security and privacy in vehicular networks Thanks guys, I just about lost it lokoing for this.
    3 KB (378 words) - 14:22, 24 August 2016
  • ...hing ranging from real-time critical systems to networked infrastructures. It is logical techniques that link implementation and specification through fo - Foundations of security
    5 KB (799 words) - 21:49, 26 February 2020
  • ** Representing and reasoning about trust, privacy, and security ** Luciano Serafini, IT
    6 KB (854 words) - 12:05, 28 May 2016
  • ...en source toolkits such as Giza++ and Moses. This development, exciting as it is, also bears the danger of introducing uniformity into MT research. AMTA ...g. Submissions should focus on the use of MT in a business setting and how it is integrated with other technologies to support business goals.
    16 KB (2,200 words) - 20:51, 18 February 2021
  • ...languages; query optimization; real-time data; recovery; scientific data; security; semantic Web; semi-structured data; spatial data; temporal data; transacti ...lease forms. One author of each accepted paper will be expected to present it at the conference.
    3 KB (457 words) - 13:09, 7 December 2016
  • ...erence in the series, will be held in Turin, Italy, during September 2008. It will continue to advanced applications and issues related to these areas. It will offer the opportunity to extensively discuss requirements,
    4 KB (457 words) - 16:14, 16 December 2020
  • ...throughout the conference. The history of NEW2AN dates back to 1993, today it is an established conference featured by proceedings published by Springer * Network Security
    5 KB (598 words) - 10:18, 29 May 2016
  • ...volvement of industry and academy. Industry involvement is essential since it poses practical and challenging problems for academic researchers. Therefor * Performance, dependability and security evaluation using analytical models, simulation or empirical approaches
    5 KB (660 words) - 16:46, 27 December 2015
  • as well as to help shape the future of IT-transformed + Security, Privacy and Open Source TRACK
    5 KB (594 words) - 16:29, 25 March 2020
  • | Title = The Second IEEE International Workshop on Security in Software Engineering | Field = Computer security and reliability
    5 KB (615 words) - 09:55, 29 May 2016
  • Since the inaugural ICITA successfully held in Australia five years ago, it has been running four times the event in difference countries. Conference l ...as well as on multi-disciplinary studies. The uniqueness of ICITA is that it crosses narrowly defined subject areas and gathers researchers from not onl
    3 KB (427 words) - 17:01, 29 May 2016
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • ...o present their latest research findings in these rapidly changing fields. It * Security and availability issues for current/future computer systems
    3 KB (406 words) - 17:39, 30 September 2016
  • Security and privacy ...hnical call for papers. While the poster need not describe completed work, it should report on research for which at least preliminary results are availa
    6 KB (771 words) - 16:09, 16 September 2019
  • - Checking or improving the safety, security, or correctness of programs ...ng to the ACM proceedings format. These 10 pages include everything (i.e., it is the total length of the paper). The program chair will reject papers tha
    5 KB (667 words) - 14:18, 25 November 2016
  • * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main
    5 KB (656 words) - 11:29, 27 August 2020
  • * Security ...ng to the ACM proceedings format. These 10 pages include everything (i.e., it is the total length of the paper). The program chair will reject papers tha
    5 KB (678 words) - 20:58, 26 November 2016
  • it several times. Please, pass the information to whom it may benefit. Thank * foundations of security
    6 KB (682 words) - 10:18, 14 April 2020
  • - security in distributed computing, cryptographic protocols ...he paper. The program committee may decline to make the award or may split it.
    6 KB (766 words) - 13:19, 28 November 2016
  • * Linkage between IT services and business services; * Web services security and privacy;
    3 KB (356 words) - 15:56, 15 February 2017
  • ...r computing; Grid computing; Pervasive and mobile computing architectures; Security in networks and distributed systems Be aware that you won't be able to delete or modify your paper once it is uploaded. Nobody but authorized members of the organisation board will b
    4 KB (490 words) - 17:05, 27 December 2015
  • |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)
    6 KB (793 words) - 15:12, 1 October 2020
  • ...uman networking with the use of wearable and implantable wireless sensors. It encompasses wireless body area network, wireless sensor network, and wirele o Security and privacy issues of UWB-based body-centric networking for personal health
    5 KB (664 words) - 17:20, 5 July 2020
  • construction of high quality computational systems. It is now a - Models of concurrency, security and mobility;
    7 KB (1,094 words) - 11:42, 29 September 2016
  • ...ns about all aspects of parallel and distributed computing and networking. It will feature session presentations, workshops, tutorials and keynote speech · Reliability, fault-tolerance, and security
    8 KB (1,050 words) - 18:04, 5 January 2017
  • ...round seems necessary for sensor networks to achieve their full potential. It is a challenge for abstract modeling, algorithmic design and analysis to ac * Cryptography, Security and trust
    6 KB (750 words) - 16:50, 27 December 2015
  • * Business, IT People and System Responsibilities * IT Governance
    4 KB (571 words) - 12:58, 9 March 2020
  • ...t has become a key concern both from a social and political point of view. It is critical to provide rescue personnel with information technology tools t * Security issues in agent-based systems for search and rescue missions, use of games,
    6 KB (783 words) - 17:04, 27 December 2015
  • * Network Security Submission of papers to COMSNETS 2010 carries with it the implied agreement that one or more of the listed authors will attend th
    7 KB (1,054 words) - 16:43, 27 December 2015
  • ...ssion instructions for details. A poster need not describe completed work; it should report on research for which at least preliminary results are availa - Security
    8 KB (1,119 words) - 09:57, 27 February 2020
  • RTSEC: Security for Internet-based real-time systems ...tecting emergency communications from misuse and exploitation; Maintaining security in the face of disaster; Intrusion prevention and detection systems; Secure
    14 KB (1,651 words) - 15:56, 15 February 2017
  • - Business-IT Alignment - Security and Privacy
    3 KB (392 words) - 13:50, 30 April 2020
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (429 words) - 08:55, 1 August 2019
  • |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    9 KB (1,092 words) - 09:35, 1 August 2019
  • ...nformation, IS effectiveness requires going beyond the syntactic nature of IT and delve into the human functions involved in the semantic, pragmatic and * Information security
    3 KB (380 words) - 15:10, 1 October 2020
  • |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress
    2 KB (217 words) - 16:50, 19 November 2020
  • * Theory of Security in Networks According to the ICALP policy, for every accepted paper it is required that at least one author attends the meeting and delivers the t
    4 KB (602 words) - 06:44, 26 August 2020
  • * IT governance * Privacy, security, trust, and safety management
    3 KB (395 words) - 15:14, 24 September 2020
  • ...nym=CALL FOR PAPER Journal: International Journal of Computer Science and Security (IJCSS) |Title=International Journal of Computer Science and Security (IJCSS)
    2 KB (298 words) - 16:47, 5 July 2020
  • |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)
    5 KB (609 words) - 17:01, 5 July 2020
  • ...ance the state-of-the-art and practical applications of computer networks. It provides a publication vehicle for complete coverage of all topics of inter • Network Security and Privacy • Network Services and Applications
    3 KB (318 words) - 16:46, 5 July 2020
  • |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability
    2 KB (217 words) - 16:57, 27 December 2015
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev
    3 KB (462 words) - 11:51, 22 March 2020
  • − Information Security and Applied Cryptography. ...ferences. The paper should not exceed twelve pages and should be edited so it can be properly printed on letter size paper.
    3 KB (367 words) - 16:37, 27 December 2015
  • ...ivilization that can resolve the conflict of civilizations, and how should it be discussed? 4-1-2. Is it possible to envisage the evolution or development of ethics?
    10 KB (1,552 words) - 17:04, 24 February 2016
  • ...range of audiences over large numbers of geographically dispersed people. It is evident that the satellite will play a complementary, but essential, rol - Security related issues of satellite communications
    9 KB (1,218 words) - 16:06, 1 October 2020
  • indexes so that it can be assessed easily. Revised and expanded version of the The 2012 International Conference of Information Security and Internet Engineering
    7 KB (909 words) - 16:30, 10 September 2020
  • ...ple. It is time to ask: can the Web be reimagined for the public good? Can it be made more human-centric, and if so, how? ...rity & Trust: Safeguarding and governance of the Web and/or AI; anonymity, security and trust for Web access; false news; data for the public good; and crime o
    6 KB (910 words) - 12:04, 31 January 2020
  • *Models to Support IT Management *Cyber Security and Privacy
    5 KB (663 words) - 11:49, 18 February 2020
  • * Trust, Data Privacy, and Security with Semantic Technologies ...ces. Each submission will be reviewed by several PC members who will judge it based on its innovativeness, appropriateness, and impact of results in term
    6 KB (872 words) - 14:00, 22 February 2020
  • • Information and data governance, information assurance, security, compliance • Role of mutual impact of society on/by IT (with focus on ontologies and databases)
    6 KB (872 words) - 23:11, 24 February 2020
  • ...st is a metropolitan region south of Brisbane on Australia’s east coast. It's famed for its long sandy beaches, surfing spots and elaborate system of i * Trust, privacy, and security on the Semantic Web
    5 KB (663 words) - 14:34, 5 December 2018
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • indexes so that it can be assessed easily. Revised and expanded version of the The 2013 International Conference of Information Security and Internet Engineering
    7 KB (903 words) - 16:27, 10 September 2020
  • |Field=Enterprise Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...are "Enterprise Software Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".
    6 KB (801 words) - 11:04, 14 April 2020
  • |Homepage=https://www.caise19.it/ ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness.
    3 KB (375 words) - 15:06, 24 September 2020
  • ...nformation, IS effectiveness requires going beyond the syntactic nature of IT and delve into the human functions involved in the semantic, pragmatic and Information security
    3 KB (441 words) - 14:52, 1 October 2020
  • ...huyLoi University and held from 07 to 09 November 2016 in Ha Noi, Vietnam. It continues to offer an opportunity for researchers and innovators to discuss ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.
    3 KB (422 words) - 12:09, 24 April 2016
  • * Semantics for IT Safety & Security * Safety & Security
    10 KB (1,347 words) - 15:01, 26 September 2016
  • * Trust, security, and privacy ...research approach and results during the poster session of the conference. It is great for discussing your research in free form with all attendants of t
    6 KB (898 words) - 14:42, 24 September 2016
  • ...posal, its appeal to a viable fraction of the Web community as well as how it fits in with the conference. Topics of interest include, but are not restri * Web Security and Trust Management
    2 KB (230 words) - 00:37, 28 May 2016
  • * Information and data governance, information assurance, security, compliance * Role of mutual impact of society on/by IT (with focus on ontologies and databases)
    6 KB (877 words) - 23:06, 24 February 2020
  • |Field=information security, hacking, it security
    386 bytes (48 words) - 16:18, 8 July 2016
  • ...rnational Conference on Semantic Technology for Intelligence, Defense, and Security ...chnology and ontology relevant to the fields of Intelligence, Defense, and Security. We are especially interested in papers on the following topics:
    4 KB (506 words) - 11:39, 8 October 2020
  • knowledge management and databases. Since 1992, it has successfully brought - Security and Privacy
    12 KB (1,565 words) - 04:15, 5 August 2023
  • - Security and Data Protection ...t your research paper at http://worldconedu.org/paper-submission/ or email it to papers-2016@worldconedu.org
    6 KB (777 words) - 23:29, 29 July 2016
  • Modern society is a networked society permeated by information technology (IT), which defines ECIS 2015's Conference Theme. Networks - perceived as a gro * Methods, Tools and Human Factors in IS/IT Management
    3 KB (434 words) - 10:28, 26 July 2016
  • * IT Implementation, Adoption and Use * Security and Privacy of Information and IS
    2 KB (263 words) - 10:32, 26 July 2016
  • ...Computing based on Semantics (“meaning”, "context", “intention”). It addresses all types of resources including data, document, tool, device, pr Use of Semantics in IT Applications
    5 KB (580 words) - 20:22, 28 January 2017
  • ...ablished itself as the world's premier research conference in data mining. It provides an international forum for presentation of original research resul - Security, privacy and social impact of data mining
    3 KB (407 words) - 10:17, 27 July 2016
  • - Internet security - Globalisation and developmental IT
    5 KB (641 words) - 22:32, 29 July 2016
  • ...brating the achievements of artificial intelligence research and practice. It is a highly referenced conference that will provide authors with useful cri ...pers on AI techniques in the context of novel application domains, such as security, sustainability, health care, transportation, and commerce. A special theme
    10 KB (1,466 words) - 15:17, 7 March 2021
  • * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main
    4 KB (528 words) - 11:25, 26 June 2020
  • * reasoning about security and privacy ...t detail to allow the program committee to assess the merits of the paper. It should begin with a succinct statement of the issues, a summary of the main
    4 KB (490 words) - 11:42, 26 June 2020
  • ...ry, it grew as well renowned event of the scientific community. Every year it joins international researchers for scientific discussions on the developme * security and privacy
    9 KB (1,190 words) - 10:12, 5 June 2019
  • ...tors, practitioners, researchers and scientists in the development arenas. It aims to provide discussions and simulations in the communication technology Communication Security, Trust, Protocols and Applications
    5 KB (588 words) - 18:00, 21 January 2017
  • - Smart city IT connectivity management - Smart city system security and privacy
    4 KB (565 words) - 09:46, 7 February 2017
  • Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin ...(seventh edition) will be held at Luton, UK during August 16-18, 2017 and it offers the opportunity for institutes, research centers, engineers, scienti
    5 KB (631 words) - 15:09, 10 April 2017
  • * Trust, security, and privacy ...research approach and results during the poster session of the conference. It is great for discussing your research in free form with all attendants of t
    7 KB (988 words) - 09:50, 14 August 2019
  • ...ry, it grew as well renowned event of the scientific community. Every year it joins international researchers for scientific discussions on the developme *security and privacy
    10 KB (1,309 words) - 10:29, 5 June 2019
  • ...S is a series of peer-reviewed International Computer Science conferences. It is a forum for researchers and practitioners to present their state-of-the- *Web Security, Integrity, Privacy, and Trust
    18 KB (2,394 words) - 16:28, 29 January 2018
  • * IT policy and business management * Security and Information Assurance
    10 KB (1,396 words) - 13:30, 28 July 2017
  • ...Kumar Das, Calcutta Institute of Engineering and Management, IndiaBai Li, IT Technical Analyst, AustraliaBhupendra Gupta, Indian Institute of Informatio
    3 KB (403 words) - 09:15, 12 July 2017
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • * IT policy and business management * Security and Information Assurance
    5 KB (679 words) - 13:28, 28 July 2017
  • *Semantics for Safety, Security & Privacy *Semantics for IT Safety & Security
    6 KB (759 words) - 15:52, 5 December 2018
  • IT-driven collaborations. The conference is nevertheless not about the union o Emerging Enterprise Technologies are profoundly changing the way we think of IT
    7 KB (1,009 words) - 13:39, 3 September 2017
  • Research, Development, and Application. And it will be held in Shanghai, China, Security Applications of Big Data
    3 KB (461 words) - 13:22, 3 September 2017
  • |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)
    4 KB (562 words) - 12:05, 3 September 2017
  • * Security and Information Assurance & IT) [http://airccse.org/cscp.html] series (Confirmed).
    5 KB (651 words) - 11:34, 8 August 2017
  • * Internet, Web and Security Visualization ...cientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, auth
    5 KB (615 words) - 10:58, 15 May 2020
  • It is one of the leading international conferences for presenting novel and Network and Data Security
    5 KB (673 words) - 09:53, 3 September 2017
  • - Security and privacy, cryptographic protocols in a journal or conference with published proceedings. It should not be
    7 KB (1,009 words) - 15:54, 3 September 2019
  • presentation of recent original work and it is an opportunity for students and Databases; Security and Cryptography; Operating Systems; Networks, Distributed
    3 KB (438 words) - 11:45, 8 August 2017

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)