Search results
Create the page "Security systems" on this wiki! See also the search results found.
Page title matches
- * Privacy concerns in Ubiquitous Computing Systems * Trust concerns in Ubiquitous Computing Systems2 KB (205 words) - 05:10, 23 September 2009
- 26 bytes (2 words) - 11:46, 8 August 2017
- 25 bytes (2 words) - 12:30, 3 September 2017
- 24 bytes (2 words) - 11:59, 3 September 2017
- 25 bytes (2 words) - 10:51, 3 September 2017
- 26 bytes (3 words) - 21:04, 29 October 2020
Page text matches
- Service Oriented Systems were born with the aim of building large adaptive applications as compositi ...ting with classic Web Services. Finally, features like Quality of Service, security and dependability need to be taken seriously into account, and this investi7 KB (957 words) - 15:15, 11 August 2008
- |Title=The 10th International Conference on Mobile Data Mangement (MDM'09): Systems, Services and Middleware scope to cover research issues in mobile systems, services and middleware.13 KB (1,468 words) - 01:23, 22 August 2008
- | Title=The 3rd KES International Symposium on Agents and Multi-agent Systems - Technologies and applications (KES-AMSTA-09) ...fic research in the technologies and applications of agent and multi-agent systems.6 KB (777 words) - 22:54, 14 August 2008
- ====Computer security and reliability==== ==== Information systems (Business informatics) ====6 KB (714 words) - 12:19, 11 December 2020
- *Network Security *Communication Systems and Networks5 KB (571 words) - 09:22, 19 July 2019
- * Mobile/Wireless computing systems and services in pervasive computing * Programming paradigms for pervasive systems12 KB (1,560 words) - 15:03, 27 August 2008
- ...011 International Conference of Computational Intelligence and Intelligent Systems The 2011 International Conference of Information Security and Internet Engineering3 KB (454 words) - 12:34, 8 October 2020
- systems, biomedical informatics, virtual digital libraries, and * Data Streams and Publish-Subscribe Systems9 KB (1,189 words) - 14:53, 28 August 2008
- ...m for the communication of research advances on the principles of database systems. This year, for the first time, ICDT will be held jointly with [[EDBT 2009] ...uctive databases and knowledge bases; Distributed databases; Integrity and security; Logic and databases; Multimedia databases; Query optimization; Query proce5 KB (753 words) - 18:59, 25 June 2012
- system of systems, etc. inter-operability, security, trusted and dependable systems, fault5 KB (715 words) - 17:43, 11 September 2008
- |Title=International Conference on Autonomous Agents and Multi-Agent Systems |Field=Multi-Agent Systems10 KB (1,371 words) - 16:14, 12 November 2020
- Software Systems The Verisoft Approach to Systems Verification5 KB (686 words) - 12:27, 12 September 2008
- ...cial issues of a high quality international journal and also in Journal of Security and Communication Networks published by John Wiley & Sons. * Security in Wireless and Pervasive systems5 KB (645 words) - 18:19, 15 September 2008
- ...d applications, and interactions of these applications with other types of systems. Management aspects related to these applications and challenges on special ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d18 KB (2,408 words) - 02:37, 16 December 2008
- |Title=8th International Conference on Information Systems Technology |Field=Information systems7 KB (763 words) - 12:25, 6 October 2011
- ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...Spatial databases; Time-series databases; RDF stores; Hybrid DB management systems11 KB (1,371 words) - 12:28, 18 May 2020
- ...emedicine, bioinformatics, finance and marketing, geographical positioning systems put pressure on database communities to push the ‘de facto’ methods to ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.)11 KB (1,446 words) - 18:26, 13 October 2008
- |Title=The 5th International Conference on Open Source Systems (F/OSS 2009) ** Testing, assuring and certifying F/OSS quality and security10 KB (1,349 words) - 16:42, 24 September 2008
- Software Security Agent-Based Software Systems2 KB (293 words) - 10:35, 24 June 2011
- ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust34 KB (4,565 words) - 22:20, 10 January 2018
- ...eory,design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust8 KB (1,037 words) - 22:20, 10 January 2018
- ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust9 KB (1,189 words) - 22:20, 10 January 2018
- systems. Aside from the regular presentations, the conference will include * Security, Privacy and Trust26 KB (3,456 words) - 22:20, 10 January 2018
- ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Fault-tolerant Distributed Systems10 KB (1,263 words) - 22:20, 10 January 2018
- ...ory, design and application of computer networks and distributed computing systems. Aside the regular presentation, the AINA meeting will include keynote addr * Fault-tolerant Distributed Systems12 KB (1,537 words) - 22:19, 10 January 2018
- ...design and application of communication networks and distributed computing systems. Aside from the regular presentation, the AINA meeting will include keynote * Security and Privacy8 KB (1,040 words) - 22:20, 10 January 2018
- | Title = Israeli Experimental Systems Conference | Field = Operating systems5 KB (777 words) - 05:50, 14 October 2008
- - Networking services for pervasive systems - Third and fourth generation systems4 KB (495 words) - 09:22, 22 August 2023
- • Cluster Architecture and Hardware Systems ◦ Parallel File Systems and I/O Libraries4 KB (452 words) - 17:47, 7 April 2021
- | Field = Embedded systems The first international conference on Sensor Systems and Software4 KB (519 words) - 16:13, 14 October 2008
- - Bring Safe, Self-x and Organic Computing Systems into Reality - ...omic Computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-he9 KB (1,216 words) - 17:32, 14 October 2008
- ...multimedia databases, digital and video libraries, compression and coding, security over the network. ...sing and environment control, video surveillance and intelligent transport systems, visual inspection and quality control, underwater robots.2 KB (268 words) - 17:47, 14 October 2008
- IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009) IEEE Workshop on Computational Intelligence in Vehicles and Vehicular Systems (CIVVS 2009)3 KB (376 words) - 17:47, 14 October 2008
- ...he way to innovative solutions for next generation wireless communications systems. o Security aspects in cross-layer designs3 KB (424 words) - 17:47, 14 October 2008
- ...e just entering the era of persuasive technology, of interactive computing systems designed to change people's attitudes and behaviors. Persuasive 2009 builds * Security and privacy8 KB (989 words) - 20:13, 22 February 2009
- | Title = The seventh ACS/IEEE International Conference on Computer Systems and Applications The seventh ACS/IEEE International Conference on Computer Systems4 KB (503 words) - 11:36, 18 October 2008
- | Field = Operating systems The WIOSC focuses on new and innovative concepts in the field of operating systems. The workshop welcomes contributions on general approaches and concepts, ne4 KB (508 words) - 21:48, 14 October 2008
- ...chnologies and radically new solutions relevant to development of computer systems and aims to foster communication among scientists and engineers to achieve ...eory, methodologies, technologies, and implementation of advanced computer systems and focusing on computing paradigms, computational models, application para4 KB (591 words) - 17:48, 14 October 2008
- ...of RFID technologies, their supporting large-scale distributed information systems and their applications. ...ed to the theory and practice of RF-based identification and communication systems. All submissions must describe original work not previously published or cu3 KB (431 words) - 17:48, 14 October 2008
- ...and academics interested in the latest development and design of wireless systems and networks. Sponsored by the IEEE Communications Society, IEEE WCNC has a • Machine learning for communication systems6 KB (731 words) - 10:33, 14 August 2023
- | Title = The Sixth IEEE International Symposium on Wireless Communication Systems 2009 ...sixth symposium, intends to bring together various wireless communication systems developers to discuss the current status, technical challenges, standards,3 KB (456 words) - 18:10, 14 October 2008
- ...ence series serves as the premier international forum addressing networks, systems, algorithms, and * Design, implementation, and evaluation of mobile systems and applications7 KB (974 words) - 12:28, 3 August 2023
- * Trust, reputation, security, and privacy in MBC Dickson K.W. Chiu, Dickson Computer Systems, HK, China5 KB (647 words) - 22:05, 14 October 2008
- ...e plays an important role in the scientific study at large and a number of systems have already furnished limited related functionalities, provenance has only ...ware engineering, workflow system, information retrieval, web service, and security research. At the same time, it also requires understanding of problems from3 KB (416 words) - 17:48, 14 October 2008
- * formal models of norms, normative systems, norm-governed societies * Intelligent legal tutoring systems7 KB (998 words) - 17:48, 14 October 2008
- | Title = The 6th IEEE International Conference on Embedded Software and Systems | Field = Embedded systems3 KB (375 words) - 17:48, 14 October 2008
- ...deployment of large-scale and high-performance FPGA-based applications and systems - e.g. DSP, networking or embedded system tools and methodologies. ...mpiled accelerators, reconfigurable computing, adaptive computing devices, systems and software, rapid-prototyping.4 KB (561 words) - 17:48, 14 October 2008
- ...Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability7 KB (960 words) - 17:48, 14 October 2008
- International Conference on Hybrid Systems: ...heory, as well as two additional areas of special emphasis: cyber-physical systems and embedded applications, benchmarks and tools.8 KB (939 words) - 17:48, 14 October 2008
- ...decade has witnessed a proliferation of powerful parallel and distributed systems and an ever increasing demand for practice of high performance computing an * Embedded systems19 KB (2,503 words) - 13:25, 28 October 2020
- * Security and privacy in vehicular networks * Experimental systems for vehicular networks3 KB (378 words) - 14:22, 24 August 2016
- landscape because it will enable new breeds of applications and systems to systems.7 KB (942 words) - 20:05, 14 October 2008
- * Testing of object-oriented systems * Distributed and concurrent object systems3 KB (328 words) - 20:05, 14 October 2008
- | Title = The 3rd International Symposium on Security and Multimodality in Pervasive Environments ...er hand, while enlarging and easing the ways to access to the environment, security threads arise and the environment must be properly equipped in order to pro3 KB (393 words) - 21:18, 14 October 2008
- | Field = Computer security and reliability ...nd test and stress equipment are on hand to demonstrate their products and systems to individuals and small groups. Attendees are encouraged to bring samples3 KB (467 words) - 21:39, 16 October 2008
- | Title = 3rd International Workshop on Scalable Stream Processing Systems 3rd International Workshop on Scalable Stream Processing Systems (SSPS 2009)3 KB (490 words) - 20:05, 14 October 2008
- + Security and information assurance Abstract: Database Management Systems form the core of the information7 KB (907 words) - 21:51, 14 October 2008
- # Semantics in P2P systems and grids # Semantic Web Trust, Privacy, Security and Intellectual Property Rights4 KB (450 words) - 20:05, 14 October 2008
- • Security, Survivability and Fault Tolerance ...rs and practitioners in the field of sensor, mesh, and ad hoc networks and systems. IEEE SECON grew out of the2 KB (244 words) - 20:05, 14 October 2008
- WINSYS is organized by INSTICC – Institute for Systems and Technologies of Information, Control and Communication ...ogether researchers, engineers and practitioners interested on information systems and applications in the context of wireless networks and mobile technologie9 KB (1,219 words) - 20:05, 14 October 2008
- ...urity and privacy challenges faced by the current and future collaborative systems and infrastructures. ...ns/experiences related to security and privacy solutions for collaborative systems. Topics of interest include, but are not limited to:4 KB (520 words) - 20:05, 14 October 2008
- | Title = 9th International Conference on New Technologies of Distributed Systems ...cits submissions on all topics related to New technologies and distributed systems, including but not limited to the following :2 KB (208 words) - 20:05, 14 October 2008
- • Ad-Hoc Wireless Networks, Adaptive Antenna Systems • Communciations Systems Software5 KB (530 words) - 10:27, 24 June 2011
- Expert Systems Information Systems3 KB (332 words) - 20:06, 14 October 2008
- |Field=Computer security and reliability ...communication and information systems. Moreover, there are other dedicated systems for data mining, recommenders, sensing, conflict detection, intrusion detec15 KB (2,175 words) - 21:03, 19 March 2013
- Home Gateway, DTV, Home Theater, PVR, Interconnects, Game Systems, Interactive and Directed Programming, Internet Integration, Next-Generatio Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability3 KB (354 words) - 20:06, 14 October 2008
- ...ital Services in eESociety, eGovernment /eGovernance, eHealth, Information Systems, and Information Management. These broad areas are divided into more detai - Delivery Systems and Environments6 KB (780 words) - 20:06, 14 October 2008
- ...= Fourth International Conference on Intelligent Computing and Information Systems ...tificial and computational intelligence as well as intelligent information systems.2 KB (193 words) - 20:06, 14 October 2008
- Adaptive Systems Agent-Based Systems3 KB (359 words) - 20:06, 14 October 2008
- | Title = The 29th Int'l Conference on Distributed Computing Systems (ICDCS 2009) o Distributed Operating Systems and Middleware2 KB (303 words) - 20:06, 14 October 2008
- |Title=3rd International Conference on Distributed Event-Based Systems ...sage-oriented middleware. The various communities dealing with event based systems have made progress in different aspects of the problem. The DEBS conference6 KB (829 words) - 15:30, 29 January 2021
- | Title = Sixth International Conference on Wireless On-demand Network Systems and Services On-demand Network Systems and Services6 KB (686 words) - 20:06, 14 October 2008
- | Title = IEEE International Conference on Systems, Man and Cybernetics 2009 IEEE International Conference on Systems, Man& Cybernetics6 KB (708 words) - 22:49, 14 October 2008
- ...and demanding settings, like manufacturing, healthcare, security, control systems, etc. ...ystems, production systems, decision support systems, knowledge management systems, etc.2 KB (261 words) - 22:45, 14 October 2008
- ...vasive healthcare seeks to respond to a variety of pressures on healthcare systems, including the increased incidence of life-style related and chronic diseas * Security and privacy in pervasive healthcare6 KB (732 words) - 22:45, 14 October 2008
- ...ectronic collaboration requires advancements in networking, technology and systems, user interfaces and interaction paradigms, and interoperation with applica ...oners, and students interested in collaborative networking, technology and systems, and applications.6 KB (674 words) - 22:45, 14 October 2008
- Data about the activities of user across systems and applications and within a multitude of contexts are an enabler for acce ...iven computing, context-driven computing, information retrieval, database systems, digital libraries, metadata, data mining, user modelling, social networks,6 KB (890 words) - 22:53, 14 October 2008
- | Title = VIII Brazilian Symposium on Human Factors in Computing Systems The Brazilian Symposium of Human Factors on Computer Systems (IHC) is the main forum of the Brazilian Human-Computer Interaction (HCI) c3 KB (502 words) - 22:53, 14 October 2008
- Theme: Computing for Next Generation Systems software development; COTS-based systems; requirements elicitation9 KB (1,193 words) - 22:53, 14 October 2008
- ...ktop interfaces, 3D virtual world environments, and multiple user embedded systems. ...machine interfaces, frameworks, reference models, architectures, tools and systems for CE4 KB (468 words) - 22:54, 14 October 2008
- | Title = Conference on Enterprise Information Systems | Field = Information systems9 KB (1,240 words) - 22:56, 14 October 2008
- ...ntific discovery, data visualization, causal induction and knowledge-based systems. B10. Security and Intrusion Detection2 KB (295 words) - 12:03, 18 October 2008
- ...ter presentations (25, 26, 27th Nov) and demonstrations of neuro-computing systems (26th Nov), followed by workshops. One Workshop on Perception and Control o ...ontrol, Arts and Design; Adaptive integrated/embedded systems; Agent based systems.5 KB (699 words) - 23:04, 14 October 2008
- | Title = Workshop on Logics for Intelligent Agents and Multi-Agent Systems Workshop on Logics for Intelligent Agents and Multi-Agent Systems (WLIAMAS 2008)5 KB (670 words) - 23:04, 14 October 2008
- CAART is organized by INSTICC (Institute for Systems and Technologies of Information, Control and Communication), with technical ...of Computational Intelligence and many other areas related to intelligent systems, on the other hand.18 KB (2,457 words) - 23:04, 14 October 2008
- ...ential specification language for anything ranging from real-time critical systems to networked infrastructures. It is logical techniques that link implementa - Foundations of security5 KB (799 words) - 21:49, 26 February 2020
- ...ases, social networks, distributed computing, web engineering, information systems, natural language processing, soft computing, and human-computer interactio ** Representing and reasoning about trust, privacy, and security6 KB (854 words) - 12:05, 28 May 2016
- �?� Artificial Intelligence and Intelligent Systems �?� Systems Modelling and Optimization13 KB (1,775 words) - 23:04, 14 October 2008
- | Title = International Conference on Artificial Intelligence: Methodology, Systems, Applications Artificial Intelligence: Methodology, Systems, Applications6 KB (827 words) - 23:04, 14 October 2008
- | Title = Sixth International Workshop on Intelligent Solutions in Embedded Systems | Field = Embedded systems2 KB (316 words) - 23:05, 14 October 2008
- ...ational Workshop on Computational Intelligence in Security for Information Systems568 bytes (62 words) - 23:05, 14 October 2008
- * Communication Systems and Networks * Cryptography and Network Security2 KB (167 words) - 23:05, 14 October 2008
- ...amalgamate ongoing research in distributed systems and complex multi-agent systems with the aim of strengthening the synergy between the two fields. * Security, Trust and Privacy4 KB (536 words) - 17:55, 10 February 2021
- |Title=International Conference on Autonomous Agents and Multi-Agent Systems - case studies and implemented systems2 KB (334 words) - 17:14, 12 November 2020
- * models of concurrency, security, and mobility * real-time, embedded and hybrid systems8 KB (1,085 words) - 18:01, 12 February 2009
- ...first-rate research that defines the cutting edge of future translations systems; case studies on practical uses of current translation systems in government and industry;16 KB (2,200 words) - 20:51, 18 February 2021
- languages; Cellular automata and systems; Combinatorial, analysis, foundations of hybrid and real-time systems; lambda5 KB (698 words) - 23:08, 14 October 2008
- |Title=ACM Symposium on Principles of Database Systems |Field=Database Systems3 KB (457 words) - 13:09, 7 December 2016
- * Energy-aware ICT infrastructure, e.g., energy aware systems and networking * Network and IT security issues in developing countries9 KB (1,127 words) - 17:19, 26 April 2011
- - Other aspects of modern information systems such as security, privacy,7 KB (851 words) - 05:29, 15 October 2008