Search results

Jump to: navigation, search

Page title matches

  • ...the most recent results in the development of system aspects of ubiquitous computing. Researchers and practitioners working in this area are expected to take th * Privacy concerns in Ubiquitous Computing Systems
    2 KB (205 words) - 05:10, 23 September 2009

Page text matches

  • |Title=The 10th International Conference on Mobile Data Mangement (MDM'09): Systems, Services and Middleware positioning technology has become mature and available. A global, pervasive computing
    13 KB (1,468 words) - 01:23, 22 August 2008
  • | Title=The 3rd KES International Symposium on Agents and Multi-agent Systems - Technologies and applications (KES-AMSTA-09) ...fic research in the technologies and applications of agent and multi-agent systems.
    6 KB (777 words) - 22:54, 14 August 2008
  • |Title=7th International Conference on Network and Computing Technologies 7th International Conference on Network and Computing Technologies (ICNCT 2019), will be held in Nagoya Institute of Technology,
    5 KB (571 words) - 09:22, 19 July 2019
  • |Title=Seventh IEEE International Conference on Pervasive Computing and Communications areas of pervasive computing and communications, which aim at providing a
    12 KB (1,560 words) - 15:03, 27 August 2008
  • systems, biomedical informatics, virtual digital libraries, and pervasive and ubiquitous computing, and trust management are just a
    9 KB (1,189 words) - 14:53, 28 August 2008
  • ...d applications, and interactions of these applications with other types of systems. Management aspects related to these applications and challenges on special ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d
    18 KB (2,408 words) - 02:37, 16 December 2008
  • ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust
    34 KB (4,565 words) - 22:20, 10 January 2018
  • ...eory,design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust
    8 KB (1,037 words) - 22:20, 10 January 2018
  • ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust
    9 KB (1,189 words) - 22:20, 10 January 2018
  • design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include
    26 KB (3,456 words) - 22:20, 10 January 2018
  • ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Fault-tolerant Distributed Systems
    10 KB (1,263 words) - 22:20, 10 January 2018
  • ...ory, design and application of computer networks and distributed computing systems. Aside the regular presentation, the AINA meeting will include keynote addr * Fault-tolerant Distributed Systems
    12 KB (1,537 words) - 22:19, 10 January 2018
  • | Title = The 6th International Conference on Autonomic and Trusted Computing The 6th International Conference on Autonomic and Trusted Computing (ATC-09)
    9 KB (1,216 words) - 17:32, 14 October 2008
  • ...e just entering the era of persuasive technology, of interactive computing systems designed to change people's attitudes and behaviors. Persuasive 2009 builds ===Mobile & Ubiquitous Persuasion===
    8 KB (989 words) - 20:13, 22 February 2009
  • | Title = The 6th IEEE International Conference on Embedded Software and Systems | Field = Embedded systems
    3 KB (375 words) - 17:48, 14 October 2008
  • | Title = The 11th IEEE International Conference on High Performance Computing and Communications ...computing and communications (HPCC). HPCC has moved into the mainstream of computing and has become a key technology in determining future research and developm
    19 KB (2,503 words) - 13:25, 28 October 2020
  • | Title = The 6th International Conference on Ubiquitous Intelligence and Computing The 6th International Conference on Ubiquitous Intelligence and Computing
    7 KB (942 words) - 20:05, 14 October 2008
  • | Title = 9th International Conference on New Technologies of Distributed Systems | Field = Distributed computing
    2 KB (208 words) - 20:05, 14 October 2008
  • ...ital Services in eESociety, eGovernment /eGovernance, eHealth, Information Systems, and Information Management. These broad areas are divided into more detai - Delivery Systems and Environments
    6 KB (780 words) - 20:06, 14 October 2008
  • ...= Fourth International Conference on Intelligent Computing and Information Systems ...tificial and computational intelligence as well as intelligent information systems.
    2 KB (193 words) - 20:06, 14 October 2008
  • |Title=3rd International Conference on Distributed Event-Based Systems |Field=Distributed computing
    6 KB (829 words) - 15:30, 29 January 2021
  • | Title = Sixth International Conference on Wireless On-demand Network Systems and Services On-demand Network Systems and Services
    6 KB (686 words) - 20:06, 14 October 2008
  • | Title = 3rd International Conference on Pervasive Computing Technologies for Healthcare ...vasive healthcare seeks to respond to a variety of pressures on healthcare systems, including the increased incidence of life-style related and chronic diseas
    6 KB (732 words) - 22:45, 14 October 2008
  • | Title = 4th International Conference on Collaborative Computing The 4th International Conference on Collaborative Computing:
    6 KB (674 words) - 22:45, 14 October 2008
  • ...cations, search engines, online shops, audio and video players, mobile and ubiquitous computers; all of these applications forming some type of sensor for user a ...iven computing, context-driven computing, information retrieval, database systems, digital libraries, metadata, data mining, user modelling, social networks,
    6 KB (890 words) - 22:53, 14 October 2008
  • | Title = VIII Brazilian Symposium on Human Factors in Computing Systems The Brazilian Symposium of Human Factors on Computer Systems (IHC) is the main forum of the Brazilian Human-Computer Interaction (HCI) c
    3 KB (502 words) - 22:53, 14 October 2008
  • ...-based services in a global computing environment. Services in AmI will be ubiquitous in that there will be no specific bearer or provider but, instead, they wil ...amalgamate ongoing research in distributed systems and complex multi-agent systems with the aim of strengthening the synergy between the two fields.
    4 KB (536 words) - 17:55, 10 February 2021
  • ...housing, data visualization, knowledge-based systems, and high performance computing. By promoting novel, high quality research findings, and innovative solutio ...inclusion, in expanded and revised form, in the Knowledge and Information Systems journal published by Springer-Verlag.
    5 KB (634 words) - 15:36, 14 December 2008
  • ...ial papers on the theory, design and implementation of digital information systems, as well as demonstrations, tutorials, workshops and industrial presentatio - Multimedia Information Systems
    4 KB (595 words) - 23:09, 14 October 2008
  • * Data management for ubiquitous and mobile computing * Data security, privacy and trust
    4 KB (593 words) - 23:10, 14 October 2008
  • ...that XML is the main means towards this new generation of data management systems. Following the experience of previous editions of DataX 2004 and DataX 2006 * XML retrieval in P2P systems
    3 KB (475 words) - 23:10, 14 October 2008
  • reliability, integrity, privacy, and security issues are still being policy. Furthermore, the complexity of security increases as
    7 KB (908 words) - 23:10, 14 October 2008
  • ...alable, robust and efficient for developing numerous original services and systems. * Context-aware Computing
    2 KB (324 words) - 16:49, 16 December 2020
  • 5. RFID/USN(Ubiquitous Sensor Network) Technologies 9. Information Security Technologies
    2 KB (200 words) - 23:11, 14 October 2008
  • | Title = Third International Workshop on Broadband and Wireless Computing, Communication and Applications | Field = Mobile computing
    7 KB (990 words) - 23:11, 14 October 2008
  • | Title = Security and Privacy in Telecommunications and Information Systems | Field = Computer security and reliability
    4 KB (587 words) - 23:30, 14 October 2008
  • | Title = Fifth Annual Conference on Wireless On demand Network Systems and Services With the increasing variety of wireless technologies, ubiquitous connectivity
    3 KB (413 words) - 23:13, 14 October 2008
  • | Title = 27th International Symposium on Reliable Distributed Systems | Field = Embedded systems
    2 KB (255 words) - 23:14, 14 October 2008
  • | Title = The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing The 4th International Conference on Collaborative Computing:
    8 KB (1,093 words) - 23:15, 14 October 2008
  • | Title = International Conference on Parallel and Distributed Computing, Applications and Technologies ...as, developments and applications in all areas of parallel and distributed computing. Following PDCAT'00 in Hong Kong, PDCAT'01 in Taipei, PDCAT'02 in Kanazawa,
    5 KB (623 words) - 23:15, 14 October 2008
  • ...le = 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services ...management and services, all with special focus on mobility and ubiquitous computing.
    5 KB (599 words) - 23:15, 14 October 2008
  • + Security, Privacy and Open Source TRACK - Security, privacy and trust methods and solutions for enabling e-Business
    5 KB (594 words) - 16:29, 25 March 2020
  • # security technology and systems # Software Engineering of Autonomic Grid Computing Systems and Applications
    6 KB (733 words) - 12:48, 27 October 2016
  • ...es in current systems and potential concerns in the field of communication systems and middleware. The conference will feature a high quality technical progra * Achieving security, reliability, and quality of service in
    3 KB (358 words) - 23:18, 14 October 2008
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • | Title = Second ACM Conference on Wireless Network Security | Field = Computer security and reliability
    2 KB (291 words) - 23:19, 14 October 2008
  • | Title = Ubiquitous Computing Security Systems | Field = Computer security and reliability
    3 KB (328 words) - 06:40, 22 December 2012
  • | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability
    6 KB (697 words) - 23:19, 14 October 2008
  • | Field = Mobile computing services. The major emphasis of the workshop this year is security of
    5 KB (663 words) - 23:20, 14 October 2008
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability
    4 KB (502 words) - 23:20, 14 October 2008
  • | Title = The 2008 International Symposium on Ubiquitous Multimedia Computing The 2008 International Symposium on Ubiquitous Multimedia Computing (UMC-08) will be held in Australia
    4 KB (573 words) - 23:20, 14 October 2008
  • ...and the years to come will witness a proliferation in the use of advanced systems. ...iscuss and exchange ideas, results and experiences in the area of advanced computing for problems in science and engineering applications and inter-disciplinary
    3 KB (357 words) - 23:23, 14 October 2008
  • ...existing computer technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in existing IT services. * High Performance Computing
    3 KB (415 words) - 23:23, 14 October 2008
  • | Title = Advance computing and communication journal ...the most recent results in the development of system aspects of ubiquitous computing. Researchers and practitioners working in this area are expected to take th
    3 KB (412 words) - 19:34, 12 November 2020
  • | Title = The Fourth International Conference on Systems | Field = Systems
    11 KB (1,492 words) - 23:26, 14 October 2008
  • *Big Data platforms with applications to network management, security, measurements *Experience and lessons learned by deploying large-scale networked systems
    4 KB (514 words) - 12:03, 6 April 2020
  • The second event on "Social and Legal Aspects Under Emerging Computing Topics of legal and social aspects of information systems include but are not limited to:
    8 KB (1,075 words) - 23:52, 14 October 2008
  • | Title = Ubiquitous Computing and Communication Journal ...ing cognitive environments, and discovery and identification of ubiquitous computing applications and services.
    3 KB (386 words) - 23:39, 14 October 2008
  • | Title = Workshop on High Performance and Grid Computing in Medicine and Biology | Field = Grid computing
    7 KB (876 words) - 23:40, 14 October 2008
  • ...However, there remains the open question of how and when to use ubiquitous computing for ward data management. The use of a mobile wireless infrastructure can lead to security and reliability problems. Mobile devices often have usability
    6 KB (771 words) - 23:42, 14 October 2008
  • | Title = The 3rd International Conference on Ubiquitous Information Management and Communication ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network
    2 KB (303 words) - 23:42, 14 October 2008
  • | Title = Third International Workshop on Pervasive Systems | Field = Ubiquitous computing
    6 KB (763 words) - 23:42, 14 October 2008
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...digm/; Recovering and fault-tolerance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Context-aware and context recognition; ...y-tolerant IP networks; Trustworthy Internet; Mobile computing; Ubiquitous computing; Reliability; Resilience; Scalability; User and service mobility; Wireless
    7 KB (883 words) - 17:35, 7 January 2021
  • | Title = IEEE-RIVF International Conference on Computing and Communication Technologies The conference solicits submission of research papers in all major areas of computing, especially results of inter-disciplinary research work combining state-of-
    5 KB (567 words) - 12:58, 18 January 2009
  • part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...nals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.
    5 KB (633 words) - 12:58, 18 January 2009
  • | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)
    16 KB (2,178 words) - 12:59, 18 January 2009
  • ...e 1st International Workshop on Security, Reliability and Quality in Cloud Computing Cloud computing gained prominence in 2007 and is picking up momentum as the next “big
    5 KB (624 words) - 13:00, 18 January 2009
  • Ubiquitous Intelligence and Computing (UIC-09) the Internet of Things. The Ubiquitous Computing community has already
    6 KB (798 words) - 13:01, 18 January 2009
  • | Title = IADIS International Conference Intelligent Systems and Agents 2009 IADIS INTERNATIONAL CONFERENCE INTELLIGENT SYSTEMS AND AGENTS 2009
    4 KB (588 words) - 13:01, 18 January 2009
  • Dataspace support or management systems provide co-ordinated access to Workshops and for exhibition of research and commercial systems.
    4 KB (568 words) - 13:01, 18 January 2009
  • | Title = The 2009 International Workshop on Ubiquitous Computing Security | Field = Ubiquitous computing
    6 KB (852 words) - 13:02, 18 January 2009
  • |Title=First Workshop on Software Engineering for Ubiquitous Computing ...2009 World Congress in Computer Science, Computer Engineering, and Applied Computing.
    7 KB (976 words) - 23:35, 28 January 2009
  • - Emerging Web-based Systems - Context Aware Ubiquitous Computing
    4 KB (630 words) - 16:33, 27 February 2009
  • | Field = Distributed computing Research in middleware systems has evolved from simple client server
    6 KB (800 words) - 22:11, 27 February 2009
  • | Title = 2009 Workshop on Middleware for Ubiquitous and Pervasive Systems | Field = Ubiquitous computing
    6 KB (861 words) - 17:07, 27 February 2009
  • ...k Modeling, Distributed Simulation and Industry, Modeling Very Large Scale Systems, Aerospace Operations, Revising Simulations Components, Meta-Knowledge Simu ...nce is coming on line, Computational resources are becoming cheaper, while ubiquitous network access has started to appear.
    38 KB (4,832 words) - 17:07, 27 February 2009
  • | Title = The 12th International Conference on Network-Based Information Systems The 12th International Conference on Network-Based Information Systems
    11 KB (1,440 words) - 17:08, 27 February 2009
  • | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability
    12 KB (1,690 words) - 17:08, 27 February 2009
  • | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability
    3 KB (480 words) - 17:08, 27 February 2009
  • between applications and underlying platforms (operating systems; system platforms and architectures for future computing and
    8 KB (1,144 words) - 20:59, 27 February 2009
  • |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security
    5 KB (578 words) - 10:21, 20 November 2020
  • | Title = The International Conference on Ambient Systems, Networks and Technologies The International Conference on Ambient Systems, Networks and Technologies (ANT-2010)
    6 KB (751 words) - 16:59, 27 December 2015
  • |Title=International Workshop on P2P, Parallel, Grid and Internet Computing Fourth International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC-2010)
    7 KB (912 words) - 17:36, 5 November 2020
  • ...such as location-based services, mobile data management, ubiquitous computing applications, secured data sharing and processing in sensor networks, ...tributions related to data management in mobile, ubiquitous, and pervasive computing. Topics of interest include, but are not limited to, the following:
    5 KB (530 words) - 11:34, 2 August 2009
  • |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security
    5 KB (599 words) - 10:21, 20 November 2020
  • | Field = Ubiquitous computing constraints in highly dynamic environments. Pervasive systems address these
    4 KB (479 words) - 11:35, 2 August 2009
  • ...ional Workshop on Information Quality and Quality of Service for Pervasive Computing ...l control, supply-chain management, healthcare, intelligent transportation systems, military intelligence, reconnaissance and surveillance (ISR), border contr
    5 KB (734 words) - 11:35, 2 August 2009
  • | Title = The First International Workshop on Ad Hoc and Ubiquitous Computing | Field = Ubiquitous computing
    5 KB (571 words) - 11:35, 2 August 2009
  • | Title = The 10th International Symposium on Pervasive Systems, Algorithms and Networks The 10th International Symposium on Pervasive Systems, Algorithms and Networks
    4 KB (422 words) - 11:36, 2 August 2009
  • ...ons and Technologies - Applications, Protocols, Algorithms, Simulators and Security Broadband mobile communication systems
    3 KB (339 words) - 11:36, 2 August 2009
  • |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security
    3 KB (352 words) - 12:39, 11 August 2009
  • |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security
    5 KB (667 words) - 14:27, 13 September 2009
  • |Title=Special Issue on Ubiquitous Computing Security Systems |Field=Ubiquitous Computing Security Systems
    1 KB (187 words) - 04:49, 23 September 2009
  • ...the most recent results in the development of system aspects of ubiquitous computing. Researchers and practitioners working in this area are expected to take th * Privacy concerns in Ubiquitous Computing Systems
    2 KB (205 words) - 05:10, 23 September 2009
  • |Title=4th International Symposium on Intelligent Distributed Computing |Field=Distributed computing
    4 KB (508 words) - 13:29, 13 July 2010
  • - Ubiquitous Computing - Geographic information systems
    4 KB (507 words) - 22:37, 18 November 2009
  • |Title=4th International KES Symposium on Agents and Multi-agent Systems - Technologies and Applications |Field=agent systems
    6 KB (733 words) - 18:19, 24 September 2020
  • |Field=Information Security, Cryptography |Affiliation=Ubiquitous Computing and Communication Journal
    3 KB (373 words) - 13:50, 19 January 2010

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)