Search results

Jump to: navigation, search
  • Information systems and database systems have always been a central topic of computer s * Applications of DB Systems and Information Systems
    4 KB (457 words) - 16:14, 16 December 2020
  • * Security, reliability and availability in distributed storage systems, geographical information systems, image processing, Web retrieval,
    5 KB (644 words) - 23:10, 14 October 2008
  • * incomplete information * privacy/security
    5 KB (647 words) - 23:10, 14 October 2008
  • | Title = The Ninth International Conference on Web-Age Information Management The Ninth International Conference on Web-Age Information Management
    10 KB (1,376 words) - 23:10, 14 October 2008
  • The theme of BNCOD 2008, the 25th in the series, is "Sharing Data, Information and Knowledge". * Data mining and information extraction
    4 KB (593 words) - 23:10, 14 October 2008
  • | Title = International Workshop on Privacy and Anonymity in the Information Society Disclosure Risk and Information Loss Assessment
    2 KB (193 words) - 23:10, 14 October 2008
  • ...e = Third International Workshop on Database Technologies for Handling XML Information on the Web ...ss, and social communities. Peer-to-peer architectures, the Grid, personal information systems, pervasive and ubiquitous computing, networked sensors, biomedical
    3 KB (475 words) - 23:10, 14 October 2008
  • * Putting Auto ID data into context (relating it to business process information) * Privacy and security in Auto ID systems
    4 KB (471 words) - 23:10, 14 October 2008
  • Nowadays, the rapid growth of information technologies has brought reliability, integrity, privacy, and security issues are still being
    7 KB (908 words) - 23:10, 14 October 2008
  • ...middleware, e.g., for managing Grid resources, computing tasks, data, and information, form the basic framework for realising an e-Science environment. By automa * Security control in managing workflow
    4 KB (560 words) - 23:10, 14 October 2008
  • ...g access to information and services. Such technologies contribute to make information and services available anytime and anywhere. This has led to the developmen * Reliability, security and privacy
    2 KB (324 words) - 16:49, 16 December 2020
  • and military operations. Such networking is essential for safety, security and economic vitality in critical information exchange among diverse, widely-dispersed, mobile users. A primary
    5 KB (549 words) - 17:15, 5 July 2020
  • Security issues Dept. of Electronic Engineering and Information Engineering Research, Technology &
    3 KB (364 words) - 23:11, 14 October 2008
  • * Network Security and Cooperation * Web Information Management
    3 KB (339 words) - 23:11, 14 October 2008
  • 9. Information Security Technologies
    2 KB (200 words) - 23:11, 14 October 2008
  • * Network Security ...n the conference Web site. Please see http://www.comsnets.org for detailed information. The authors of accepted papers must guarantee that their paper will be pre
    4 KB (465 words) - 23:11, 14 October 2008
  • 11. Communication and Information Systems Security Symposium
    3 KB (431 words) - 09:18, 4 August 2023
  • ...he fly, based on which all electronic devices will be able to exchange the information with each other whenever necessary. Also, ubiquitous computing is an emergi Network Security and Privacy
    7 KB (990 words) - 23:11, 14 October 2008
  • | Title = Security and Privacy in Telecommunications and Information Systems | Field = Computer security and reliability
    4 KB (587 words) - 23:30, 14 October 2008
  • - Computer and Communications Network Security Further information about the conference is available at IWT official web site. Please, visit h
    3 KB (375 words) - 23:37, 14 October 2008
  • | Title = Third International Conference on Bio-Inspired Models of Network, Information and Computing Systems 3rd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems
    5 KB (694 words) - 23:11, 14 October 2008
  • + Security for CE Communications Multimedia Information Processing on Wireless Sensor Networks
    5 KB (584 words) - 09:43, 4 September 2023
  • ...be held in Bangkok, Thailand. The ISPACS presents every possibility on new information technologies. The ISPACS 2008 will include many regular sessions on the top 7. Security Signal Processing
    4 KB (496 words) - 23:12, 14 October 2008
  • Security/privacy in wireless systems Wireless net. information theory
    2 KB (244 words) - 23:12, 14 October 2008
  • 5. Information and Communication Technologies (ICT) 5 .54 Network Security
    2 KB (250 words) - 23:12, 14 October 2008
  • ...ospective tutorial presenters should contact the Tutorials Chair. For more information please visit the conference web page (see below). - Network Security
    3 KB (465 words) - 23:13, 14 October 2008
  • ...rage contributions on policy-based techniques in support of management and security of all types of wireless networks: cellular, Wi-Fi, Mobile Ad Hoc, hybrids, ...ource allocation, autonomic computing, systems management, QoS adaptation, security
    5 KB (667 words) - 23:13, 14 October 2008
  • * Computer Networks and Security * Information Theory and Coding
    2 KB (283 words) - 23:13, 14 October 2008
  • * Security and resilience of networked systems For more information and submission guidelines, please see
    4 KB (528 words) - 23:13, 14 October 2008
  • Information and Communication Technologies continue to rapidly transform how business i ...values, the real-world impact of e-Business research, and customer-centric information systems respectively. With this year?s workshop being located in Europe, we
    3 KB (430 words) - 23:13, 14 October 2008
  • *Security and privacy in Web search and mining *Information extraction, slot-filling
    2 KB (237 words) - 12:23, 11 September 2020
  • | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.
    4 KB (457 words) - 23:13, 14 October 2008
  • ...published work that demonstrate current research in all areas of Web based information systems and their applications in science, technology, business and commerc Web Services Security
    3 KB (494 words) - 23:16, 14 October 2008
  • ...os, audio recordings) in bibliometrics (publication patterns), in homeland security (terrorist networks). * Mining social data for multimedia information retrieval
    3 KB (453 words) - 23:14, 14 October 2008
  • networks, including user behavior models, security and trust, P2P, - "How salesforce.com Changes Information Technology"
    7 KB (813 words) - 23:14, 14 October 2008
  • * Security Challenges for Web Services * Extended Web Services Specifications (security, QoS, other properties)
    8 KB (1,158 words) - 23:14, 14 October 2008
  • * Data Models for Web Information Systems * Web Information Extraction...
    3 KB (250 words) - 23:14, 14 October 2008
  • * Security, privacy, and trust ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to
    6 KB (869 words) - 23:14, 14 October 2008
  • | Title = IEEE Information Theory Workshop on Networking and Information Theory | Field = Information theory
    3 KB (308 words) - 23:15, 14 October 2008
  • * Security, robustness, and fault-tolerance in networked environments ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to
    8 KB (1,093 words) - 23:15, 14 October 2008
  • ...m for researchers, engineers and academia to exchange the latest technical information and research findings on next-generation networked multimedia concepts, tec * QoS and Security Support for Entertainment
    8 KB (1,011 words) - 23:15, 14 October 2008
  • | Title = The Second International Workshop on Peer-to-Peer Computing for Information Search Peer-to-Peer Computing for Information Search (P2PSearch 2008)
    5 KB (554 words) - 23:15, 14 October 2008
  • across the whole information flow from service creation to deployment * Security aspects in network management
    6 KB (663 words) - 23:15, 14 October 2008
  • * Data management and middleware support for collaborative information systems * Security, privacy and trust management in collaborative networks, systems, and appli
    8 KB (1,093 words) - 23:15, 14 October 2008
  • | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)
    5 KB (628 words) - 23:15, 14 October 2008
  • 4. Security and Privacy 4-03 Distributed systems security
    5 KB (623 words) - 23:15, 14 October 2008
  • ...ng difficult social and policy issues such as those related to privacy and security ...l-mobile technologies, information networking, human-computer interaction, security and privacy.
    8 KB (1,003 words) - 23:15, 14 October 2008
  • | Title = Foundations of Information Management in Networks Foundations of Information Management in Networks
    4 KB (563 words) - 23:15, 14 October 2008
  • * Network Security ...viewer-friendly format). All papers must include a title, complete contact information for all authors, and keywords on the cover page. The corresponding author s
    5 KB (598 words) - 10:18, 29 May 2016
  • * Security, privacy and social issues of mobile and ubiquitous systems ...Applications (MONET) journal. Please visit the Publications page for more information.
    5 KB (599 words) - 23:15, 14 October 2008
  • | Title = The Third International ICST Conference on Scalable Information Systems | Field = Information retrieval
    4 KB (491 words) - 23:16, 14 October 2008
  • - Information forensics and security
    2 KB (253 words) - 23:16, 14 October 2008
  • * Information forensics and security ...special session authors are referred to the ICASSP website for additional information regarding submissions.
    4 KB (490 words) - 22:46, 4 February 2009
  • * A Student Paper Contest with awards sponsored by Canon Information Systems Research Australia (CiSRA). To enter the contest a paper submission * Fusion mechanism of multimodal signals in human information processing system and applications to multimodal multimedia data fusion/int
    4 KB (443 words) - 17:06, 24 February 2016
  • | Title = International Symposium on Information Theory and its Applications | Field = Information theory
    3 KB (362 words) - 23:17, 14 October 2008
  • Information Retrieval Network Security and Information Assurance
    4 KB (438 words) - 23:17, 14 October 2008
  • | Title = International Conference on Information Processing in Sensor Networks ...signal and image processing, information and coding theory, databases and information management, distributed algorithms, networks and protocols, wireless commun
    4 KB (570 words) - 23:17, 14 October 2008
  • Information forensics and security ...special session authors are referred to the ICASSP website for additional information regarding submissions.
    3 KB (450 words) - 23:04, 4 February 2009
  • * Performance, dependability and security evaluation using analytical models, simulation or empirical approaches * Model-based security engineering and design for security
    5 KB (660 words) - 16:46, 27 December 2015
  • | Field = Information technology ...ems across network centric environments to allow distributed computing and information sharing.
    5 KB (697 words) - 23:18, 14 October 2008
  • to exchange information on the engineering design, enabling + Security, Privacy and Open Source TRACK
    5 KB (594 words) - 16:29, 25 March 2020
  • # security technology and systems * Integrity, Security, and Fault Tolerance
    6 KB (733 words) - 12:48, 27 October 2016
  • | Title = The Second IEEE International Workshop on Security in Software Engineering | Field = Computer security and reliability
    5 KB (615 words) - 09:55, 29 May 2016
  • |Title=5th International Conference on Information Technology and Applications (ICITA 2008) |Field=Information technology
    3 KB (427 words) - 17:01, 29 May 2016
  • ...encourage researchers and practitioners from the RE, software engineering, information systems, and embedded systems fields to present original work. Contribution * quality goals (e.g., security),
    4 KB (503 words) - 23:18, 14 October 2008
  • | Title = Symposium on Requirements Engineering for Information Security ...t/event.showcfp?eventid=1752&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]
    583 bytes (64 words) - 23:18, 14 October 2008
  • ...lacing - the software life cycle: the model life cycle. Further background information can be found here. Background information: Model Based Software Engineering
    18 KB (2,714 words) - 23:23, 14 October 2008
  • ...his has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society tha General areas of interest to ASONAM 2009 include information science and mathematics,
    3 KB (404 words) - 23:18, 14 October 2008
  • rich latent information within these networks into actionable o Privacy and security issues.
    5 KB (592 words) - 23:18, 14 October 2008
  • ...tiple research fields such as user modeling, machine learning, intelligent information retrieval, data and text mining, statistics, computational intelligence, hu - Security and privacy aspects of personalization and recommendation
    4 KB (570 words) - 23:19, 14 October 2008
  • areas in information technology. Although many algorithms and blog mining, security mining, taxation mining, scientific data
    4 KB (510 words) - 23:19, 14 October 2008
  • ...polarized opinions: There are those who think an organization can analyze information it has gathered for any purpose it desires and those who think that every t ...ance to the point where privacy would no longer rely on accidental lack of information but rather on intentional and engineered inability to know. This belief is
    5 KB (721 words) - 23:19, 14 October 2008
  • ...e = Sixth International Conference on Cryptography, Coding and Information Security | Field = Computer security and reliability
    3 KB (448 words) - 23:19, 14 October 2008
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability
    5 KB (673 words) - 23:19, 14 October 2008
  • | Title = Ubiquitous Computing Security Systems | Field = Computer security and reliability
    3 KB (328 words) - 06:40, 22 December 2012
  • | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability
    6 KB (697 words) - 23:19, 14 October 2008
  • | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability
    6 KB (736 words) - 23:20, 14 October 2008
  • | Title = Information Security South Africa (ISSA) Conference 2008 | Field = Computer security and reliability
    4 KB (465 words) - 23:20, 14 October 2008
  • | Title = New Security Paradigms Workshop | Field = Computer security and reliability
    8 KB (1,072 words) - 23:20, 14 October 2008
  • | Title = The Sixth International Workshop on Security In Information Systems | Field = Computer security and reliability
    590 bytes (68 words) - 23:20, 14 October 2008
  • | Title = The 11th Information Security Conference | Field = Computer security and reliability
    528 bytes (59 words) - 23:20, 14 October 2008
  • | Title = Special Session on Systems and Information Security | Field = Computer security and reliability
    541 bytes (61 words) - 23:20, 14 October 2008
  • forming, a new way to manage personal information or a new approach to model context information. There is less emphasis on the actual
    5 KB (663 words) - 23:20, 14 October 2008
  • | Title = Workshop in Information Security Theory and Practices 2008: Smart Devices, Convergence and Next Generation N | Field = Computer security and reliability
    606 bytes (68 words) - 23:20, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security | Field = Computer security and reliability
    4 KB (565 words) - 23:20, 14 October 2008
  • | Title = 23rd International Information Security Conference | Field = Computer security and reliability
    5 KB (637 words) - 23:20, 14 October 2008
  • | Title = NATO Advanced Research Workshop: Metamaterials for Secure Information and Communication Technologies | Field = Computer security and reliability
    2 KB (276 words) - 23:20, 14 October 2008
  • | Title = IEEE Symposium on Security and Privacy | Field = Computer security and reliability
    2 KB (262 words) - 23:20, 14 October 2008
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • | Title = SPIE Defense and Security Symposium | Field = Computer security and reliability
    1 KB (167 words) - 23:20, 14 October 2008
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability
    4 KB (502 words) - 23:20, 14 October 2008
  • - Multimedia security and content protection contact information for the presenter, and a description of the tutorial and material to be dis
    3 KB (425 words) - 23:20, 14 October 2008
  • - Personalization, Privacy and Security in Mobile Computing - Security and Privacy of Mobile/Wireless Systems
    10 KB (1,262 words) - 23:20, 14 October 2008
  • ...Multimedia (ISM2008) is an international forum for researchers to exchange information regarding advances in the state of the art and practice of multimedia compu * Multimedia security including digital watermark and encryption
    5 KB (595 words) - 23:20, 14 October 2008
  • -Security issues on UMC Contact Information
    4 KB (573 words) - 23:20, 14 October 2008
  • ...learning techniques to address reliability, performance, power management, security, fault diagnosis, or manageability issues in computer systems ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to
    6 KB (837 words) - 23:21, 14 October 2008
  • · Computational Linguistics & Information Integration · Forensic Studies and Security Issues
    3 KB (364 words) - 23:21, 14 October 2008
  • ...ires that referees treat the contents of papers under review as privileged information not to be disclosed to others before publication. It is expected that no on Service Security, Privacy and Trust
    18 KB (2,352 words) - 23:23, 14 October 2008
  • | Title = IEEE 8th International Conference on Computer and Information Technology ...ted many high quality research papers spanning over the various aspects of information technology, computing science and computer engineering. These papers highli
    3 KB (415 words) - 23:23, 14 October 2008

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)