Search results

Jump to: navigation, search
  • |Title=9th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    496 bytes (63 words) - 14:05, 6 November 2020
  • |Title=15th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    506 bytes (61 words) - 14:16, 6 November 2020
  • |Title=8th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    475 bytes (60 words) - 14:03, 6 November 2020
  • |Title=14th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    485 bytes (60 words) - 14:15, 6 November 2020
  • |Title=12th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    497 bytes (60 words) - 14:11, 6 November 2020
  • |Title=13th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    516 bytes (64 words) - 14:12, 6 November 2020
  • |Title=10th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    491 bytes (60 words) - 14:07, 6 November 2020
  • |Title=11th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    507 bytes (62 words) - 14:09, 6 November 2020
  • | Title = First ACM Conference on Wireless Network Security | Field = Computer security and reliability
    2 KB (197 words) - 23:15, 14 October 2008
  • - Information forensics and security - Sensor network
    2 KB (253 words) - 23:16, 14 October 2008
  • Hyper Network Communication Network Security and Information Assurance
    4 KB (438 words) - 23:17, 14 October 2008
  • ...industry, and government to present and discuss recent advances in sensor network research and applications. The conference covers both theoretical and exper Network health monitoring
    4 KB (570 words) - 23:17, 14 October 2008
  • ...rch domains that increasingly play a key role in connecting systems across network centric environments to allow distributed computing and information sharing * OSS and security, security implication of OSS, security concerns in using OSS
    5 KB (697 words) - 23:18, 14 October 2008
  • ...his has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society tha The international conference on Advances in Social Network Analysis and Mining (ASONAM 2009) will primarily provide an interdisciplina
    3 KB (404 words) - 23:18, 14 October 2008
  • o Privacy and security issues. o Impact of recommendation models on the evolution of the social network.
    5 KB (592 words) - 23:18, 14 October 2008
  • intelligence, domain constraints and network intelligence in data blog mining, security mining, taxation mining, scientific data
    4 KB (510 words) - 23:19, 14 October 2008
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • | Title = Second ACM Conference on Wireless Network Security | Field = Computer security and reliability
    2 KB (291 words) - 23:19, 14 October 2008
  • | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability
    5 KB (673 words) - 23:19, 14 October 2008
  • | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability
    6 KB (697 words) - 23:19, 14 October 2008
  • | Title = The First ACM Computer Security Architecture Workshop | Field = Computer security and reliability
    5 KB (619 words) - 23:19, 14 October 2008
  • | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability
    6 KB (736 words) - 23:20, 14 October 2008
  • | Title = Information Security South Africa (ISSA) Conference 2008 | Field = Computer security and reliability
    4 KB (465 words) - 23:20, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security | Field = Computer security and reliability
    4 KB (565 words) - 23:20, 14 October 2008
  • | Title = IEEE Symposium on Security and Privacy | Field = Computer security and reliability
    2 KB (262 words) - 23:20, 14 October 2008
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability
    4 KB (502 words) - 23:20, 14 October 2008
  • - Mobile Network Traffic Engineering, Performance & Optimization - Wireless & Mobile Network Management and Service Infrastructure
    10 KB (1,262 words) - 23:20, 14 October 2008
  • Service Security, Privacy and Trust Service Network Economic Structures and Effects
    18 KB (2,352 words) - 23:23, 14 October 2008
  • * Information Security * Ubiquitous and Sensor Network
    3 KB (415 words) - 23:23, 14 October 2008
  • | Field = Computer security and reliability ...des research at all design levels: circuit, architecture, compiler, OS and network. This workshop aims to become a forum for academia and industry to discuss
    5 KB (598 words) - 01:12, 31 May 2012
  • RAID, and network-storage system designs). ...s increasingly important as boundaries between hardware/software and local/network
    3 KB (406 words) - 17:39, 30 September 2016
  • ...SETI@Home?s "BOINC" computational Grid; BitTorrent?s Content Distribution Network; and ppLive, and ppStream in China, as well as Zattoo in Europe, all of thr * Security and Trust in Distributed Systems
    6 KB (761 words) - 03:28, 6 January 2009
  • resources such as processing, network bandwidth and storage capacity - Networking and Security
    5 KB (577 words) - 23:27, 14 October 2008
  • * Hardware support for security * Network processor and router architectures
    2 KB (259 words) - 10:14, 29 May 2016
  • ...d their own properties with respect to traffic load, congestion situation, network topology, and wireless channel propagation etc. However, cognitive radio wi ...s that report the latest research advances in this field from physical and network layers to practical applications.
    3 KB (409 words) - 23:27, 14 October 2008
  • ...a broad forum an outstanding opportunity for researchers, academicians and network engineers to discuss new and emerging technologies in the field of computer - Network management and performance
    3 KB (413 words) - 23:28, 14 October 2008
  • Computational Intelligence: Artificial neural network, Fuzzy systems, Genetic algorithm, Evolutionary computing, Machine learning ...energy, Waste management, Waste treatment and recycling, Water network and security, Sensor technologies, Intelligent Micro-grids
    4 KB (561 words) - 23:29, 14 October 2008
  • of real-time embedded systems, such as timeliness, safety, security, - COMPOSITIONAL DISTRIBUTED SYSTEMS: composition of network protocol
    6 KB (707 words) - 23:29, 14 October 2008
  • |Field=Computer Science, Embedded systems, Embedded Network Sensor Systems, Sensor Systems Sensor network architecture and protocols Sensor network algorithms such as localization, routing, time synchronization, clustering,
    6 KB (771 words) - 16:09, 16 September 2019
  • ...ity when compared to traditional critical systems, where dependability and security are fairly well understood as complementary concepts and a variety of prove ...lopment tools with middleware, traditional dependability, fault tolerance, security, and adaptivity concepts, together with social and psychological aspects, t
    8 KB (952 words) - 23:31, 14 October 2008
  • Security in distributed systems Network-based Computing
    5 KB (702 words) - 23:31, 14 October 2008
  • ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.
    5 KB (580 words) - 10:32, 12 May 2020
  • ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more.
    4 KB (577 words) - 09:28, 12 May 2020
  • *Big Data platforms with applications to network management, security, measurements *Design, analysis, and evaluation of network architectures
    4 KB (514 words) - 12:03, 6 April 2020
  • ...ternet technologies, multimedia, wireless communications, data privacy and security, authentification, authorization and federation. ...tem analysis and control, HVDC and FACTS, Power market, Power distribution network and automation, Power protection, SCADA, EMS, WAMS and substation automatio
    4 KB (504 words) - 23:33, 14 October 2008
  • ?Semantic Web ?Semantic Search and Query ?Semantic Link Network ?Semantic Normalization ?Semantic Interoperability ?Semantic Visualization ...lf-Organized Intelligence ?Service-oriented Computing ?Mobile Grid ?Social Network ?Community Discovery
    3 KB (367 words) - 23:35, 14 October 2008
  • | Title = SANS Network Security 2007
    492 bytes (57 words) - 23:36, 14 October 2008
  • | Title = The First International Conference on Security and Privacy in Mobile Information and Communication Systems ...edge researchers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymaker
    4 KB (451 words) - 23:37, 14 October 2008
  • * foundations of security * security and trust issues in services
    6 KB (682 words) - 10:18, 14 April 2020
  • of billions of sensing devices. While a single sensor network typically - Sensor network protocols
    4 KB (483 words) - 23:37, 14 October 2008
  • �?� Network architectures for sensor networks SECURITY
    11 KB (1,533 words) - 23:38, 14 October 2008
  • ...ield of computer and data communication networks. We invite submissions on network architecture, design, implementation, operations, analysis, measurement, pe * Network applications & services
    3 KB (380 words) - 19:34, 17 November 2008
  • ...obile. The implementation of such a paradigm requires advances in wireless network technologies and devices, development of infrastructures supporting cogniti * Information Security and Cryptography
    3 KB (386 words) - 23:39, 14 October 2008
  • ...nd security, systems health management, and related areas. Collaborate and network with scientists, engineers, developers and customers, in a balance of forma
    1 KB (164 words) - 23:39, 14 October 2008
  • ...tures and compilers for graphics/gaming, embedded processors, DSPs, ASIPs (network, multimedia, wireless, etc.) * Microarchitecture support for reliability, dependability, and security
    3 KB (326 words) - 17:43, 8 November 2008
  • ...cast network, home network, mobile multimedia QoS, mobile security, ad hoc network ...system), personal information management, data integration and federation, security, privacy
    2 KB (303 words) - 23:42, 14 October 2008
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...management /locator-location paradigm/; Recovering and fault-tolerance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Cont ...Scalability; User and service mobility; Wireless QoS; Traffic engineering; Network planning; Intermittent services; Virtualization; Self-management and contr
    7 KB (883 words) - 17:35, 7 January 2021
  • ...raw observations that are used in our experiments. Examples might include network measurement or capturing data such as seismic measurements. Middleware is r * Virtual organization and security issues of instruments and sensors on the Grid
    4 KB (642 words) - 21:17, 9 December 2008
  • ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Network Architectures and Routing
    5 KB (526 words) - 01:02, 2 February 2009
  • | Title = 3rd International Conference on Network and System Security 3rd International Conference on Network and System Security (NSS 2009)
    12 KB (1,669 words) - 12:58, 18 January 2009
  • o Security o Network architecture
    5 KB (567 words) - 12:58, 18 January 2009
  • o Game-theoretic aspects of network formation on the Internet * Security, Privacy, Encryption, and Digital Rights, including
    9 KB (1,221 words) - 12:58, 18 January 2009
  • | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)
    16 KB (2,178 words) - 12:59, 18 January 2009
  • ...mance Analysis; Power Aware Embedded Computing; Adaptive Embedded Systems; Security in Embedded Systems. System-on-Chip and Network-on-Chip Design & Testing: Design of Application- Specific Instruction-Set P
    3 KB (337 words) - 12:59, 18 January 2009
  • ...building federated digital technologies that will enable the formation of network of digital technologies. Data and Network mining
    4 KB (529 words) - 13:00, 18 January 2009
  • - Data warehouse privacy, security, and reliability - Security, privacy and social impact of data mining
    7 KB (1,006 words) - 13:00, 18 January 2009
  • | Title = The 11th ACM workshop on Multimedia and Security The 11th ACM workshop on Multimedia and Security will be held in Princeton, New Jersey, USA on September 7th and 8th of 2009
    3 KB (303 words) - 17:06, 24 February 2016
  • o Network management, QoS management o System architecture and protocol (e.g., MAC, network, transport)
    14 KB (1,518 words) - 13:01, 18 January 2009
  • + Security + Social Network
    3 KB (410 words) - 13:01, 18 January 2009
  • Security in wireless networks Network measurement and Management
    3 KB (320 words) - 16:40, 27 December 2015
  • ...their research results and address open issues in Wireless Communications, Network Technologies, Services and Application. Network Technologies
    2 KB (210 words) - 13:01, 18 January 2009
  • * Network applications and services * Network architectures and management
    10 KB (1,206 words) - 13:01, 18 January 2009
  • ...pose architectures and accelerators; Architecture of the memory hierarchy; Network and interconnect architectures; Parallel I/O and storage systems; Power-eff ...algorithms; Optimizations of communication and synchronization protocols; Network algorithms, Scheduling and load balancing; Scientific applications; Applica
    4 KB (490 words) - 17:05, 27 December 2015
  • - Computer and Network Architecture - Security Engineering
    10 KB (1,321 words) - 13:01, 18 January 2009
  • ...practical aspects of health informatics and bioinformatics and a chance to network with others working and researching in this area. • Security, Ethics and Privacy
    4 KB (528 words) - 13:01, 18 January 2009
  • |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)
    6 KB (793 words) - 15:12, 1 October 2020
  • Nowadays, computing and network systems, such as peer-to-peer, wireless ad hoc, sensor networks, and genera ...this direction, biology, psychology, economics (e.g., game theory), social network, and many other research fields can provide many helpful hints for autonomo
    6 KB (767 words) - 13:01, 18 January 2009
  • - Innovative applications of social network analysis - Scalable, customizable social network infrastructure construction
    3 KB (446 words) - 13:02, 18 January 2009
  • | Title = Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Device Use | Field = Computer security and reliability
    11 KB (1,539 words) - 13:02, 18 January 2009
  • | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)
    6 KB (852 words) - 13:02, 18 January 2009
  • ...place in conjunction with the 3rd International Conference on Information Security and Assurance, Seoul, Korea http://www.sersc.org/ISA2009. A wireless sensor network (WSN) is an emerging research field with several interesting application do
    3 KB (450 words) - 13:02, 18 January 2009
  • ...ssues can expose the network infrastructure to stability, performance, and security problems. ...izations. Also, it can be the basis for prevention and response in network security, as typically the detection of attacks and intrusions requires the analysis
    5 KB (431 words) - 13:03, 18 January 2009
  • ...ess body area network, wireless sensor network, and wireless personal area network. Body-centric wireless communications find rich applications in personal he o Security and privacy issues of UWB-based body-centric networking for personal health
    5 KB (664 words) - 17:20, 5 July 2020
  • ...ergy and brainpower. As a speaker, you will have the unique opportunity to network and share knowledge with hundreds of other IT leaders, executives and busin * Security throughout the enterprise (servers, programming, development process, preve
    2 KB (299 words) - 16:33, 27 February 2009
  • ...temas, Wireless communications, Technologies and applications, Information security ...temas, Wireless communications, Technologies and applications, Information security
    8 KB (977 words) - 16:33, 27 February 2009
  • ...number of devices connected to the networks has changed the Internet to a "network of things and computers". These trends, plus the rise of collaborative tech * Frameworks and Overarching Issues of Network Governance
    4 KB (557 words) - 16:33, 27 February 2009
  • | Title = IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09) IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09)
    2 KB (229 words) - 16:33, 27 February 2009
  • 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.
    7 KB (897 words) - 17:05, 27 February 2009
  • Network management • Network performance evaluation
    5 KB (654 words) - 17:06, 27 February 2009
  • · Network routing and communication algorithms · Reliability, fault-tolerance, and security
    8 KB (1,050 words) - 18:04, 5 January 2017
  • * Network applications & services * Network architectures
    4 KB (559 words) - 17:06, 27 February 2009
  • * Security and privacy in P2P systems * Network support for P2P systems
    5 KB (623 words) - 17:06, 27 February 2009
  • establish contacts between computer network researchers, practitioners * Security and privacy
    3 KB (456 words) - 17:06, 27 February 2009
  • | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability
    8 KB (967 words) - 17:07, 27 February 2009
  • communicate through a Wireless Network. The building of software    * Privacy and security services
    6 KB (861 words) - 17:07, 27 February 2009
  • | Title = 3rd WORKSHOP ON Practice and Theory of IT Security | Field = Computer security and reliability
    4 KB (506 words) - 17:07, 27 February 2009
  • | Title = Workshop on Trust, Risk and Security Assessments for Network Dependability in Digital Ecosystems (TRSDE) | Field = Computer security and reliability
    4 KB (600 words) - 17:07, 27 February 2009
  • ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Security and Privacy
    7 KB (941 words) - 17:07, 27 February 2009

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)