Search results
Create the page "Information Security" on this wiki! See also the search results found.
- |Title=The IEEE 22nd International Conference on Advanced Information Networking and Applications ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-08) will be held in Ginowan City , Okinaw8 KB (1,037 words) - 22:20, 10 January 2018
- |Title=The IEEE 21st International Conference on Advanced Information Networking and Applications (AINA-07) ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-07) will be held in Niagara Falls, Canada9 KB (1,189 words) - 22:20, 10 January 2018
- |Title=The IEEE 20th International Conference on Advanced Information Networking and Applications on Advanced Information Networking and Applications (AINA2006) will26 KB (3,456 words) - 22:20, 10 January 2018
- |Title=The IEEE 19th International Conference on Advanced Information Networking and Applications ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA 2005) will be held in Tamkang University,10 KB (1,263 words) - 22:20, 10 January 2018
- |Title=The 18th International Conference on Advanced Information Networking and Applications (AINA 2004) The International Conference on Advanced Information Networking and Applications (AINA 2004) will be held in Fukuoka, Kyushu, Ja12 KB (1,537 words) - 22:19, 10 January 2018
- |Title=The International Conference on Advanced Information Networking and Applications The International Conference on Advanced Information Networking and Application will be held in Xi'an, China in March 27-29, 2008 KB (1,040 words) - 22:20, 10 January 2018
- Users will be able to retrieve, publish, and manage information, - Wireless security and dependability4 KB (495 words) - 09:22, 22 August 2023
- ...traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. - Trust-related Security and Privacy: Trust-related secure architecture, framework, policy, intrusio9 KB (1,216 words) - 17:32, 14 October 2008
- * Security assessment and enhancement * Games of imperfect or asymmetric information6 KB (722 words) - 17:32, 14 October 2008
- ...raction and representation, shape and motion primitives, texture and color information, statistical, structural and syntactic pattern recognition, neural networks ...multimedia databases, digital and video libraries, compression and coding, security over the network.2 KB (268 words) - 17:47, 14 October 2008
- Persuasive Technology is all about using Information and Communications Technology to change what we think and do. We are just e * Security and privacy8 KB (989 words) - 20:13, 22 February 2009
- Geographical Information Systems/ Global Navigation Satellite Systems Security and Information Assurance4 KB (503 words) - 11:36, 18 October 2008
- - System management and security; For more information visit the conference web site at http://www.computingfrontiers.org4 KB (591 words) - 17:48, 14 October 2008
- ...n the areas of RFID technologies, their supporting large-scale distributed information systems and their applications. * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques3 KB (431 words) - 17:48, 14 October 2008
- • Information-theoretic aspects of wireless communications • Wireless network security and privacy6 KB (731 words) - 10:33, 14 August 2023
- ...ireless communications and networking employed to support the needs of the Information Society. This sixth symposium, intends to bring together various wireless c * Wireless privacy and security3 KB (456 words) - 18:10, 14 October 2008
- session that includes the ACM Student Research Competition. More information on these activities, including submission * Security, privacy, and trustworthiness of mobile and wireless systems7 KB (974 words) - 12:28, 3 August 2023
- ...uming but also error-prone. The systematic and timely capture of the above information may accurately keep track of the various stages that data go through and he ...ware engineering, workflow system, information retrieval, web service, and security research. At the same time, it also requires understanding of problems from3 KB (416 words) - 17:48, 14 October 2008
- Information theory: distributed network coding, Shannon's entropy, Nash equilibrium Internet security enforcement and validation11 KB (1,385 words) - 17:48, 14 October 2008
- * legal and quasi-legal applications of AI and other advanced information technologies * Conceptual or model-based legal information retrieval7 KB (998 words) - 17:48, 14 October 2008
- ...nal Conference on the Theory and Application of Cryptology and Information Security556 bytes (69 words) - 15:16, 10 March 2020
- ...ternational Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability7 KB (960 words) - 17:48, 14 October 2008
- The 8th ACM/IEEE Conference on Information Processing in ...cations o real-time resource management and scheduling o embedded system security o programming languages and software engineering for real-time or8 KB (939 words) - 17:48, 14 October 2008
- * Trust, security and privacy Trust, security and privacy19 KB (2,503 words) - 13:25, 28 October 2020
- Ubiquitous sensors, devices, networks and information are paving the way * Security, Privacy, Safety and Legal Issues7 KB (942 words) - 20:05, 14 October 2008
- | Title = The 3rd International Symposium on Security and Multimodality in Pervasive Environments ...er hand, while enlarging and easing the ways to access to the environment, security threads arise and the environment must be properly equipped in order to pro3 KB (393 words) - 21:18, 14 October 2008
- | Field = Computer security and reliability ...the “tour guide” and save you time by collecting and summarizing this information to bring you up to date in a particular area as efficiently as possible.3 KB (467 words) - 21:39, 16 October 2008
- - Information dissemination and publish/subscribe functionality in SPSs - Information integration and data source wrapping in SPSs3 KB (490 words) - 20:05, 14 October 2008
- |Title=First IEEE Workshop on Information and Software as Services First IEEE Workshop on Information & Software as Services (WISS'09)7 KB (907 words) - 21:51, 14 October 2008
- # Semantic Information Retrieval # Semantic Web Trust, Privacy, Security and Intellectual Property Rights4 KB (450 words) - 20:05, 14 October 2008
- | Title = International Conference on Wireless Information Networks and System WINSYS is organized by INSTICC – Institute for Systems and Technologies of Information, Control and Communication9 KB (1,219 words) - 20:05, 14 October 2008
- [For more information, please visit URL: http://www.sis.uncc.edu/~mshehab/trustcol08/ ] ...enerate added momentum towards research in finding viable solutions to the security and privacy challenges faced by the current and future collaborative system4 KB (520 words) - 20:05, 14 October 2008
- * Cryptography and Security * Information Retrieval2 KB (216 words) - 20:05, 14 October 2008
- • Ethical, Social, Privacy, Security and moral Issues in an e-societ • Information Society5 KB (530 words) - 10:27, 24 June 2011
- Information Systems Computer and Network Security3 KB (332 words) - 20:06, 14 October 2008
- |Field=Computer security and reliability ...ctions), or refinery& chemical systems rely on networked communication and information systems. Moreover, there are other dedicated systems for data mining, recom15 KB (2,175 words) - 21:03, 19 March 2013
- Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability AUTOMOTIVE ENTERTAINMENT and INFORMATION3 KB (354 words) - 20:06, 14 October 2008
- ...in eESociety, eGovernment /eGovernance, eHealth, Information Systems, and Information Management. These broad areas are divided into more detailed areas (see bel * Topics related to the Information Society are of interest. These include, but are not limited to the followin6 KB (780 words) - 20:06, 14 October 2008
- | Title = Fourth International Conference on Intelligent Computing and Information Systems ...vances of artificial and computational intelligence as well as intelligent information systems.2 KB (193 words) - 20:06, 14 October 2008
- Information and Knowledge Engineering Intelligent Information Processing Systems3 KB (359 words) - 20:06, 14 October 2008
- o Security and Privacy For further information, please contact the program chair, Professor Xiaodong Zhang at zhang@cse.oh2 KB (303 words) - 20:06, 14 October 2008
- ...cess management and modelling, Grid computing, Web services notifications, information dissemination, event stream processing, and message-oriented middleware. Th * Security issues6 KB (829 words) - 15:30, 29 January 2021
- ...ssist in the development of best practice and relevant standards. For more information, please visit: http://www.ieee-cqr.org/ . * Security and Reliability Issues4 KB (505 words) - 22:15, 14 October 2008
- Enterprise Information Systems Homeland Security6 KB (708 words) - 22:49, 14 October 2008
- ...ologies in complex and demanding settings, like manufacturing, healthcare, security, control systems, etc. ...echnologies with other technologies used to support organisations, such as information systems, production systems, decision support systems, knowledge management2 KB (261 words) - 22:45, 14 October 2008
- * Security and privacy in pervasive healthcare * Using mobile devices for healthcare information storage, update, and transmission6 KB (732 words) - 22:45, 14 October 2008
- * Data management and middleware support for collaborative information systems * Security and trust management in collaborative networks, systems, and applications6 KB (674 words) - 22:45, 14 October 2008
- ...d task identification, personalized access to information and personalized information management, to name but a few. The advantages of such data are numerous, st ...biquitous computing, activity-driven computing, context-driven computing, information retrieval, database systems, digital libraries, metadata, data mining, user6 KB (890 words) - 22:53, 14 October 2008
- ...e are promoting society integration and disseminating the digital culture. Information and Communication Technologies (ICT) are intensely used by Brazilian popula ...diversity of interactive systems usage, like in entertainment, security in information exchange and broadcast, participation in social and democratic processes as3 KB (502 words) - 22:53, 14 October 2008
- - Databases: query processing; information integration; - Security and Privacy: cryptography; access control; security in9 KB (1,193 words) - 22:53, 14 October 2008
- �?� Information integration in sensor networks �?� Knowledge management, information systems, large databases, data-mining4 KB (468 words) - 22:54, 14 October 2008
- | Title = Conference on Enterprise Information Systems | Field = Information systems9 KB (1,240 words) - 22:56, 14 October 2008
- | Title = International Conference on Neural Information Processing ...ecision support, business and finance, speech-, image- and multimodal information processing, process control, arts and design. The conference will includ5 KB (699 words) - 23:04, 14 October 2008
- CAART is organized by INSTICC (Institute for Systems and Technologies of Information, Control and Communication), with technical co-sponsorship by the WfMC and ...is connection, therefore, authors are invited to highlight the benefits of Information Technology (IT) in these areas. Ideas on how to solve problems using agents18 KB (2,457 words) - 23:04, 14 October 2008
- ...gence, databases, social networks, distributed computing, web engineering, information systems, natural language processing, soft computing, and human-computer in General Information6 KB (854 words) - 12:05, 28 May 2016
- �?� Security and Cryptography �?� Information Systems13 KB (1,775 words) - 23:04, 14 October 2008
- ...oftware Engineering, Data Bases, Distributed Systems, Information Systems, Information Retrieval, Service Oriented Applications, etc. - Information integration6 KB (827 words) - 23:04, 14 October 2008
- ...tle = International Workshop on Computational Intelligence in Security for Information Systems568 bytes (62 words) - 23:05, 14 October 2008
- * Cryptography and Network Security * Information Assurance2 KB (167 words) - 23:05, 14 October 2008
- More information about each type of submission is included below. ...-time localization of critical information, provision of technical support information, or creation of preliminary translations for post-editing. Submissions shou16 KB (2,200 words) - 20:51, 18 February 2021
- information and communication complexity. programs; foundations of security; term rewriting;5 KB (698 words) - 23:08, 14 October 2008
- distributed databases; information retrieval; knowledge bases; logic; data; security; semi-structured data; spatial data; temporal data;5 KB (660 words) - 14:52, 2 March 2012
- ...languages; query optimization; real-time data; recovery; scientific data; security; semantic Web; semi-structured data; spatial data; temporal data; transacti3 KB (457 words) - 13:09, 7 December 2016
- Information and Communication Technologies (ICTs) have proved to offer immense potentia * Network and IT security issues in developing countries9 KB (1,127 words) - 17:19, 26 April 2011
- - Other aspects of modern information systems such as security, privacy,7 KB (851 words) - 05:29, 15 October 2008
- * Information retrieval, filtering and dissemination. * Privacy and Security in Databases.2 KB (308 words) - 23:08, 14 October 2008
- Library. For additional information, please visit the above official ACM SAC Data Privacy and Security7 KB (1,006 words) - 23:08, 14 October 2008
- areas but also adds emphasis on Web, Information Retrieval and Data Mining. * Data privacy and security5 KB (661 words) - 16:23, 11 December 2008
- new perspectives regarding information sharing, annotation, * Policies, authentication, security, and trust within5 KB (709 words) - 23:08, 14 October 2008
- non-functional system properties (e.g. availability, reliability, security, performance, embedded systems, and that is not the case in information systems). Finally, because of7 KB (791 words) - 23:09, 14 October 2008
- | Title = 10th ACM International Workshop on Web Information and Data Management 10th ACM International Workshop on Web Information3 KB (437 words) - 23:20, 14 October 2008
- ...for possible inclusion, in expanded and revised form, in the Knowledge and Information Systems journal published by Springer-Verlag. * Security and data integrity5 KB (634 words) - 15:36, 14 December 2008
- technologies for the design, management and use of information systems management and analysis given the large amounts of information that are10 KB (1,288 words) - 11:52, 18 October 2008
- ...tion. Also, ODBASE'08 encourages the submission of papers that examine the information needs of various applications, including electronic commerce, electronic go ...stributed Applications), and IS'08 (International Symposium on Information Security).8 KB (1,081 words) - 08:21, 22 December 2011
- |Title=ACM 17th Conference on Information and Knowledge Management |Field=Information retrieval29 KB (4,077 words) - 18:04, 18 August 2023
- | Title = Third International Conference on Digital Information Management Third IEEE International Conference on Digital Information Management (ICDIM 2008)...4 KB (595 words) - 23:09, 14 October 2008
- * mobile database security committee. Detailed submission information will be posted on the web7 KB (875 words) - 23:09, 14 October 2008
- | Title = Third International Workshop on Flexible Database and Information Systems Technology Information systems are able to deal with an incredible amount of data, concerning ever7 KB (917 words) - 23:09, 14 October 2008
- * Data privacy and security * Managing uncertain and imprecise information6 KB (840 words) - 23:10, 14 October 2008
- § Geographic Information Systems § Multimedia Databases and Information Retrieval3 KB (305 words) - 08:44, 31 July 2020
- Information systems and database systems have always been a central topic of computer s * Applications of DB Systems and Information Systems4 KB (457 words) - 16:14, 16 December 2020
- * Security, reliability and availability in distributed storage systems, geographical information systems, image processing, Web retrieval,5 KB (644 words) - 23:10, 14 October 2008
- * incomplete information * privacy/security5 KB (647 words) - 23:10, 14 October 2008
- | Title = The Ninth International Conference on Web-Age Information Management The Ninth International Conference on Web-Age Information Management10 KB (1,376 words) - 23:10, 14 October 2008
- The theme of BNCOD 2008, the 25th in the series, is "Sharing Data, Information and Knowledge". * Data mining and information extraction4 KB (593 words) - 23:10, 14 October 2008
- | Title = International Workshop on Privacy and Anonymity in the Information Society Disclosure Risk and Information Loss Assessment2 KB (193 words) - 23:10, 14 October 2008
- ...e = Third International Workshop on Database Technologies for Handling XML Information on the Web ...ss, and social communities. Peer-to-peer architectures, the Grid, personal information systems, pervasive and ubiquitous computing, networked sensors, biomedical3 KB (475 words) - 23:10, 14 October 2008
- * Putting Auto ID data into context (relating it to business process information) * Privacy and security in Auto ID systems4 KB (471 words) - 23:10, 14 October 2008
- Nowadays, the rapid growth of information technologies has brought reliability, integrity, privacy, and security issues are still being7 KB (908 words) - 23:10, 14 October 2008
- ...middleware, e.g., for managing Grid resources, computing tasks, data, and information, form the basic framework for realising an e-Science environment. By automa * Security control in managing workflow4 KB (560 words) - 23:10, 14 October 2008
- ...g access to information and services. Such technologies contribute to make information and services available anytime and anywhere. This has led to the developmen * Reliability, security and privacy2 KB (324 words) - 16:49, 16 December 2020
- and military operations. Such networking is essential for safety, security and economic vitality in critical information exchange among diverse, widely-dispersed, mobile users. A primary5 KB (549 words) - 17:15, 5 July 2020
- Security issues Dept. of Electronic Engineering and Information Engineering Research, Technology &3 KB (364 words) - 23:11, 14 October 2008
- * Network Security and Cooperation * Web Information Management3 KB (339 words) - 23:11, 14 October 2008
- 9. Information Security Technologies2 KB (200 words) - 23:11, 14 October 2008
- * Network Security ...n the conference Web site. Please see http://www.comsnets.org for detailed information. The authors of accepted papers must guarantee that their paper will be pre4 KB (465 words) - 23:11, 14 October 2008
- 11. Communication and Information Systems Security Symposium3 KB (431 words) - 09:18, 4 August 2023
- ...he fly, based on which all electronic devices will be able to exchange the information with each other whenever necessary. Also, ubiquitous computing is an emergi Network Security and Privacy7 KB (990 words) - 23:11, 14 October 2008
- | Title = Security and Privacy in Telecommunications and Information Systems | Field = Computer security and reliability4 KB (587 words) - 23:30, 14 October 2008
- - Computer and Communications Network Security Further information about the conference is available at IWT official web site. Please, visit h3 KB (375 words) - 23:37, 14 October 2008