Search results

Jump to: navigation, search
  • * Security and trust management in collaborative networks, systems, and applications * Workflow technology and workflow management for collaborative network management
    6 KB (674 words) - 22:45, 14 October 2008
  • Database Security and Transaction Support Advanced Applications of Neural Network
    9 KB (1,240 words) - 22:56, 14 October 2008
  • ...ame studies/game design, e) graphics and interfaces and f ) networking and security. Papers that fall outside these topic areas are strongly encouraged and sho Networks and Security
    9 KB (1,275 words) - 14:46, 27 December 2015
  • - Social network analysis - Trust, privacy, and security on the semantic web
    6 KB (827 words) - 23:04, 14 October 2008
  • * Error tolerance, security and robustness * Network protocols and middleware for embedded systems
    2 KB (316 words) - 23:05, 14 October 2008
  • * Cryptography and Network Security * Voice-over-IP and Security
    2 KB (167 words) - 23:05, 14 October 2008
  • bioinformatics; Network computing; Neural computing; programs; foundations of security; term rewriting;
    5 KB (698 words) - 23:08, 14 October 2008
  • This track is dedicated to communication and network technologies that are of specific relevance to developing countries. The tr * Innovations in femtocells, picocells and relay network technologies
    9 KB (1,127 words) - 17:19, 26 April 2011
  • * Data Portability and Social Network Portability * Policies, authentication, security, and trust within
    5 KB (709 words) - 23:08, 14 October 2008
  • * Security and data integrity * Telecommunications, network and systems management
    5 KB (634 words) - 15:36, 14 December 2008
  • - Security and Access Control - Information Content Security
    4 KB (595 words) - 23:09, 14 October 2008
  • * mobile database security * sensor network databases
    7 KB (875 words) - 23:09, 14 October 2008
  • ...stems and networks designed using database principles (and vice versa), to network monitoring systems that depend on advanced data management and analysis cap * Network algorithms and theory applied to database systems
    3 KB (332 words) - 23:10, 14 October 2008
  • ...systems. However, such systems constrained resources in terms of autonomy, network bandwidth or storage capacity, mobile devices (mobile phones, PDA�?�) h * Reliability, security and privacy
    2 KB (324 words) - 16:49, 16 December 2020
  • ...he Natural Sciences and Engineering Research Council of Canada. The LORNET Network is hosting its 4th annual e-learning conference on Intelligent Interactive * Security and privacy;
    4 KB (503 words) - 23:11, 14 October 2008
  • and military operations. Such networking is essential for safety, security and economic vitality in •Trust, security, dependability, privacy, QoS and
    5 KB (549 words) - 17:15, 5 July 2020
  • ...special issue is to explore the development of vehicular ad hoc and sensor network technologies about communication, networking, and applications. Security issues
    3 KB (364 words) - 23:11, 14 October 2008
  • * Network Data Mining * Network Management
    3 KB (339 words) - 23:11, 14 October 2008
  • ...ocols, web architectures and protocols, network measurements and testbeds, network management systems, content distribution, peer to peer and overlay networks ...e, multilayer design and optimisation, MPLS and GMPLS, RFID, multicasting, network modelling and simulation, real-time voice/video over IP networks, resource
    7 KB (981 words) - 03:18, 6 January 2009
  • 1. NGN(Next Generation Network), NGI(Next Generation Internet) and Future Internet Technologies 5. RFID/USN(Ubiquitous Sensor Network) Technologies
    2 KB (200 words) - 23:11, 14 October 2008
  • * Network-based applications * Network Security
    4 KB (465 words) - 23:11, 14 October 2008
  • * Wireless Mesh & Sensor Network Applications * Network Security & Reliability
    4 KB (559 words) - 23:11, 14 October 2008
  • ...ocus on new models and methods as well as mechanisms, which can enable the network to perform adaptive behaviors. High-speed Network Protocols
    7 KB (990 words) - 23:11, 14 October 2008
  • - Computer and Communications Network Security
    3 KB (375 words) - 23:37, 14 October 2008
  • | Title = Third International Conference on Bio-Inspired Models of Network, Information and Computing Systems 3rd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems
    5 KB (694 words) - 23:11, 14 October 2008
  • | Title = New Technologies, Mobility and Security ...8 is the Second International Conference on New Technologies, Mobility and Security that will be held from 5 to 7 November, 2008 in Tangier, Morocco.
    2 KB (209 words) - 23:12, 14 October 2008
  • 6. Intelligent Communication Systems and Network Protocols 7. Security Signal Processing
    4 KB (496 words) - 23:12, 14 October 2008
  • Papers related to wireless and mobile network Modeling, Analysis, - Wireless network algorithms and protocols
    4 KB (596 words) - 23:12, 14 October 2008
  • Security/privacy in wireless systems Wireless network architectures
    2 KB (244 words) - 23:12, 14 October 2008
  • 1 .5 Network Management 1 .6 Network Planning and Optimization
    2 KB (250 words) - 23:12, 14 October 2008
  • ...and operation of Next Generation Internet networks. It is organized by the Network of Excellence (NoE) Euro-FGI (http://www.eurongi.org) that was initiated by * Network co-operation
    3 KB (382 words) - 23:12, 14 October 2008
  • ...ield of computer and data communication networks. We invite submissions on network architecture, design, implementation, operations, analysis, measurement, pe * Analysis and design of network architectures and algorithms
    3 KB (352 words) - 23:12, 14 October 2008
  • - Network Security - Trust, Security, and Privacy
    3 KB (465 words) - 23:13, 14 October 2008
  • * Computer Networks and Security * Network Reliability and QoS
    2 KB (283 words) - 23:13, 14 October 2008
  • | Title = Fifth Annual Conference on Wireless On demand Network Systems and Services effort as well as with little dependency on existing network infrastructures.
    3 KB (413 words) - 23:13, 14 October 2008
  • architectural boundaries of large-scale network services. We solicit * Security and resilience of networked systems
    4 KB (528 words) - 23:13, 14 October 2008
  • sub-areas of research: adaptation of system operations to the network the 90's that had an inward focus on network signaling & control today's
    5 KB (651 words) - 23:13, 14 October 2008
  • - Wireless network security and privacy - Security Techniques and systems
    3 KB (343 words) - 10:31, 14 August 2023
  • *Security and privacy in Web search and mining *Discovery-driven Web and social network mining
    2 KB (237 words) - 12:23, 11 September 2020
  • | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.
    4 KB (457 words) - 23:13, 14 October 2008
  • ...nhanced business information systems, e-education specialists, Information security, and other Web related technologies. The aim of NWeSP'08 is to serve as a f Web Services Security
    3 KB (494 words) - 23:16, 14 October 2008
  • ...os, audio recordings) in bibliometrics (publication patterns), in homeland security (terrorist networks). * Social network analysis
    3 KB (453 words) - 23:14, 14 October 2008
  • networks, including user behavior models, security and trust, P2P, the Network Society"
    7 KB (813 words) - 23:14, 14 October 2008
  • * Networking and network services * Security, privacy, and trust
    6 KB (869 words) - 23:14, 14 October 2008
  • * Security of WiMAX in NGN * Network architecture infrastructure integration of WiMAX in NGN
    1 KB (181 words) - 23:14, 14 October 2008
  • ...ant research dialog, or pushes the architectural boundaries of large-scale network services. We solicit papers describing original and previously unpublished * Security, robustness, and fault-tolerance in networked environments
    8 KB (1,093 words) - 23:15, 14 October 2008
  • ...itionally offered predominantly passive experiences, continual advances in network and computer technologies are providing tools for implementing greater inte * QoS and Security Support for Entertainment
    8 KB (1,011 words) - 23:15, 14 October 2008
  • | Title = IEEE 3rd International Workshop on Distributed Autonomous Network Management Systems 3rd International Workshop on Distributed Autonomous Network
    6 KB (663 words) - 23:15, 14 October 2008
  • * Security, privacy and trust management in collaborative networks, systems, and appli * Workflow management for collaborative network/system
    8 KB (1,093 words) - 23:15, 14 October 2008
  • | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)
    5 KB (628 words) - 23:15, 14 October 2008
  • 3-08 Network routing and communication algorithms 4. Security and Privacy
    5 KB (623 words) - 23:15, 14 October 2008
  • ...ng difficult social and policy issues such as those related to privacy and security The third generation of social networking technologies has hit the Web. This network serve increasingly
    8 KB (1,003 words) - 23:15, 14 October 2008
  • | Title = 4th IEEE Workshop on Secure Network Protocols 4th workshop on Secure Network Protocols (NPSec 2008)
    4 KB (493 words) - 23:15, 14 October 2008
  • * Giuseppe Persiano: Security of networks of low capability devices Network information management is a growing area of research at the attention
    4 KB (563 words) - 23:15, 14 October 2008
  • * Measurement-based network management such as traffic engineering * Network applications such as WWW, multimedia streaming, and gaming
    3 KB (313 words) - 23:15, 14 October 2008
  • ...lumes, mainly because of converged type of traffic resulted from converged network operation under converged services and applications. Moreover, wireless acc * New Teletraffic and Network Traffic Challenges and Paradigms
    5 KB (598 words) - 10:18, 29 May 2016
  • ...act may both be mobile. Their implementation requires advances in wireless network technologies and devices, development of infrastructures supporting cogniti * Ad hoc and sensor network support for ubiquitous computing
    5 KB (599 words) - 23:15, 14 October 2008
  • | Title = 18th International workshop on Network and Operating Systems Support for Digital Audio and Video In-network stream processing
    3 KB (322 words) - 23:15, 14 October 2008
  • |Title=6th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    509 bytes (65 words) - 14:00, 6 November 2020
  • |Title=7th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    509 bytes (62 words) - 14:01, 6 November 2020
  • |Title=9th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    496 bytes (63 words) - 14:05, 6 November 2020
  • |Title=15th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    506 bytes (61 words) - 14:16, 6 November 2020
  • |Title=8th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    475 bytes (60 words) - 14:03, 6 November 2020
  • |Title=14th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    485 bytes (60 words) - 14:15, 6 November 2020
  • |Title=12th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    497 bytes (60 words) - 14:11, 6 November 2020
  • |Title=13th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    516 bytes (64 words) - 14:12, 6 November 2020
  • |Title=10th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    491 bytes (60 words) - 14:07, 6 November 2020
  • |Title=11th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    507 bytes (62 words) - 14:09, 6 November 2020
  • | Title = First ACM Conference on Wireless Network Security | Field = Computer security and reliability
    2 KB (197 words) - 23:15, 14 October 2008
  • - Information forensics and security - Sensor network
    2 KB (253 words) - 23:16, 14 October 2008
  • Hyper Network Communication Network Security and Information Assurance
    4 KB (438 words) - 23:17, 14 October 2008
  • ...industry, and government to present and discuss recent advances in sensor network research and applications. The conference covers both theoretical and exper Network health monitoring
    4 KB (570 words) - 23:17, 14 October 2008
  • ...rch domains that increasingly play a key role in connecting systems across network centric environments to allow distributed computing and information sharing * OSS and security, security implication of OSS, security concerns in using OSS
    5 KB (697 words) - 23:18, 14 October 2008
  • ...his has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society tha The international conference on Advances in Social Network Analysis and Mining (ASONAM 2009) will primarily provide an interdisciplina
    3 KB (404 words) - 23:18, 14 October 2008
  • o Privacy and security issues. o Impact of recommendation models on the evolution of the social network.
    5 KB (592 words) - 23:18, 14 October 2008
  • intelligence, domain constraints and network intelligence in data blog mining, security mining, taxation mining, scientific data
    4 KB (510 words) - 23:19, 14 October 2008
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • | Title = Second ACM Conference on Wireless Network Security | Field = Computer security and reliability
    2 KB (291 words) - 23:19, 14 October 2008
  • | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability
    5 KB (673 words) - 23:19, 14 October 2008
  • | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability
    6 KB (697 words) - 23:19, 14 October 2008
  • | Title = The First ACM Computer Security Architecture Workshop | Field = Computer security and reliability
    5 KB (619 words) - 23:19, 14 October 2008
  • | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability
    6 KB (736 words) - 23:20, 14 October 2008
  • | Title = Information Security South Africa (ISSA) Conference 2008 | Field = Computer security and reliability
    4 KB (465 words) - 23:20, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security | Field = Computer security and reliability
    4 KB (565 words) - 23:20, 14 October 2008
  • | Title = IEEE Symposium on Security and Privacy | Field = Computer security and reliability
    2 KB (262 words) - 23:20, 14 October 2008
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability
    4 KB (502 words) - 23:20, 14 October 2008
  • - Mobile Network Traffic Engineering, Performance & Optimization - Wireless & Mobile Network Management and Service Infrastructure
    10 KB (1,262 words) - 23:20, 14 October 2008
  • Service Security, Privacy and Trust Service Network Economic Structures and Effects
    18 KB (2,352 words) - 23:23, 14 October 2008
  • * Information Security * Ubiquitous and Sensor Network
    3 KB (415 words) - 23:23, 14 October 2008
  • | Field = Computer security and reliability ...des research at all design levels: circuit, architecture, compiler, OS and network. This workshop aims to become a forum for academia and industry to discuss
    5 KB (598 words) - 01:12, 31 May 2012
  • RAID, and network-storage system designs). ...s increasingly important as boundaries between hardware/software and local/network
    3 KB (406 words) - 17:39, 30 September 2016
  • ...SETI@Home?s "BOINC" computational Grid; BitTorrent?s Content Distribution Network; and ppLive, and ppStream in China, as well as Zattoo in Europe, all of thr * Security and Trust in Distributed Systems
    6 KB (761 words) - 03:28, 6 January 2009
  • resources such as processing, network bandwidth and storage capacity - Networking and Security
    5 KB (577 words) - 23:27, 14 October 2008
  • * Hardware support for security * Network processor and router architectures
    2 KB (259 words) - 10:14, 29 May 2016
  • ...d their own properties with respect to traffic load, congestion situation, network topology, and wireless channel propagation etc. However, cognitive radio wi ...s that report the latest research advances in this field from physical and network layers to practical applications.
    3 KB (409 words) - 23:27, 14 October 2008
  • ...a broad forum an outstanding opportunity for researchers, academicians and network engineers to discuss new and emerging technologies in the field of computer - Network management and performance
    3 KB (413 words) - 23:28, 14 October 2008
  • Computational Intelligence: Artificial neural network, Fuzzy systems, Genetic algorithm, Evolutionary computing, Machine learning ...energy, Waste management, Waste treatment and recycling, Water network and security, Sensor technologies, Intelligent Micro-grids
    4 KB (561 words) - 23:29, 14 October 2008
  • of real-time embedded systems, such as timeliness, safety, security, - COMPOSITIONAL DISTRIBUTED SYSTEMS: composition of network protocol
    6 KB (707 words) - 23:29, 14 October 2008
  • |Field=Computer Science, Embedded systems, Embedded Network Sensor Systems, Sensor Systems Sensor network architecture and protocols Sensor network algorithms such as localization, routing, time synchronization, clustering,
    6 KB (771 words) - 16:09, 16 September 2019

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)