Search results

Jump to: navigation, search
  • ...for and publish information on scientific events, as well as universities, information infrastructure institutions, specialised societies, publishers and funding <!--[[:category:Information theory|Information theory]], [[:category:Internet|Internet]], [[:category:World wide web|World
    7 KB (815 words) - 18:03, 14 April 2021
  • '''Business Information Systems''' *Cyber Security and Privacy
    5 KB (663 words) - 11:49, 18 February 2020
  • * Semantic Information Management & Knowledge Integration * Trust, Data Privacy, and Security with Semantic Technologies
    6 KB (872 words) - 14:00, 22 February 2020
  • * Knowledge Graph Population and Information Extraction * Trust, Privacy, and Security for Knowledge Graphs
    4 KB (531 words) - 14:14, 22 February 2020
  • |Title=43rd International ACM SIGIR Conference on Research and Development in Information Retrieval |Field=Information retrieval
    8 KB (1,024 words) - 09:57, 13 May 2020
  • ...ter interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational linguistics. ...ividual stakeholders. They can be use by communities to assemble and share information about applications of AI, to inform approaches to ethical use of AI and the
    6 KB (872 words) - 23:11, 24 February 2020
  • Computer & Network Security Systems Information Theory
    10 KB (1,363 words) - 09:26, 7 May 2012
  • |Title=International Journal of Advances in Computing and Information Technology ...ch results and fundamental advances in all aspects of computer science and Information technology. IJACIT offers wide area of scope and aim that covers almost all
    3 KB (434 words) - 22:46, 30 May 2012
  • *Security and privacy ...formatted according to the [http://www.springer.de/comp/lncs/authors.html information for Springer LNCS authors] and submitted in PDF via [https://easychair.org/
    7 KB (991 words) - 11:15, 12 July 2019
  • * Machine learning and information extraction on the Semantic Web * Trust, privacy, and security on the Semantic Web
    5 KB (663 words) - 14:34, 5 December 2018
  • * Machine learning and information extraction on the Semantic Web * Trust, privacy, and security on the Semantic Web
    5 KB (699 words) - 14:57, 5 December 2018
  • Data Security More information on special sessions is available at www.iasted.org/conferences/specialsessi
    10 KB (1,492 words) - 17:22, 26 June 2012
  • |Title=4th International Conference on Information Visualization Theory and Applications |Field=Information Visualization
    4 KB (466 words) - 16:27, 19 June 2012
  • ...munication Protocols, Sensor Networks Software and Architectures, Wireless Information Networks, Data Manipulation, Signal Processing, Localization and Object Tra 2. WIRELESS INFORMATION NETWORKS
    5 KB (600 words) - 14:41, 20 June 2012
  • Service and Systems Design and QoS Network Security Information and Service Economy
    5 KB (662 words) - 18:50, 20 June 2012
  • |Field=INFORMATION TECHNOLOGIES SUPPORTING LEARNING,LEARNING/TEACHING METHODOLOGIES AND ASSESS 1. INFORMATION TECHNOLOGIES SUPPORTING LEARNING
    5 KB (671 words) - 18:54, 20 June 2012
  • ...rested in the advances and applications in the field of Smart Grids, Green Information and Communication Technologies, Sustainability, Energy Aware Systems and Te Smart Grid Security and Reliability
    5 KB (649 words) - 10:44, 21 June 2012
  • |Field=terrorism, national security, crime, politics, law |Superevent=secau Security Congress
    4 KB (575 words) - 05:16, 28 June 2012
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • |Title=IPICS Summer School Intensive Program on Information Communication Security |Field=information and communication security
    688 bytes (88 words) - 11:28, 1 August 2019
  • |Title=Intensive Programme on Information and Communications Security |Field=information and communication security
    406 bytes (49 words) - 15:37, 1 August 2019
  • ...atial exploration (telescopes, lenses), telecommunications (fiber optics), information processing (quantum computing), industry (cutting and precision measurement System Reliability and Security
    8 KB (1,102 words) - 17:23, 18 July 2012
  • |Field=Information and Communication Security ...broad coverage of recent developments in “Information and Communication Security”. In 2012 the IPICS will be hosted by the SBA Research, at Vienna, Austri
    2 KB (263 words) - 15:04, 24 July 2012
  • *Geographical Information Systems/ Global Navigation Satellite Systems (GIS/GNSS) *Intelligent Information & Database Systems
    2 KB (274 words) - 18:15, 13 August 2012
  • - Information and Data Management<br /> - Security and Access Control<br />
    3 KB (466 words) - 13:00, 16 August 2012
  • |Title=15th International Conference on Enterprise Information Systems ...y, Systems Integration, Artificial Intelligence, Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce
    5 KB (552 words) - 15:08, 21 August 2012
  • ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. • Information and innovation diffusion
    6 KB (728 words) - 01:01, 25 August 2012
  • |Superevent=World congress on Computing and Information Technology (WCIT) ...heir research activities in the field of Computer Science, Engineering and Information Technology. ICGCTI 2013 provides opportunities for the delegates to share t
    4 KB (491 words) - 22:39, 28 August 2012
  • The 2013 International Conference of Information Engineering The 2013 International Conference of Information Security and Internet Engineering
    7 KB (903 words) - 16:27, 10 September 2020
  • The 2013 International Conference of Information Engineering The 2013 International Conference of Information Security and Internet Engineering
    6 KB (868 words) - 17:21, 29 August 2012
  • |Field=databases, data warehousing, data mining,data management,data security ...ehousing, data mining, data management, data security and other aspects of information systems and technology involving advanced applications of data.
    5 KB (558 words) - 13:27, 27 November 2020
  • |Field=Enterprise Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...are "Enterprise Software Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".
    6 KB (801 words) - 11:04, 14 April 2020
  • |title=International Journal of Science and Applied Information Technology (IJSAIT) |Field=Computer Science, Information Technology
    2 KB (234 words) - 08:25, 26 October 2012
  • Information and Computer Technology Information Security
    2 KB (224 words) - 08:27, 26 October 2012
  • Security and Cryptography Web Information Systems
    2 KB (211 words) - 08:30, 26 October 2012
  • |Title=6th International Conference on Information Security and Cryptology 6th International Conference on Information Security and Cryptology
    3 KB (351 words) - 09:52, 28 October 2012
  • |Title=31st Conference on Advanced Information Systems Engineering ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness.
    3 KB (375 words) - 15:06, 24 September 2020
  • |Title=2013 International Conference on Internet Services Technology and Information Engineering (ISTIE 2013) 2013 International Conference on Internet Services Technology and Information Engineering (ISTIE 2013)
    6 KB (764 words) - 02:27, 11 December 2012
  • ...ents, logistics and networking, to complex event processing in finance and security. The DEBS conference brings together researchers and practitioners from the More information about the tracks and submission information can be found on the DEBS 2013 website:
    6 KB (826 words) - 15:44, 29 January 2021
  • ...ternative technologies (e.g. solar, tidal, wind, biofuels); food and water security; lobbying efforts by oil and multi-national companies to counter climate sc ...iters to visit www.alternateroutes.ca for author guidelines and additional information. Submissions must be sent directly to editor@alternateroutes.ca. Publicatio
    3 KB (404 words) - 15:10, 10 December 2020
  • |Title=The Second Asian Conference on Information Systems ...the Institute of Electrical Engineers of Japan (IEEJ) and the Electronics, Information and Systems Society under IEEJ and supported by SIIT, OPU, JAIST, NECTEC, P
    3 KB (408 words) - 11:39, 5 January 2013
  • |Title=International Conference on Information Society |Field=Information and communication technologies
    4 KB (535 words) - 14:38, 17 January 2013
  • |Title=5th International Conference on Knowledge Management and Information Sharing ...tures. Although standardization is indeed an essential element for sharing information, IS effectiveness requires going beyond the syntactic nature of IT and delv
    3 KB (441 words) - 14:52, 1 October 2020
  • - Information systems and people in organizations - Information and communications technologies and development
    5 KB (702 words) - 10:02, 5 March 2013
  • Privacy, Security and Neuroethics award and a best poster award. Please check the website for further information.
    5 KB (571 words) - 11:33, 26 March 2013
  • ...munication Protocols, Sensor Networks Software and Architectures, Wireless Information Networks, Data Manipulation, Signal Processing, Localization and Object Tra 2. WIRELESS INFORMATION NETWORKS
    5 KB (647 words) - 19:06, 5 April 2013
  • information from content and the connection of semantics to knowledge, Please refer to the conference website for further information:
    5 KB (609 words) - 11:08, 26 July 2016
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • ...SCI indexed journals, including International Journal on Semantic Web and Information Systems (IJSWIS). More journals will be added soon. ** Machine learning and information extraction on the Web
    5 KB (711 words) - 19:02, 7 March 2020
  • *Cyber Security *Data Mining & Information Retrieval
    3 KB (308 words) - 17:30, 26 May 2016
  • |Title=3rd International Conference on Digital Information Processing, Data Mining, and Wireless Communications *Digital Information Processing
    2 KB (227 words) - 11:30, 21 June 2016
  • ...istributed platforms, middleware, embedded- and cyber-physical-systems and security infrastructures. *Quality Aspects: Functionality, interoperability, performance, conformance, security, reliability, robustness, etc.
    3 KB (405 words) - 10:56, 24 April 2016
  • ...achine learning, computational biology, agent-based systems, semantic web, information extraction and retrieval, text and web mining, health care and public servi ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.
    3 KB (422 words) - 12:09, 24 April 2016
  • |Title=Computational Intelligence in Information Systems The main goals of Computational Intelligence in Information Systems (CIIS) are to understand better these technologies and their applic
    3 KB (309 words) - 17:11, 18 February 2021
  • * Semantic Information Management * Semantics for IT Safety & Security
    10 KB (1,347 words) - 15:01, 26 September 2016
  • * Information extraction and content analysis * Semantic-based information retrieval
    6 KB (898 words) - 14:42, 24 September 2016
  • Faculty of Information Technology, Le Quy Don Technical University Information Security
    3 KB (359 words) - 22:34, 30 September 2016
  • |Title=17th International Conference on Web Information Systems Engineering WISE 2016 welcomes all submissions that fall in the domain of Web, information systems, data analytics, and knowledge and data engineering. The decision o
    2 KB (230 words) - 00:37, 28 May 2016
  • ...ntegration, and information extraction, as well as papers that examine the information needs of various applications. ...ication of semantics and semantic modelling to enable co-operation between information systems. This year, we would also welcome additional submissions on the cha
    9 KB (1,131 words) - 23:18, 24 February 2020
  • |Title=25th European Conference on Information Systems |Field=Information Systems
    1 KB (177 words) - 10:04, 26 July 2016
  • * Information systems and Network security
    2 KB (197 words) - 16:16, 10 November 2016
  • ...IEICE Transactions Special Section on Information and Communication System Security (August 2017) |Field=security, informatioin security, network security, cyber security
    421 bytes (51 words) - 15:56, 15 February 2017
  • ...ter interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational linguistics. ...ividual stakeholders. They can be use by communities to assemble and share information about applications of AI, to inform approaches to ethical use of AI and the
    6 KB (877 words) - 23:06, 24 February 2020
  • ...ACM 2016 : 2016 6th International Conference on Communication and Network Security(ICCNS 2016)--ACM, EI and Scopus |Field=information technology, multimedia, wireless, information systems
    451 bytes (56 words) - 16:17, 8 July 2016
  • |Field=information security, anti-virus
    358 bytes (42 words) - 16:18, 8 July 2016
  • |Title=Ekoparty 2016 : Ekoparty Security Conference |Field=hacking, information security, offensive security
    384 bytes (45 words) - 16:18, 8 July 2016
  • |Field=information security, hacking
    321 bytes (39 words) - 16:18, 8 July 2016
  • |Field=information security, hacking
    282 bytes (29 words) - 18:24, 8 July 2016
  • |Field=information security, hacking, it security
    386 bytes (48 words) - 16:18, 8 July 2016
  • |Title=FC 2017 : Financial Cryptography and Data Security 2017 |Field=cryptography, information security
    364 bytes (45 words) - 16:19, 8 July 2016
  • |Title=ICIT 2016 : 15th International Conference on Information Technology |Field=information security, biomedical informatics, text and web-data analytics
    426 bytes (51 words) - 16:19, 8 July 2016
  • |Title=CISSI 2016 : International Symposium on Information Systems Security |Field=computer sciences, security, big data, cloud computing
    329 bytes (35 words) - 17:36, 8 July 2016
  • ...rnational Conference on Semantic Technology for Intelligence, Defense, and Security ...chnology and ontology relevant to the fields of Intelligence, Defense, and Security. We are especially interested in papers on the following topics:
    4 KB (506 words) - 11:39, 8 October 2020
  • |Title=ICISSP 2017 : 3rd International Conference on Information Systems Security and Privacy |Field=security systems, privacy
    385 bytes (48 words) - 16:21, 8 July 2016
  • |Title=9th Asian Conference on Intelligent Information and Database Systems The 9th Asian Conference on Intelligent Information and Database Systems (ACIIDS) 2017
    4 KB (464 words) - 11:38, 4 September 2020
  • |Title=23rd ACM International Conference on Information and Knowledge Management |Field=Information and Knowledge Management
    12 KB (1,565 words) - 04:15, 5 August 2023
  • - Security and Data Protection For further information please visit WCE-2016 at www.worldconedu.org
    6 KB (777 words) - 23:29, 29 July 2016
  • ...e=IEEE iNIS 2016 : 2nd IEEE International Symposium on Nanoelectronic and Information Systems ...ation systems, iot-big data, nanoelectronic systems, cyberphysical systems security
    464 bytes (56 words) - 15:35, 27 August 2016
  • |Title=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things
    870 bytes (100 words) - 18:53, 2 March 2021
  • |Title=INCISCOS 2016 : International Conference on Information Systems and Computer Science |Field=computer science, information systems, data mining, security
    472 bytes (58 words) - 15:36, 27 August 2016
  • |Title=ICISE 2017 : 2017 2nd International Conference on Information Systems Engineering (ICISE 2017)--IEEE, Ei |Field=information technology, information systems, information security, signal processing
    454 bytes (53 words) - 15:36, 27 August 2016
  • ...le=International Conference on Research and Practical Issues of Enterprise Information Systems |Field=Information Systems
    925 bytes (116 words) - 11:05, 24 August 2016
  • ...cond International Conference on Computer Graphics, Vision and Information Security (CGVIS) |Field=computer graphics, computer vision, image processing, information security
    1 KB (143 words) - 12:26, 5 November 2020
  • |Title=7th International Conference on Communications Security & Information Assurance |Field=security, communications, information security, cryptography
    370 bytes (37 words) - 06:18, 20 September 2016
  • |Title=ICISC 2016 : The 19th Annual International Conference on Information Security and Cryptology
    402 bytes (52 words) - 11:16, 5 September 2016
  • |Title=The Eleventh International Conference on Advances in Information Mining and Management - IMMM 2021, The Eleventh International Conference on Advances in Information Mining and Management
    10 KB (1,305 words) - 00:29, 12 December 2020
  • |Title=23rd European Conference on Information Systems |Field=Information Systems
    3 KB (434 words) - 10:28, 26 July 2016
  • |Title=2015 International Conference on Information Systems |Field=Information Systems
    2 KB (263 words) - 10:32, 26 July 2016
  • ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (282 words) - 10:48, 8 February 2020
  • ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (270 words) - 10:49, 8 February 2020
  • |Title=International Conference on Information Society |Field=Information Society
    5 KB (641 words) - 22:32, 29 July 2016
  • ...ional Civil Aviation Organization New Technology Working Group Request For Information |Field=technology, biometrics, identity management, security
    467 bytes (59 words) - 13:50, 25 September 2016
  • ...S-ACM 2016 : 2016 4th International Conference on Information and Network Security (ICINS 2016)--Ei Compendex
    452 bytes (54 words) - 10:46, 11 September 2016
  • |Acronym=JIP SI: Computer Security Technologies 2017 ...2017 : Journal of Information Processing, Special issue of “Computer Security Technologies against Sophisticated Cyber Attacks”
    513 bytes (62 words) - 14:44, 6 November 2020
  • * data mining, information extraction, search * data privacy and security
    4 KB (557 words) - 10:14, 15 May 2019
  • ...pers on AI techniques in the context of novel application domains, such as security, sustainability, health care, transportation, and commerce. A special theme ...re allowed as long as the deadline date is not past anywhere in the world. Information about camera ready deadlines will be provided to authors at a later date.
    10 KB (1,466 words) - 15:17, 7 March 2021
  • |Field=semantic web, internet of things, big data, information security
    431 bytes (45 words) - 21:01, 26 November 2016
  • |Title=ICICS 2017 : The 8th International Conference on Information and Communication Systems |Field=online social networks, security, big data, communication systems
    441 bytes (55 words) - 13:49, 25 September 2016
  • |Title=7th Asian Conference Intelligent Information and Database Systems |Field=Intelligen Information and Database Systems
    3 KB (340 words) - 11:27, 4 September 2020
  • ...ssing, neuroscience, bioinformatics, privacy and security, machine vision, information retrieval
    2 KB (240 words) - 15:50, 21 May 2019

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)