Search results

Jump to: navigation, search
  • ...itle = Annual Workshop of the ESF Networking Programme on Games for Design and Verification | Field = Computer networking
    3 KB (443 words) - 14:53, 27 December 2015
  • |title=Ubiquitous Computing and Communication Journal |Title=Ubiquitous Computing and Communication Journal
    5 KB (653 words) - 16:59, 29 May 2016
  • ...le=The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems
    3 KB (338 words) - 16:53, 27 December 2015
  • |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    9 KB (1,092 words) - 09:35, 1 August 2019
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • |Field=Computer science ...tion in 1985 until December 2018, print copies were mailed to CCSC members and also distributed at the regional conferences. Starting with Volume 34 issue
    3 KB (389 words) - 13:46, 6 May 2020
  • |Title=International Symposium on Computer and Information Sciences
    217 bytes (26 words) - 22:31, 25 February 2020
  • |Title=21st ACM Conference on Economics and Computation The 21st ACM Conference on Economics and Computation (EC) 2020
    5 KB (718 words) - 12:00, 11 September 2020
  • |Acronym=CALL FOR PAPER Journal: International Journal of Biometrics and Bioinformatics (IJBB) |Title=International Journal of Biometrics and Bioinformatics (IJBB)
    3 KB (364 words) - 16:46, 5 July 2020
  • ...ions and theoretical or quantitative discussion intended for both academic and industrial progress. ...ngineers, among others working in Engineering and welcome them to exchange and share their expertise in their particular disciplines. We also encourage ar
    3 KB (322 words) - 16:47, 5 July 2020
  • ...in the theory, design, implementation, analysis, and application of secure computer systems. ...echanisms for enforcing them, and the architectural principles of software and hardware system implementing them.
    5 KB (609 words) - 17:01, 5 July 2020
  • |Title=14th Federated Conference on Computer Science and Information Systems ...work Systems and Applications, Information Systems and Technology,Software and System Engineering
    4 KB (550 words) - 12:11, 13 September 2019
  • |Title=17th International Congress on Computer Science Research |Field=Computer science
    3 KB (367 words) - 16:37, 27 December 2015
  • |Title=32nd International Symposium on Computer and Information Sciences |Field=computer information sciences
    1 KB (134 words) - 15:01, 6 August 2019
  • |Title=31st International Symposium on Computer and Information Sciences |Field=computer and information sciences
    1 KB (139 words) - 15:14, 6 August 2019
  • ...le=The sixth IASTED International Conference on Computational Intelligence and Bioinformatics |Field=Computational Intelligence and Bioinformatics
    12 KB (1,534 words) - 16:38, 27 December 2015
  • |Title=World Congress on Engineering and Computer Science 2012 |Field=engineering, computer science, systems engineering, chemical engineering
    6 KB (823 words) - 11:15, 24 September 2020
  • |Field=Information systems Hosted by University of Leipzig, Department of Computer Science and Information Systems Institute,
    5 KB (738 words) - 01:41, 25 February 2020
  • |Title=24th International Conference on Theory and Practice of Digital Libraries ...special needs and requirements for effective data utilization, management and exploitation.
    6 KB (825 words) - 10:31, 24 March 2020
  • |Title=29th ACM International Conference on Information and Knowledge Management |Field=Information and Knowledge Management
    5 KB (653 words) - 13:04, 3 August 2023

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)