Search results

Jump to: navigation, search
  • * Security and trust management in collaborative networks, systems, and applications * Workflow technology and workflow management for collaborative network management
    6 KB (674 words) - 22:45, 14 October 2008
  • Database Security and Transaction Support Advanced Applications of Neural Network
    9 KB (1,240 words) - 22:56, 14 October 2008
  • ...ame studies/game design, e) graphics and interfaces and f ) networking and security. Papers that fall outside these topic areas are strongly encouraged and sho Networks and Security
    9 KB (1,275 words) - 14:46, 27 December 2015
  • - Social network analysis - Trust, privacy, and security on the semantic web
    6 KB (827 words) - 23:04, 14 October 2008
  • * Error tolerance, security and robustness * Network protocols and middleware for embedded systems
    2 KB (316 words) - 23:05, 14 October 2008
  • * Cryptography and Network Security * Voice-over-IP and Security
    2 KB (167 words) - 23:05, 14 October 2008
  • bioinformatics; Network computing; Neural computing; programs; foundations of security; term rewriting;
    5 KB (698 words) - 23:08, 14 October 2008
  • This track is dedicated to communication and network technologies that are of specific relevance to developing countries. The tr * Innovations in femtocells, picocells and relay network technologies
    9 KB (1,127 words) - 17:19, 26 April 2011
  • * Data Portability and Social Network Portability * Policies, authentication, security, and trust within
    5 KB (709 words) - 23:08, 14 October 2008
  • * Security and data integrity * Telecommunications, network and systems management
    5 KB (634 words) - 15:36, 14 December 2008
  • - Security and Access Control - Information Content Security
    4 KB (595 words) - 23:09, 14 October 2008
  • * mobile database security * sensor network databases
    7 KB (875 words) - 23:09, 14 October 2008
  • ...stems and networks designed using database principles (and vice versa), to network monitoring systems that depend on advanced data management and analysis cap * Network algorithms and theory applied to database systems
    3 KB (332 words) - 23:10, 14 October 2008
  • ...systems. However, such systems constrained resources in terms of autonomy, network bandwidth or storage capacity, mobile devices (mobile phones, PDA�?�) h * Reliability, security and privacy
    2 KB (324 words) - 16:49, 16 December 2020
  • ...he Natural Sciences and Engineering Research Council of Canada. The LORNET Network is hosting its 4th annual e-learning conference on Intelligent Interactive * Security and privacy;
    4 KB (503 words) - 23:11, 14 October 2008
  • and military operations. Such networking is essential for safety, security and economic vitality in •Trust, security, dependability, privacy, QoS and
    5 KB (549 words) - 17:15, 5 July 2020
  • ...special issue is to explore the development of vehicular ad hoc and sensor network technologies about communication, networking, and applications. Security issues
    3 KB (364 words) - 23:11, 14 October 2008
  • * Network Data Mining * Network Management
    3 KB (339 words) - 23:11, 14 October 2008
  • ...ocols, web architectures and protocols, network measurements and testbeds, network management systems, content distribution, peer to peer and overlay networks ...e, multilayer design and optimisation, MPLS and GMPLS, RFID, multicasting, network modelling and simulation, real-time voice/video over IP networks, resource
    7 KB (981 words) - 03:18, 6 January 2009
  • 1. NGN(Next Generation Network), NGI(Next Generation Internet) and Future Internet Technologies 5. RFID/USN(Ubiquitous Sensor Network) Technologies
    2 KB (200 words) - 23:11, 14 October 2008

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)