Search results

Jump to: navigation, search

Page title matches

Page text matches

  • ...puting has been a primary gathering forum for applied computer scientists, computer engineers, software engineers, and application developers from around the w ...ting with classic Web Services. Finally, features like Quality of Service, security and dependability need to be taken seriously into account, and this investi
    7 KB (957 words) - 15:15, 11 August 2008
  • |Title=Annual Computer Security Applications Conference
    297 bytes (35 words) - 16:50, 16 February 2021
  • ** Privacy, safety and security ** Privacy, safety, and security
    6 KB (777 words) - 22:54, 14 August 2008
  • === Computer sciences=== ==== Computer communications (networks)====
    6 KB (714 words) - 12:19, 11 December 2020
  • | title = Transactions on Information and System Security | Field = Computer security and reliability
    272 bytes (32 words) - 16:33, 18 August 2008
  • |Field=computer science *Network Security
    5 KB (571 words) - 09:22, 19 July 2019
  • |Title=1st International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    522 bytes (65 words) - 13:51, 6 November 2020
  • |Title=2nd International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    535 bytes (66 words) - 14:23, 6 November 2020
  • |Title=3rd International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    482 bytes (60 words) - 13:55, 6 November 2020
  • |Title=4th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    470 bytes (56 words) - 13:57, 6 November 2020
  • |Title=5th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    474 bytes (60 words) - 13:58, 6 November 2020
  • | Title= Conference on Computer and Communications Security 1997 | Field = Computer security and reliability
    334 bytes (35 words) - 20:56, 4 October 2016
  • |Field=Computer and Communications Security
    272 bytes (33 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    256 bytes (30 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    251 bytes (30 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    264 bytes (32 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    264 bytes (32 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    278 bytes (33 words) - 17:56, 4 October 2016
  • |Title=International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    322 bytes (46 words) - 08:58, 13 February 2021
  • | Title = Conference on Computer and Communications Security | Field = Computer security and reliability
    141 bytes (16 words) - 00:24, 22 August 2008
  • * IEEE, IEEE Computer Society * Trust, security and privacy issues in pervasive systems
    12 KB (1,560 words) - 15:03, 27 August 2008
  • |Field=Computer science ...ocus on the frontier topics in the theoretical and applied engineering and computer science subjects. The WCE conferences serve as good platforms for our membe
    3 KB (454 words) - 12:34, 8 October 2020
  • This is the twelfth IEEE Computer Society symposium dealing with the inter-operability, security, trusted and dependable systems, fault
    5 KB (715 words) - 17:43, 11 September 2008
  • - privacy and security Keith S. Decker, Dept. of Computer and Information Sciences,
    10 KB (1,371 words) - 16:14, 12 November 2020
  • |Field=Computer networking * Security issues of data management in wireless networks
    5 KB (611 words) - 15:43, 16 September 2008
  • ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d Additionally, P2P systems require special attention from the security point of view. Trust, reputation, copyrights, and intellectual property are
    18 KB (2,408 words) - 02:37, 16 December 2008
  • ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.) The DB 2009 Proceedings will be published by IEEE Computer Society Press and on-line via IEEE XPlore Digital Library. IEEE will index
    11 KB (1,446 words) - 18:26, 13 October 2008
  • |Field=Computer science ** Testing, assuring and certifying F/OSS quality and security
    10 KB (1,349 words) - 16:42, 24 September 2008
  • Software Security Human-Computer Interaction
    2 KB (293 words) - 10:35, 24 June 2011
  • |Field=Computer networking ...May 26-29, 2009. The conference covers theory, design and application of computer networks and distributed computing systems. Aside from the regular presenta
    34 KB (4,565 words) - 22:20, 10 January 2018
  • |Field=Computer networking ...March 25-28, 2008. The conference covers theory,design and application of computer networks and distributed computing systems. Aside from the regular presenta
    8 KB (1,037 words) - 22:20, 10 January 2018
  • |Field=Computer networking ..., May 21-23, 2007. The conference covers theory, design and application of computer networks and distributed computing systems. Aside from the regular presenta
    9 KB (1,189 words) - 22:20, 10 January 2018
  • |Field=Computer networking the TCDP of the IEEE Computer Society, the International Conference
    26 KB (3,456 words) - 22:20, 10 January 2018
  • |Field=Computer networking ...- March 30, 2005. The conference covers theory, design and application of computer networks and distributed computing systems. Aside from the regular presenta
    10 KB (1,263 words) - 22:20, 10 January 2018
  • |Field=Computer networking ...will include sessions on all aspects of theory, design and application of computer networks and distributed computing systems. Aside the regular presentation,
    12 KB (1,537 words) - 22:19, 10 January 2018
  • |Field=Computer networking * Security and Privacy
    8 KB (1,040 words) - 22:20, 10 January 2018
  • * General computer systems issues in operating systems, architecture, memory hierarchy, compil ...issues such as workload modeling, performance metrics, power consumption, security, usability, and experience with real systems and failures
    5 KB (777 words) - 05:50, 14 October 2008
  • - Wireless security and dependability ...fp/servlet/event.showcfp?eventid=3852&copyownerid=2 WikiCFP][[Category:Computer networking]]
    4 KB (495 words) - 09:22, 22 August 2023
  • ...traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. - Trust-related Security and Privacy: Trust-related secure architecture, framework, policy, intrusio
    9 KB (1,216 words) - 17:32, 14 October 2008
  • | Field = Computer networking communication networks, computer networks, social networks, biological
    6 KB (722 words) - 17:32, 14 October 2008
  • ...multimedia databases, digital and video libraries, compression and coding, security over the network. ...e, OCR and document analysis, mobile robots and visual navigation, network security, remote sensing and environment control, video surveillance and intelligent
    2 KB (268 words) - 17:47, 14 October 2008
  • | Field = Computer networking o Security aspects in cross-layer designs
    3 KB (424 words) - 17:47, 14 October 2008
  • ===Design, Human Computer Interaction=== * Security and privacy
    8 KB (989 words) - 20:13, 22 February 2009
  • | Title = The seventh ACS/IEEE International Conference on Computer Systems and Applications | Field = Computer science
    4 KB (503 words) - 11:36, 18 October 2008
  • | Field = Computer architecture ...vanced technologies and radically new solutions relevant to development of computer systems and aims to foster communication among scientists and engineers to
    4 KB (591 words) - 17:48, 14 October 2008
  • | Field = Computer networking * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques
    3 KB (431 words) - 17:48, 14 October 2008
  • | Field = Computer networking • Wireless network security and privacy
    6 KB (731 words) - 10:33, 14 August 2023
  • | Field = Computer networking * Wireless privacy and security
    3 KB (456 words) - 18:10, 14 October 2008
  • |Field=Computer networking * Security, privacy, and trustworthiness of mobile and wireless systems
    7 KB (974 words) - 12:28, 3 August 2023
  • |Field=Informatics, Computer Science, COP * Computer Science Security.
    3 KB (317 words) - 18:42, 7 October 2011
  • * Trust, reputation, security, and privacy in MBC ...sent the work. Papers should not exceed 15 pages in LNCS (Lecture Notes in Computer Science) format: http://www.springer.de/comp/lncs/authors.html
    5 KB (647 words) - 22:05, 14 October 2008
  • ...d functionalities, provenance has only recently attracted the attention of computer scientists. Provenance poses many fundamental challenges, such as performan ...ware engineering, workflow system, information retrieval, web service, and security research. At the same time, it also requires understanding of problems from
    3 KB (416 words) - 17:48, 14 October 2008
  • ...nd panel sessions. The INTERNET 2009 Proceedings will be published by IEEE Computer Society and posted on Xplore IEEE system. A best paper award will be grante Internet security enforcement and validation
    11 KB (1,385 words) - 17:48, 14 October 2008
  • | Title = IEEE International Conference on Intelligence and Security Informatics | Field = Computer security and reliability
    438 bytes (45 words) - 21:41, 16 October 2008
  • * Computer-assisted legal drafting and document management ...legal norm-governed systems (e.g. e-commerce rules, organization rules and security regulations)
    7 KB (998 words) - 17:48, 14 October 2008
  • | Title = The First International Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability
    7 KB (960 words) - 17:48, 14 October 2008
  • | Field = Computer networking * Trust, security and privacy
    19 KB (2,503 words) - 13:25, 28 October 2020
  • |Field=Computer science * Security and privacy in vehicular networks
    3 KB (378 words) - 14:22, 24 August 2016
  • * Security, Privacy, Safety and Legal Issues Computer Science (LNCS, EI indexed). At least one author of each accepted
    7 KB (942 words) - 20:05, 14 October 2008
  • | Title = The 3rd International Symposium on Security and Multimodality in Pervasive Environments | Field = Computer science
    3 KB (393 words) - 21:18, 14 October 2008
  • | Field = Computer security and reliability
    3 KB (467 words) - 21:39, 16 October 2008
  • - Security and privacy in SPSs - SPS exploiting emerging computer architectures (multi-core, cell)
    3 KB (490 words) - 20:05, 14 October 2008
  • + Security and information assurance Biography: Dr. Divyakant Agrawal is a Professor of Computer
    7 KB (907 words) - 21:51, 14 October 2008
  • | Field = Computer networking • Security, Survivability and Fault Tolerance
    2 KB (244 words) - 20:05, 14 October 2008
  • | Field = Computer networking ...seeks papers describing significant research contributions to the field of computer and data communication networks. We invite submissions on various aspects o
    3 KB (353 words) - 20:31, 14 October 2008
  • | Field = Computer networking * › Security Aspects of Mobile Software
    9 KB (1,219 words) - 20:05, 14 October 2008
  • Computer Vision • Ethical, Social, Privacy, Security and moral Issues in an e-societ
    5 KB (530 words) - 10:27, 24 June 2011
  • Human-Computer Interface & Visualization Computer-aided Design/manufacturing
    3 KB (332 words) - 20:06, 14 October 2008
  • |Field=Computer security and reliability ...(railways, airlines, road), life related (health, emergency response, and security), manufacturing (chips, computers, cars) or financial (credit cards, on-lin
    15 KB (2,175 words) - 21:03, 19 March 2013
  • Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability USER INTERFACE and HUMAN COMPUTER INTERACTION
    3 KB (354 words) - 20:06, 14 October 2008
  • - Data Security Issues - IS Security Issues
    6 KB (780 words) - 20:06, 14 October 2008
  • The Faculty of computer and information science organizes this important conference.this conferenc * Computer Networks
    2 KB (193 words) - 20:06, 14 October 2008
  • Computer Vision Intelligent Networks and Security
    3 KB (359 words) - 20:06, 14 October 2008
  • | Field = Computer networking o Security and Privacy
    2 KB (303 words) - 20:06, 14 October 2008
  • | Field = Computer networking ...mic experts to present and discuss communications quality, reliability and security issues as they relate to real world issues. The output from the workshops a
    4 KB (505 words) - 22:15, 14 October 2008
  • | Field = Computer networking * Security
    6 KB (686 words) - 20:06, 14 October 2008
  • Homeland Security Human-Computer Interaction
    6 KB (708 words) - 22:49, 14 October 2008
  • | Title = The 11th European Conference on Computer Supported Co-operative Work | Field = Human-computer interaction
    2 KB (261 words) - 22:45, 14 October 2008
  • | Field = Human-computer interaction * Security and privacy in pervasive healthcare
    6 KB (732 words) - 22:45, 14 October 2008
  • | Field = Human-computer interaction the International Computer Sciences, and Social Informatics and Telecommunications Engineering (ICST)
    6 KB (674 words) - 22:45, 14 October 2008
  • | Field = Human-computer interaction - Privacy and security issues
    6 KB (890 words) - 22:53, 14 October 2008
  • | Field = Human-computer interaction ...ionals, educators and students of various HCI-related disciplines, such as Computer Science, Psychology, Ergonomics and Graphic Design, among others.
    3 KB (502 words) - 22:53, 14 October 2008
  • | Title = 18th annual international conference on computer science and software engineering - Security and Privacy: cryptography; access control; security in
    9 KB (1,193 words) - 22:53, 14 October 2008
  • | Field = Human-computer interaction computer science education) to present original research on software
    3 KB (355 words) - 22:53, 14 October 2008
  • | Field = Human-computer interaction �?� Multi-resolution and other efficient computer graphics, visualization algorithms for cooperative visualization
    4 KB (468 words) - 22:54, 14 October 2008
  • | Title = Human Computer Interaction 2008 | Field = Human-computer interaction
    3 KB (322 words) - 22:41, 4 February 2009
  • 5. Human-Computer Interaction Database Security and Transaction Support
    9 KB (1,240 words) - 22:56, 14 October 2008
  • ...08), this year's conference expands its scope to encompass all aspects of Computer Science focused game research, along with game-oriented education research, ...ame studies/game design, e) graphics and interfaces and f ) networking and security. Papers that fall outside these topic areas are strongly encouraged and sho
    9 KB (1,275 words) - 14:46, 27 December 2015
  • ...bringing together researchers from the fields of modal logics, theoretical computer science and multi-agent systems as well as researchers who are interested i * security, privacy and trust issues in multi-agent systems
    5 KB (670 words) - 23:04, 14 October 2008
  • | Title = European Conference on Intelligence and Security Informatics | Field = Computer security and reliability
    592 bytes (64 words) - 23:04, 14 October 2008
  • ...ntelligence. Because of its ubiquity, logic has acquired a central role in Computer Science education. - Foundations of security
    5 KB (799 words) - 21:49, 26 February 2020
  • ...nformation systems, natural language processing, soft computing, and human-computer interaction. ** Representing and reasoning about trust, privacy, and security
    6 KB (854 words) - 12:05, 28 May 2016
  • Notes in Computer Science�?? (LNCS). share research results in Computer Science and Informatics as well as
    13 KB (1,775 words) - 23:04, 14 October 2008
  • - Computer vision - AI and Human-computer interaction
    6 KB (827 words) - 23:04, 14 October 2008
  • * Cryptography and Network Security * Voice-over-IP and Security
    2 KB (167 words) - 23:05, 14 October 2008
  • | Acronym = Computer Journal 2008 the Computer Journal
    4 KB (536 words) - 17:55, 10 February 2021
  • * models of concurrency, security, and mobility * type and category theory in computer science
    8 KB (1,085 words) - 18:01, 12 February 2009
  • b. Security/accreditation c. Cyber Security
    16 KB (2,200 words) - 20:51, 18 February 2021
  • | Title = 5th IFIP International Conference on Theoretical Computer Science 5th IFIP International Conference on Theoretical Computer Science
    5 KB (698 words) - 23:08, 14 October 2008
  • data; security; semi-structured data; spatial data; temporal data; LaTeX2e style llncs for Lecture Notes in Computer Science, which is
    5 KB (660 words) - 14:52, 2 March 2012
  • * Network and IT security issues in developing countries Abdelfettah Belghith, National School of Computer Sciences (ENSI), Tunisia;
    9 KB (1,127 words) - 17:19, 26 April 2011
  • ...tes to attend sessions in any conference participating in the Australasian Computer Science Week. * Privacy and Security in Databases.
    2 KB (308 words) - 23:08, 14 October 2008
  • primary and international forum for applied computer scientists, computer engineering, and other computer related professionals to gather, interact, present,
    7 KB (1,006 words) - 23:08, 14 October 2008
  • non-functional system properties (e.g. availability, reliability, security, performance, by using the Springer Lecture Notes in Computer Science (LNCS) style
    7 KB (791 words) - 23:09, 14 October 2008
  • Security, Personalization Department of Computer Science, University of California-Santa Cruz,
    3 KB (437 words) - 23:20, 14 October 2008
  • ...will be included in a separate workshop proceedings published by the IEEE Computer Society Press. * Mining and link analysis in networked settings: web, social and computer networks, and online communities
    5 KB (634 words) - 15:36, 14 December 2008
  • * Security techniques * Concurrent engineering and computer integrated manufacturing
    29 KB (4,077 words) - 18:04, 18 August 2023
  • * Privacy and security issues ...ns of the conference. The conference proceedings will be published by IEEE Computer Society. The extended version of the best papers would also be invited for
    3 KB (452 words) - 23:09, 14 October 2008
  • ...t/event.showcfp?eventid=2563&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]
    589 bytes (67 words) - 23:09, 14 October 2008
  • - Human-Computer Interaction - Security and Access Control
    4 KB (595 words) - 23:09, 14 October 2008
  • * mobile database security Institute of Computer Science IV, University of Bonn
    7 KB (875 words) - 23:09, 14 October 2008
  • * Flexible techniques for security and intrusion detection in Information Systems and Databases ...ers, formatted following the formatting instructions available on the IEEE Computer Society web site; the LaTeX style files can be dowloaded here as well. Pape
    7 KB (917 words) - 23:09, 14 October 2008
  • Information systems and database systems have always been a central topic of computer science. Additionally the * Data and Information Privacy and Security
    4 KB (457 words) - 16:14, 16 December 2020
  • * Security, reliability and availability in distributed storage systems, .../servlet/event.showcfp?eventid=2250&copyownerid=598 WikiCFP][[Category:Computer networking]]
    5 KB (644 words) - 23:10, 14 October 2008
  • - security and privacy All accepted papers, between 5 and 11 pages long, will be published by IEEE Computer Society.
    4 KB (539 words) - 23:10, 14 October 2008
  • Sponsored by: Database Society, Chinese Computer Federation; Natural Science Foundation of China - Database security
    10 KB (1,376 words) - 23:10, 14 October 2008
  • ...nce proceedings, as in previous years, by Springer in the Lecture Notes in Computer Science (LNCS) series. * Data security, privacy and trust
    4 KB (593 words) - 23:10, 14 October 2008
  • · Security control in grid workflow systems ...Indexed). Selected papers will be invited to a special issue in Journal of Computer and System Sciences.
    7 KB (886 words) - 23:10, 14 October 2008
  • * Data analysis for network traffic estimation and security ...fp/servlet/event.showcfp?eventid=1749&copyownerid=2 WikiCFP][[Category:Computer networking]]
    3 KB (332 words) - 23:10, 14 October 2008
  • * Privacy and security in Auto ID systems ...fp/servlet/event.showcfp?eventid=1118&copyownerid=2 WikiCFP][[Category:Computer networking]]
    4 KB (471 words) - 23:10, 14 October 2008
  • reliability, integrity, privacy, and security issues are still being policy. Furthermore, the complexity of security increases as
    7 KB (908 words) - 23:10, 14 October 2008
  • ...WSES 07 will appear in the International Journal of Future Generations of Computer Systems (FGCS). Selected papers of WSES 06 have appeared in a special issue * Security control in managing workflow
    4 KB (560 words) - 23:10, 14 October 2008
  • | Field = Computer networking and military operations. Such networking is essential for safety, security and economic vitality in
    5 KB (549 words) - 17:15, 5 July 2020
  • | Field = Computer networking Security issues
    3 KB (364 words) - 23:11, 14 October 2008
  • | Field = Computer networking * Network Security and Cooperation
    3 KB (339 words) - 23:11, 14 October 2008
  • | Field = Computer networking Quality of service, authentication and security, multimedia protocols, web architectures and protocols, network measurement
    7 KB (981 words) - 03:18, 6 January 2009
  • * Security and privacy ...fp/servlet/event.showcfp?eventid=3261&copyownerid=2 WikiCFP][[Category:Computer networking]]
    2 KB (243 words) - 23:11, 14 October 2008
  • | Field = Computer networking 9. Information Security Technologies
    2 KB (200 words) - 23:11, 14 October 2008
  • | Field = Computer networking * Network Security
    4 KB (465 words) - 23:11, 14 October 2008
  • | Field = Computer networking * Network Security & Reliability
    4 KB (559 words) - 23:11, 14 October 2008
  • |Field=Computer networking 11. Communication and Information Systems Security Symposium
    3 KB (431 words) - 09:18, 4 August 2023
  • ...orks and sensor networks are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enab Network Security and Privacy
    7 KB (990 words) - 23:11, 14 October 2008
  • | Title = Security and Privacy in Telecommunications and Information Systems | Field = Computer security and reliability
    4 KB (587 words) - 23:30, 14 October 2008
  • | Field = Computer networking - Computer and Communications Network Security
    3 KB (375 words) - 23:37, 14 October 2008
  • | Field = Computer networking ...t bringing together researchers and scientists from several disciplines in computer science and engineering where bio-inspired methods are investigated.
    5 KB (694 words) - 23:11, 14 October 2008
  • | Field = Computer networking + Security for CE Communications
    5 KB (584 words) - 09:43, 4 September 2023
  • | Title = New Technologies, Mobility and Security | Field = Computer networking
    2 KB (209 words) - 23:12, 14 October 2008
  • | Field = Computer networking 7. Security Signal Processing
    4 KB (496 words) - 23:12, 14 October 2008
  • - Security and privacy of mobile/wireless systems Note: A special issue With Elsevier, Computer Networks is planned for
    4 KB (596 words) - 23:12, 14 October 2008
  • Security/privacy in wireless systems ...fp/servlet/event.showcfp?eventid=2439&copyownerid=2 WikiCFP][[Category:Computer networking]]
    2 KB (244 words) - 23:12, 14 October 2008
  • 1 .2 Computer Communication and Networks 5 .54 Network Security
    2 KB (250 words) - 23:12, 14 October 2008
  • | Title = Fourth International Conference on Security and Privacy for Communication Networks | Field = Computer security and reliability
    615 bytes (67 words) - 23:12, 14 October 2008
  • | Field = Computer networking o Security and privacy
    9 KB (1,117 words) - 23:12, 14 October 2008
  • | Field = Computer networking * Security architectures and mechanisms
    3 KB (382 words) - 23:12, 14 October 2008
  • | Field = Computer networking ...seeks papers describing significant research contributions to the field of computer and data communication networks. We invite submissions on network architect
    3 KB (352 words) - 23:12, 14 October 2008
  • - Network Security - Trust, Security, and Privacy
    3 KB (465 words) - 23:13, 14 October 2008
  • | Field = Computer networking ...rage contributions on policy-based techniques in support of management and security of all types of wireless networks: cellular, Wi-Fi, Mobile Ad Hoc, hybrids,
    5 KB (667 words) - 23:13, 14 October 2008
  • | Field = Computer networking ...rch results and to exchange new ideas and practical experience in data and computer communications, optical fiber communications, microwaves, antennas and prop
    2 KB (260 words) - 23:13, 14 October 2008
  • | Title = International Conference on Computer and Communication Engineering | Field = Computer networking
    2 KB (283 words) - 23:13, 14 October 2008
  • | Field = Computer networking * Security
    3 KB (413 words) - 23:13, 14 October 2008
  • | Field = Computer networking * Security and resilience of networked systems
    4 KB (528 words) - 23:13, 14 October 2008
  • | Field = Computer networking application-level reliability & performance, security, QoS assurance,
    5 KB (651 words) - 23:13, 14 October 2008
  • | Field = Computer networking - Wireless network security and privacy
    3 KB (343 words) - 10:31, 14 August 2023
  • * Self-Protection, Security, and Trust ...references, using 10 fonts, and number each page. You can confirm the IEEE Computer Society Proceedings Author Guidelines at the following web page:
    3 KB (415 words) - 23:13, 14 October 2008
  • | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.
    4 KB (457 words) - 23:13, 14 October 2008
  • | Homepage = conferences.computer.org/icws/2008 http://conferences.computer.org/icws/2008
    8 KB (1,158 words) - 23:14, 14 October 2008
  • | Title = The 2nd International Workshop on Web and Pervasive Security ...t/event.showcfp?eventid=1628&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]
    582 bytes (69 words) - 23:14, 14 October 2008
  • | Field = Computer architecture ...ew ground or present insightful results based on practical experience with computer systems. The USENIX conference has a broad scope, and specific topics of in
    6 KB (869 words) - 23:14, 14 October 2008
  • * Security of WiMAX in NGN .../servlet/event.showcfp?eventid=2244&copyownerid=590 WikiCFP][[Category:Computer networking]]
    1 KB (181 words) - 23:14, 14 October 2008
  • * Security ...fp/servlet/event.showcfp?eventid=3273&copyownerid=2 WikiCFP][[Category:Computer networking]]
    3 KB (308 words) - 23:15, 14 October 2008
  • | Field = Computer networking * Security, robustness, and fault-tolerance in networked environments
    8 KB (1,093 words) - 23:15, 14 October 2008
  • |Field=Computer Science, Artificial Intelligence,Multi Agent Systems * Values in multi-agent systems, including privacy, safety, security and transparency
    6 KB (659 words) - 17:41, 11 February 2021
  • ...phics, artificial intelligence, games, animation, multimedia design, human-computer interaction, educational media and software engineering. Even though high-t * QoS and Security Support for Entertainment
    8 KB (1,011 words) - 23:15, 14 October 2008
  • | Field = Computer networking * Security and Robustness in P2P Information Search
    5 KB (554 words) - 23:15, 14 October 2008
  • | Field = Computer networking distributed teams of humans, computer applications, and/or autonomous robots to achieve higher productivity and
    8 KB (1,093 words) - 23:15, 14 October 2008
  • | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)
    5 KB (628 words) - 23:15, 14 October 2008
  • | Field = Computer networking 1-07 Computer networks
    5 KB (623 words) - 23:15, 14 October 2008
  • | Field = Computer networking ...ng difficult social and policy issues such as those related to privacy and security
    8 KB (1,003 words) - 23:15, 14 October 2008
  • | Field = Computer networking NPSec 2008 particularly welcomes new ideas on security in the context of
    4 KB (493 words) - 23:15, 14 October 2008
  • | Field = Computer networking * Giuseppe Persiano: Security of networks of low capability devices
    4 KB (563 words) - 23:15, 14 October 2008
  • * Network Security .../servlet/event.showcfp?eventid=2391&copyownerid=548 WikiCFP][[Category:Computer networking]]
    5 KB (598 words) - 10:18, 29 May 2016
  • | Field = Computer networking * Security, privacy and social issues of mobile and ubiquitous systems
    5 KB (599 words) - 23:15, 14 October 2008
  • Multimedia security ...fp/servlet/event.showcfp?eventid=1731&copyownerid=2 WikiCFP][[Category:Computer networking]]
    3 KB (322 words) - 23:15, 14 October 2008
  • |Title=6th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    509 bytes (65 words) - 14:00, 6 November 2020
  • |Title=7th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    509 bytes (62 words) - 14:01, 6 November 2020
  • |Title=9th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    496 bytes (63 words) - 14:05, 6 November 2020
  • |Title=15th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    506 bytes (61 words) - 14:16, 6 November 2020
  • |Title=8th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    475 bytes (60 words) - 14:03, 6 November 2020
  • |Title=14th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    485 bytes (60 words) - 14:15, 6 November 2020
  • |Title=12th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    497 bytes (60 words) - 14:11, 6 November 2020
  • |Title=13th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    516 bytes (64 words) - 14:12, 6 November 2020
  • |Title=10th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    491 bytes (60 words) - 14:07, 6 November 2020
  • |Title=11th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    507 bytes (62 words) - 14:09, 6 November 2020
  • | Title = First ACM Conference on Wireless Network Security | Field = Computer security and reliability
    2 KB (197 words) - 23:15, 14 October 2008
  • | Field = Computer networking ...fp/servlet/event.showcfp?eventid=1201&copyownerid=2 WikiCFP][[Category:Computer networking]]
    625 bytes (69 words) - 23:15, 14 October 2008
  • M. Computer Vision & VR N. Multimedia & Human-computer Interaction
    2 KB (226 words) - 23:17, 14 October 2008
  • | Title = Fifth International Conference on Computer Vision, Image and Signal Processing | Field = Computer graphics
    4 KB (438 words) - 23:17, 14 October 2008
  • |Title=The First International Workshop on the Critical Computer Based Systems The construction of dependable and complex computer-based systems demands the interaction and involvement of industry and acade
    5 KB (660 words) - 16:46, 27 December 2015
  • ...d papers will be included in the conference proceedings and published IEEE Computer Society and referenced in IEEE explore and major indexes. The proceedings w * OSS and security, security implication of OSS, security concerns in using OSS
    5 KB (697 words) - 23:18, 14 October 2008
  • |Homepage=conferences.computer.org/icebe/2008 (ICEBE 2008) http://conferences.computer.org/icebe/
    5 KB (594 words) - 16:29, 25 March 2020
  • (e.g., QoS, security, fault tolerance, messaging, Please follow the IEEE Computer Society Press Proceedings Author
    4 KB (504 words) - 23:18, 14 October 2008
  • # security technology and systems * Computer-Supported Cooperative Work
    6 KB (733 words) - 12:48, 27 October 2016
  • | Title = The Second IEEE International Workshop on Security in Software Engineering | Field = Computer security and reliability
    5 KB (615 words) - 09:55, 29 May 2016
  • Computer Huamn Interaction Computer Graphics and Multimedia
    3 KB (427 words) - 17:01, 29 May 2016
  • ...from cognate areas such as formal methods, systems engineering, human and computer interaction, economics and management and social sciences are very welcome * quality goals (e.g., security),
    4 KB (503 words) - 23:18, 14 October 2008
  • | Title = Symposium on Requirements Engineering for Information Security ...t/event.showcfp?eventid=1752&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]
    583 bytes (64 words) - 23:18, 14 October 2008
  • ...his has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society tha IEEE Computer Society
    3 KB (404 words) - 23:18, 14 October 2008
  • ...ieval, data and text mining, statistics, computational intelligence, human-computer interaction and intelligent software agents. - Human-computer interaction aspects of personalization
    4 KB (570 words) - 23:19, 14 October 2008
  • blog mining, security mining, taxation mining, scientific data IEEE Computer Society Press Proceedings Author Guidelines at
    4 KB (510 words) - 23:19, 14 October 2008
  • ...ense. Debates over the need for privacy protection vs. service to national security and business interests were held in newspapers, magazines, research article It is clear that privacy is a domain dependent concept: homeland security, healthcare, business secrecy, entertainment, web 2.0, and ubiquitous compu
    5 KB (721 words) - 23:19, 14 October 2008
  • ...e = Sixth International Conference on Cryptography, Coding and Information Security | Field = Computer security and reliability
    3 KB (448 words) - 23:19, 14 October 2008
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • | Title = Second ACM Conference on Wireless Network Security | Field = Computer security and reliability
    2 KB (291 words) - 23:19, 14 October 2008
  • * Security and survivability [[Category:Computer security and reliability]]
    2 KB (322 words) - 00:35, 15 October 2008
  • | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability
    5 KB (673 words) - 23:19, 14 October 2008
  • | Title = Ubiquitous Computing Security Systems | Field = Computer security and reliability
    3 KB (328 words) - 06:40, 22 December 2012
  • | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability
    6 KB (697 words) - 23:19, 14 October 2008
  • | Field = Computer security and reliability
    631 bytes (73 words) - 17:05, 24 February 2016
  • | Title = The First ACM Computer Security Architecture Workshop | Field = Computer security and reliability
    5 KB (619 words) - 23:19, 14 October 2008
  • | Field = Computer security and reliability
    580 bytes (67 words) - 17:01, 27 December 2015
  • | Field = Computer security and reliability
    570 bytes (64 words) - 23:19, 14 October 2008
  • | Title = International Workshop on Security and Privacy in Enterprise Computing | Field = Computer security and reliability
    574 bytes (65 words) - 23:19, 14 October 2008
  • | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability
    6 KB (736 words) - 23:20, 14 October 2008
  • | Title = 3rd International Workshop on Security | Field = Computer security and reliability
    524 bytes (59 words) - 10:04, 29 May 2016
  • | Title = Information Security South Africa (ISSA) Conference 2008 | Field = Computer security and reliability
    4 KB (465 words) - 23:20, 14 October 2008
  • | Title = New Security Paradigms Workshop | Field = Computer security and reliability
    8 KB (1,072 words) - 23:20, 14 October 2008
  • | Title = 13th European Symposium on Research in Computer Security | Field = Computer security and reliability
    556 bytes (64 words) - 23:20, 14 October 2008
  • | Field = Computer security and reliability ...t/event.showcfp?eventid=2738&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]
    621 bytes (70 words) - 23:20, 14 October 2008
  • | Title = International Symposium on Electronic Commerce and Security | Field = Computer science
    657 bytes (71 words) - 23:20, 14 October 2008
  • | Title = The Sixth International Workshop on Security In Information Systems | Field = Computer security and reliability
    590 bytes (68 words) - 23:20, 14 October 2008
  • | Title = The 11th Information Security Conference | Field = Computer security and reliability
    528 bytes (59 words) - 23:20, 14 October 2008
  • | Title = 3rd IEEE International Workshop on Security, Trust, and Privacy for Software Applications | Homepage = conferences.computer.org/compsac/2008/workshops/STPSA2008.html
    656 bytes (73 words) - 23:20, 14 October 2008
  • | Title = Special Session on Systems and Information Security | Field = Computer security and reliability
    541 bytes (61 words) - 23:20, 14 October 2008
  • | Title = 2008 Workshop on Security and High Performance Computing Systems | Field = Computer security and reliability
    574 bytes (65 words) - 23:20, 14 October 2008
  • services. The major emphasis of the workshop this year is security of wireless applications. What are the real security threats towards
    5 KB (663 words) - 23:20, 14 October 2008
  • | Field = Computer security and reliability # Building security into products
    3 KB (337 words) - 23:20, 14 October 2008
  • | Title = IEEE 21st Computer Security Foundations Symposium | Field = Computer science
    597 bytes (69 words) - 23:20, 14 October 2008
  • | Title = Workshop in Information Security Theory and Practices 2008: Smart Devices, Convergence and Next Generation N | Field = Computer security and reliability
    606 bytes (68 words) - 23:20, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security | Field = Computer security and reliability
    4 KB (565 words) - 23:20, 14 October 2008
  • | Title = 23rd International Information Security Conference | Field = Computer security and reliability
    5 KB (637 words) - 23:20, 14 October 2008
  • | Title = IEEE International Conference on Intelligence and Security Informatics | Field = Computer security and reliability
    436 bytes (45 words) - 21:41, 16 October 2008
  • | Field = Computer security and reliability
    554 bytes (65 words) - 23:20, 14 October 2008
  • | Field = Computer security and reliability
    2 KB (276 words) - 23:20, 14 October 2008
  • | Title = IEEE Symposium on Security and Privacy | Field = Computer security and reliability
    2 KB (262 words) - 23:20, 14 October 2008
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • ...who need to become acquaintedwith new theories and technologies related to security and privacy challenges in collaborative environments. ...Worksharing, (CollaborateCom-2007), which is jointly sponsored by the IEEE Computer Society, Create-Net and the International Communication Sciences and Techno
    1 KB (185 words) - 23:20, 14 October 2008
  • | Acronym = Security in RFID 2008 | Title = Security in RFID and its Industrial Applications
    617 bytes (71 words) - 23:20, 14 October 2008
  • | Title = The 3rd International Symposium on Ubiquitous Application and Security Service | Field = Computer security and reliability
    574 bytes (65 words) - 23:20, 14 October 2008
  • | Title = SPIE Defense and Security Symposium | Field = Computer security and reliability
    1 KB (167 words) - 23:20, 14 October 2008
  • |Field=Computer and Communications Security
    278 bytes (33 words) - 17:56, 4 October 2016
  • |Title=ACM SIGSAC Conference on Computer and Communications Security |Field=Computer and Communications Security
    538 bytes (66 words) - 10:02, 25 February 2021
  • |Field=Computer and Communications Security
    279 bytes (33 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    270 bytes (33 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    276 bytes (33 words) - 17:58, 4 October 2016
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability
    4 KB (502 words) - 23:20, 14 October 2008
  • IEEE societies (the Computer Society, the Signal Processing Society, the Circuits and - Multimedia security and content protection
    3 KB (425 words) - 23:20, 14 October 2008
  • - Personalization, Privacy and Security in Mobile Computing - Security and Privacy of Mobile/Wireless Systems
    10 KB (1,262 words) - 23:20, 14 October 2008
  • * Multimedia security including digital watermark and encryption ...d e-mail address. The Conference Proceedings will be published by the IEEE Computer Society Press. A number of the papers presented at the conference will be s
    5 KB (595 words) - 23:20, 14 October 2008
  • ...ost comprehensive conference focused on the various aspects of advances in Computer Science. -Security issues on UMC
    4 KB (573 words) - 23:20, 14 October 2008
  • ...cluding the Circuits and Systems Society, the Com-munications Society, the Computer Society, and the Signal Processing Society. The conference will feature wor *Multimedia security and content protection
    2 KB (296 words) - 23:20, 14 October 2008

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)