Search results

Jump to: navigation, search
  • ...al studies, systematic reviews, conceptual explorations, innovative ideas, critical appraisals, etc. related to: * knowledge management and engineering,
    7 KB (959 words) - 14:51, 27 December 2015
  • ...First International Workshop on Dependability and Security in Complex and Critical Information Systems ...First International Workshop on Dependability and Security in Complex and Critical Information Systems
    7 KB (960 words) - 17:48, 14 October 2008
  • Most of critical activities in the areas of communications (telephone, Internet), energy & f ...s crucial for data protection and recoverability when implementing mission critical applications and services.
    15 KB (2,175 words) - 21:03, 19 March 2013
  • IBM TORONTO SOFTWARE LABORATORY, IBM CENTERS FOR ADVANCED STUDIES IBM Centers for Advanced Studies. This "Meeting of Minds" provides an
    9 KB (1,193 words) - 22:53, 14 October 2008
  • ...ses on the human actor and software agent collaboration in safety and time critical systems-of-systems. This focus includes topics ranging from: In addition, HCP 2008 welcome progress, innovations, demonstrations and case-studies on the following well-known (non-exhaustive) list of HCP-related topics:
    4 KB (518 words) - 14:42, 27 December 2015
  • multilingual document management/workflow case studies of technology-based solutions
    4 KB (576 words) - 23:06, 14 October 2008
  • case studies on practical uses of current translation systems in government and industry ...how MT is used to meet business needs such as just-in-time localization of critical information, provision of technical support information, or creation of pre
    16 KB (2,200 words) - 20:51, 18 February 2021
  • * creation, delivery and management of humanities digital resources * collaboration between libraries and scholars in the creation, delivery, and management of humanities digital resources
    7 KB (1,033 words) - 23:08, 14 October 2008
  • | Acronym = SPECIAL ISSUE ON MISSION CRITICAL NETWOR 2009 | Title = JSAC CALL FOR PAPERS SPECIAL ISSUE ON MISSION CRITICAL NETWORKING
    5 KB (549 words) - 17:15, 5 July 2020
  • |Title=The First International Workshop on the Critical Computer Based Systems ...practical results relevant to the engineering of highly sophisticated and critical systems that are used in automotive, avionics, railway, naval, chemical, nu
    5 KB (660 words) - 16:46, 27 December 2015
  • ..., strategies for promoting, adopting, using Open Source Solutions and case studies or success stories in specific domains. ..., strategies for promoting, adopting, using Open Source Solutions and case studies or success stories in specific domains.
    5 KB (697 words) - 23:18, 14 October 2008
  • * Run-time management of resilience requirements ...butions of in-depth description of practitioner experience reports or case studies within the scope of SERENE are invited. Submissions should include sufficie
    9 KB (1,264 words) - 18:14, 8 November 2008
  • successfully used to program real-time and safety critical applications, from nuclear power plant management layer to Airbus air
    6 KB (659 words) - 23:18, 14 October 2008
  • ...al studies, systematic reviews, conceptual explorations, innovative ideas, critical appraisals, etc. related to: knowledge management and engineering,
    4 KB (463 words) - 13:54, 18 October 2008
  • * Implementation, deployment and management of network security policies. ...ection: protocols, implementations, metering, watermarking, digital rights management.
    5 KB (673 words) - 23:19, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security ...ual meeting and conference of the newly formed IFIP Working Group on Trust Management (IFIP WG 11.11). IFIPTM 2007 provided a truly global platform for the repor
    4 KB (565 words) - 23:20, 14 October 2008
  • real-time, safety-critical, embedded, or mobile systems * scheduling and resource management
    2 KB (254 words) - 23:22, 14 October 2008
  • * SECMAN: Security management ...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance
    13 KB (1,617 words) - 19:03, 24 November 2008
  • guaranteeing service timeliness is becoming a critical feature that elevates decision technology, database management and so on. RTSOAA 2009 welcomes the
    7 KB (922 words) - 00:58, 9 January 2009
  • ...resent an opportunity for educators to develop new skills and to stimulate critical debate on theories, approaches, principles and applications of m-learning, ** Case studies in mLearning
    11 KB (1,366 words) - 16:44, 14 January 2009
  • papers on practical studies and experiments, critique of existing work, emerging issues, * Cryptographic techniques and key management
    16 KB (2,178 words) - 12:59, 18 January 2009
  • ...f a particular community. In many cases, the funding and support for these critical initiatives is fragile and temporary, and directed in piecemeal fashion. Th Information and Data Management
    4 KB (529 words) - 13:00, 18 January 2009
  • Such alignment is a critical ?early stage? activity to understand * Case studies and empirical reports on the benefits and costs of
    3 KB (465 words) - 13:01, 18 January 2009
  • ...pment projects will come under close scrutiny. It will become increasingly critical to design global partnerships that both clarify cost/benefits and enable de ...decisions; cost/benefit analysis; value propositions; risk assessment and management; vendor selection.
    6 KB (857 words) - 13:01, 18 January 2009
  • * Trust and reputation models and management * Service science, management and engineering
    6 KB (767 words) - 13:01, 18 January 2009
  • ...cated, remote and mobile participants simultaneously. Similarly, it may be critical to support a spectrum of richness and responsiveness. In order to move forw ...design and real-world user experience. In particular, we are interested in studies that show how to enable easy and effective crossovers between media like vi
    5 KB (670 words) - 17:08, 27 February 2009
  • safety-critical, embedded, or mobile systems - scheduling and resource management
    4 KB (504 words) - 16:43, 27 December 2015
  • ...nting and discussing new educational environments, best practices and case studies on innovative technology-based learning strategies, institutional policies 4. Legal and Cultural Management Issues
    5 KB (661 words) - 15:49, 8 December 2009
  • |Title=2nd International Workshop on Agent Technology for Disaster Management ...become a key concern both from a social and political point of view. It is critical to provide rescue personnel with information technology tools that enable m
    6 KB (783 words) - 17:04, 27 December 2015
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance
    6 KB (746 words) - 11:35, 2 August 2009
  • In this scenario, it is critical that the underlying business models help to Knowledge management in service ecosystems
    4 KB (586 words) - 11:35, 2 August 2009
  • ...mate change is likely to be the defining issue of the 21st Century. Recent studies indicate that climate change is accelerating, confirming the most pessimist ...y). In nearly all these challenges, software has a major role to play as a critical enabling technology.
    7 KB (992 words) - 11:44, 2 August 2009
  • | Title = ACM First International Workshop on Data-intensive Software Management and Mining Data-intensive Software Management and Mining
    4 KB (543 words) - 11:35, 2 August 2009
  • ...information flow between partners involved in supply chains (supply chain management). However, today’s business environment is changing significantly due to ...east with its existing set of standards, it promotes adaptive supply chain management concepts, flexible and re-configurable logistics service provisioning along
    12 KB (1,624 words) - 11:36, 2 August 2009
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...mization; Internet performance prediction; Internet performance evaluation studies; Internet performance testbeds; Performance evaluation of Web search engine
    14 KB (1,651 words) - 15:56, 15 February 2017
  • -Implementation, deployment and management of network security policies ...ection: protocols, implementations, metering, watermarking, digital rights management
    6 KB (766 words) - 10:54, 26 April 2010
  • ...national, interdisciplinary, graduate student association dedicated to the critical analysis of terrorism, counterterrorism policy, and related national and in ...nological impacts of security concerns and the conclusions drawn from such critical paradigms, and 4) The ongoing search for security. SATSA and the Moynihan
    3 KB (359 words) - 00:15, 17 November 2009
  • The conference addresses critical issues related to diversity. Proposals on all relevant topics are welcome, ...ry, cultural studies, culture, globalisation, interdisciplinary, learning, management, globalization, social justice, race, ethnicity, gender, education, multidi
    932 bytes (103 words) - 11:52, 1 March 2012
  • |Field=Critical Management Studies ...d differentiations); procedurisation of innovation; meaning and utility of management standards both online and offline; sophistication of managerial control and
    5 KB (638 words) - 10:47, 20 September 2010
  • Risk and Incident Management Investigative Case Studies
    3 KB (462 words) - 11:51, 22 March 2020
  • E-business architectures leverage Web Technologies to implement mission-critical e-business systems. ...semantic e-business. It builds up on Semantic Web technologies, knowledge management and e-business processes. Challenges address the conceptualization how e-bu
    10 KB (1,232 words) - 18:10, 5 March 2012
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...Web-based communication services; Node localizations; Indoor positioning; Management plane; Community structure detection; Preventing DDoS attacks; Multifactor
    13 KB (1,580 words) - 19:35, 18 February 2021
  • Critical and Cultural Studies, Gender and Communication Media Management and Economics
    5 KB (767 words) - 08:06, 11 May 2012
  • ...al studies, systematic reviews, conceptual explorations, innovative ideas, critical appraisals, etc. related to the following topics list: Knowledge Management and Engineering
    3 KB (332 words) - 19:36, 20 August 2012
  • |Title=20th International Conference on Knowledge Engineering and Knowledge Management The 20th International Conference on Knowledge Engineering and Knowledge Management is concerned with the impact of time and space on the representation of kno
    8 KB (1,067 words) - 12:26, 7 July 2018
  • |Title=12th International Workshop on Data Privacy Management 12th International Workshop on Data Privacy Management (DPM 2017)
    7 KB (887 words) - 15:22, 15 July 2017
  • - Safety-Critical Software - Dynamic Discovery and Version Management
    8 KB (1,150 words) - 10:11, 7 August 2019
  • Early diagnosis is critical, as melanoma can be effectively treated with simple difficult to learn, and several studies have demonstrated limits of dermoscopy
    3 KB (464 words) - 09:59, 21 August 2017
  • * Empirical studies and experiences of agile methods * Agility in systems engineering and safety critical systems
    4 KB (472 words) - 10:36, 26 November 2017
  • * Foundations and conceptual studies of and for agile methods * Empirical studies and experiences
    2 KB (230 words) - 10:36, 26 November 2017
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...works; CLOUD/GRID fora, standards, development, evolution; CLOUD/GRID case studies, validation testbeds, prototypes, and lessons learned
    14 KB (1,770 words) - 14:56, 19 April 2020
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...ques; Medical IoT Device-to-Device communication; Blockchain in supporting critical infrastructures; Vulnerability on social media spaces; Internet of Medical
    17 KB (2,088 words) - 12:49, 14 June 2020
  • ...s, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure * Risk assessment and security risk management
    3 KB (353 words) - 12:35, 23 June 2020
  • ...s, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure * Risk assessment and security risk management
    3 KB (423 words) - 11:27, 23 June 2020
  • * Risk assessment and risk management * New approaches for security and privacy in cloud computing and for critical infrastructure
    3 KB (407 words) - 11:20, 23 June 2020
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...User-centric requirements in network-centric approaches; User-centric and critical time-centric applications and services; User information access behavior; U
    10 KB (1,232 words) - 16:20, 22 March 2021
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...tware testing and testing tools; Software implementation; Software project management (risk analysis, dependencies, etc.); Component-based software development;
    13 KB (1,573 words) - 12:00, 10 July 2020
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...Management (MAM); Identity and Access Management (IAM); Risk and security management; IT-Governance, Risks and compliance; Public safety and professional commun
    15 KB (1,886 words) - 16:16, 25 August 2020
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u MECSN: Energy, management and control of sensor networks
    15 KB (1,880 words) - 14:45, 27 August 2020
  • ...rence topics of interest should include Economics, Management, Information Management, Innovation, Entrepreneurship, Education, Marketing, Human Resources, and F * Country and Industry Studies of Trade
    9 KB (896 words) - 16:31, 6 August 2020
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...TeleCare trials; Resource and demands through eHealth service; eHealth in critical situations (heart failure, kidney blockage, mental health, etc.); eHealth s
    16 KB (2,024 words) - 13:33, 24 August 2020
  • running experiments, applications, and industrial case studies. Authors analysis of embedded systems; Mission-critical features for embedded
    10 KB (1,210 words) - 20:17, 22 November 2020
  • running experiments, applications, and industrial case studies. Authors Empirical distribution parameters; Package management systems;
    12 KB (1,505 words) - 20:38, 22 November 2020
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...works; CLOUD/GRID fora, standards, development, evolution; CLOUD/GRID case studies, validation testbeds, prototypes, and lessons learned
    13 KB (1,574 words) - 12:11, 24 November 2020
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...ques; Medical IoT Device-to-Device communication; Blockchain in supporting critical infrastructures; Vulnerability on social media spaces; Internet of Medical
    17 KB (2,035 words) - 14:45, 18 February 2021
  • running experiments, applications, and industrial case studies. Authors Network)--based resilience; Policy-based NFV management; Performance of
    13 KB (1,607 words) - 19:32, 30 November 2020
  • running experiments, applications, and industrial case studies. Authors Mobility, handoff protocols and management; Next generation 802.11 and
    19 KB (2,346 words) - 10:51, 9 December 2020
  • running experiments, applications, and industrial case studies. Authors file and storage systems, power management, database systems, computer
    9 KB (1,079 words) - 11:12, 9 December 2020
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...works; CLOUD/GRID fora, standards, development, evolution; CLOUD/GRID case studies, validation testbeds, prototypes, and lessons learned
    13 KB (1,653 words) - 14:44, 10 February 2021
  • ...nce, Next Generation Networks and Ubiquitous Services, Network Control and Management, Multi Provider QoS/SLA Internetworking, Software Defined Networking, Emerg ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u
    14 KB (1,718 words) - 11:30, 3 March 2021
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...; Femto Cells; IMS and IMS-based services; Mobility, handoff protocols and management; Next generation 802.11 and 802.15 including mesh, PAN, BAN, etc.; Ultra-wi
    19 KB (2,317 words) - 02:40, 26 November 2021
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...etworks, distributed and parallel systems, file and storage systems, power management, database systems, computer networks and architectures, operating systems,
    9 KB (1,086 words) - 02:44, 26 November 2021
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...ity in embedded systems; Performance analysis of embedded systems; Mission-critical features for embedded systems; Real-life embedded systems use cases; Dedica
    10 KB (1,228 words) - 02:46, 26 November 2021
  • ...s, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not u ...llel programming; Visual tools; Empirical distribution parameters; Package management systems; Crowdsourcing software development; Model checking specifications;
    13 KB (1,522 words) - 03:32, 3 December 2021