Search results

Jump to: navigation, search

Page title matches

Page text matches

  • |Title=The 10th International Conference on Mobile Data Mangement (MDM'09): Systems, Services and Middleware in mobile data management. The conference provides unique opportunities for researchers,
    13 KB (1,468 words) - 01:23, 22 August 2008
  • ...prehensively represented this includes future events as well as historical data about e.g. about acceptance rates of the main conferences in the field ====Computer security and reliability====
    6 KB (714 words) - 12:19, 11 December 2020
  • *Network Security *Data Warehousing, Ontologies and Databases
    5 KB (571 words) - 09:22, 19 July 2019
  • The 2011 International Conference of Computational Statistics and Data Engineering The 2011 International Conference of Data Mining and Knowledge Engineering
    3 KB (454 words) - 12:34, 8 October 2020
  • Data management constitutes the essential enabling technology for several diverse purposes. Established data management solutions
    9 KB (1,189 words) - 14:53, 28 August 2008
  • ...Temporal data; Concurrency and recovery; Transaction management; Views and data warehousing.
    5 KB (753 words) - 18:59, 25 June 2012
  • |Title=International Workshop on Data Management as well as directions for future research directions on data
    5 KB (611 words) - 15:43, 16 September 2008
  • ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d ...articular requirements. On the one hand, there are aspects of programming, data handling, and intensive computing applications; on the other hand, there ar
    18 KB (2,408 words) - 02:37, 16 December 2008
  • * Data warehouse and multidimensional modelling, analysis and mining * Security issues in information systems
    7 KB (763 words) - 12:25, 6 October 2011
  • ...Twelfth International Conference on Advances in Databases, Knowledge, and Data Applications |Field=data, software, automation
    11 KB (1,371 words) - 12:28, 18 May 2020
  • ...substantial improvements for content processing, information indexing, and data, process and knowledge mining. The push came from Web services, artificial ...s on databases, evolution of relation between databases and other domains, data base technologies and content processing, as well as specifics in applicati
    11 KB (1,446 words) - 18:26, 13 October 2008
  • * Security, Privacy and Trust * Distributed Database and Data Mining
    34 KB (4,565 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust * Distributed Database and Data Mining
    8 KB (1,037 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust * Distributed Database and Data Mining
    9 KB (1,189 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust * Distributed Database and Data Mining
    26 KB (3,456 words) - 22:20, 10 January 2018
  • ...issues such as workload modeling, performance metrics, power consumption, security, usability, and experience with real systems and failures ...losive growth in storage and the increasing need to store, find and manage data for long periods
    5 KB (777 words) - 05:50, 14 October 2008
  • Data Distribution, Load Balancing & Scaling ◦ Security and Reliability
    4 KB (452 words) - 17:47, 7 April 2021
  • ...lds such as embedded systems, distributed systems, data management, system security and applications. The conference places emphasis on layers well above the t * Security, Privacy & Trust
    4 KB (519 words) - 16:13, 14 October 2008
  • IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009) IEEE Symposium on Computational Intelligence and Data Mining (CIDM 2009)
    3 KB (376 words) - 17:47, 14 October 2008
  • * Security and privacy New tools for measurement and data collection
    8 KB (989 words) - 20:13, 22 February 2009
  • Database and Data Mining Security and Information Assurance
    4 KB (503 words) - 11:36, 18 October 2008
  • * Data mining and knowledge discovery for MBC * RFID and sensor data management for MBC
    5 KB (647 words) - 22:05, 14 October 2008
  • | Title = 1st International Workshop on Data and Process Provenance ...-produce experiments as well as to greatly assist in the interpretation of data-analyses outcomes. These are all crucial for knowledge discovery.
    3 KB (416 words) - 17:48, 14 October 2008
  • ...re defined radio networks, wireless networks, sensor networks, or Internet data streaming and mining. Internet and data streaming/mining algorithms
    11 KB (1,385 words) - 17:48, 14 October 2008
  • | Title = IEEE International Conference on Intelligence and Security Informatics | Field = Computer security and reliability
    438 bytes (45 words) - 21:41, 16 October 2008
  • * Database applications and data mining * Trust, security and privacy
    19 KB (2,503 words) - 13:25, 28 October 2020
  • * Security and privacy in vehicular networks * Architecture, algorithms and protocols for data dissemination in vehicular networks
    3 KB (378 words) - 14:22, 24 August 2016
  • - Persistence support and integration of stored data in SPSs - Data mining and knowledge discovery in SPSs
    3 KB (490 words) - 20:05, 14 October 2008
  • Conference on Data Engineering in Shanghai, China) rent out network presence, computation power, and data storage space
    7 KB (907 words) - 21:51, 14 October 2008
  • # Data Semantics and Linked Data Semantic Web data
    4 KB (450 words) - 20:05, 14 October 2008
  • ...describing significant research contributions to the field of computer and data communication networks. We invite submissions on various aspects of network * Network security, vulnerability, and defenses
    3 KB (353 words) - 20:31, 14 October 2008
  • * › Mobile Agents Support for Data Networks * › Security Aspects of Mobile Software
    9 KB (1,219 words) - 20:05, 14 October 2008
  • Privacy, Trust, and Security is Distributed Systems Data Placement and Storage in Distributed and Mobile Environments
    2 KB (208 words) - 20:05, 14 October 2008
  • ...ithm engineering techniques in the design and evaluation of algorithms and data structures. Submissions should present significant contributions supported * Cryptography and Security
    2 KB (216 words) - 20:05, 14 October 2008
  • Data Mining and Knowledge Discovery Computer and Network Security
    3 KB (332 words) - 20:06, 14 October 2008
  • |Field=Computer security and reliability ...n and information systems. Moreover, there are other dedicated systems for data mining, recommenders, sensing, conflict detection, intrusion detection, or
    15 KB (2,175 words) - 21:03, 19 March 2013
  • Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability SECURITY and RIGHTS MANAGEMENT
    3 KB (354 words) - 20:06, 14 October 2008
  • - Data Security Issues - Electronic Data Interchange (EDI)
    6 KB (780 words) - 20:06, 14 October 2008
  • * Data Warehousing and Data Mining * Security Technologies
    2 KB (193 words) - 20:06, 14 October 2008
  • Data mining Intelligent Networks and Security
    3 KB (359 words) - 20:06, 14 October 2008
  • o Data Management and Data Centers o Security and Privacy
    2 KB (303 words) - 20:06, 14 October 2008
  • ...ction, logistics and networking to complex event processing in finance and security. The event based paradigm has gathered momentum as witnessed by current eff ...ages for event correlation and patterns, streaming and continuous queries, data fusion
    6 KB (829 words) - 15:30, 29 January 2021
  • * Security * Data dissemination and Peer-to-Peer systems
    6 KB (686 words) - 20:06, 14 October 2008
  • * Data fusion in pervasive healthcare environments * Physiological models for interpreting medical sensor data
    6 KB (732 words) - 22:45, 14 October 2008
  • * Data management and middleware support for collaborative information systems * Security and trust management in collaborative networks, systems, and applications
    6 KB (674 words) - 22:45, 14 October 2008
  • ...t provided a suitable model to collect, represent, process and manage such data. Current advances like the Contextualized Attention Metadata Schema (CAM) o ...ing, information retrieval, database systems, digital libraries, metadata, data mining, user modelling, social networks, psychology and cognitive science,
    6 KB (890 words) - 22:53, 14 October 2008
  • semi-structured data; data mining; knowledge discovery; schema migration; digital libraries; data warehousing
    9 KB (1,193 words) - 22:53, 14 October 2008
  • -Visualization of data and processes in applications -Visualization of data base schemes
    3 KB (355 words) - 22:53, 14 October 2008
  • �?� Large scale, massive data storage, access, exploration, and manipulation, for cooperative visualizati ...ent process modeling, product modeling, reference models, business models, data representations and standards.
    4 KB (468 words) - 22:54, 14 October 2008
  • Coupling and Integrating Heterogeneous Data Sources Database Security and Transaction Support
    9 KB (1,240 words) - 22:56, 14 October 2008
  • ...ame studies/game design, e) graphics and interfaces and f ) networking and security. Papers that fall outside these topic areas are strongly encouraged and sho ...istributed database techniques and consistency models for networked games; data management for games that cross physical and virtual worlds.
    9 KB (1,275 words) - 14:46, 27 December 2015
  • |Title=13th Pacific-Asia Conference on Knowledge Discovery and Data Mining |Field=Data mining
    2 KB (295 words) - 12:03, 18 October 2008
  • - Data Mining - Security and Reputation
    18 KB (2,457 words) - 23:04, 14 October 2008
  • ...ent repeatability of their experiments, and share with the community their data and test harnesses. Topics include, but are not limited to, the following. * Management of Semantic Web Data
    6 KB (854 words) - 12:05, 28 May 2016
  • �?� Bases de Datos, Data Warehouses y Minería de Datos �?� Networks and Data Communications
    13 KB (1,775 words) - 23:04, 14 October 2008
  • ...search and different scientific communities, such as Software Engineering, Data Bases, Distributed Systems, Information Systems, Information Retrieval, Ser - Data mining and data analysis
    6 KB (827 words) - 23:04, 14 October 2008
  • * Error tolerance, security and robustness * Data gathering, aggregation and dissemination
    2 KB (316 words) - 23:05, 14 October 2008
  • * Cryptography and Network Security * Data Mining and Knownledge Discovery
    2 KB (167 words) - 23:05, 14 October 2008
  • ...t the field of MT continues to grow and attract more and more researchers. Data-driven approaches have become particularly fashionable in recent years. The Advances in data-driven MT (Statistical MT, Example-based MT, etc.)
    16 KB (2,200 words) - 20:51, 18 February 2021
  • | Title = The Alberto Mendelzon Workshop on Foundations of Data Management THE ALBERTO MENDELZON WORKSHOP ON FOUNDATIONS OF DATA MANAGEMENT
    5 KB (660 words) - 14:52, 2 March 2012
  • ...providing new insights in the specification, design, or implementation of data management tools are called for. ...data; security; semantic Web; semi-structured data; spatial data; temporal data; transactions; updates; views; Web services; workflows; XML.
    3 KB (457 words) - 13:09, 7 December 2016
  • |Title=2009 ACM SIGMOD International Conference on Management of Data 2009 ACM SIGMOD International Conference on Management of Data
    7 KB (851 words) - 05:29, 15 October 2008
  • * Data mining/knowledge discovery. * Data warehousing.
    2 KB (308 words) - 23:08, 14 October 2008
  • Data Privacy and Security Data Warehousing, Data Cubes, and
    7 KB (1,006 words) - 23:08, 14 October 2008
  • | Title = 14th International Conference on Management of Data areas but also adds emphasis on Web, Information Retrieval and Data Mining.
    5 KB (661 words) - 16:23, 11 December 2008
  • | Title = 1st Social Data on the Web workshop CfP: 1st Social Data on the Web workshop (SDoW2008)
    5 KB (709 words) - 23:08, 14 October 2008
  • | Title = 10th ACM International Workshop on Web Information and Data Management and Data Management (WIDM 2008)
    3 KB (437 words) - 23:20, 14 October 2008
  • | Title = The 8th IEEE International Conference on Data Mining | Field = Data mining
    5 KB (634 words) - 15:36, 14 December 2008
  • |Title=ACM Eleventh International Workshop on Data Warehousing and OLAP ACM Eleventh International Workshop on Data Warehousing and OLAP
    10 KB (1,288 words) - 11:52, 18 October 2008
  • ...n disciplines such as databases, artificial intelligence, semantic web, or data extraction. Also, ODBASE'08 encourages the submission of papers that examin ...stributed Applications), and IS'08 (International Symposium on Information Security).
    8 KB (1,081 words) - 08:21, 22 December 2011
  • ...rch on information and knowledge management, as well as recent advances on data and knowledge bases. The purpose of the conference is to identify challengi * Automatic acquisition of data and knowledge bases (especially raw text)
    29 KB (4,077 words) - 18:04, 18 August 2023
  • * Data quality, integration, warehousing and mining * Privacy and security issues
    3 KB (452 words) - 23:09, 14 October 2008
  • | Title = 5th VLDB Workshop on Secure Data Management ...t/event.showcfp?eventid=2563&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]
    589 bytes (67 words) - 23:09, 14 October 2008
  • - Data and Information Quality Management - Data Grids, Data and Information Quality
    4 KB (595 words) - 23:09, 14 October 2008
  • | Title = 7th ACM International Workshop on Data Engineering for Wireless and Mobile Access as a bridge between the data management, wireless networking, and
    7 KB (875 words) - 23:09, 14 October 2008
  • ...tructured (XML) or unstructured (textual) documents are becoming important data sources for enterprises and organizations. ...typical question is �??how to take advantage from such large volumes of data, in order to extract useful information for decision making, for discoverin
    7 KB (917 words) - 23:09, 14 October 2008
  • * Data quality, semantics and integration * Data privacy and security
    6 KB (840 words) - 23:10, 14 October 2008
  • ...ics, including traditional database management, as well new challenges for data management in any possible domain. Prospective authors are encouraged to co DATA WAREHOUSING AND KNOWLEDGE DISCOVERY
    3 KB (305 words) - 08:44, 31 July 2020
  • integration of intelligence and data justifies its today's attractiveness. Since 1990 DEXA is an annual internat * Data and Information Modelling
    4 KB (457 words) - 16:14, 16 December 2020
  • | Title = Second Workshop on Scalable Data Management, Applications and Systems Second International Workshop on Scalable Data Management Applications and Systems
    5 KB (644 words) - 23:10, 14 October 2008
  • stronger over the years as data management research marched through many a data model, with logic keeping up and providing the foundations every step
    5 KB (647 words) - 23:10, 14 October 2008
  • | Title = 3rd Workshop on Data Storage Devices and Systems DS2 2008, the 3rd International Workshop on Data Storage Devices and Systems, will be held at the University of Perugia, Per
    4 KB (539 words) - 23:10, 14 October 2008
  • ...d tools for querying, retrieving, integrating, analyzing, and managing the data on the Web. ...s, results, experience, techniques and tools related to all aspects of Web data management. The conference invites original research and industrial papers
    10 KB (1,376 words) - 23:10, 14 October 2008
  • The theme of BNCOD 2008, the 25th in the series, is "Sharing Data, Information and Knowledge". * Data integration and interoperability
    4 KB (593 words) - 23:10, 14 October 2008
  • · Workflow description languages targeting computation, data and transaction intensive tasks · Security control in grid workflow systems
    7 KB (886 words) - 23:10, 14 October 2008
  • Attacks against De-identified Data Data Anonymity
    2 KB (193 words) - 23:10, 14 October 2008
  • ...y. Our belief is that XML is the main means towards this new generation of data management systems. Following the experience of previous editions of DataX * Interchange and integration of XML data
    3 KB (475 words) - 23:10, 14 October 2008
  • ...es (and vice versa), to network monitoring systems that depend on advanced data management and analysis capabilities�?? suggests a blurring of the bounda * Data models, query models, and query languages for networking
    3 KB (332 words) - 23:10, 14 October 2008
  • | Title = International Workshop on RFID Data Management International Workshop on RFID Data Management
    4 KB (471 words) - 23:10, 14 October 2008
  • | Title = 3rd Int. Workshop on Dependability Aspects on Data WArehousing and Mining Applications tremendous opportunities for data sharing, integration, and analysis
    7 KB (908 words) - 23:10, 14 October 2008
  • ...layers of middleware, e.g., for managing Grid resources, computing tasks, data, and information, form the basic framework for realising an e-Science envir * Security control in managing workflow
    4 KB (560 words) - 23:10, 14 October 2008
  • |Title=1st Workshop on Data and Services Management in Mobile Environments ...nt techniques. Therefore, these techniques are evolving and leading to new data and services management systems that consider variable user capabilities an
    2 KB (324 words) - 16:49, 16 December 2020
  • * Data mining and Pattern Recognition in e-learning * Security and privacy;
    4 KB (503 words) - 23:11, 14 October 2008
  • * Architectures for Voice/Data Services * Network Data Mining
    3 KB (339 words) - 23:11, 14 October 2008
  • 7. Security Signal Processing 1. Analog Circuits, Filters and Data Conversion
    4 KB (496 words) - 23:12, 14 October 2008
  • 1 .9 Data Communications 5 .54 Network Security
    2 KB (250 words) - 23:12, 14 October 2008
  • ...SIGCOMM is the flagship annual conference of the Special Interest Group on Data Communications, a special interest group of the Association for Computing M ...describing significant research contributions to the field of computer and data communication networks. We invite submissions on network architecture, desi
    3 KB (352 words) - 23:12, 14 October 2008
  • ...est research results and to exchange new ideas and practical experience in data and computer communications, optical fiber communications, microwaves, ante ...peaceful country in a turbulent area, enjoys extreme levels of safety and security. Jordanian people are internationally known for generosity, hospitality and
    2 KB (260 words) - 23:13, 14 October 2008
  • * Computer Networks and Security * Data Mining and Database Applications
    2 KB (283 words) - 23:13, 14 October 2008
  • * Security * Data dissemination and Peer-to-Peer systems
    3 KB (413 words) - 23:13, 14 October 2008
  • networks could mean a set of collaborative data processing nodes that application-level reliability & performance, security, QoS assurance,
    5 KB (651 words) - 23:13, 14 October 2008
  • |Title=Second ACM International Conference on Web Search and Data Mining The Second ACM International Conference on Web Search and Data Mining (WSDM) 2009
    2 KB (237 words) - 12:23, 11 September 2020
  • | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.
    4 KB (457 words) - 23:13, 14 October 2008
  • | Title = 1st Workshop on Mining Social Data | Field = Data mining
    3 KB (453 words) - 23:14, 14 October 2008
  • * Technologies for Building and Operating Massive Web Services Data * Security Challenges for Web Services
    8 KB (1,158 words) - 23:14, 14 October 2008
  • ...knowledge and opinions about problems and solutions at the intersection of data management and the\ * Data-oriented aspects of Web application development environments...
    3 KB (250 words) - 23:14, 14 October 2008
  • * P2P Data Mining and Knowledge Discovery for Information Search * Security and Robustness in P2P Information Search
    5 KB (554 words) - 23:15, 14 October 2008
  • * Security aspects in network management * Data management for real-time dynamic service provisioning
    6 KB (663 words) - 23:15, 14 October 2008
  • * Data management and middleware support for collaborative information systems * Security, privacy and trust management in collaborative networks, systems, and appli
    8 KB (1,093 words) - 23:15, 14 October 2008
  • 3-03 Distributed data and knowledge based systems 3-10 Database applications and data mining
    5 KB (623 words) - 23:15, 14 October 2008
  • ...ng difficult social and policy issues such as those related to privacy and security likely in those areas where the right data in the right time have mission-critical importance.
    8 KB (1,003 words) - 23:15, 14 October 2008
  • NPSec 2008 particularly welcomes new ideas on security in the context of Internet security and new primitives for supporting secure network protocol
    4 KB (493 words) - 23:15, 14 October 2008
  • * Giuseppe Persiano: Security of networks of low capability devices of several communities: Algorithms, Formal Methods, Information systems, Data
    4 KB (563 words) - 23:15, 14 October 2008
  • * Data-centric issues, including anonymization, querying, and storage * Network security threats and countermeasures
    3 KB (313 words) - 23:15, 14 October 2008
  • ...applications, service-oriented computing, middleware, networking, agents, data management and services, all with special focus on mobility and ubiquitous * Security, privacy and social issues of mobile and ubiquitous systems
    5 KB (599 words) - 23:15, 14 October 2008
  • As data and knowledge volume keep increasing while global means for analyze huge volume of data and knowledge.
    4 KB (491 words) - 23:16, 14 October 2008
  • ...fferent aspects of the field, ranging from accuracy and robustness to data security and user interface. o Fusion schemes/Data quality estimation/Qualitative-based fusion
    4 KB (526 words) - 23:17, 14 October 2008
  • ...an information processing system and applications to multimodal multimedia data fusion/integration. ...mation, pre/post-processing of digital video, joint source/channel coding, data streaming, speech/audio, image/video coding and processing
    4 KB (443 words) - 17:06, 24 February 2016
  • Data Compression and Source Coding Cryptology and Data Security
    3 KB (362 words) - 23:17, 14 October 2008
  • Machine Learning and Data Mining Image and Data Representation
    4 KB (438 words) - 23:17, 14 October 2008
  • Data processing, storage and management Security
    4 KB (570 words) - 23:17, 14 October 2008
  • * Innovative file or data storage system design * Security
    3 KB (345 words) - 14:50, 26 December 2011
  • * Performance, dependability and security evaluation using analytical models, simulation or empirical approaches * Model-based security engineering and design for security
    5 KB (660 words) - 16:46, 27 December 2015
  • ...ge, and multimedia data to traditional structured data and semi-structured data found in the web. SITIS spans two inter-related research domains that incre * OSS and security, security implication of OSS, security concerns in using OSS
    5 KB (697 words) - 23:18, 14 October 2008
  • + Data Management for e-Business TRACK - Data and knowledge engineering for e-Business
    5 KB (594 words) - 16:29, 25 March 2020
  • (e.g., QoS, security, fault tolerance, messaging, orchestration/composition, data integration and data retention)
    4 KB (504 words) - 23:18, 14 October 2008
  • # security technology and systems * Agent-based distributed data mining
    6 KB (733 words) - 12:48, 27 October 2016
  • Cyber Security Data Structure and Algorithm
    3 KB (427 words) - 17:01, 29 May 2016
  • | Title = 2008 ESA Workshop on Avionics Data, Control and Software Systems ESA Workshop on Avionics Data, Control and Software Systems (ADCSS)
    18 KB (2,714 words) - 23:23, 14 October 2008
  • | Field = Data mining ...his has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society tha
    3 KB (404 words) - 23:18, 14 October 2008
  • | Field = Data mining the 25th International Conference on Data Engineering ICDE'09,
    5 KB (592 words) - 23:18, 14 October 2008
  • | Field = Data mining ...uch as user modeling, machine learning, intelligent information retrieval, data and text mining, statistics, computational intelligence, human-computer int
    4 KB (570 words) - 23:19, 14 October 2008
  • | Title = The 2nd International Workshop on Domain Driven Data Mining | Field = Data mining
    4 KB (510 words) - 23:19, 14 October 2008
  • | Title = Practical Privacy - Preserving Data Mining | Field = Data mining
    5 KB (721 words) - 23:19, 14 October 2008
  • | Title = 23rd International Information Security Conference | Field = Computer security and reliability
    5 KB (637 words) - 23:20, 14 October 2008
  • | Title = SPIE Defense and Security Symposium | Field = Computer security and reliability
    1 KB (167 words) - 23:20, 14 October 2008
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability
    4 KB (502 words) - 23:20, 14 October 2008
  • 1.6 Semantic Analysis of Multimedia Data 1.7 Statistical Modeling of Multimedia Data
    3 KB (340 words) - 18:41, 10 June 2020
  • Due to constant changing environments, limited battery life and diverse data types, Mobile - Database and Data Management Mobile Computing
    10 KB (1,262 words) - 23:20, 14 October 2008
  • ...learning techniques to address reliability, performance, power management, security, fault diagnosis, or manageability issues in computer systems * Experience with online data collection and machine learning analysis
    6 KB (837 words) - 23:21, 14 October 2008
  • - Distributed Database and Data Mining - Security, Privacy and Trust
    3 KB (357 words) - 23:23, 14 October 2008
  • * Database and Data Mining * Information Security
    3 KB (415 words) - 23:23, 14 October 2008
  • ...It is based on studying combinatorial properties of the considered digital data sets. Combinatorial image analysis often features various advantages (in te
    6 KB (814 words) - 23:25, 14 October 2008
  • ..., computer vision, image analysis, signal processing, statistics, computer security, etc. The purpose of this conference is to provide a scientific forum for r * sensor design and data acquisition
    3 KB (325 words) - 23:50, 14 October 2008
  • ...ntification techniques playing a key role in human-computer interfaces for security and restricted-access systems. �?� Classification and browsing of multimodal data
    4 KB (550 words) - 23:25, 14 October 2008
  • ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design Security and protection systems
    11 KB (1,492 words) - 23:26, 14 October 2008
  • * Innovative file or data storage system design * Security
    4 KB (547 words) - 23:26, 14 October 2008
  • Grid computing enables the sharing of distributed computing and data - Distributed and Large-Scale Data Access and Management
    5 KB (577 words) - 23:27, 14 October 2008
  • * Hardware support for security * Instruction level, thread level, and data level parallelism
    2 KB (259 words) - 10:14, 29 May 2016
  • ...ns and required attributes, such as reliability, availability, safety, and security, as well as human factors. * Architecture and protocols for security.
    4 KB (528 words) - 23:27, 14 October 2008
  • ...ermining the right memory subsystem, ensuring coherence and consistency of data, and trying to limit the area and power budgets, all require a deep underst ...P architectures for solving problems, e.g. using multiple cores to enhance security, reliability, improve single-thread performance, reduce power, etc.
    4 KB (575 words) - 23:27, 14 October 2008
  • ...uzzy systems, Genetic algorithm, Evolutionary computing, Machine learning, Data mining ...energy, Waste management, Waste treatment and recycling, Water network and security, Sensor technologies, Intelligent Micro-grids
    4 KB (561 words) - 23:29, 14 October 2008
  • ...cation and networking, embedded systems and hardware, distributed systems, data management, and applications, so we welcome cross-disciplinary work. Data, information, and signal processing
    6 KB (771 words) - 16:09, 16 September 2019
  • o Language features to enhance reliability and security handling, for reliability and security
    5 KB (673 words) - 23:30, 14 October 2008
  • * Tools and Methodologies for Large Scale Semantic Web Data - Management Trust, Provenance, Security, Privacy, Identity and the Semantic Web
    4 KB (573 words) - 23:31, 14 October 2008
  • Semantic Annotation of Data Semantic Web Trust, Privacy, Security and Intellectual Property Rights
    2 KB (266 words) - 11:46, 28 May 2016
  • * Cloud computing and data center networks * Architectural support for improving security or availability
    4 KB (577 words) - 23:31, 14 October 2008
  • ...ity when compared to traditional critical systems, where dependability and security are fairly well understood as complementary concepts and a variety of prove ...lopment tools with middleware, traditional dependability, fault tolerance, security, and adaptivity concepts, together with social and psychological aspects, t
    8 KB (952 words) - 23:31, 14 October 2008
  • Security in distributed systems Data grid
    5 KB (702 words) - 23:31, 14 October 2008
  • or remote data and service resources to perform various in silico computations and data repositories in a distributed environment,
    6 KB (750 words) - 23:31, 14 October 2008
  • * Techniques that treat programs/models as data objects including meta-programming, generative programming, staged computat ...distributed and web-based applications, resource-limited computation, and security.
    4 KB (468 words) - 23:32, 14 October 2008
  • ...he conference covers optimization for parallelism, performance, power, and security, where that optimization occurs in the mapping from an input (including API * Memory management, including data distribution, synchronization and GC
    3 KB (342 words) - 23:32, 14 October 2008
  • ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...application specific fixed function, programmable, reconfigurable, near- data and in-memory accelerators, etc.
    5 KB (580 words) - 10:32, 12 May 2020
  • *Big Data platforms with applications to network management, security, measurements *Innovative uses of network data beyond communication
    4 KB (514 words) - 12:03, 6 April 2020
  • �?� Optimization techniques for security and reliability �?� Memory management, including data distribution and synchronization
    2 KB (201 words) - 23:32, 14 October 2008
  • ...ternet technologies, multimedia, wireless communications, data privacy and security, authentification, authorization and federation.
    4 KB (504 words) - 23:33, 14 October 2008
  • ** integration of data and processes ** data integration from Web information sources
    9 KB (1,134 words) - 01:18, 1 February 2009
  • ...Web-based user interfaces and services that securely access Grid resource, data, application, and collaboration services for communities of scientists. As ...n Social and Facebook APIs for socially networked applications, OpenID for security, and cloud computing offerings from Amazon, Microsoft, Google, and others w
    3 KB (378 words) - 23:34, 14 October 2008
  • | Title = The First International Conference on Security and Privacy in Mobile Information and Communication Systems ...edge researchers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymaker
    4 KB (451 words) - 23:37, 14 October 2008
  • * algorithms and data structures including sequential, parallel, * foundations of security
    6 KB (682 words) - 10:18, 14 April 2020
  • offer applications easy and efficient access to sensor data at the scale selected types of sensor data, a GSN provides an application with
    4 KB (483 words) - 23:37, 14 October 2008
  • �?� Data aggregation �?� Data storage and retrieval
    11 KB (1,533 words) - 23:38, 14 October 2008
  • information system is to balance the autonomy of networked data, Agent-based distributed data mining.
    9 KB (1,215 words) - 23:38, 14 October 2008
  • ...describing significant research contributions to thefield of computer and data communication networks. We invite submissions on network architecture, desi * Security, trust, & privacy
    3 KB (380 words) - 19:34, 17 November 2008
  • - Data Distribution, Load Balancing & Scaling - Security and Reliability
    5 KB (606 words) - 14:17, 8 April 2021
  • MEASUREMENT-DATA ACQUISITION MEASUREMENT-DATA PROCESSING
    3 KB (360 words) - 23:39, 14 October 2008
  • * Architectures and designs for concurrency: superscalar, VLIW, data parallel, multithreaded, multicore, transactional, etc. * Microarchitecture support for reliability, dependability, and security
    3 KB (326 words) - 17:43, 8 November 2008
  • # Security challenges and solutions for interoperability/interoperation of # Interoperability of digital repositories and data storage technologies in
    7 KB (959 words) - 23:40, 14 October 2008
  • * Grid Infrastructures for Biomedical Data Analysis and Management * Security in Biomedical Data Grids
    7 KB (876 words) - 23:40, 14 October 2008
  • | Field = Computer security and reliability * Integrated system reliability, availability, security, safety, and timing analysis and evaluation methods
    6 KB (748 words) - 14:43, 27 December 2015
  • | Title = Fourth International Workshop on the Value of Security through Collaboration ...ties of the ecosystem where the nodes operate may be guaranteed. Thus, the security property of the ecosystem may be driven by self-organizing mechanisms. Depe
    3 KB (420 words) - 23:42, 14 October 2008
  • ward data management. The use of a mobile wireless infrastructure can lead to security and reliability problems. Mobile devices often have usability 3.Data integration across different health service settings.
    6 KB (771 words) - 23:42, 14 October 2008
  • ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network - Knowledge discovery and data mining, link analysis, Web mining - Internet search, UCC management, online
    2 KB (303 words) - 23:42, 14 October 2008
  • - peer-to-peer systems, overlay networks, distributed data management - security in distributed computing, cryptographic protocols
    6 KB (766 words) - 13:19, 28 November 2016
  • |title=IEEE Transactions on Big Data |Field=Big Data
    927 bytes (139 words) - 05:14, 9 September 2023
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • .../autonomic, on-demand, cloud/etc./; Context-aware and context recognition; Data-centers and nano-centers; Information processing /distribution, discovery, ...ion; All-IP versus protocol translation; IP simplified network management; Security, trust, and privacy; Network stability under topology change; Delay-toleran
    7 KB (883 words) - 17:35, 7 January 2021
  • ...a platform for data gathering or the management of information related to data collection that helps researchers demonstrate the validity of their experim * Virtual organization and security issues of instruments and sensors on the Grid
    4 KB (642 words) - 21:17, 9 December 2008
  • Call For Papers: International Journal on Data Engineering and Management ...DEMFoundation) is a non profit organization promoting data engineering and data management research worldwide with out any discrimination. It’s acting as
    3 KB (440 words) - 12:20, 12 December 2008
  • - The role of Software Architecture in the engineering and testing of data analytics software systems (AKA BigData); - Safety & Security Assurance of Avionic & Medical Cyber-Physical Systems.
    1 KB (187 words) - 21:13, 12 July 2020
  • data, analysis, decision and execution. As such, real time service-oriented * Security and privacy for RTSOAA based CPS
    7 KB (922 words) - 00:58, 9 January 2009
  • As the Web data is very diverse, WIS are seeking efficient and flexible approaches to provide integrated views over heterogeneous data sources.
    8 KB (1,101 words) - 15:16, 12 January 2009
  • ** Privacy and security ** Inter/intra government applications data exchange
    11 KB (1,366 words) - 16:44, 14 January 2009
  • - Security - Data Analysis
    6 KB (812 words) - 12:55, 18 January 2009
  • The Data Grid and Pervasive Computing Data and knowledge management for Pervasive Computing
    4 KB (597 words) - 13:46, 23 January 2009
  • ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Fusion and Data Collection
    5 KB (526 words) - 01:02, 2 February 2009
  • o Security o Knowledge discovery and data mining
    5 KB (567 words) - 12:58, 18 January 2009
  • o Databases and data mining * Security, Privacy, Encryption, and Digital Rights, including
    9 KB (1,221 words) - 12:58, 18 January 2009
  • - Data modeling - Security
    5 KB (633 words) - 12:58, 18 January 2009
  • | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)
    16 KB (2,178 words) - 12:59, 18 January 2009
  • ...ethical issues, such as those pertaining to information security, privacy, data mining, and intellectual property. Therefore, as e-business continues to gr ...ent issues in e-business such as those of privacy, information management, data mining, intellectual property, and consumer tracking.
    6 KB (856 words) - 13:00, 18 January 2009
  • ...cessing play a key role in the context of a plethora of modern distributed data, information and knowledge management applications and systems. Distributed - Distributed XML Data Management
    7 KB (1,030 words) - 13:00, 18 January 2009
  • Information and Data Management Data and Network mining
    4 KB (529 words) - 13:00, 18 January 2009
  • | Title = 11th International Conference on Data Warehousing and Knowledge Discovery 11th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2009),
    7 KB (1,006 words) - 13:00, 18 January 2009
  • - temporal data models and query languages - temporal data mining
    6 KB (872 words) - 13:00, 18 January 2009
  • | Title = The 1st International Workshop on Security, Reliability and Quality in Cloud Computing computing brings on security, reliability and quality? In other words, what new issues raised
    5 KB (624 words) - 13:00, 18 January 2009
  • | Title = The 11th ACM workshop on Multimedia and Security The 11th ACM workshop on Multimedia and Security will be held in Princeton, New Jersey, USA on September 7th and 8th of 2009
    3 KB (303 words) - 17:06, 24 February 2016
  • - AI in Computer Security - AI in Databases and Data Mining
    4 KB (582 words) - 14:47, 2 December 2010
  • Web Data Integration Web Data Mashup
    2 KB (240 words) - 17:46, 21 July 2016
  • o Security in Power Line Communications * High data rate transmission systems
    14 KB (1,518 words) - 13:01, 18 January 2009
  • Knowledge Discovery and Data Mining Security in wireless networks
    3 KB (320 words) - 16:40, 27 December 2015
  • Network Security Data Management
    2 KB (210 words) - 13:01, 18 January 2009
  • and parallel and distributed data storage technologies. NAS 2009 will * Security, trust, and privacy
    10 KB (1,206 words) - 13:01, 18 January 2009
  • - Security Engineering - Data Mining
    10 KB (1,321 words) - 13:01, 18 January 2009
  • Security, Ethics and Privacy • Data Mining and Knowledge Discovery in HI
    4 KB (528 words) - 13:01, 18 January 2009
  • numbers of diverse but interrelated data sources of many varying forms. these disparate data sources, so that they can co-exist comfortably and
    4 KB (568 words) - 13:01, 18 January 2009
  • - Data mining advances on the discovery and analysis of communities - Security, privacy, trust and safety of cyber physical & social computing
    3 KB (446 words) - 13:02, 18 January 2009
  • | Title = 4th Workshop on Data Storage Devices and Systems DS2 2009, the 4th International Workshop on Data Storage Devices and Systems, will be held at the Kyung Hee University, Yong
    4 KB (532 words) - 15:04, 27 December 2015
  • | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)
    6 KB (852 words) - 13:02, 18 January 2009
  • ...place in conjunction with the 3rd International Conference on Information Security and Assurance, Seoul, Korea http://www.sersc.org/ISA2009. ? MAC and link layer security protocol
    3 KB (450 words) - 13:02, 18 January 2009
  • ...ssues can expose the network infrastructure to stability, performance, and security problems. ...acks and intrusions requires the analysis of detailed traces. Furthermore, data collection and analysis is important for generating and validating models o
    5 KB (431 words) - 13:03, 18 January 2009
  • B-09 Web-page Security Monitoring C-08 Uncertainty Management in Data Mining
    4 KB (459 words) - 16:33, 27 February 2009
  • As volume of data and knowledge keeps increasing, new methods, modeling paradigms, and struct Scalable Data Mining
    4 KB (512 words) - 16:33, 27 February 2009
  • * security in distributed computing, cryptographic protocols * peer-to-peer systems, overlay networks, distributed data management
    7 KB (890 words) - 15:05, 27 December 2015
  • ...temas, Wireless communications, Technologies and applications, Information security ...temas, Wireless communications, Technologies and applications, Information security
    8 KB (977 words) - 16:33, 27 February 2009
  • * Virtualization in data centers * Security aspects of using virtualization in a distributed environment
    5 KB (576 words) - 16:34, 27 February 2009
  • * Security and trustworthy in multi-tenancy service hosting environment * Web services for data intensive computing and scientific workflows
    6 KB (855 words) - 17:06, 27 February 2009
  • systems; concurrency theory; database theory, semi-structured data and finite model theory; models of reactive, hybrid and stochastic * Emerging fields: security and cryptography; ad hoc and mobile systems;
    2 KB (282 words) - 11:28, 21 April 2021
  • XML and semi-structured data Information Security
    5 KB (604 words) - 17:06, 27 February 2009
  • |Field=Big Data · Reliability, fault-tolerance, and security
    8 KB (1,050 words) - 18:04, 5 January 2017
  • + Middleware solutions for Security, Privacy and Trust service, and data access service
    6 KB (800 words) - 22:11, 27 February 2009
  • systems that cooperate to exchange data. These systems have emerged as the * Security and privacy in P2P systems
    5 KB (623 words) - 17:06, 27 February 2009
  • Special Issue of IEEE Transactions on Knowledge and Data Engineering into a huge repository of cross-referenced, machine-understandable data and
    7 KB (883 words) - 17:06, 27 February 2009
  • * Data Types and Query Languages * Data Stream Technologies
    4 KB (534 words) - 17:07, 27 February 2009
  • | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability
    8 KB (967 words) - 17:07, 27 February 2009
  • _ Data Governance _ Data Scrubbing and Cleaning
    5 KB (690 words) - 17:07, 27 February 2009
  •    * Aggregation techniques and data management    * Privacy and security services
    6 KB (861 words) - 17:07, 27 February 2009
  • | Title = Workshop on Trust, Risk and Security Assessments for Network Dependability in Digital Ecosystems (TRSDE) | Field = Computer security and reliability
    4 KB (600 words) - 17:07, 27 February 2009
  • ...RFID, GSM, GPRS, 3G Digital Pens, PDAs, Mobile Phones, VoIP, Video, Voice, Data, other devices) for improvement of our human lives, not just organizations, Security and Privacy
    7 KB (941 words) - 17:07, 27 February 2009
  • * Data propagation and routing * Data aggregation/data compression
    6 KB (750 words) - 16:50, 27 December 2015
  • * Authorization, Privacy and Security * Data Mining and Knowledge Discovery
    9 KB (1,249 words) - 08:42, 7 October 2011
  • Computer System, Information Security and Networks • Data and Knowledge Engineering for E-Business
    3 KB (319 words) - 17:07, 27 February 2009
  • * Security, data handling, and privacy * Spontaneous integration of public/private data & devices
    5 KB (670 words) - 17:08, 27 February 2009
  • in harmony with societal values and economic viability, with enhanced security, -Databases and Data Mining
    11 KB (1,440 words) - 17:08, 27 February 2009
  • The functionality provided by modern database management systems (DBMS), data in hardware architectures, new data storage requirements, and new usage patterns
    6 KB (817 words) - 17:08, 27 February 2009
  • | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability
    12 KB (1,690 words) - 17:08, 27 February 2009
  • | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability
    6 KB (828 words) - 17:08, 27 February 2009
  • * Data-centric issues, including anonymization, querying, and storage * Network security threats and countermeasures
    6 KB (774 words) - 17:08, 27 February 2009
  • * Middleware for data intensive computing * Information assurance and security
    8 KB (1,144 words) - 20:59, 27 February 2009
  • |Title=Financial Cryptography and Data Security 2018
    475 bytes (53 words) - 13:18, 10 March 2020

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)