Search results

Jump to: navigation, search
  • social/management sciences, (multi-)robotics, and on elements for structuring/defining/analyzing the identity and
    10 KB (1,371 words) - 16:14, 12 November 2020
  • ...tions, and interactions of these applications with other types of systems. Management aspects related to these applications and challenges on specialized domains ...s. The challenges consist of service discovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desira
    18 KB (2,408 words) - 02:37, 16 December 2008
  • |Title=International Symposium on Memory Management ...areas of memory management. Survey papers that present an aspect of memory management with a new coherence are also welcome.
    6 KB (967 words) - 22:51, 4 February 2009
  • * › Wireless Information Policy, Risk Assessment and Management * › Network Management and Control
    9 KB (1,219 words) - 20:05, 14 October 2008
  • Identity management for large scale collaborative infrastructures Trust models, trust negotiation/management for collaborative systems
    4 KB (520 words) - 20:05, 14 October 2008
  • ..., eGovernment /eGovernance, eHealth, Information Systems, and Information Management. These broad areas are divided into more detailed areas (see below). Howeve - Innovation, identity and the global village syndrome
    6 KB (780 words) - 20:06, 14 October 2008
  • * Standards or specifications for content management ...es and affiliations. Furthermore, self-references that reveal the author's identity should be avoided. Paper submission is handled electronically using the STA
    4 KB (524 words) - 23:02, 14 October 2008
  • ...sources and Evaluation for Identity Matching, Entity Resolution and Entity Management ...sources and Evaluation for Identity Matching, Entity Resolution and Entity Management
    3 KB (369 words) - 23:08, 14 October 2008
  • ...including traditional database management, as well new challenges for data management in any possible domain. Prospective authors are encouraged to consider nove § Transactions and Workflow Management
    3 KB (305 words) - 08:44, 31 July 2020
  • ...osophy and logic, cognitive science, knowledge management, linguistics and management science are relevant areas, too. In the conference, there will be four cate ...is focused on information technologies, knowledgere presentation, process management, and new trends in these, including time-sensitive structures and communica
    8 KB (1,143 words) - 11:55, 20 June 2011
  • The security of digital exchanges and its counterpart, the management of digital identities, is the main issue concerning the concept of global s - Identity Management and New Ideas & Paradigms for the Security of Digital Identities
    4 KB (587 words) - 23:30, 14 October 2008
  • ...uting, we encourage contributions on policy-based techniques in support of management and security of all types of wireless networks: cellular, Wi-Fi, Mobile Ad ...008 invites unpublished novel contributions on all aspects of policy-based management. This year, as part of the technical program we also plan a special session
    5 KB (667 words) - 23:13, 14 October 2008
  • ...s to give thought to the identity of the profession and their own sense of identity alike. The amount of information is growing exponentially. * Information Professional and Information Management
    3 KB (490 words) - 10:33, 7 June 2020
  • ...al Issue is associated with COST 2101 Workshop on "Biometrics and Identity Management" held in Denmark in May 2008. Therefore, contributors to COST 2101 Workshop
    4 KB (526 words) - 23:17, 14 October 2008
  • -Identity Management -Security and Trust Management in P2P and Grid applications
    4 KB (487 words) - 10:42, 21 August 2020
  • * Key management in wireless/mobile environments * Identity theft and phishing in mobile networks
    2 KB (291 words) - 23:19, 14 October 2008
  • * Identity and Trust management * Digital Rights Management
    6 KB (736 words) - 23:20, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security ...ual meeting and conference of the newly formed IFIP Working Group on Trust Management (IFIP WG 11.11). IFIPTM 2007 provided a truly global platform for the repor
    4 KB (565 words) - 23:20, 14 October 2008
  • access control electronic frauds security management accounting and audit identity management smartcards
    5 KB (637 words) - 23:20, 14 October 2008
  • Mobility management and Handover Resource allocation management
    4 KB (502 words) - 23:20, 14 October 2008
  • 9) Memory management, smart caches and compiler controlled memories efforts to conceal their identity. Submissions not adhering to these
    11 KB (1,352 words) - 00:33, 15 October 2008
  • * Tools and Methodologies for Large Scale Semantic Web Data - Management * Semantic Web-based Knowledge Management
    4 KB (573 words) - 23:31, 14 October 2008
  • * Memory management ...please provide that information to the PC chair separately. Note that the identity of the authors will be revealed to the reviewers once the review is submitt
    5 KB (678 words) - 20:58, 26 November 2016
  • ...l or distributed simulation, including synchronization, scheduling, memory management, and load balancing. ...submissions will be reviewed using a double-blind review process,i.e., the identity of authors, and referees will not be revealed to each other. To ensure blin
    3 KB (372 words) - 23:32, 14 October 2008
  • Service marketing and customer relationship management Knowledge modeling, management, and application
    8 KB (1,075 words) - 23:52, 14 October 2008
  • | Field = Management ...expanding field by focusing on issues relevant to electronic business and management. Academics and practitioners are invited to submit conceptually and empiric
    3 KB (391 words) - 23:36, 14 October 2008
  • risk management, collaborative filtering, social/business networking * Trust management, reputation management and identity management
    4 KB (499 words) - 23:42, 14 October 2008
  • * SECMAN: Security management ...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance
    13 KB (1,617 words) - 19:03, 24 November 2008
  • * Distributed Access Control and Trust Management * Identity Management and Authentication
    12 KB (1,669 words) - 12:58, 18 January 2009
  • - Organisational Design and Management - Identity
    6 KB (860 words) - 13:00, 18 January 2009
  • * Mashups and federated identity * Mashups for corporate knowledge management
    6 KB (684 words) - 13:00, 18 January 2009
  • management of customers? data in Web stores can help building trust by - Trust management frameworks for secure collaborations
    5 KB (602 words) - 13:44, 23 January 2009
  • * Authentication and identity management in UE * Risk assessment, and management in UE
    6 KB (793 words) - 15:12, 1 October 2020
  • - Identity management - Key management and authentication
    6 KB (852 words) - 13:02, 18 January 2009
  • - Digital Rights Management - Identity and Trust Management
    8 KB (967 words) - 17:07, 27 February 2009
  • | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business 2009 World Congress on Privacy, Security, Trust and the Management of e-Business
    12 KB (1,690 words) - 17:08, 27 February 2009
  • ...current network architectures and the Internet, autonomous and spontaneous management will be a key feature of future networks and information systems. In this c * Identity management
    3 KB (480 words) - 17:08, 27 February 2009
  • - digital right management - transaction management
    6 KB (828 words) - 17:08, 27 February 2009
  • - QoS management in WMS - Authentication, identity management in WMS
    3 KB (477 words) - 16:54, 8 August 2009
  • ...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance ...e protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillance; Database security
    6 KB (746 words) - 11:35, 2 August 2009
  • ...erification; Performance on firewall protected real-time systems; Security management in real-time systems; Metrics and techniques for security risk assessment; ...methodologies and ID Cards; Security on hardware and smart cards; Identity management; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anon
    14 KB (1,651 words) - 15:56, 15 February 2017
  • Identity Management, Security and Trust Management in P2P and Grid applications,
    3 KB (352 words) - 12:39, 11 August 2009
  • -Implementation, deployment and management of network security policies ...ection: protocols, implementations, metering, watermarking, digital rights management
    6 KB (766 words) - 10:54, 26 April 2010
  • * Digital Rights Management * Identity and Trust management
    4 KB (484 words) - 14:20, 14 December 2009
  • - Enterprise management and consumer protection - Identity and Trust Management
    7 KB (982 words) - 19:13, 3 January 2010
  • - QoS management in WMS - Authentication, identity management in WMS
    3 KB (497 words) - 03:43, 28 February 2010
  • * Formal relations: parthood, identity, connection, dependence, constitution, subsumption, instantiation * Identity and change
    4 KB (551 words) - 14:54, 27 December 2015
  • * › Knowledge Management * › e-Procurement and Web-based Supply Chain Management
    19 KB (2,462 words) - 19:10, 26 August 2010
  • - identity management, anonymity
    5 KB (701 words) - 05:52, 14 April 2011
  • Identity Management Security and Trust Management in P2P and Grid applications
    5 KB (597 words) - 10:45, 21 August 2020
  • |Title=International Workshop on Visualization and Information Security Management |Field=Security Management
    3 KB (468 words) - 00:17, 2 March 2011
  • Identity Management Information Security Management
    3 KB (368 words) - 16:16, 29 February 2012
  • ...Management of non-unique physical cell identities, IP address and VLAN ID management. ...ation; Node load balancing, Tracking area optimization, Quality of Service Management, Transport Path Optimization, Green approaches and energy efficiency mechan
    5 KB (633 words) - 14:08, 2 March 2012
  • ...Web-based communication services; Node localizations; Indoor positioning; Management plane; Community structure detection; Preventing DDoS attacks; Multifactor ...n of network functions; Software defined networking (SDN) and 5G; Mobility management, energy efficiency, power cost reduction in 5G networks; Network function v
    13 KB (1,580 words) - 19:35, 18 February 2021
  • ...manifold, including an unprecedented flexibility for network operation and management, and a favorable environment for delivering innovative network applications ...us security aspects of next-generation networking technologies and service management frameworks.
    4 KB (581 words) - 18:48, 24 February 2020
  • ...as include conceptual modeling, database design, knowledge engineering and management, software engineering, organizational modeling, artificial intelligence, ro * Formal relations: parthood, identity, connection, dependence, constitution, causality, subsumption, instantiatio
    6 KB (751 words) - 14:08, 22 February 2020
  • *Business Process Management ...tion of the paper and any other reference that may disclose the authors’ identity.
    7 KB (938 words) - 11:06, 6 September 2020
  • |Field=Research of Data Management Theory ...prestigious forum for the exchange of the latest research results in data management. Held in an attractive European location, the conference provides unique op
    5 KB (580 words) - 13:29, 4 February 2019
  • ...al issues arises out of this. What impact does this have on the self whose identity in the time/space continuum, in the rapidly changing environment, and in th Business and Management Ethics
    4 KB (563 words) - 11:14, 17 September 2020
  • ...ost prominently the Model-Driven Architecture (MDA) fostered by the Object Management Group (OMG). In the scope of MDA, a couple of technologies have been develo Workflow Management Systems
    8 KB (1,165 words) - 17:11, 18 July 2012
  • Special Theme: "Connectedness, Identity and Alienation in the Arts and Humanities" ...suggestion of an optional themes to concentrate the mind; "Connectedness, Identity and Alienation in the Arts and Humanities", and the organizers encourage su
    3 KB (351 words) - 11:10, 17 September 2020
  • Economics and Management Ethnicity, Difference, Identity
    2 KB (291 words) - 19:26, 2 March 2021
  • • Ecological management • Social identity
    6 KB (728 words) - 01:01, 25 August 2012
  • Special Theme: "Connectedness, Identity and Alienation in the Arts and Humanities" The conference theme is "Connectedness, Identity and Alienation in the Arts and Humanities", and the organizers encourage su
    2 KB (289 words) - 09:59, 4 March 2013
  • Economics and Management Ethnicity, Difference, Identity
    3 KB (402 words) - 10:00, 4 March 2013
  • * Enterprise Security Management * Identity Management
    2 KB (264 words) - 15:32, 7 January 2021
  • ...es and affiliations. Furthermore, self-references that reveal the author's identity, e.g., "We previously showed (Smith, 1991) ..." must be avoided. Instead, u Submission is electronic, using the Softconf START conference management system at
    10 KB (1,480 words) - 23:28, 13 December 2017
  • |Field=technology, biometrics, identity management, security
    467 bytes (59 words) - 13:50, 25 September 2016
  • |Title=Detection, Representation and Management of Concept Drift in Linked Open Data Drift-a-LOD2017: Detection, Representation and Management of Concept Drift in Linked Open Data
    4 KB (531 words) - 12:59, 8 July 2017
  • * Data Management and Knowledge Representation ...tion of the paper and any other reference that may disclose the authors’ identity.
    5 KB (615 words) - 10:58, 15 May 2020
  • Integrity and Constraint Management: verification, validation, consistent Security in Information and Knowledge Systems: identity theft, privacy,
    9 KB (1,118 words) - 13:41, 3 September 2017
  • • Digital Rights ManagementIdentity Management
    5 KB (626 words) - 12:02, 3 September 2017
  • Identity Management Key Distribution and Management
    2 KB (308 words) - 11:50, 3 September 2017
  • identity management applications. While the hand-based biometrics (including
    3 KB (450 words) - 15:32, 9 October 2020
  • Identity management using physiological and behavioural characteristics  Trust management for multimodal interfaces
    4 KB (592 words) - 13:34, 28 July 2017
  • |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)
    5 KB (640 words) - 13:34, 28 July 2017
  • Automated Material Handling; Instrumentation System; Asset Management Systems; Biometrics and Identity Management; Modeling and Simulation; Classification and
    4 KB (508 words) - 13:23, 28 July 2017
  • - Content Protection and Digital Rights Management - Identity and Trust Management
    3 KB (380 words) - 12:30, 3 September 2017
  • Identity management Trust and reputation management
    4 KB (547 words) - 09:58, 21 August 2017
  • - Data Management for Large Data - Data and Knowledge Management
    8 KB (1,170 words) - 13:40, 3 September 2017
  • ...prestigious forum for the exchange of the latest research results in data management. Held in an attractive European location, the conference provides unique op ...ence on research on the foundations of database systems. Having a European identity, it is typically held in historical European locations; ICDT can be seen as
    2 KB (320 words) - 11:44, 28 October 2020
  • ...prestigious forum for the exchange of the latest research results in data management. Held in an attractive European location, the conference provides unique op ...ence on research on the foundations of database systems. Having a European identity, it is typically held in historical European locations; ICDT can be seen as
    2 KB (313 words) - 10:48, 23 February 2020
  • * Data management for mobile applications * System-level energy management for mobile devices
    5 KB (759 words) - 15:21, 18 June 2020
  • ...sues of privacy, identity, trust, and participation, Cooperative knowledge management, Organizational issues of technology design, use, or adaptation, Strategies
    2 KB (209 words) - 07:08, 17 April 2020
  • * Identity Management * Trust Models and Trust Management
    3 KB (313 words) - 17:14, 4 November 2020
  • - Enterprise management and consumer protection - Intellectual property and digital rights management
    5 KB (690 words) - 12:02, 26 March 2020
  • * Data management for mobile applications * System-level energy management for mobile devices
    5 KB (732 words) - 15:22, 18 June 2020
  • * Data management for mobile applications * System-level energy management for mobile devices
    6 KB (944 words) - 15:24, 18 June 2020
  • * Data management for mobile applications * System-level energy management for mobile devices
    5 KB (721 words) - 10:07, 17 August 2023
  • ...riting; Social media posts; Web and urban environments; Web-based disaster management; Web-based practical reasoning; Spamming detection; Reasoning models for th ...itectures; Web engineering; Web applications; Web services and information management; Behavioral analysis and personalization; Crowdsourcing systems and Social
    11 KB (1,390 words) - 12:35, 18 May 2020
  • |Title=21st European Conference on Knowledge Management * The fundamentals of Knowledge Management
    1 KB (136 words) - 20:49, 13 May 2020
  • * Data Management and Knowledge Representation ...tion of the paper and any other reference that may disclose the authors’ identity.
    5 KB (630 words) - 10:01, 15 May 2020
  • * Data Management and Knowledge Representation ...tion of the paper and any other reference that may disclose the authors’ identity.
    6 KB (735 words) - 11:44, 15 May 2020
  • ...oups on web-based applications; E-business system design, development, and management for SMEs ...nterprise Web services; Web services discovery, announcing, monitoring and management; Platforms, technologies, mechanisms and case studies; Grid architectures,
    14 KB (1,804 words) - 13:49, 5 June 2020
  • ...-critical services; Preventing Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control ...erification; Performance on firewall protected real-time systems; Security management in real-time systems; Metrics and techniques for security risk assessment;
    17 KB (2,088 words) - 12:49, 14 June 2020
  • ...Business models on wireless networks; Communications regulations, Spectrum management; Software-Defined Radio (SDR) [ architectures, hardware, software, signal p ...and networks; Methodologies and development tools for high speed networks; Management and control of high speed networks; Performance in high speed networks; Sec
    13 KB (1,636 words) - 11:51, 10 July 2020
  • ...in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality of Service) and QoE (Quality of Experience); Standardization ...tion, accounting and audit, anonymity and pseudonymity; identity and trust management, biometric methods; Anti-malware techniques: detection, analysis, preventio
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ...user in initial set-up of user profiles; Personalization and user profile management; Preferences for personalization in manufacturers' devices; Standardization ...identity and security - identity provider; Home content access and rights management
    10 KB (1,232 words) - 16:20, 22 March 2021
  • ...Management (MAM); Identity and Access Management (IAM); Risk and security management; IT-Governance, Risks and compliance; Public safety and professional commun ...nst leaks; Internet security and content cloud services; Risk and security management; IT-Governance, Risks and compliance; SCADA-based information security syst
    15 KB (1,886 words) - 16:16, 25 August 2020
  • * Identity Management * Security and Trust Management in P2P and Grid applications
    4 KB (468 words) - 11:39, 21 August 2020
  • * Identity Management * Security and Trust Management in P2P and Grid applications
    4 KB (538 words) - 11:52, 21 August 2020
  • * Identity Management * Security and Trust Management in P2P and Grid applications
    5 KB (627 words) - 10:49, 25 August 2020
  • ...ign for one vs. Design for all; Accessible and privacy preserving identity management and authentication; Multimodality and accessibility; Accessibility, Adaptiv
    10 KB (1,232 words) - 13:26, 24 August 2020
  • Identity-Based Cryptography Identity Management
    2 KB (169 words) - 10:42, 25 August 2020
  • * Identity Management * Security and Trust Management in P2P and Grid applications
    3 KB (336 words) - 11:20, 25 August 2020
  • * Identity Management * Security and Trust Management in P2P and Grid applications
    5 KB (590 words) - 11:54, 25 August 2020
  • * Identity Management * Security and Trust Management in P2P and Grid applications
    5 KB (581 words) - 12:47, 25 August 2020
  • | [[Identity and Identification in Antiquity 2009]] ||[[:Identity and Identification in Antiquity]] ||45 | [[IJISSS special issue 2008]] ||[[:The Engineering, Management, and Philosophy of Service-oriented Information Systems]] ||26
    24 KB (2,633 words) - 18:53, 15 October 2020
  • ...-critical services; Preventing Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Optimal balancing control ...erification; Performance on firewall protected real-time systems; Security management in real-time systems; Metrics and techniques for security risk assessment;
    17 KB (2,035 words) - 14:45, 18 February 2021
  • videogames (VaaS); LTE broadcasting; Identity-oriented networks; Network)--based resilience; Policy-based NFV management; Performance of
    13 KB (1,607 words) - 19:32, 30 November 2020
  • Knowledge, Data and Information Management Security, Privacy, Trust, Identity, Biometrics
    5 KB (640 words) - 21:39, 17 December 2020
  • ...oups on web-based applications; E-business system design, development, and management for SMEs ...nterprise Web services; Web services discovery, announcing, monitoring and management; Platforms, technologies, mechanisms and case studies; Grid architectures,
    15 KB (1,921 words) - 01:00, 12 December 2020
  • ...as 'wiki markup') or a rich-text editor. While a wiki is a type of content management system, it differs from a blog or most other such systems in that the conte ...as 'wiki markup') or a rich-text editor. While a wiki is a type of content management system, it differs from a blog or most other such systems in that the conte
    4 KB (476 words) - 12:47, 12 December 2020
  • *Trust and identity management
    6 KB (804 words) - 11:42, 28 January 2021
  • * • Identity Management * • Trust Management
    2 KB (197 words) - 17:40, 11 February 2021
  • Identity management Key management
    1 KB (188 words) - 04:26, 13 April 2021