Search results

Jump to: navigation, search

Page title matches

Page text matches

  • All these technological developments are expected to bring us a next wave of information * Security and privacy issues for ubiquitous systems
    13 KB (1,468 words) - 01:23, 22 August 2008
  • ** Privacy, safety and security ** Privacy, safety, and security
    6 KB (777 words) - 22:54, 14 August 2008
  • In order to make information of the various fields of science available {{SITENAME}} relies on a network ====Computer security and reliability====
    6 KB (714 words) - 12:19, 11 December 2020
  • | title = Transactions on Information and System Security | Field = Computer security and reliability
    272 bytes (32 words) - 16:33, 18 August 2008
  • *Communication and Information Theory *Network Security
    5 KB (571 words) - 09:22, 19 July 2019
  • * Quality of information (QoI) in sensor-enabled pervasive environments * Trust, security and privacy issues in pervasive systems
    12 KB (1,560 words) - 15:03, 27 August 2008
  • The 2011 International Conference of Information Engineering The 2011 International Conference of Information Security and Internet Engineering
    3 KB (454 words) - 12:34, 8 October 2020
  • are challenged by applications aimed at personal information The new information paradigms and requirements will move our research
    9 KB (1,189 words) - 14:53, 28 August 2008
  • ...uctive databases and knowledge bases; Distributed databases; Integrity and security; Logic and databases; Multimedia databases; Query optimization; Query proce
    5 KB (753 words) - 18:59, 25 June 2012
  • inter-operability, security, trusted and dependable systems, fault resource allocation, scheduling, fault tolerance, security.
    5 KB (715 words) - 17:43, 11 September 2008
  • systems. See http://www.ifaamas.org for more information. INFORMATION FOR AUTHORS
    10 KB (1,371 words) - 16:14, 12 November 2020
  • Local information can be found at http://www.cs.york.ac.uk/vstte08/ Unguessable Atoms: A Logical Foundation for Security
    5 KB (686 words) - 12:27, 12 September 2008
  • number of wireless terminals and information generated by such could call the "Information-Explosion Era."
    5 KB (611 words) - 15:43, 16 September 2008
  • ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d Additionally, P2P systems require special attention from the security point of view. Trust, reputation, copyrights, and intellectual property are
    18 KB (2,408 words) - 02:37, 16 December 2008
  • |Title=8th International Conference on Information Systems Technology |Field=Information systems
    7 KB (763 words) - 12:25, 6 October 2011
  • ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...ons; Target-oriented keyword search; Filter-based profile matching; Mutual information on data streams; Stream processing; Digitized documents streams; Queries wi
    11 KB (1,371 words) - 12:28, 18 May 2020
  • ...ed to databases triggered substantial improvements for content processing, information indexing, and data, process and knowledge mining. The push came from Web se ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.)
    11 KB (1,446 words) - 18:26, 13 October 2008
  • ...ucators and researchers as well as an important aspect of e-government and information society initiatives. F/OSS is a complex phenomenon that requires an interdi ...indings and practical experiences. The conference is also meant to provide information and education to practitioners, identify directions for further research an
    10 KB (1,349 words) - 16:42, 24 September 2008
  • Software Security Internet and Information Systems Development
    2 KB (293 words) - 10:35, 24 June 2011
  • |Title=The IEEE 23rd International Conference on Advanced Information Networking and Applications (AINA-09) ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-09) will be held in Bradford, May 26-29,
    34 KB (4,565 words) - 22:20, 10 January 2018
  • |Title=The IEEE 22nd International Conference on Advanced Information Networking and Applications ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-08) will be held in Ginowan City , Okinaw
    8 KB (1,037 words) - 22:20, 10 January 2018
  • |Title=The IEEE 21st International Conference on Advanced Information Networking and Applications (AINA-07) ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-07) will be held in Niagara Falls, Canada
    9 KB (1,189 words) - 22:20, 10 January 2018
  • |Title=The IEEE 20th International Conference on Advanced Information Networking and Applications on Advanced Information Networking and Applications (AINA2006) will
    26 KB (3,456 words) - 22:20, 10 January 2018
  • |Title=The IEEE 19th International Conference on Advanced Information Networking and Applications ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA 2005) will be held in Tamkang University,
    10 KB (1,263 words) - 22:20, 10 January 2018
  • |Title=The 18th International Conference on Advanced Information Networking and Applications (AINA 2004) The International Conference on Advanced Information Networking and Applications (AINA 2004) will be held in Fukuoka, Kyushu, Ja
    12 KB (1,537 words) - 22:19, 10 January 2018
  • |Title=The International Conference on Advanced Information Networking and Applications The International Conference on Advanced Information Networking and Application will be held in Xi'an, China in March 27-29, 200
    8 KB (1,040 words) - 22:20, 10 January 2018
  • Users will be able to retrieve, publish, and manage information, - Wireless security and dependability
    4 KB (495 words) - 09:22, 22 August 2023
  • ...traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. - Trust-related Security and Privacy: Trust-related secure architecture, framework, policy, intrusio
    9 KB (1,216 words) - 17:32, 14 October 2008
  • * Security assessment and enhancement * Games of imperfect or asymmetric information
    6 KB (722 words) - 17:32, 14 October 2008
  • ...raction and representation, shape and motion primitives, texture and color information, statistical, structural and syntactic pattern recognition, neural networks ...multimedia databases, digital and video libraries, compression and coding, security over the network.
    2 KB (268 words) - 17:47, 14 October 2008
  • Persuasive Technology is all about using Information and Communications Technology to change what we think and do. We are just e * Security and privacy
    8 KB (989 words) - 20:13, 22 February 2009
  • Geographical Information Systems/ Global Navigation Satellite Systems Security and Information Assurance
    4 KB (503 words) - 11:36, 18 October 2008
  • - System management and security; For more information visit the conference web site at http://www.computingfrontiers.org
    4 KB (591 words) - 17:48, 14 October 2008
  • ...n the areas of RFID technologies, their supporting large-scale distributed information systems and their applications. * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques
    3 KB (431 words) - 17:48, 14 October 2008
  • Information-theoretic aspects of wireless communications • Wireless network security and privacy
    6 KB (731 words) - 10:33, 14 August 2023
  • ...ireless communications and networking employed to support the needs of the Information Society. This sixth symposium, intends to bring together various wireless c * Wireless privacy and security
    3 KB (456 words) - 18:10, 14 October 2008
  • session that includes the ACM Student Research Competition. More information on these activities, including submission * Security, privacy, and trustworthiness of mobile and wireless systems
    7 KB (974 words) - 12:28, 3 August 2023
  • ...uming but also error-prone. The systematic and timely capture of the above information may accurately keep track of the various stages that data go through and he ...ware engineering, workflow system, information retrieval, web service, and security research. At the same time, it also requires understanding of problems from
    3 KB (416 words) - 17:48, 14 October 2008
  • Information theory: distributed network coding, Shannon's entropy, Nash equilibrium Internet security enforcement and validation
    11 KB (1,385 words) - 17:48, 14 October 2008
  • * legal and quasi-legal applications of AI and other advanced information technologies * Conceptual or model-based legal information retrieval
    7 KB (998 words) - 17:48, 14 October 2008
  • ...nal Conference on the Theory and Application of Cryptology and Information Security
    556 bytes (69 words) - 15:16, 10 March 2020
  • ...ternational Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability
    7 KB (960 words) - 17:48, 14 October 2008
  • The 8th ACM/IEEE Conference on Information Processing in ...cations o real-time resource management and scheduling o embedded system security o programming languages and software engineering for real-time or
    8 KB (939 words) - 17:48, 14 October 2008
  • * Trust, security and privacy Trust, security and privacy
    19 KB (2,503 words) - 13:25, 28 October 2020
  • Ubiquitous sensors, devices, networks and information are paving the way * Security, Privacy, Safety and Legal Issues
    7 KB (942 words) - 20:05, 14 October 2008
  • | Title = The 3rd International Symposium on Security and Multimodality in Pervasive Environments ...er hand, while enlarging and easing the ways to access to the environment, security threads arise and the environment must be properly equipped in order to pro
    3 KB (393 words) - 21:18, 14 October 2008
  • | Field = Computer security and reliability ...the “tour guide” and save you time by collecting and summarizing this information to bring you up to date in a particular area as efficiently as possible.
    3 KB (467 words) - 21:39, 16 October 2008
  • - Information dissemination and publish/subscribe functionality in SPSs - Information integration and data source wrapping in SPSs
    3 KB (490 words) - 20:05, 14 October 2008
  • |Title=First IEEE Workshop on Information and Software as Services First IEEE Workshop on Information & Software as Services (WISS'09)
    7 KB (907 words) - 21:51, 14 October 2008
  • # Semantic Information Retrieval # Semantic Web Trust, Privacy, Security and Intellectual Property Rights
    4 KB (450 words) - 20:05, 14 October 2008
  • | Title = International Conference on Wireless Information Networks and System WINSYS is organized by INSTICC – Institute for Systems and Technologies of Information, Control and Communication
    9 KB (1,219 words) - 20:05, 14 October 2008
  • [For more information, please visit URL: http://www.sis.uncc.edu/~mshehab/trustcol08/ ] ...enerate added momentum towards research in finding viable solutions to the security and privacy challenges faced by the current and future collaborative system
    4 KB (520 words) - 20:05, 14 October 2008
  • * Cryptography and Security * Information Retrieval
    2 KB (216 words) - 20:05, 14 October 2008
  • • Ethical, Social, Privacy, Security and moral Issues in an e-societ • Information Society
    5 KB (530 words) - 10:27, 24 June 2011
  • Information Systems Computer and Network Security
    3 KB (332 words) - 20:06, 14 October 2008
  • |Field=Computer security and reliability ...ctions), or refinery& chemical systems rely on networked communication and information systems. Moreover, there are other dedicated systems for data mining, recom
    15 KB (2,175 words) - 21:03, 19 March 2013
  • Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability AUTOMOTIVE ENTERTAINMENT and INFORMATION
    3 KB (354 words) - 20:06, 14 October 2008
  • ...in eESociety, eGovernment /eGovernance, eHealth, Information Systems, and Information Management. These broad areas are divided into more detailed areas (see bel * Topics related to the Information Society are of interest. These include, but are not limited to the followin
    6 KB (780 words) - 20:06, 14 October 2008
  • | Title = Fourth International Conference on Intelligent Computing and Information Systems ...vances of artificial and computational intelligence as well as intelligent information systems.
    2 KB (193 words) - 20:06, 14 October 2008
  • Information and Knowledge Engineering Intelligent Information Processing Systems
    3 KB (359 words) - 20:06, 14 October 2008
  • o Security and Privacy For further information, please contact the program chair, Professor Xiaodong Zhang at zhang@cse.oh
    2 KB (303 words) - 20:06, 14 October 2008
  • ...cess management and modelling, Grid computing, Web services notifications, information dissemination, event stream processing, and message-oriented middleware. Th * Security issues
    6 KB (829 words) - 15:30, 29 January 2021
  • ...ssist in the development of best practice and relevant standards. For more information, please visit: http://www.ieee-cqr.org/ . * Security and Reliability Issues
    4 KB (505 words) - 22:15, 14 October 2008
  • Enterprise Information Systems Homeland Security
    6 KB (708 words) - 22:49, 14 October 2008
  • ...ologies in complex and demanding settings, like manufacturing, healthcare, security, control systems, etc. ...echnologies with other technologies used to support organisations, such as information systems, production systems, decision support systems, knowledge management
    2 KB (261 words) - 22:45, 14 October 2008
  • * Security and privacy in pervasive healthcare * Using mobile devices for healthcare information storage, update, and transmission
    6 KB (732 words) - 22:45, 14 October 2008
  • * Data management and middleware support for collaborative information systems * Security and trust management in collaborative networks, systems, and applications
    6 KB (674 words) - 22:45, 14 October 2008
  • ...d task identification, personalized access to information and personalized information management, to name but a few. The advantages of such data are numerous, st ...biquitous computing, activity-driven computing, context-driven computing, information retrieval, database systems, digital libraries, metadata, data mining, user
    6 KB (890 words) - 22:53, 14 October 2008
  • ...e are promoting society integration and disseminating the digital culture. Information and Communication Technologies (ICT) are intensely used by Brazilian popula ...diversity of interactive systems usage, like in entertainment, security in information exchange and broadcast, participation in social and democratic processes as
    3 KB (502 words) - 22:53, 14 October 2008
  • - Databases: query processing; information integration; - Security and Privacy: cryptography; access control; security in
    9 KB (1,193 words) - 22:53, 14 October 2008
  • �?� Information integration in sensor networks �?� Knowledge management, information systems, large databases, data-mining
    4 KB (468 words) - 22:54, 14 October 2008
  • | Title = Conference on Enterprise Information Systems | Field = Information systems
    9 KB (1,240 words) - 22:56, 14 October 2008
  • | Title = International Conference on Neural Information Processing ...ecision support, business and finance, speech-, image- and multimodal information processing, process control, arts and design. The conference will includ
    5 KB (699 words) - 23:04, 14 October 2008
  • CAART is organized by INSTICC (Institute for Systems and Technologies of Information, Control and Communication), with technical co-sponsorship by the WfMC and ...is connection, therefore, authors are invited to highlight the benefits of Information Technology (IT) in these areas. Ideas on how to solve problems using agents
    18 KB (2,457 words) - 23:04, 14 October 2008
  • ...gence, databases, social networks, distributed computing, web engineering, information systems, natural language processing, soft computing, and human-computer in General Information
    6 KB (854 words) - 12:05, 28 May 2016
  • �?� Security and Cryptography �?� Information Systems
    13 KB (1,775 words) - 23:04, 14 October 2008
  • ...oftware Engineering, Data Bases, Distributed Systems, Information Systems, Information Retrieval, Service Oriented Applications, etc. - Information integration
    6 KB (827 words) - 23:04, 14 October 2008
  • ...tle = International Workshop on Computational Intelligence in Security for Information Systems
    568 bytes (62 words) - 23:05, 14 October 2008
  • * Cryptography and Network Security * Information Assurance
    2 KB (167 words) - 23:05, 14 October 2008
  • More information about each type of submission is included below. ...-time localization of critical information, provision of technical support information, or creation of preliminary translations for post-editing. Submissions shou
    16 KB (2,200 words) - 20:51, 18 February 2021
  • information and communication complexity. programs; foundations of security; term rewriting;
    5 KB (698 words) - 23:08, 14 October 2008
  • distributed databases; information retrieval; knowledge bases; logic; data; security; semi-structured data; spatial data; temporal data;
    5 KB (660 words) - 14:52, 2 March 2012
  • ...languages; query optimization; real-time data; recovery; scientific data; security; semantic Web; semi-structured data; spatial data; temporal data; transacti
    3 KB (457 words) - 13:09, 7 December 2016
  • Information and Communication Technologies (ICTs) have proved to offer immense potentia * Network and IT security issues in developing countries
    9 KB (1,127 words) - 17:19, 26 April 2011
  • - Other aspects of modern information systems such as security, privacy,
    7 KB (851 words) - 05:29, 15 October 2008
  • * Information retrieval, filtering and dissemination. * Privacy and Security in Databases.
    2 KB (308 words) - 23:08, 14 October 2008
  • Library. For additional information, please visit the above official ACM SAC Data Privacy and Security
    7 KB (1,006 words) - 23:08, 14 October 2008
  • areas but also adds emphasis on Web, Information Retrieval and Data Mining. * Data privacy and security
    5 KB (661 words) - 16:23, 11 December 2008
  • new perspectives regarding information sharing, annotation, * Policies, authentication, security, and trust within
    5 KB (709 words) - 23:08, 14 October 2008
  • non-functional system properties (e.g. availability, reliability, security, performance, embedded systems, and that is not the case in information systems). Finally, because of
    7 KB (791 words) - 23:09, 14 October 2008
  • | Title = 10th ACM International Workshop on Web Information and Data Management 10th ACM International Workshop on Web Information
    3 KB (437 words) - 23:20, 14 October 2008
  • ...for possible inclusion, in expanded and revised form, in the Knowledge and Information Systems journal published by Springer-Verlag. * Security and data integrity
    5 KB (634 words) - 15:36, 14 December 2008
  • technologies for the design, management and use of information systems management and analysis given the large amounts of information that are
    10 KB (1,288 words) - 11:52, 18 October 2008
  • ...tion. Also, ODBASE'08 encourages the submission of papers that examine the information needs of various applications, including electronic commerce, electronic go ...stributed Applications), and IS'08 (International Symposium on Information Security).
    8 KB (1,081 words) - 08:21, 22 December 2011
  • |Title=ACM 17th Conference on Information and Knowledge Management |Field=Information retrieval
    29 KB (4,077 words) - 18:04, 18 August 2023
  • | Title = Third International Conference on Digital Information Management Third IEEE International Conference on Digital Information Management (ICDIM 2008)...
    4 KB (595 words) - 23:09, 14 October 2008
  • * mobile database security committee. Detailed submission information will be posted on the web
    7 KB (875 words) - 23:09, 14 October 2008
  • | Title = Third International Workshop on Flexible Database and Information Systems Technology Information systems are able to deal with an incredible amount of data, concerning ever
    7 KB (917 words) - 23:09, 14 October 2008
  • * Data privacy and security * Managing uncertain and imprecise information
    6 KB (840 words) - 23:10, 14 October 2008
  • § Geographic Information Systems § Multimedia Databases and Information Retrieval
    3 KB (305 words) - 08:44, 31 July 2020
  • Information systems and database systems have always been a central topic of computer s * Applications of DB Systems and Information Systems
    4 KB (457 words) - 16:14, 16 December 2020
  • * Security, reliability and availability in distributed storage systems, geographical information systems, image processing, Web retrieval,
    5 KB (644 words) - 23:10, 14 October 2008
  • * incomplete information * privacy/security
    5 KB (647 words) - 23:10, 14 October 2008
  • | Title = The Ninth International Conference on Web-Age Information Management The Ninth International Conference on Web-Age Information Management
    10 KB (1,376 words) - 23:10, 14 October 2008
  • The theme of BNCOD 2008, the 25th in the series, is "Sharing Data, Information and Knowledge". * Data mining and information extraction
    4 KB (593 words) - 23:10, 14 October 2008
  • | Title = International Workshop on Privacy and Anonymity in the Information Society Disclosure Risk and Information Loss Assessment
    2 KB (193 words) - 23:10, 14 October 2008
  • ...e = Third International Workshop on Database Technologies for Handling XML Information on the Web ...ss, and social communities. Peer-to-peer architectures, the Grid, personal information systems, pervasive and ubiquitous computing, networked sensors, biomedical
    3 KB (475 words) - 23:10, 14 October 2008
  • * Putting Auto ID data into context (relating it to business process information) * Privacy and security in Auto ID systems
    4 KB (471 words) - 23:10, 14 October 2008
  • Nowadays, the rapid growth of information technologies has brought reliability, integrity, privacy, and security issues are still being
    7 KB (908 words) - 23:10, 14 October 2008
  • ...middleware, e.g., for managing Grid resources, computing tasks, data, and information, form the basic framework for realising an e-Science environment. By automa * Security control in managing workflow
    4 KB (560 words) - 23:10, 14 October 2008
  • ...g access to information and services. Such technologies contribute to make information and services available anytime and anywhere. This has led to the developmen * Reliability, security and privacy
    2 KB (324 words) - 16:49, 16 December 2020
  • and military operations. Such networking is essential for safety, security and economic vitality in critical information exchange among diverse, widely-dispersed, mobile users. A primary
    5 KB (549 words) - 17:15, 5 July 2020
  • Security issues Dept. of Electronic Engineering and Information Engineering Research, Technology &
    3 KB (364 words) - 23:11, 14 October 2008
  • * Network Security and Cooperation * Web Information Management
    3 KB (339 words) - 23:11, 14 October 2008
  • 9. Information Security Technologies
    2 KB (200 words) - 23:11, 14 October 2008
  • * Network Security ...n the conference Web site. Please see http://www.comsnets.org for detailed information. The authors of accepted papers must guarantee that their paper will be pre
    4 KB (465 words) - 23:11, 14 October 2008
  • 11. Communication and Information Systems Security Symposium
    3 KB (431 words) - 09:18, 4 August 2023
  • ...he fly, based on which all electronic devices will be able to exchange the information with each other whenever necessary. Also, ubiquitous computing is an emergi Network Security and Privacy
    7 KB (990 words) - 23:11, 14 October 2008
  • | Title = Security and Privacy in Telecommunications and Information Systems | Field = Computer security and reliability
    4 KB (587 words) - 23:30, 14 October 2008
  • - Computer and Communications Network Security Further information about the conference is available at IWT official web site. Please, visit h
    3 KB (375 words) - 23:37, 14 October 2008
  • | Title = Third International Conference on Bio-Inspired Models of Network, Information and Computing Systems 3rd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems
    5 KB (694 words) - 23:11, 14 October 2008
  • + Security for CE Communications Multimedia Information Processing on Wireless Sensor Networks
    5 KB (584 words) - 09:43, 4 September 2023
  • ...be held in Bangkok, Thailand. The ISPACS presents every possibility on new information technologies. The ISPACS 2008 will include many regular sessions on the top 7. Security Signal Processing
    4 KB (496 words) - 23:12, 14 October 2008
  • Security/privacy in wireless systems Wireless net. information theory
    2 KB (244 words) - 23:12, 14 October 2008
  • 5. Information and Communication Technologies (ICT) 5 .54 Network Security
    2 KB (250 words) - 23:12, 14 October 2008
  • ...ospective tutorial presenters should contact the Tutorials Chair. For more information please visit the conference web page (see below). - Network Security
    3 KB (465 words) - 23:13, 14 October 2008
  • ...rage contributions on policy-based techniques in support of management and security of all types of wireless networks: cellular, Wi-Fi, Mobile Ad Hoc, hybrids, ...ource allocation, autonomic computing, systems management, QoS adaptation, security
    5 KB (667 words) - 23:13, 14 October 2008
  • * Computer Networks and Security * Information Theory and Coding
    2 KB (283 words) - 23:13, 14 October 2008
  • * Security and resilience of networked systems For more information and submission guidelines, please see
    4 KB (528 words) - 23:13, 14 October 2008
  • Information and Communication Technologies continue to rapidly transform how business i ...values, the real-world impact of e-Business research, and customer-centric information systems respectively. With this year?s workshop being located in Europe, we
    3 KB (430 words) - 23:13, 14 October 2008
  • *Security and privacy in Web search and mining *Information extraction, slot-filling
    2 KB (237 words) - 12:23, 11 September 2020
  • | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.
    4 KB (457 words) - 23:13, 14 October 2008
  • ...published work that demonstrate current research in all areas of Web based information systems and their applications in science, technology, business and commerc Web Services Security
    3 KB (494 words) - 23:16, 14 October 2008
  • ...os, audio recordings) in bibliometrics (publication patterns), in homeland security (terrorist networks). * Mining social data for multimedia information retrieval
    3 KB (453 words) - 23:14, 14 October 2008
  • networks, including user behavior models, security and trust, P2P, - "How salesforce.com Changes Information Technology"
    7 KB (813 words) - 23:14, 14 October 2008
  • * Security Challenges for Web Services * Extended Web Services Specifications (security, QoS, other properties)
    8 KB (1,158 words) - 23:14, 14 October 2008
  • * Data Models for Web Information Systems * Web Information Extraction...
    3 KB (250 words) - 23:14, 14 October 2008
  • * Security, privacy, and trust ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to
    6 KB (869 words) - 23:14, 14 October 2008
  • | Title = IEEE Information Theory Workshop on Networking and Information Theory | Field = Information theory
    3 KB (308 words) - 23:15, 14 October 2008
  • * Security, robustness, and fault-tolerance in networked environments ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to
    8 KB (1,093 words) - 23:15, 14 October 2008
  • ...m for researchers, engineers and academia to exchange the latest technical information and research findings on next-generation networked multimedia concepts, tec * QoS and Security Support for Entertainment
    8 KB (1,011 words) - 23:15, 14 October 2008
  • | Title = The Second International Workshop on Peer-to-Peer Computing for Information Search Peer-to-Peer Computing for Information Search (P2PSearch 2008)
    5 KB (554 words) - 23:15, 14 October 2008
  • across the whole information flow from service creation to deployment * Security aspects in network management
    6 KB (663 words) - 23:15, 14 October 2008
  • * Data management and middleware support for collaborative information systems * Security, privacy and trust management in collaborative networks, systems, and appli
    8 KB (1,093 words) - 23:15, 14 October 2008
  • | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)
    5 KB (628 words) - 23:15, 14 October 2008
  • 4. Security and Privacy 4-03 Distributed systems security
    5 KB (623 words) - 23:15, 14 October 2008
  • ...ng difficult social and policy issues such as those related to privacy and security ...l-mobile technologies, information networking, human-computer interaction, security and privacy.
    8 KB (1,003 words) - 23:15, 14 October 2008
  • | Title = Foundations of Information Management in Networks Foundations of Information Management in Networks
    4 KB (563 words) - 23:15, 14 October 2008
  • * Network Security ...viewer-friendly format). All papers must include a title, complete contact information for all authors, and keywords on the cover page. The corresponding author s
    5 KB (598 words) - 10:18, 29 May 2016
  • * Security, privacy and social issues of mobile and ubiquitous systems ...Applications (MONET) journal. Please visit the Publications page for more information.
    5 KB (599 words) - 23:15, 14 October 2008
  • | Title = The Third International ICST Conference on Scalable Information Systems | Field = Information retrieval
    4 KB (491 words) - 23:16, 14 October 2008
  • - Information forensics and security
    2 KB (253 words) - 23:16, 14 October 2008
  • * Information forensics and security ...special session authors are referred to the ICASSP website for additional information regarding submissions.
    4 KB (490 words) - 22:46, 4 February 2009
  • * A Student Paper Contest with awards sponsored by Canon Information Systems Research Australia (CiSRA). To enter the contest a paper submission * Fusion mechanism of multimodal signals in human information processing system and applications to multimodal multimedia data fusion/int
    4 KB (443 words) - 17:06, 24 February 2016
  • | Title = International Symposium on Information Theory and its Applications | Field = Information theory
    3 KB (362 words) - 23:17, 14 October 2008
  • Information Retrieval Network Security and Information Assurance
    4 KB (438 words) - 23:17, 14 October 2008
  • | Title = International Conference on Information Processing in Sensor Networks ...signal and image processing, information and coding theory, databases and information management, distributed algorithms, networks and protocols, wireless commun
    4 KB (570 words) - 23:17, 14 October 2008
  • Information forensics and security ...special session authors are referred to the ICASSP website for additional information regarding submissions.
    3 KB (450 words) - 23:04, 4 February 2009
  • * Performance, dependability and security evaluation using analytical models, simulation or empirical approaches * Model-based security engineering and design for security
    5 KB (660 words) - 16:46, 27 December 2015
  • | Field = Information technology ...ems across network centric environments to allow distributed computing and information sharing.
    5 KB (697 words) - 23:18, 14 October 2008
  • to exchange information on the engineering design, enabling + Security, Privacy and Open Source TRACK
    5 KB (594 words) - 16:29, 25 March 2020
  • # security technology and systems * Integrity, Security, and Fault Tolerance
    6 KB (733 words) - 12:48, 27 October 2016
  • | Title = The Second IEEE International Workshop on Security in Software Engineering | Field = Computer security and reliability
    5 KB (615 words) - 09:55, 29 May 2016
  • |Title=5th International Conference on Information Technology and Applications (ICITA 2008) |Field=Information technology
    3 KB (427 words) - 17:01, 29 May 2016
  • ...encourage researchers and practitioners from the RE, software engineering, information systems, and embedded systems fields to present original work. Contribution * quality goals (e.g., security),
    4 KB (503 words) - 23:18, 14 October 2008
  • | Title = Symposium on Requirements Engineering for Information Security ...t/event.showcfp?eventid=1752&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]
    583 bytes (64 words) - 23:18, 14 October 2008
  • ...lacing - the software life cycle: the model life cycle. Further background information can be found here. Background information: Model Based Software Engineering
    18 KB (2,714 words) - 23:23, 14 October 2008
  • ...his has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society tha General areas of interest to ASONAM 2009 include information science and mathematics,
    3 KB (404 words) - 23:18, 14 October 2008
  • rich latent information within these networks into actionable o Privacy and security issues.
    5 KB (592 words) - 23:18, 14 October 2008
  • ...tiple research fields such as user modeling, machine learning, intelligent information retrieval, data and text mining, statistics, computational intelligence, hu - Security and privacy aspects of personalization and recommendation
    4 KB (570 words) - 23:19, 14 October 2008
  • areas in information technology. Although many algorithms and blog mining, security mining, taxation mining, scientific data
    4 KB (510 words) - 23:19, 14 October 2008
  • ...polarized opinions: There are those who think an organization can analyze information it has gathered for any purpose it desires and those who think that every t ...ance to the point where privacy would no longer rely on accidental lack of information but rather on intentional and engineered inability to know. This belief is
    5 KB (721 words) - 23:19, 14 October 2008
  • ...e = Sixth International Conference on Cryptography, Coding and Information Security | Field = Computer security and reliability
    3 KB (448 words) - 23:19, 14 October 2008
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability
    5 KB (673 words) - 23:19, 14 October 2008
  • | Title = Ubiquitous Computing Security Systems | Field = Computer security and reliability
    3 KB (328 words) - 06:40, 22 December 2012
  • | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability
    6 KB (697 words) - 23:19, 14 October 2008
  • | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability
    6 KB (736 words) - 23:20, 14 October 2008
  • | Title = Information Security South Africa (ISSA) Conference 2008 | Field = Computer security and reliability
    4 KB (465 words) - 23:20, 14 October 2008
  • | Title = New Security Paradigms Workshop | Field = Computer security and reliability
    8 KB (1,072 words) - 23:20, 14 October 2008
  • | Title = The Sixth International Workshop on Security In Information Systems | Field = Computer security and reliability
    590 bytes (68 words) - 23:20, 14 October 2008
  • | Title = The 11th Information Security Conference | Field = Computer security and reliability
    528 bytes (59 words) - 23:20, 14 October 2008
  • | Title = Special Session on Systems and Information Security | Field = Computer security and reliability
    541 bytes (61 words) - 23:20, 14 October 2008
  • forming, a new way to manage personal information or a new approach to model context information. There is less emphasis on the actual
    5 KB (663 words) - 23:20, 14 October 2008
  • | Title = Workshop in Information Security Theory and Practices 2008: Smart Devices, Convergence and Next Generation N | Field = Computer security and reliability
    606 bytes (68 words) - 23:20, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security | Field = Computer security and reliability
    4 KB (565 words) - 23:20, 14 October 2008
  • | Title = 23rd International Information Security Conference | Field = Computer security and reliability
    5 KB (637 words) - 23:20, 14 October 2008
  • | Title = NATO Advanced Research Workshop: Metamaterials for Secure Information and Communication Technologies | Field = Computer security and reliability
    2 KB (276 words) - 23:20, 14 October 2008
  • | Title = IEEE Symposium on Security and Privacy | Field = Computer security and reliability
    2 KB (262 words) - 23:20, 14 October 2008
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • | Title = SPIE Defense and Security Symposium | Field = Computer security and reliability
    1 KB (167 words) - 23:20, 14 October 2008
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability
    4 KB (502 words) - 23:20, 14 October 2008
  • - Multimedia security and content protection contact information for the presenter, and a description of the tutorial and material to be dis
    3 KB (425 words) - 23:20, 14 October 2008
  • - Personalization, Privacy and Security in Mobile Computing - Security and Privacy of Mobile/Wireless Systems
    10 KB (1,262 words) - 23:20, 14 October 2008
  • ...Multimedia (ISM2008) is an international forum for researchers to exchange information regarding advances in the state of the art and practice of multimedia compu * Multimedia security including digital watermark and encryption
    5 KB (595 words) - 23:20, 14 October 2008
  • -Security issues on UMC Contact Information
    4 KB (573 words) - 23:20, 14 October 2008
  • ...learning techniques to address reliability, performance, power management, security, fault diagnosis, or manageability issues in computer systems ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to
    6 KB (837 words) - 23:21, 14 October 2008
  • · Computational Linguistics & Information Integration · Forensic Studies and Security Issues
    3 KB (364 words) - 23:21, 14 October 2008
  • ...ires that referees treat the contents of papers under review as privileged information not to be disclosed to others before publication. It is expected that no on Service Security, Privacy and Trust
    18 KB (2,352 words) - 23:23, 14 October 2008
  • | Title = IEEE 8th International Conference on Computer and Information Technology ...ted many high quality research papers spanning over the various aspects of information technology, computing science and computer engineering. These papers highli
    3 KB (415 words) - 23:23, 14 October 2008
  • ...ess calculi, programming language semantics, proof theory, reasoning about security, rewriting, specifications, type systems and type theory, and verification. All deadlines are firm; late submissions will not be considered. Detailed information about electronic paper submission via EasyChair will be posted at the LICS
    2 KB (285 words) - 15:11, 7 November 2016
  • Information Security and Cryptography Information Systems
    3 KB (412 words) - 19:34, 12 November 2020
  • ...ring the past decade. They come in diverse forms: business support, public security, entertainment, welfare and many more. Video streaming, video conferencing, - Side information refinement
    4 KB (567 words) - 23:24, 14 October 2008
  • | Title = 8th International Workshop on Pattern Recognition in Information Systems Pattern Recognition in Information Systems
    4 KB (550 words) - 23:25, 14 October 2008
  • ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design Security and protection systems
    11 KB (1,492 words) - 23:26, 14 October 2008
  • * Security ...Web form, which will be available here soon. The Web form asks for contact information for the paper and allows for the submission of your full paper file in PDF
    4 KB (547 words) - 23:26, 14 October 2008
  • | Field = Computer security and reliability ...ith at least 10pt font. Submission instructions and other workshop related information will appear here.
    5 KB (598 words) - 01:12, 31 May 2012
  • * Security and Trust in Distributed Systems ** [[has general chair::Sam Joseph]], Dept of Information and Computer Sciences, University of Hawaii at Manoa, Email: srjoseph@hawai
    6 KB (761 words) - 03:28, 6 January 2009
  • - Information Services - Networking and Security
    5 KB (577 words) - 23:27, 14 October 2008
  • * Hardware support for security For more information on the conference and submission instructions, please visit the conference
    2 KB (259 words) - 10:14, 29 May 2016
  • ...ns and required attributes, such as reliability, availability, safety, and security, as well as human factors. * Architecture and protocols for security.
    4 KB (528 words) - 23:27, 14 October 2008
  • ...energy, Waste management, Waste treatment and recycling, Water network and security, Sensor technologies, Intelligent Micro-grids ...n, transmission, processing, fusion, management, simulation and display of information for aerospace systems
    4 KB (561 words) - 23:29, 14 October 2008
  • Data, information, and signal processing Security and privacy
    6 KB (771 words) - 16:09, 16 September 2019
  • suitability to each conference. PLEASE SEE BELOW for topic information 10) Networked embedded systems and security
    11 KB (1,352 words) - 00:33, 15 October 2008
  • reliability, security and survivability in RT systems; scheduling further information.
    7 KB (870 words) - 23:30, 14 October 2008
  • ...es, social networks, Web services, distributed computing, Web engineering, information systems, natural language processing, multimedia, and human-computer intera ...hould not exceed 15 pages in length and must be formatted according to the information for LNCS authors.
    4 KB (573 words) - 23:31, 14 October 2008
  • * Information extraction from the Deep Web, especially from E-commerce sites * Security and privacy issues of Deep Web content extraction and annotation
    2 KB (225 words) - 23:31, 14 October 2008
  • ...cooperation and goal seeking through sharing policy and ontology, safety & security in systems, other QoS issues, and so on. ...es relating to architecture, implementation, coordination, service levels, security, etc. of semantic or otherwise agents.
    10 KB (1,391 words) - 23:31, 14 October 2008
  • .... corporate culture), psychological (perceived dependability), managerial (information management and processes), and economical. Fostering learning is a key, and ...ity when compared to traditional critical systems, where dependability and security are fairly well understood as complementary concepts and a variety of prove
    8 KB (952 words) - 23:31, 14 October 2008
  • Security in distributed systems Autonomic access control and security issues
    5 KB (702 words) - 23:31, 14 October 2008
  • - KBS in Geographic Information Systems (GIS) - Semantic information retrieval
    4 KB (523 words) - 23:31, 14 October 2008
  • workflows to keep track of execution history, such information is o Security of Web services and scientific workflows
    6 KB (750 words) - 23:31, 14 October 2008
  • ...forum where researchers, developers, educators, and practitioners exchange information on the latest practical and experimental work in the design and implementat - Checking or improving the safety, security, or correctness of programs
    5 KB (667 words) - 14:18, 25 November 2016
  • ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more. ...l meeting grounds for the presentation and discussion of the most advanced information on the development of all aspects of computing systems.
    4 KB (577 words) - 09:28, 12 May 2020
  • ...ovel insights from industry. See the HPCA 2020 website: TBD for additional information about HPCA 2020 and submission details. * Security
    3 KB (327 words) - 13:11, 11 May 2020
  • ...m where researchers, developers, educators, and practitioners can exchange information on the latest practical and experimental work in the design and implementat * Security
    5 KB (678 words) - 20:58, 26 November 2016
  • SUMMARY: Reliability, safety, and security are among the most critical requirements of contemporary software. The appl ...process must remain focused on the importance of reliability, safety, and security; our educational institutions must fully integrate these concerns into thei
    8 KB (1,079 words) - 23:32, 14 October 2008
  • o Program Chair: LTC Robert Kewley, PhD, Director of Information Engineering, Systems Engineering Department, US Military Academy at West Po * Symposium on Simulation of Systems Security (SSSS)
    6 KB (735 words) - 23:32, 14 October 2008
  • Topics of legal and social aspects of information systems include but are not limited to: File / information sharing networks and user behavior
    8 KB (1,075 words) - 23:52, 14 October 2008
  • | Title = 12th International Conference on Business Information Systems | Field = Information systems
    9 KB (1,134 words) - 01:18, 1 February 2009
  • ...proaches provide important enhancements to the ways gateways interact with information services, provide rich user interactivity, and build social networks. Exami * Portal security models and solutions;
    3 KB (378 words) - 23:34, 14 October 2008
  • | Field = Information science ...of Knowledge Grid ?Large-Scale Distributed Knowledge Management ?Ontology Information/Knowledge/Service Integration ?Knowledge Flow ?Internet-based Knowledge Eng
    3 KB (367 words) - 23:35, 14 October 2008
  • ...tle = The First International Conference on Security and Privacy in Mobile Information and Communication Systems ...edge researchers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymaker
    4 KB (451 words) - 23:37, 14 October 2008
  • [This information is being posted to multiple lists - we apologise if you get it several times. Please, pass the information to whom it may benefit. Thank
    6 KB (682 words) - 10:18, 14 April 2020
  • ...these general themes, DEON2008 will encourage a special focus on the topic Security and Trust. Specific Security and Trust themes
    5 KB (587 words) - 23:37, 14 October 2008
  • provides access to information of a limited geographical area and - Security
    4 KB (483 words) - 23:37, 14 October 2008
  • ...xpensive sensor nodes to create flexible and robust networks for gathering information is central to this vibrant field. Research is being undertaken to develop SECURITY
    11 KB (1,533 words) - 23:38, 14 October 2008
  • | Title = Twelfth International Workshop on Cooperative Information Agents An intelligent information agent is a computational software entity
    9 KB (1,215 words) - 23:38, 14 October 2008
  • * Security, trust, & privacy * Techical Program Vice-Chair for Information Systems (EDAS)
    3 KB (380 words) - 19:34, 17 November 2008
  • * Information Security and Cryptography * Information Systems
    3 KB (386 words) - 23:39, 14 October 2008
  • ...as now become the mainstream technology for High Performance Computing and Information Technology. - Security and Reliability
    5 KB (606 words) - 14:17, 8 April 2021
  • ...about novel and emergent applications in smart sensors, biology, homeland security, systems health management, and related areas. Collaborate and network with For additional information, please visit the Sensors Applications Symposium website at www.sensorapps.
    1 KB (164 words) - 23:39, 14 October 2008
  • ...perating systems, storage, networking, languages and language engineering, security, dependability, and manageability. We are also interested in contributions ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to
    6 KB (781 words) - 23:39, 14 October 2008
  • # Security challenges and solutions for interoperability/interoperation of # Experiences with Grid information interoperability (XML, RDF, etc.)
    7 KB (959 words) - 23:40, 14 October 2008
  • WORKSHOP INFORMATION: * Security in Biomedical Data Grids
    7 KB (876 words) - 23:40, 14 October 2008
  • | Field = Computer security and reliability * Integrated system reliability, availability, security, safety, and timing analysis and evaluation methods
    6 KB (748 words) - 14:43, 27 December 2015
  • Security Assessment Security of Supply
    8 KB (1,082 words) - 23:40, 14 October 2008
  • | Title = Information Security and Cryptology Conference
    519 bytes (56 words) - 23:41, 14 October 2008
  • | Title = Fourth International Workshop on the Value of Security through Collaboration ...ties of the ecosystem where the nodes operate may be guaranteed. Thus, the security property of the ecosystem may be driven by self-organizing mechanisms. Depe
    3 KB (420 words) - 23:42, 14 October 2008
  • ...ers in a hospital ward are, by the very nature of their work, mobile. The information that nurses, doctors and other health ward data management. The use of a mobile wireless infrastructure can lead to security and reliability problems. Mobile devices often have usability
    6 KB (771 words) - 23:42, 14 October 2008

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)