Search results

Jump to: navigation, search

Page title matches

Page text matches

  • Service Oriented Systems were born with the aim of building large adaptive applications as compositi ...ting with classic Web Services. Finally, features like Quality of Service, security and dependability need to be taken seriously into account, and this investi
    7 KB (957 words) - 15:15, 11 August 2008
  • |Title=The 10th International Conference on Mobile Data Mangement (MDM'09): Systems, Services and Middleware scope to cover research issues in mobile systems, services and middleware.
    13 KB (1,468 words) - 01:23, 22 August 2008
  • | Title=The 3rd KES International Symposium on Agents and Multi-agent Systems - Technologies and applications (KES-AMSTA-09) ...fic research in the technologies and applications of agent and multi-agent systems.
    6 KB (777 words) - 22:54, 14 August 2008
  • ====Computer security and reliability==== ==== Information systems (Business informatics) ====
    6 KB (714 words) - 12:19, 11 December 2020
  • *Network Security *Communication Systems and Networks
    5 KB (571 words) - 09:22, 19 July 2019
  • * Mobile/Wireless computing systems and services in pervasive computing * Programming paradigms for pervasive systems
    12 KB (1,560 words) - 15:03, 27 August 2008
  • ...011 International Conference of Computational Intelligence and Intelligent Systems The 2011 International Conference of Information Security and Internet Engineering
    3 KB (454 words) - 12:34, 8 October 2020
  • systems, biomedical informatics, virtual digital libraries, and * Data Streams and Publish-Subscribe Systems
    9 KB (1,189 words) - 14:53, 28 August 2008
  • ...m for the communication of research advances on the principles of database systems. This year, for the first time, ICDT will be held jointly with [[EDBT 2009] ...uctive databases and knowledge bases; Distributed databases; Integrity and security; Logic and databases; Multimedia databases; Query optimization; Query proce
    5 KB (753 words) - 18:59, 25 June 2012
  • system of systems, etc. inter-operability, security, trusted and dependable systems, fault
    5 KB (715 words) - 17:43, 11 September 2008
  • |Title=International Conference on Autonomous Agents and Multi-Agent Systems |Field=Multi-Agent Systems
    10 KB (1,371 words) - 16:14, 12 November 2020
  • Software Systems The Verisoft Approach to Systems Verification
    5 KB (686 words) - 12:27, 12 September 2008
  • ...cial issues of a high quality international journal and also in Journal of Security and Communication Networks published by John Wiley & Sons. * Security in Wireless and Pervasive systems
    5 KB (645 words) - 18:19, 15 September 2008
  • ...d applications, and interactions of these applications with other types of systems. Management aspects related to these applications and challenges on special ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d
    18 KB (2,408 words) - 02:37, 16 December 2008
  • |Title=8th International Conference on Information Systems Technology |Field=Information systems
    7 KB (763 words) - 12:25, 6 October 2011
  • ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...Spatial databases; Time-series databases; RDF stores; Hybrid DB management systems
    11 KB (1,371 words) - 12:28, 18 May 2020
  • ...emedicine, bioinformatics, finance and marketing, geographical positioning systems put pressure on database communities to push the ‘de facto’ methods to ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.)
    11 KB (1,446 words) - 18:26, 13 October 2008
  • |Title=The 5th International Conference on Open Source Systems (F/OSS 2009) ** Testing, assuring and certifying F/OSS quality and security
    10 KB (1,349 words) - 16:42, 24 September 2008
  • Software Security Agent-Based Software Systems
    2 KB (293 words) - 10:35, 24 June 2011
  • ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust
    34 KB (4,565 words) - 22:20, 10 January 2018
  • ...eory,design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust
    8 KB (1,037 words) - 22:20, 10 January 2018
  • ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust
    9 KB (1,189 words) - 22:20, 10 January 2018
  • systems. Aside from the regular presentations, the conference will include * Security, Privacy and Trust
    26 KB (3,456 words) - 22:20, 10 January 2018
  • ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Fault-tolerant Distributed Systems
    10 KB (1,263 words) - 22:20, 10 January 2018
  • ...ory, design and application of computer networks and distributed computing systems. Aside the regular presentation, the AINA meeting will include keynote addr * Fault-tolerant Distributed Systems
    12 KB (1,537 words) - 22:19, 10 January 2018
  • ...design and application of communication networks and distributed computing systems. Aside from the regular presentation, the AINA meeting will include keynote * Security and Privacy
    8 KB (1,040 words) - 22:20, 10 January 2018
  • | Title = Israeli Experimental Systems Conference | Field = Operating systems
    5 KB (777 words) - 05:50, 14 October 2008
  • - Networking services for pervasive systems - Third and fourth generation systems
    4 KB (495 words) - 09:22, 22 August 2023
  • • Cluster Architecture and Hardware Systems ◦ Parallel File Systems and I/O Libraries
    4 KB (452 words) - 17:47, 7 April 2021
  • | Field = Embedded systems The first international conference on Sensor Systems and Software
    4 KB (519 words) - 16:13, 14 October 2008
  • - Bring Safe, Self-x and Organic Computing Systems into Reality - ...omic Computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-he
    9 KB (1,216 words) - 17:32, 14 October 2008
  • ...multimedia databases, digital and video libraries, compression and coding, security over the network. ...sing and environment control, video surveillance and intelligent transport systems, visual inspection and quality control, underwater robots.
    2 KB (268 words) - 17:47, 14 October 2008
  • IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009) IEEE Workshop on Computational Intelligence in Vehicles and Vehicular Systems (CIVVS 2009)
    3 KB (376 words) - 17:47, 14 October 2008
  • ...he way to innovative solutions for next generation wireless communications systems. o Security aspects in cross-layer designs
    3 KB (424 words) - 17:47, 14 October 2008
  • ...e just entering the era of persuasive technology, of interactive computing systems designed to change people's attitudes and behaviors. Persuasive 2009 builds * Security and privacy
    8 KB (989 words) - 20:13, 22 February 2009
  • | Title = The seventh ACS/IEEE International Conference on Computer Systems and Applications The seventh ACS/IEEE International Conference on Computer Systems
    4 KB (503 words) - 11:36, 18 October 2008
  • | Field = Operating systems The WIOSC focuses on new and innovative concepts in the field of operating systems. The workshop welcomes contributions on general approaches and concepts, ne
    4 KB (508 words) - 21:48, 14 October 2008
  • ...chnologies and radically new solutions relevant to development of computer systems and aims to foster communication among scientists and engineers to achieve ...eory, methodologies, technologies, and implementation of advanced computer systems and focusing on computing paradigms, computational models, application para
    4 KB (591 words) - 17:48, 14 October 2008
  • ...of RFID technologies, their supporting large-scale distributed information systems and their applications. ...ed to the theory and practice of RF-based identification and communication systems. All submissions must describe original work not previously published or cu
    3 KB (431 words) - 17:48, 14 October 2008
  • ...and academics interested in the latest development and design of wireless systems and networks. Sponsored by the IEEE Communications Society, IEEE WCNC has a • Machine learning for communication systems
    6 KB (731 words) - 10:33, 14 August 2023
  • | Title = The Sixth IEEE International Symposium on Wireless Communication Systems 2009 ...sixth symposium, intends to bring together various wireless communication systems developers to discuss the current status, technical challenges, standards,
    3 KB (456 words) - 18:10, 14 October 2008
  • ...ence series serves as the premier international forum addressing networks, systems, algorithms, and * Design, implementation, and evaluation of mobile systems and applications
    7 KB (974 words) - 12:28, 3 August 2023
  • * Trust, reputation, security, and privacy in MBC Dickson K.W. Chiu, Dickson Computer Systems, HK, China
    5 KB (647 words) - 22:05, 14 October 2008
  • ...e plays an important role in the scientific study at large and a number of systems have already furnished limited related functionalities, provenance has only ...ware engineering, workflow system, information retrieval, web service, and security research. At the same time, it also requires understanding of problems from
    3 KB (416 words) - 17:48, 14 October 2008
  • * formal models of norms, normative systems, norm-governed societies * Intelligent legal tutoring systems
    7 KB (998 words) - 17:48, 14 October 2008
  • | Title = The 6th IEEE International Conference on Embedded Software and Systems | Field = Embedded systems
    3 KB (375 words) - 17:48, 14 October 2008
  • ...deployment of large-scale and high-performance FPGA-based applications and systems - e.g. DSP, networking or embedded system tools and methodologies. ...mpiled accelerators, reconfigurable computing, adaptive computing devices, systems and software, rapid-prototyping.
    4 KB (561 words) - 17:48, 14 October 2008
  • ...Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability
    7 KB (960 words) - 17:48, 14 October 2008
  • International Conference on Hybrid Systems: ...heory, as well as two additional areas of special emphasis: cyber-physical systems and embedded applications, benchmarks and tools.
    8 KB (939 words) - 17:48, 14 October 2008
  • ...decade has witnessed a proliferation of powerful parallel and distributed systems and an ever increasing demand for practice of high performance computing an * Embedded systems
    19 KB (2,503 words) - 13:25, 28 October 2020
  • * Security and privacy in vehicular networks * Experimental systems for vehicular networks
    3 KB (378 words) - 14:22, 24 August 2016
  • landscape because it will enable new breeds of applications and systems to systems.
    7 KB (942 words) - 20:05, 14 October 2008
  • * Testing of object-oriented systems * Distributed and concurrent object systems
    3 KB (328 words) - 20:05, 14 October 2008
  • | Title = The 3rd International Symposium on Security and Multimodality in Pervasive Environments ...er hand, while enlarging and easing the ways to access to the environment, security threads arise and the environment must be properly equipped in order to pro
    3 KB (393 words) - 21:18, 14 October 2008
  • | Field = Computer security and reliability ...nd test and stress equipment are on hand to demonstrate their products and systems to individuals and small groups. Attendees are encouraged to bring samples
    3 KB (467 words) - 21:39, 16 October 2008
  • | Title = 3rd International Workshop on Scalable Stream Processing Systems 3rd International Workshop on Scalable Stream Processing Systems (SSPS 2009)
    3 KB (490 words) - 20:05, 14 October 2008
  • + Security and information assurance Abstract: Database Management Systems form the core of the information
    7 KB (907 words) - 21:51, 14 October 2008
  • # Semantics in P2P systems and grids # Semantic Web Trust, Privacy, Security and Intellectual Property Rights
    4 KB (450 words) - 20:05, 14 October 2008
  • Security, Survivability and Fault Tolerance ...rs and practitioners in the field of sensor, mesh, and ad hoc networks and systems. IEEE SECON grew out of the
    2 KB (244 words) - 20:05, 14 October 2008
  • WINSYS is organized by INSTICC – Institute for Systems and Technologies of Information, Control and Communication ...ogether researchers, engineers and practitioners interested on information systems and applications in the context of wireless networks and mobile technologie
    9 KB (1,219 words) - 20:05, 14 October 2008
  • ...urity and privacy challenges faced by the current and future collaborative systems and infrastructures. ...ns/experiences related to security and privacy solutions for collaborative systems. Topics of interest include, but are not limited to:
    4 KB (520 words) - 20:05, 14 October 2008
  • | Title = 9th International Conference on New Technologies of Distributed Systems ...cits submissions on all topics related to New technologies and distributed systems, including but not limited to the following :
    2 KB (208 words) - 20:05, 14 October 2008
  • • Ad-Hoc Wireless Networks, Adaptive Antenna Systems • Communciations Systems Software
    5 KB (530 words) - 10:27, 24 June 2011
  • Expert Systems Information Systems
    3 KB (332 words) - 20:06, 14 October 2008
  • |Field=Computer security and reliability ...communication and information systems. Moreover, there are other dedicated systems for data mining, recommenders, sensing, conflict detection, intrusion detec
    15 KB (2,175 words) - 21:03, 19 March 2013
  • Home Gateway, DTV, Home Theater, PVR, Interconnects, Game Systems, Interactive and Directed Programming, Internet Integration, Next-Generatio Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability
    3 KB (354 words) - 20:06, 14 October 2008
  • ...ital Services in eESociety, eGovernment /eGovernance, eHealth, Information Systems, and Information Management. These broad areas are divided into more detai - Delivery Systems and Environments
    6 KB (780 words) - 20:06, 14 October 2008
  • ...= Fourth International Conference on Intelligent Computing and Information Systems ...tificial and computational intelligence as well as intelligent information systems.
    2 KB (193 words) - 20:06, 14 October 2008
  • Adaptive Systems Agent-Based Systems
    3 KB (359 words) - 20:06, 14 October 2008
  • | Title = The 29th Int'l Conference on Distributed Computing Systems (ICDCS 2009) o Distributed Operating Systems and Middleware
    2 KB (303 words) - 20:06, 14 October 2008
  • |Title=3rd International Conference on Distributed Event-Based Systems ...sage-oriented middleware. The various communities dealing with event based systems have made progress in different aspects of the problem. The DEBS conference
    6 KB (829 words) - 15:30, 29 January 2021
  • | Title = Sixth International Conference on Wireless On-demand Network Systems and Services On-demand Network Systems and Services
    6 KB (686 words) - 20:06, 14 October 2008
  • | Title = IEEE International Conference on Systems, Man and Cybernetics 2009 IEEE International Conference on Systems, Man& Cybernetics
    6 KB (708 words) - 22:49, 14 October 2008
  • ...and demanding settings, like manufacturing, healthcare, security, control systems, etc. ...ystems, production systems, decision support systems, knowledge management systems, etc.
    2 KB (261 words) - 22:45, 14 October 2008
  • ...vasive healthcare seeks to respond to a variety of pressures on healthcare systems, including the increased incidence of life-style related and chronic diseas * Security and privacy in pervasive healthcare
    6 KB (732 words) - 22:45, 14 October 2008
  • ...ectronic collaboration requires advancements in networking, technology and systems, user interfaces and interaction paradigms, and interoperation with applica ...oners, and students interested in collaborative networking, technology and systems, and applications.
    6 KB (674 words) - 22:45, 14 October 2008
  • Data about the activities of user across systems and applications and within a multitude of contexts are an enabler for acce ...iven computing, context-driven computing, information retrieval, database systems, digital libraries, metadata, data mining, user modelling, social networks,
    6 KB (890 words) - 22:53, 14 October 2008
  • | Title = VIII Brazilian Symposium on Human Factors in Computing Systems The Brazilian Symposium of Human Factors on Computer Systems (IHC) is the main forum of the Brazilian Human-Computer Interaction (HCI) c
    3 KB (502 words) - 22:53, 14 October 2008
  • Theme: Computing for Next Generation Systems software development; COTS-based systems; requirements elicitation
    9 KB (1,193 words) - 22:53, 14 October 2008
  • ...ktop interfaces, 3D virtual world environments, and multiple user embedded systems. ...machine interfaces, frameworks, reference models, architectures, tools and systems for CE
    4 KB (468 words) - 22:54, 14 October 2008
  • | Title = Conference on Enterprise Information Systems | Field = Information systems
    9 KB (1,240 words) - 22:56, 14 October 2008
  • ...ntific discovery, data visualization, causal induction and knowledge-based systems. B10. Security and Intrusion Detection
    2 KB (295 words) - 12:03, 18 October 2008
  • ...ter presentations (25, 26, 27th Nov) and demonstrations of neuro-computing systems (26th Nov), followed by workshops. One Workshop on Perception and Control o ...ontrol, Arts and Design; Adaptive integrated/embedded systems; Agent based systems.
    5 KB (699 words) - 23:04, 14 October 2008
  • | Title = Workshop on Logics for Intelligent Agents and Multi-Agent Systems Workshop on Logics for Intelligent Agents and Multi-Agent Systems (WLIAMAS 2008)
    5 KB (670 words) - 23:04, 14 October 2008
  • CAART is organized by INSTICC (Institute for Systems and Technologies of Information, Control and Communication), with technical ...of Computational Intelligence and many other areas related to intelligent systems, on the other hand.
    18 KB (2,457 words) - 23:04, 14 October 2008
  • ...ential specification language for anything ranging from real-time critical systems to networked infrastructures. It is logical techniques that link implementa - Foundations of security
    5 KB (799 words) - 21:49, 26 February 2020
  • ...ases, social networks, distributed computing, web engineering, information systems, natural language processing, soft computing, and human-computer interactio ** Representing and reasoning about trust, privacy, and security
    6 KB (854 words) - 12:05, 28 May 2016
  • �?� Artificial Intelligence and Intelligent Systems �?� Systems Modelling and Optimization
    13 KB (1,775 words) - 23:04, 14 October 2008
  • | Title = International Conference on Artificial Intelligence: Methodology, Systems, Applications Artificial Intelligence: Methodology, Systems, Applications
    6 KB (827 words) - 23:04, 14 October 2008
  • | Title = Sixth International Workshop on Intelligent Solutions in Embedded Systems | Field = Embedded systems
    2 KB (316 words) - 23:05, 14 October 2008
  • ...ational Workshop on Computational Intelligence in Security for Information Systems
    568 bytes (62 words) - 23:05, 14 October 2008
  • * Communication Systems and Networks * Cryptography and Network Security
    2 KB (167 words) - 23:05, 14 October 2008
  • ...amalgamate ongoing research in distributed systems and complex multi-agent systems with the aim of strengthening the synergy between the two fields. * Security, Trust and Privacy
    4 KB (536 words) - 17:55, 10 February 2021
  • |Title=International Conference on Autonomous Agents and Multi-Agent Systems - case studies and implemented systems
    2 KB (334 words) - 17:14, 12 November 2020
  • * models of concurrency, security, and mobility * real-time, embedded and hybrid systems
    8 KB (1,085 words) - 18:01, 12 February 2009
  • ...first-rate research that defines the cutting edge of future translations systems; case studies on practical uses of current translation systems in government and industry;
    16 KB (2,200 words) - 20:51, 18 February 2021
  • languages; Cellular automata and systems; Combinatorial, analysis, foundations of hybrid and real-time systems; lambda
    5 KB (698 words) - 23:08, 14 October 2008
  • |Title=ACM Symposium on Principles of Database Systems |Field=Database Systems
    3 KB (457 words) - 13:09, 7 December 2016
  • * Energy-aware ICT infrastructure, e.g., energy aware systems and networking * Network and IT security issues in developing countries
    9 KB (1,127 words) - 17:19, 26 April 2011
  • - Other aspects of modern information systems such as security, privacy,
    7 KB (851 words) - 05:29, 15 October 2008
  • ...um for exploring research, development, and novel applications of database systems. The Twentieth Australasian Database Conference, ADC 2009, will be held in * Privacy and Security in Databases.
    2 KB (308 words) - 23:08, 14 October 2008
  • Audio/Video Database Systems Cooperative Database Systems and
    7 KB (1,006 words) - 23:08, 14 October 2008
  • * Data privacy and security * Security and privacy in data mining
    5 KB (661 words) - 16:23, 11 December 2008
  • dedicated to non-functional properties of software systems and researches from language non-functional properties of software systems in Domain Specific Modeling Languages, and
    7 KB (791 words) - 23:09, 14 October 2008
  • ...ition, databases and data warehousing, data visualization, knowledge-based systems, and high performance computing. By promoting novel, high quality research ...inclusion, in expanded and revised form, in the Knowledge and Information Systems journal published by Springer-Verlag.
    5 KB (634 words) - 15:36, 14 December 2008
  • are the core of current Decision Support Systems. Traditionally, a data technologies for the design, management and use of information systems
    10 KB (1,288 words) - 11:52, 18 October 2008
  • ...s and half a dozen of RDF stores, inferencing engines, or ontology mapping systems. ...ase, preference will be given to papers that describe software products or systems that are in wide (experimental) use.
    8 KB (1,081 words) - 08:21, 22 December 2011
  • ...enging problems facing the development of future knowledge and information systems, and to shape future directions of research by soliciting and reviewing hig * High performance OLTP systems
    29 KB (4,077 words) - 18:04, 18 August 2023
  • ...ld describe the development and operations of challenging database related systems and applications. * Privacy and security issues
    3 KB (452 words) - 23:09, 14 October 2008
  • ...ial papers on the theory, design and implementation of digital information systems, as well as demonstrations, tutorials, workshops and industrial presentatio - Multimedia Information Systems
    4 KB (595 words) - 23:09, 14 October 2008
  • * mobile database security * wireless multimedia systems
    7 KB (875 words) - 23:09, 14 October 2008
  • | Title = Third International Workshop on Flexible Database and Information Systems Technology ...concerning every aspect of real life. Data are dealt with by heterogeneous systems, concern heterogeneous application domains, are structured in heterogeneous
    7 KB (917 words) - 23:09, 14 October 2008
  • * Data privacy and security * Novel/ Advanced applications and systems
    6 KB (840 words) - 23:10, 14 October 2008
  • |Title=Sixteenth Italian Symposium on Advanced Database Systems § Geographic Information Systems
    3 KB (305 words) - 08:44, 31 July 2020
  • |Title=19th International Conference on Database and Expert Systems Aplications Information systems and database systems have always been a central topic of computer science. Additionally the
    4 KB (457 words) - 16:14, 16 December 2020
  • | Title = Second Workshop on Scalable Data Management, Applications and Systems Second International Workshop on Scalable Data Management Applications and Systems
    5 KB (644 words) - 23:10, 14 October 2008
  • | Title = 3rd Workshop on Data Storage Devices and Systems ...related to the design, development, and evaluation of storage devices and systems. DS2 2008 builds on the success of previous workshops in this series held i
    4 KB (539 words) - 23:10, 14 October 2008
  • ...beyond the capabilities of traditional database and information retrieval systems. These challenges include the development of effective and efficient techni ...l papers on the theory, design and implementation of Web-based information systems, as well as proposals for demonstrations, tutorials and panels. WAIM'08 is
    10 KB (1,376 words) - 23:10, 14 October 2008
  • * Data security, privacy and trust * Distributed information systems
    4 KB (593 words) - 23:10, 14 October 2008
  • · Security control in grid workflow systems · Interoperability between grid workflow systems
    7 KB (886 words) - 23:10, 14 October 2008
  • ...that XML is the main means towards this new generation of data management systems. Following the experience of previous editions of DataX 2004 and DataX 2006 * XML retrieval in P2P systems
    3 KB (475 words) - 23:10, 14 October 2008
  • ...designed using database principles (and vice versa), to network monitoring systems that depend on advanced data management and analysis capabilities�?? sugg * Network algorithms and theory applied to database systems
    3 KB (332 words) - 23:10, 14 October 2008
  • * Privacy and security in Auto ID systems
    4 KB (471 words) - 23:10, 14 October 2008
  • reliability, integrity, privacy, and security issues are still being policy. Furthermore, the complexity of security increases as
    7 KB (908 words) - 23:10, 14 October 2008
  • | Title = 3rd International Workshop on Workflow Systems in e-Science ...as on scientific workflow management and e-Science. Live demos of workflow systems and workflow application are welcome.
    4 KB (560 words) - 23:10, 14 October 2008
  • ...alable, robust and efficient for developing numerous original services and systems. * Embedded Database Systems
    2 KB (324 words) - 16:49, 16 December 2020
  • Best practices for application systems * Building Learning Systems from Reusable and Interoperable Software Components
    4 KB (503 words) - 23:11, 14 October 2008
  • * Adaptive Web Systems * Antenna Systems
    3 KB (339 words) - 23:11, 14 October 2008
  • ...on Networking, sponsored by the IFIP Technical Committee on Communication Systems (TC 6). The main objectives of Networking 2009 are to bring together member ...tures and protocols, network measurements and testbeds, network management systems, content distribution, peer to peer and overlay networks, pricing and billi
    7 KB (981 words) - 03:18, 6 January 2009
  • | Title = Tenth Workshop on Mobile Computing Systems and Applications ...of highly selective, interactive workshops focused on mobile applications, systems, and environments, as well as their underlying state-of-the-art technologie
    2 KB (243 words) - 23:11, 14 October 2008
  • 9. Information Security Technologies 11. Multimedia & Internet Systems, Services and Standards
    2 KB (200 words) - 23:11, 14 October 2008
  • | Title = The First International Conference on COMunication Systems and NETworks The First International Conference on COMunication Systems and NETworks
    4 KB (465 words) - 23:11, 14 October 2008
  • * Grid Computing / Multi-Agent Systems * Network Security & Reliability
    4 KB (559 words) - 23:11, 14 October 2008
  • 6. Optical Networks and Systems Symposium 11. Communication and Information Systems Security Symposium
    3 KB (431 words) - 09:18, 4 August 2023
  • P2P Systems Wireless Communication Systems and Applications
    7 KB (990 words) - 23:11, 14 October 2008
  • | Title = Security and Privacy in Telecommunications and Information Systems | Field = Computer security and reliability
    4 KB (587 words) - 23:30, 14 October 2008
  • ...iscuss the continuous and fast advances in several areas of communications systems and networks. The IWT'09 organizing committee invites you to submit origina - Computer and Communications Network Security
    3 KB (375 words) - 23:37, 14 October 2008
  • ...al Conference on Bio-Inspired Models of Network, Information and Computing Systems ...l Conference on Bio-Inspired Models of Network, Information, and Computing Systems
    5 KB (694 words) - 23:11, 14 October 2008
  • ...International Symposium on Intelligent Signal Processing and Communication Systems ...International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS) is one of the most well known international symposiums in signal p
    4 KB (496 words) - 23:12, 14 October 2008
  • ...onal Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems Modeling, Analysis and Simulation of Wireless and Mobile Systems.
    4 KB (596 words) - 23:12, 14 October 2008
  • | Title = IEEE International Symposium on Wireless Communication Systems 3G, 4G and beyond systems
    2 KB (244 words) - 23:12, 14 October 2008
  • 1 .13 Optical systems, Networks and Applications 2. Transmission Systems and Technologies
    2 KB (250 words) - 23:12, 14 October 2008
  • o Satellite systems/networks and high altitude platforms o Security and privacy
    9 KB (1,117 words) - 23:12, 14 October 2008
  • Communication Systems - Network Security
    3 KB (465 words) - 23:13, 14 October 2008
  • ...rage contributions on policy-based techniques in support of management and security of all types of wireless networks: cellular, Wi-Fi, Mobile Ad Hoc, hybrids, ...a special session devoted to the demonstrations of innovative policy based systems. Papers must describe original work and must not have been accepted or subm
    5 KB (667 words) - 23:13, 14 October 2008
  • ...microwaves, antennas and propagation, and electronic circuits, devices and systems. ...peaceful country in a turbulent area, enjoys extreme levels of safety and security. Jordanian people are internationally known for generosity, hospitality and
    2 KB (260 words) - 23:13, 14 October 2008
  • * Computer Networks and Security * Neural Networks and Intelligent Systems
    2 KB (283 words) - 23:13, 14 October 2008
  • | Title = Fifth Annual Conference on Wireless On demand Network Systems and Services * Security
    3 KB (413 words) - 23:13, 14 October 2008
  • | Title = 5th USENIX Symposium on Networked Systems Design and Implementation The 5th USENIX Symposium on Networked Systems Design and Implementation
    4 KB (528 words) - 23:13, 14 October 2008
  • embedded systems for aerospace, automotive, military, E-commerce, and application-level reliability & performance, security, QoS assurance,
    5 KB (651 words) - 23:13, 14 October 2008
  • and design of wireless systems. Sponsored by the IEEE Communications - B3G Systems, WiMAX and WLAN
    3 KB (343 words) - 10:31, 14 August 2023
  • ...challenging and time consuming task. Autonomic computing systems, that is, systems that are based on self-configuring and self-managing elements, have emerged * Multi-Agent Systems Architectures for Autonomic Web-Services and their Environments
    3 KB (415 words) - 23:13, 14 October 2008
  • Theme: Designing e-Business Systems: Markets, Services and Networks ...real-world impact of e-Business research, and customer-centric information systems respectively. With this year?s workshop being located in Europe, we feel th
    3 KB (430 words) - 23:13, 14 October 2008
  • *Security and privacy in Web search and mining *User profiling and recommendation systems
    2 KB (237 words) - 12:23, 11 September 2020
  • | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.
    4 KB (457 words) - 23:13, 14 October 2008
  • ...rk that demonstrate current research in all areas of Web based information systems and their applications in science, technology, business and commerce. You Web Services Security
    3 KB (494 words) - 23:16, 14 October 2008
  • ...social websites and instant messaging systems. Due to the success of such systems, numerous web users everyday use the Web as a social medium to interact wit ...os, audio recordings) in bibliometrics (publication patterns), in homeland security (terrorist networks).
    3 KB (453 words) - 23:14, 14 October 2008
  • | Title = 27th International Symposium on Reliable Distributed Systems | Field = Embedded systems
    2 KB (255 words) - 23:14, 14 October 2008
  • networks, including user behavior models, security and trust, P2P, issues, and practices on government systems.
    7 KB (813 words) - 23:14, 14 October 2008
  • products, including experimental efforts, innovative systems and * Quality of service in Web Services systems (real-time
    8 KB (1,158 words) - 23:14, 14 October 2008
  • * Data Models for Web Information Systems * Query languages and systems for XML and Web data
    3 KB (250 words) - 23:14, 14 October 2008
  • ...or present insightful results based on practical experience with computer systems. The USENIX conference has a broad scope, and specific topics of interest i * Distributed and parallel systems
    6 KB (869 words) - 23:14, 14 October 2008
  • ...l issue of International Journal of Autonomous and Adaptive Communications Systems will cover the following topical areas but are not limited to them: * Security of WiMAX in NGN
    1 KB (181 words) - 23:14, 14 October 2008
  • * Security * Peer-to-peer systems
    3 KB (308 words) - 23:15, 14 October 2008
  • | Title = 6th USENIX Symposium on Networked Systems Design and Implementation Krishna Gummadi, Max Planck Institute for Software Systems
    8 KB (1,093 words) - 23:15, 14 October 2008
  • |Title=19th International Conference on Autonomous Agents and Multi Agent Systems |Field=Computer Science, Artificial Intelligence,Multi Agent Systems
    6 KB (659 words) - 17:41, 11 February 2021
  • ...h findings on next-generation networked multimedia concepts, technologies, systems, and applications for entertainment covering existing deployments, current * QoS and Security Support for Entertainment
    8 KB (1,011 words) - 23:15, 14 October 2008
  • * Systems and Architectures for P2P Based Web Search * P2P Information Search Systems and Architectures
    5 KB (554 words) - 23:15, 14 October 2008
  • ...EE 3rd International Workshop on Distributed Autonomous Network Management Systems Management Systems
    6 KB (663 words) - 23:15, 14 October 2008
  • collaborators. Technology has evolved from standalone tools, to open systems supporting collaboration in in networking, technology and systems, user interfaces and interaction paradigms, and interoperation with
    8 KB (1,093 words) - 23:15, 14 October 2008
  • 1-03 Heterogeneous and multimedia Systems 1-06 Ubiquitous computing systems
    5 KB (623 words) - 23:15, 14 October 2008
  • NPSec 2008 particularly welcomes new ideas on security in the context of Internet security and new primitives for supporting secure network protocol
    4 KB (493 words) - 23:15, 14 October 2008
  • systems * Giuseppe Persiano: Security of networks of low capability devices
    4 KB (563 words) - 23:15, 14 October 2008
  • * Design of monitoring systems, sampling methods, signal processing methods * Network security threats and countermeasures
    3 KB (313 words) - 23:15, 14 October 2008
  • ...w requirements and challenges on treatment of traffic within communication systems a certain degree of multilayer co-operation has to be achieved. This forms ...* Medium Access Control Protocols and Scheduling Techniques for Wireless Systems
    5 KB (598 words) - 10:18, 29 May 2016
  • | Title = 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services ...d successful ubiquitous systems. Areas addressed by the conference include systems, applications, service-oriented computing, middleware, networking, agents,
    5 KB (599 words) - 23:15, 14 October 2008
  • | Title = 18th International workshop on Network and Operating Systems Support for Digital Audio and Video ...invited to present prototypes of their software, demos, or entire research systems online and interactively.
    3 KB (322 words) - 23:15, 14 October 2008
  • | Title = The Third International ICST Conference on Scalable Information Systems The Third International ICST Conference on Scalable Information Systems
    4 KB (491 words) - 23:16, 14 October 2008
  • - Communication systems and networks - Information forensics and security
    2 KB (253 words) - 23:16, 14 October 2008
  • * Design and implementation of signal processing systems * Information forensics and security
    4 KB (490 words) - 22:46, 4 February 2009
  • * A Student Paper Contest with awards sponsored by Canon Information Systems Research Australia (CiSRA). To enter the contest a paper submission must ha * Hybrid multimedia processing technology and systems incorporating bio-inspired and conventional methods.
    4 KB (443 words) - 17:06, 24 February 2016
  • Communication Systems Spread Spectrum Systems
    3 KB (362 words) - 23:17, 14 October 2008
  • Nonlinear signals and systems Multimedia and Communication Systems
    4 KB (438 words) - 23:17, 14 October 2008
  • ...rks and protocols, wireless communications, machine learning, and embedded systems design. The Information Processing (IP) track will focus on algorithms, systems, and theory pertaining to information processing using networks of embedded
    4 KB (570 words) - 23:17, 14 October 2008
  • Design and implementation of signal processing systems Information forensics and security
    3 KB (450 words) - 23:04, 4 February 2009
  • ...tions in the design, implementation, evaluation, and deployment of storage systems. The conference will consist of two and a half days of technical presentati * Archival storage systems
    3 KB (345 words) - 14:50, 26 December 2011
  • |Title=The First International Workshop on the Critical Computer Based Systems ...l results relevant to the engineering of highly sophisticated and critical systems that are used in automotive, avionics, railway, naval, chemical, nuclear, m
    5 KB (660 words) - 16:46, 27 December 2015
  • ...r-related research domains that increasingly play a key role in connecting systems across network centric environments to allow distributed computing and info * OSS and security, security implication of OSS, security concerns in using OSS
    5 KB (697 words) - 23:18, 14 October 2008
  • + Security, Privacy and Open Source TRACK - Security, privacy and trust methods and solutions for enabling e-Business
    5 KB (594 words) - 16:29, 25 March 2020
  • # security technology and systems # Software Engineering of Autonomic Grid Computing Systems and Applications
    6 KB (733 words) - 12:48, 27 October 2016
  • | Title = The Second IEEE International Workshop on Security in Software Engineering | Field = Computer security and reliability
    5 KB (615 words) - 09:55, 29 May 2016
  • Cyber Security Handheld Devices and Systems
    3 KB (427 words) - 17:01, 29 May 2016
  • ...the development process. With the spread of service-oriented and autonomic systems, software quality is continuously negotiated and adapted at run-time. Requi ...nt original work. Contributions from cognate areas such as formal methods, systems engineering, human and computer interaction, economics and management and s
    4 KB (503 words) - 23:18, 14 October 2008
  • ...es in current systems and potential concerns in the field of communication systems and middleware. The conference will feature a high quality technical progra * Achieving security, reliability, and quality of service in
    3 KB (358 words) - 23:18, 14 October 2008
  • | Title = 2008 ESA Workshop on Avionics Data, Control and Software Systems ESA Workshop on Avionics Data, Control and Software Systems (ADCSS)
    18 KB (2,714 words) - 23:23, 14 October 2008
  • ...his has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society tha
    3 KB (404 words) - 23:18, 14 October 2008
  • Study of these large-scale social networking systems, their to recommendation systems, targeted advertising, and classification/
    5 KB (592 words) - 23:18, 14 October 2008
  • ...ch adapt their behavior to the user preferences and needs, and recommender systems that predict the relevance of diverse items (e.g., movies, travels, product - User profiling in adaptive systems
    4 KB (570 words) - 23:19, 14 October 2008
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • | Title = Second ACM Conference on Wireless Network Security | Field = Computer security and reliability
    2 KB (291 words) - 23:19, 14 October 2008
  • | Title = Work in Progress Session of the 29th International Real-Time Systems Symposium research in real-time systems, theory, and applications. The primary
    2 KB (322 words) - 00:35, 15 October 2008
  • | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability
    5 KB (673 words) - 23:19, 14 October 2008
  • | Title = Ubiquitous Computing Security Systems | Field = Computer security and reliability
    3 KB (328 words) - 06:40, 22 December 2012
  • | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability
    6 KB (697 words) - 23:19, 14 October 2008
  • | Title = The First ACM Computer Security Architecture Workshop | Field = Computer security and reliability
    5 KB (619 words) - 23:19, 14 October 2008
  • | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability
    6 KB (736 words) - 23:20, 14 October 2008
  • | Title = The Sixth International Workshop on Security In Information Systems | Field = Computer security and reliability
    590 bytes (68 words) - 23:20, 14 October 2008
  • | Title = Special Session on Systems and Information Security | Field = Computer security and reliability
    541 bytes (61 words) - 23:20, 14 October 2008
  • | Title = 2008 Workshop on Security and High Performance Computing Systems | Field = Computer security and reliability
    574 bytes (65 words) - 23:20, 14 October 2008
  • services. The major emphasis of the workshop this year is security of wireless applications. What are the real security threats towards
    5 KB (663 words) - 23:20, 14 October 2008
  • | Field = Computer security and reliability ...throughout the entire product development cycle in software, hardware, and systems are encouraged. The conference will bridge theory, applications, experience
    3 KB (337 words) - 23:20, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security | Field = Computer security and reliability
    4 KB (565 words) - 23:20, 14 October 2008
  • | Title = 23rd International Information Security Conference | Field = Computer security and reliability
    5 KB (637 words) - 23:20, 14 October 2008
  • | Field = Computer security and reliability ...of these innovative materials in secure wireless and optical communication systems, antennas, high-speed circuits, optical sensing, nanoscale imaging and cloa
    2 KB (276 words) - 23:20, 14 October 2008
  • | Title = IEEE Symposium on Security and Privacy | Field = Computer security and reliability
    2 KB (262 words) - 23:20, 14 October 2008
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • | Title = SPIE Defense and Security Symposium | Field = Computer security and reliability
    1 KB (167 words) - 23:20, 14 October 2008
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability
    4 KB (502 words) - 23:20, 14 October 2008
  • multimedia systems, technologies and applications. ICME is co-sponsored by four Systems Society, and the Communications Society).
    3 KB (425 words) - 23:20, 14 October 2008
  • - Personalization, Privacy and Security in Mobile Computing - Distributed Systems Aspects of Mobile Computing
    10 KB (1,262 words) - 23:20, 14 October 2008
  • * Multimedia systems, architecture, and applications * Peer-to-peer multimedia systems and streaming
    5 KB (595 words) - 23:20, 14 October 2008
  • -Pervasive and interactive multimedia systems -Multimedia systems, architecture, and applications for UMC
    4 KB (573 words) - 23:20, 14 October 2008
  • ...state-of-the-art research, development, and implementations of multimedia systems, technologies and applications. ICME is co-sponsored by four IEEE societies including the Circuits and Systems Society, the Com-munications Society, the Computer Society, and the Signal
    2 KB (296 words) - 23:20, 14 October 2008
  • | Title = Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques | Field = Systems
    6 KB (837 words) - 23:21, 14 October 2008
  • ...as of on-line and off-line recognition of handwriting, pen-based interface systems for the processing of multilingual handwritten documents and forms. The pro · Systems and Architectures
    3 KB (364 words) - 23:21, 14 October 2008
  • * Functional Programming and Security * Functional Programming to Animate/Prototype/Implement Systems from Formal or Semi-Formal Specifications
    5 KB (636 words) - 23:22, 14 October 2008
  • Service Security, Privacy and Trust Security, Privacy and Trust in Business Process Management
    18 KB (2,352 words) - 23:23, 14 October 2008
  • ...and the years to come will witness a proliferation in the use of advanced systems. - Security, Privacy and Trust
    3 KB (357 words) - 23:23, 14 October 2008
  • ...existing computer technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in existing IT services. * Multimedia Systems
    3 KB (415 words) - 23:23, 14 October 2008
  • ...s, proof theory, reasoning about security, rewriting, specifications, type systems and type theory, and verification. We welcome submissions in emergent areas
    2 KB (285 words) - 15:11, 7 November 2016
  • Information Security and Cryptography Information Systems
    3 KB (412 words) - 19:34, 12 November 2020
  • ...g in a wide range of areas, as diverse as medicine, robotics, defense, and security. As a rule, the processed data are discrete; therefore, the "discrete appro ...re invited to submit original papers describing in detail working computer systems for image analysis. The algorithms should mostly be based on discrete/combi
    6 KB (814 words) - 23:25, 14 October 2008
  • ..., computer vision, image analysis, signal processing, statistics, computer security, etc. The purpose of this conference is to provide a scientific forum for r * real-time embedded biometric systems
    3 KB (325 words) - 23:50, 14 October 2008
  • | Title = 8th International Workshop on Pattern Recognition in Information Systems Pattern Recognition in Information Systems
    4 KB (550 words) - 23:25, 14 October 2008
  • | Title = The Fourth International Conference on Systems | Field = Systems
    11 KB (1,492 words) - 23:26, 14 October 2008
  • | Field = Systems ...tions in the design, implementation, evaluation, and deployment of storage systems. The conference will consist of two and a half days of technical presentati
    4 KB (547 words) - 23:26, 14 October 2008
  • | Title = The Third International Conference on Systems | Field = Systems
    6 KB (765 words) - 23:26, 14 October 2008
  • ...the International Council on Systems Engineering and 6th Biennial European Systems Engineering Conference | Field = Systems
    2 KB (309 words) - 23:26, 14 October 2008
  • | Field = Computer security and reliability ** Fault injection, detection, Error modeling, Fail-safe and fail-stop systems, Time and space redundancy, dRedundancy/dEnergy (dR/dE) -efficient architec
    5 KB (598 words) - 01:12, 31 May 2012
  • ...onference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '09) |Field=Operating Systems
    3 KB (406 words) - 17:39, 30 September 2016
  • ==Architectures for Distributed Systems== Hawaii International Conference of Systems Sciences
    6 KB (761 words) - 03:28, 6 January 2009
  • ...approaches to the design and implementation of high-performance computing systems. These boundaries between state of the art and innovation constitute the co ...ontiers of computer science and engineering and that will provide advanced systems for current and future applications.
    3 KB (376 words) - 23:27, 14 October 2008
  • * Memory systems * Hardware support for security
    2 KB (259 words) - 10:14, 29 May 2016
  • ...ns and required attributes, such as reliability, availability, safety, and security, as well as human factors. ...r the design, validation, operation and evaluation of dependable computing systems. All kinds of faults are of interest, from traditional hardware and softwar
    4 KB (528 words) - 23:27, 14 October 2008
  • | Title = Cognitive Radio Systems Call for papers: Cognitive Radio Systems
    3 KB (409 words) - 23:27, 14 October 2008
  • - Distributed systems - Network security
    3 KB (413 words) - 23:28, 14 October 2008
  • | Field = Control systems A Special Session on `Design, Analysis and Tools for Integrated Circuits and Systems is organized. Authors who are interested in the special session need to sub
    4 KB (561 words) - 23:29, 14 October 2008
  • * Biologically inspired systems * Multirobot systems
    3 KB (423 words) - 23:29, 14 October 2008
  • ...e = Workshop on Compositional Theory and Technology for Real-Time Embedded Systems (co-located with RTSS 2008) | Field = Real-time systems
    6 KB (707 words) - 23:29, 14 October 2008
  • |Title=The 6th ACM Conference on Embedded Networked Sensor Systems ...omputer Science, Embedded systems, Embedded Network Sensor Systems, Sensor Systems
    6 KB (771 words) - 16:09, 16 September 2019

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)