Search results

Jump to: navigation, search
  • | Title = The 3rd International Conference on Ubiquitous Information Management and Communication ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network
    2 KB (303 words) - 23:42, 14 October 2008
  • - Privacy, security and trust - Gregory Yovanof, Athens Information Technology, Greece
    6 KB (763 words) - 23:42, 14 October 2008
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...c./; Context-aware and context recognition; Data-centers and nano-centers; Information processing /distribution, discovery, sharing/; Virtualization; Overlay infr ...ion; All-IP versus protocol translation; IP simplified network management; Security, trust, and privacy; Network stability under topology change; Delay-toleran
    7 KB (883 words) - 17:35, 7 January 2021
  • ...nts together to produce a platform for data gathering or the management of information related to data collection that helps researchers demonstrate the validity * Virtual organization and security issues of instruments and sensors on the Grid
    4 KB (642 words) - 21:17, 9 December 2008
  • The scope of the journal ranges from theories of data, information, semantics and knowledge to innovative methods, tools and domain-specific a ...Networks, HCI, Agents, Data Semantics, Medical, Healthcare, Entertainment, Security.
    3 KB (440 words) - 12:20, 12 December 2008
  • reliability, security and trust). Such quantities play a central role in quantitative information such as time and probabilities either directly in the
    6 KB (823 words) - 14:28, 14 December 2008
  • ...f Academic Excellence in Information Assurance Education from the National Security Agency.
    2 KB (331 words) - 05:33, 5 January 2009
  • * Security and privacy for RTSOAA based CPS ==Paper Submission Information==
    7 KB (922 words) - 00:58, 9 January 2009
  • |Title=Web Information Systems Modeling Modern Web Information Systems need to fulfill a large number of
    8 KB (1,101 words) - 15:16, 12 January 2009
  • ** Privacy and security ** Information/communication applications
    11 KB (1,366 words) - 16:44, 14 January 2009
  • |Field=Internet security Conference registration information will be posted by February 1 at www.ccdcoe.org.
    2 KB (219 words) - 17:25, 14 January 2009
  • * Model-driven development of process-aware information systesm, * Security issues of web-based processes,
    4 KB (602 words) - 14:34, 17 January 2009
  • ...bilistic analysis for RT systems; quality of service support; reliability, security and survivability in RT systems; scheduling and schedulability analysis; wo website later for further information.
    5 KB (720 words) - 14:46, 17 January 2009
  • - Security - Distributed Intelligent Information Systems
    6 KB (812 words) - 12:55, 18 January 2009
  • ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Information Management and Dissemination
    5 KB (526 words) - 01:02, 2 February 2009
  • * Information and Knowledge Management Track (Chair(s): Ralf Kutsche - Bich-Thuy Dong) o Integrated information systems
    5 KB (567 words) - 12:58, 18 January 2009
  • Trust, Privacy & Security in Digital Business (TrustBus'09) Security patterns have arrived to a stage where there are a significant
    6 KB (740 words) - 12:58, 18 January 2009
  • o Prediction/information markets o Economics of information
    9 KB (1,221 words) - 12:58, 18 January 2009
  • part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...elected journals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.
    5 KB (633 words) - 12:58, 18 January 2009
  • | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)
    16 KB (2,178 words) - 12:59, 18 January 2009
  • ...o raises a host of ethical issues, such as those pertaining to information security, privacy, data mining, and intellectual property. Therefore, as e-business ...of widely discussed current issues in e-business such as those of privacy, information management, data mining, intellectual property, and consumer tracking.
    6 KB (856 words) - 13:00, 18 January 2009
  • ...g play a key role in the context of a plethora of modern distributed data, information and knowledge management applications and systems. Distributed XML processi - Distributed XML Information Retrieval
    7 KB (1,030 words) - 13:00, 18 January 2009
  • part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...elected journals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.
    6 KB (860 words) - 13:00, 18 January 2009
  • services and information sources with intelligent information processing in business intranet environments stressing the need for security and
    6 KB (684 words) - 13:00, 18 January 2009
  • Information and Data Management Security and Access Control
    4 KB (529 words) - 13:00, 18 January 2009
  • With the exponentially growing amount of information to be included in the decision making process, the data to be - Data warehouse privacy, security, and reliability
    7 KB (1,006 words) - 13:00, 18 January 2009
  • - temporal information extraction - time-dependent security policies
    6 KB (872 words) - 13:00, 18 January 2009
  • E-transactions systems involve 3 or more partners in the exchange of information concerning trades, payments, services...: a customer communicates through a Many aspects contribute to the functioning of e-transactions systems such as security aspects (authentication, confidentiality, ..), architecture (such as Cap, 3
    6 KB (772 words) - 13:00, 18 January 2009
  • * Security Systems & Services ...uire that referees treat the contents of papers under review as privileged information not to be disclosed to others before publication. It is expected that no on
    9 KB (1,183 words) - 13:41, 23 January 2009
  • made considerable advances in closing the information gap between * Privacy and security issues with things and services
    6 KB (798 words) - 13:01, 18 January 2009
  • - AI in Computer Security - AI in Information Assurance
    4 KB (582 words) - 14:47, 2 December 2010
  • |Title=Tenth International Conference Series on Web Information Systems Engineering WISE 2009 invites submissions on all topics related to Web information systems engineering, including but not limited to those listed below:
    2 KB (240 words) - 17:46, 21 July 2016
  • ...itle = International Conference on Communications and Networking in China, Information and Coding Theory Symposium o Security in Power Line Communications
    14 KB (1,518 words) - 13:01, 18 January 2009
  • + Information Integration and Mash-ups + Information Mining and Reporting
    3 KB (410 words) - 13:01, 18 January 2009
  • Visualization and Its Information Information and Its Technical Education
    3 KB (320 words) - 16:40, 27 December 2015
  • part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...elected journals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.
    4 KB (564 words) - 13:01, 18 January 2009
  • part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...elected journals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.
    4 KB (588 words) - 13:01, 18 January 2009
  • College of Electronics and Information, Kyung Hee University, Yongin (South Korea) - Geographical Information Systems
    10 KB (1,321 words) - 13:01, 18 January 2009
  • ...areas and to create the much-needed synergy among medical, biological and Information Technology sectors. HIBIT is one of the few international conferences on t • Clinical Informatics and Hospital Information Systems
    4 KB (528 words) - 13:01, 18 January 2009
  • |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)
    6 KB (793 words) - 15:12, 1 October 2020
  • ...and network systems gradually become the fundamental infrastructure of our information society, many multidisciplinary research topics emerge to reflect the featu * Bio-inspired information and communication systems
    6 KB (767 words) - 13:01, 18 January 2009
  • * Data mining and information extraction * Data security, privacy and trust
    4 KB (568 words) - 13:01, 18 January 2009
  • ...ociety have formed into the world we live in, however the emergence of the information technologies that ...ital systems that support useful functionality by making socially produced information available to physical things.
    3 KB (446 words) - 13:02, 18 January 2009
  • | Title = Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Device Use | Field = Computer security and reliability
    11 KB (1,539 words) - 13:02, 18 January 2009
  • | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)
    6 KB (852 words) - 13:02, 18 January 2009
  • | Title = The 1st International Workshop on Information Assurance in Wireless Sensor Networks ...place in conjunction with the 3rd International Conference on Information Security and Assurance, Seoul, Korea http://www.sersc.org/ISA2009.
    3 KB (450 words) - 13:02, 18 January 2009
  • Department of Information Technologies of University of Milan in conjunction Security in Knowledge-based Multimedia Systems
    6 KB (693 words) - 13:03, 18 January 2009
  • |Title=32nd International Convention on Information and Communication Technology, Electronics and Microelectronics With the 32nd International Convention MIPRO, devoted to information and communication technology, electronics and microelectronics, we enter th
    4 KB (524 words) - 17:20, 12 February 2009
  • ...Service composition, Functional and Non Functional Requirements (NFR: QoS, security), and management and diagnosis, who investigate concepts, methods, techniq * NFR (quality, security, robustness, adaptability) management in choreographed and/or
    7 KB (960 words) - 16:33, 27 February 2009
  • ...to the great needs of economic globalization and the rapid advancement of information technology, Natural Language Processing based on Knowledge Engineering has B-04 Information Retrieval
    4 KB (459 words) - 16:33, 27 February 2009
  • | Title = The 4th International ICST Conference on Scalable Information Systems in terms of information access, storage and retrieval.
    4 KB (512 words) - 16:33, 27 February 2009
  • o Security and privacy issues of UWB-based body-centric networking for personal health ...peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the IJUWBCS web page (http://www.ind
    5 KB (664 words) - 17:20, 5 July 2020
  • * security in distributed computing, cryptographic protocols (5) information whether the paper is a regular submission, or a brief
    7 KB (890 words) - 15:05, 27 December 2015
  • * Knowledge Representation, Distributed Models and Reasoning, Information visualization ...temas, Wireless communications, Technologies and applications, Information security
    8 KB (977 words) - 16:33, 27 February 2009
  • | Title = Second International ICST Symposium on Global Information Second International ICST Symposium on Global Information Governance (ISGIG)
    4 KB (557 words) - 16:33, 27 February 2009
  • - Web Information Filtering and Retrieval - Web Security
    4 KB (630 words) - 16:33, 27 February 2009
  • | Title = IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09) IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09)
    2 KB (229 words) - 16:33, 27 February 2009
  • * Security aspects of using virtualization in a distributed environment For more information:
    5 KB (576 words) - 16:34, 27 February 2009
  • Process Architectures), FAST (Formal Aspects in Security and Trust), information on FMweek,
    8 KB (1,079 words) - 17:05, 27 February 2009
  • 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.
    7 KB (897 words) - 17:05, 27 February 2009
  • * Security and trustworthy in multi-tenancy service hosting environment Ian Gorton, Computational and Information Sciences at Pacific Northwest National Laboratory, US
    6 KB (855 words) - 17:06, 27 February 2009
  • Official publication of the Information Resources Management Association - Security issues and technologies
    5 KB (646 words) - 17:06, 27 February 2009
  • | Title = The 2009 International Conference on Web Information Systems and Mining (WISM’09) and the 2009 International Conference on Art ...orum for scientists and researchers to present the state of the art of web information systems, web mining, artificial intelligence, computational intelligence, w
    5 KB (604 words) - 17:06, 27 February 2009
  • · Reliability, fault-tolerance, and security Jongsuk Ruth Lee, Korea Institute of Science and Technology Information, Korea
    8 KB (1,050 words) - 18:04, 5 January 2017
  • ...cent developments and research issues on e-commerce, enterprise computing, security and developments in the area of social networks. ADDITIONAL INFORMATION
    4 KB (528 words) - 17:06, 27 February 2009
  • + Middleware solutions for Security, Privacy and Trust (Elsevier's Engineering Information Index), and automatically included
    6 KB (800 words) - 22:11, 27 February 2009
  • * Security and privacy in P2P systems Detailed information on electronic submission are provided on the web site
    5 KB (623 words) - 17:06, 27 February 2009
  • ...erence aims to provide a forum to disseminate, to all branches industries, information on the most recent and relevant innovations, theories and applications in I • Information Processing and Engineering
    3 KB (399 words) - 17:06, 27 February 2009
  • VoIP, NGN and IMS Security * Security models of voice, video and text over IP services
    4 KB (621 words) - 17:06, 27 February 2009
  • transform, and integrate information in a platform-independent manner. * Rule languages for exchanging and processing information through the
    7 KB (883 words) - 17:06, 27 February 2009
  • * Geographic Information Retrieval * Security and Integrity
    4 KB (534 words) - 17:07, 27 February 2009
  • | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability
    8 KB (967 words) - 17:07, 27 February 2009
  • | Title = 14th International Conference on Information Quality 14th International Conference on Information Quality (ICIQ)
    5 KB (690 words) - 17:07, 27 February 2009
  • | Title = 3rd WORKSHOP ON Practice and Theory of IT Security | Field = Computer security and reliability
    4 KB (506 words) - 17:07, 27 February 2009
  • | Title = Workshop on Trust, Risk and Security Assessments for Network Dependability in Digital Ecosystems (TRSDE) | Field = Computer security and reliability
    4 KB (600 words) - 17:07, 27 February 2009
  • | Title = 5th IEEE International Workshop on Wireless and Sensor Networks Security Wireless and Sensor Networks Security (WSNS'09)
    4 KB (485 words) - 17:07, 27 February 2009
  • ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Web Spam - Adversarial Information Retrieval in Digital Ecosystems
    7 KB (941 words) - 17:07, 27 February 2009
  • * Error and erasure correcting codes for information dispersal * Cryptography, Security and trust
    6 KB (750 words) - 16:50, 27 December 2015
  • * Authorization, Privacy and Security * Geographical Information Systems
    9 KB (1,249 words) - 08:42, 7 October 2011
  • Computer System, Information Security and Networks • Security and Privacy in E-Commerce
    3 KB (319 words) - 17:07, 27 February 2009
  • For latest information see: ...ning, Device and Equipment Technology, Production processes and Sequences, Information Technology
    38 KB (4,832 words) - 17:07, 27 February 2009
  • IEEE Computer Society Task Force on Information Assurance by the special interest group Security - Intrusion Detection and
    8 KB (1,020 words) - 17:07, 27 February 2009
  • * Security, data handling, and privacy ...peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the Author Guidelines page
    5 KB (670 words) - 17:08, 27 February 2009
  • | Title = The 12th International Conference on Network-Based Information Systems The 12th International Conference on Network-Based Information Systems
    11 KB (1,440 words) - 17:08, 27 February 2009
  • | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability
    12 KB (1,690 words) - 17:08, 27 February 2009
  • | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability
    3 KB (480 words) - 17:08, 27 February 2009
  • | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability
    6 KB (828 words) - 17:08, 27 February 2009
  • * Network security threats and countermeasures ...xson, IMC '07). If applicable, authors are also urged to notify parties of security flaws in their products or services in advance of publication. Adherence to
    6 KB (774 words) - 17:08, 27 February 2009
  • * Information assurance and security of the Springer LNCS Style (please check the Information for Authors
    8 KB (1,144 words) - 20:59, 27 February 2009
  • ...nal Conference on the Theory and Application of Cryptology and Information Security
    602 bytes (67 words) - 15:25, 10 March 2020
  • ...nal Conference on the Theory and Application of Cryptology and Information Security
    433 bytes (48 words) - 15:34, 10 March 2020
  • * Business Information Technology Alignment * Project, risk and security management
    4 KB (571 words) - 12:58, 9 March 2020
  • ...nal Conference on the Theory and Application of Cryptology and Information Security
    178 bytes (23 words) - 21:30, 10 March 2020
  • |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security
    5 KB (578 words) - 10:21, 20 November 2020
  • 1. Information Technologies Supporting Learning AREA 1: INFORMATION TECHNOLOGIES SUPPORTING LEARNING
    5 KB (661 words) - 15:49, 8 December 2009
  • |Title=International Conference on Web Information Systems and Technologies (WEBIST) |Field=Web Information Systems
    3 KB (440 words) - 15:25, 9 December 2009
  • |Title=International Workshop on Wireless Multimedia Computing and Security Services - Security, privacy, and cryptographic protocols for WMC
    3 KB (477 words) - 16:54, 8 August 2009
  • ...tion Retrieval, HCI) interested in topics like trust, provenance, privacy, security, reputation and spam, in order to address current challenges of their adapt - Privacy and Security in self-organizing and adaptive systems
    5 KB (642 words) - 20:34, 9 June 2009
  • ...d political point of view. It is critical to provide rescue personnel with information technology tools that enable more effective and efficient mitigation during ...arge-scale multi-agent systems that deals with uncertainty and conflicting information during crisis management,
    6 KB (783 words) - 17:04, 27 December 2015
  • Security and Cryptography Information Retrieval
    3 KB (412 words) - 19:29, 2 August 2009
  • ...and architectures, optimization of FPGA-based cores (e.g. arithmetic, DSP, security, embedded processors, memory interfaces, or other functions). ...entify authors will not be considered. Submission instructions and further information will be available at the conference website: http://www.isfpga.org.
    5 KB (632 words) - 11:32, 2 August 2009
  • ...g practitioners, managers, researchers, and educators to exchange valuable information and develop new synergies to address the complex issues and problems of com For Technical Program information contact:
    6 KB (706 words) - 11:33, 2 August 2009
  • * Network Security ...n the conference Web site. Please see http://www.comsnets.org for detailed information. The authors of accepted papers must guarantee that their paper will be pr
    7 KB (1,054 words) - 16:43, 27 December 2015
  • ...ited not only in traditional database areas but also in Data Quality, Web, Information Retrieval and Data Mining. We invite submission of original research contri * Data privacy and security
    4 KB (553 words) - 11:33, 2 August 2009
  • ...ware reuse, dynamic software adaptation, efficiency on multicore hardware, security, and safety. ...sk rejection. All papers must be submitted by September 08, 2009. For more information please visit the SAC 2010 Website.
    5 KB (743 words) - 17:02, 27 December 2015
  • | Title = 7th International Conference on Information Systems for Crisis Response and Management 7th International Conference on Information Systems for Crisis Response and Management
    4 KB (528 words) - 11:33, 2 August 2009
  • | Title = Journal of Information and Communication Technology JICT is a refereed journal in the field of information and communication technology (ICT), providing an international forum for pr
    2 KB (258 words) - 11:33, 2 August 2009
  • ...tworks (e.g., wireless networks, RFID, etc) in order to share and exchange information and provide services. Ambient systems pose new research challenges due to t Ambient Systems Security and Privacy
    6 KB (751 words) - 16:59, 27 December 2015
  • World Wide Web has transformed into a social platform for communication, information sharing and collaboration between Web users. Social learning is concerned w - Personalization, security and privacy
    4 KB (525 words) - 11:34, 2 August 2009
  • †Professor, Department of Information Technology, *Assistant Professor, Department of Information Technology
    5 KB (657 words) - 11:34, 2 August 2009
  • | Field = Information systems ...er Science & Engineering, *Assistant Professor, Department of Information Technology
    4 KB (564 words) - 12:01, 6 November 2020
  • * Trust Integration and Security in Grid and P2P Systems Department of Information and Communication Engineering
    7 KB (912 words) - 17:36, 5 November 2020
  • |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security
    5 KB (599 words) - 10:21, 20 November 2020
  • guaranteeing communications and collecting information that is vital for * Network self-healing, security and self-defence
    4 KB (479 words) - 11:35, 2 August 2009
  • | Acronym = Security 2009 ...S International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)
    6 KB (746 words) - 11:35, 2 August 2009
  • | Title = International Workshop on Information Quality and Quality of Service for Pervasive Computing ...on, processing, and consumption elements that the broad spectrum of smart, information-intensive, sensor-enabled pervasive applications depend on, such as remote
    5 KB (734 words) - 11:35, 2 August 2009
  • | Title = First Iberic Conference on Web-Applications Security (IBWAS’09) First Iberic Conference on Web-Applications Security (IBWAS’09)
    9 KB (1,261 words) - 11:35, 2 August 2009
  • Mediterranean Conference on Information Systems (MCIS 2009) in Athens, Greece. information assets and market capitalization while creating business ecosystems.
    4 KB (586 words) - 11:35, 2 August 2009
  • | Title = Third International Workshop on Mobile Multimedia Information Retrieval | Field = Information retrieval
    5 KB (674 words) - 11:35, 2 August 2009
  • |Title=The 9th ACM/IEEE International Conference on Information Processing in Sensor Networks The 9th ACM/IEEE Conference on Information Processing in Sensor Networks
    8 KB (1,119 words) - 09:57, 27 February 2020
  • ...ry, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is ? Security and privacy
    5 KB (571 words) - 11:35, 2 August 2009
  • More information: http://ispan2009.comm.ccu.edu.tw/speakers.html -Journal of Information and Science Engineering (JISE) (SCI)
    4 KB (422 words) - 11:36, 2 August 2009
  • Conference Venue information Information and Communication Technology Management
    4 KB (462 words) - 11:36, 2 August 2009
  • ...ected to the Internet. There is a need for those networks to provide their information in an interpretable form and to reduce the complexity of accessing sensor s ...onse time, resource consumption, throughput, availability, reliability and security.
    9 KB (1,206 words) - 11:40, 2 August 2009
  • LTC 2009 - Call for papers and important information ...ay technological environment. Since the very beginning of the Computer and Information Age these fields have influenced and stimulated each other. The European U
    14 KB (1,872 words) - 19:26, 2 August 2009
  • Human Resource Management Information System and the Security Technology
    2 KB (277 words) - 16:38, 27 December 2015
  • | Title = IEEE International Symposium on Information Theory | Field = Information theory
    2 KB (217 words) - 11:36, 2 August 2009
  • * Information-theoretic aspects of cognitive radio networks * Trust and security issues
    4 KB (549 words) - 11:36, 2 August 2009
  • Submitted for indexing: Elsevier's EI Compendex Database, EI's Engineering Information Index RTSEC: Security for Internet-based real-time systems
    14 KB (1,651 words) - 15:56, 15 February 2017
  • |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security
    3 KB (352 words) - 12:39, 11 August 2009
  • |Title= 12th International Conference on Enterprise Information Systems Conference name: 12th International Conference on Enterprise Information Systems (ICEIS)
    5 KB (552 words) - 17:06, 12 August 2009
  • |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability
    6 KB (766 words) - 10:54, 26 April 2010
  • |Title=International Conference on Information Visualization Theory and Applications Conference name: International Conference on Information Visualization Theory and Applications (IVAPP)
    2 KB (245 words) - 18:52, 7 January 2010
  • |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security
    5 KB (667 words) - 14:27, 13 September 2009
  • ...benchmarking, review, inspection and walkthrough, reliability, safety and security design tools, testing tools, information systems engineering, quality tools
    4 KB (583 words) - 12:17, 25 November 2009
  • |Title=Special Issue on Ubiquitous Computing Security Systems |Field=Ubiquitous Computing Security Systems
    1 KB (187 words) - 04:49, 23 September 2009
  • * How does security address the legal and ethical issues in emerging ubiquitous computing syste ===For More Information===
    2 KB (205 words) - 05:10, 23 September 2009
  • ...great impact on the development of new generation intelligent distributed information systems. The aim of this symposium is to bring together researchers involve - Information extraction and retrieval in distributed environments
    4 KB (508 words) - 13:29, 13 July 2010
  • |Title=6th Annual Conference on Peace and Security |Field=Security
    3 KB (359 words) - 00:15, 17 November 2009
  • |Title=International Conference on Information Society (i-Society 2010) - Geographic information systems
    4 KB (507 words) - 22:37, 18 November 2009
  • Mink Spaans (NED), TNO Defence, Security and Safety; ==IC2J Editorial Staff and Contact Information==
    2 KB (233 words) - 23:39, 18 November 2009
  • dissemination of information in social systems. With the rapid development of information and communication technologies,
    4 KB (449 words) - 11:04, 26 November 2009
  • * Application security * Blended Internet security methods
    5 KB (607 words) - 18:01, 3 December 2009
  • ...d validation. E-business agents. Pervasive computing. Privacy, safety, and security. ...g. Case studies and reports on deployments. Computational infrastructures. Information retrieval. Web services and semantic web. E-learning sys-tems. E-institutio
    6 KB (733 words) - 18:19, 24 September 2020
  • ...Programme, those nations that succeed in harnessing the potential of ICT (Information and Communication Technology) can look forward to greatly expand economic g ...in his/her own environment), there are important related concern, such as security and privacy, which need to be addressed also, since providing powerful (rem
    6 KB (889 words) - 13:48, 26 February 2010
  • |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust
    4 KB (484 words) - 14:20, 14 December 2009
  • 11. New Information Technology and Education Digital Campus Construction and Data Security Management
    2 KB (195 words) - 04:32, 7 January 2010
  • |Title=7th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS |Field=Computer security and reliability
    7 KB (982 words) - 19:13, 3 January 2010
  • |Title=3rd International Workshop on Wireless Multimedia Computing and Security Services ...ward for a deeper understanding in wireless multimedia computing (WMC) and security services.
    3 KB (497 words) - 03:43, 28 February 2010
  • |Field=Information Security, Cryptography
    3 KB (373 words) - 13:50, 19 January 2010
  • ...ometrics Technologies and Applications, Pattern Recognition and Biometrics Security, Bioinformatics and IT Applications in the above themes. Information retrieval and internet applications
    3 KB (382 words) - 18:27, 20 January 2010
  • •Robots for Security There will be an exhibition site at the conference. Information for prospective exhibitors will be available on the web site.
    3 KB (413 words) - 05:21, 26 January 2010
  • |Title=3rd International Conference on Security of Information and Networks |Field=Computer security
    10 KB (1,270 words) - 17:12, 20 April 2010
  • |Title=The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems
    3 KB (338 words) - 16:53, 27 December 2015
  • ...d software development. The conference tracks are "Software Engineering", "Information Systems and Data Management", "Programming Languages", "Distributed and Par - Enterprise Information Systems
    3 KB (392 words) - 13:50, 30 April 2020
  • |Title=International Conference on Wireless Information Networks and Systems Conference name: International Conference on Wireless Information Networks and Systems (WINSYS)
    4 KB (379 words) - 15:35, 5 February 2010
  • ...to representation, storage, authentication and communication of multimedia information. * › Multimedia Security
    3 KB (310 words) - 15:37, 5 February 2010
  • |Title=International Conference on Security and Cryptography |Field=Computer security and reliability
    4 KB (409 words) - 15:40, 5 February 2010
  • ..., signal processing and multimedia applications, and wireless networks and information systems. These are the main knowledge areas that define the six component c
    2 KB (180 words) - 15:49, 5 February 2010
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (429 words) - 08:55, 1 August 2019
  • |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    9 KB (1,092 words) - 09:35, 1 August 2019
  • ...tion, strategic to augment marketing, business intelligence and to enhance information retrieval via social search engines. ...odels of users’ behaviour that can resists malicious attack, low quality information and preserve privacy.
    6 KB (765 words) - 14:01, 11 April 2010
  • |Title=International Conference on Knowledge Management and Information Sharing 2010 ...tures. Although standardization is indeed an essential element for sharing information, IS effectiveness requires going beyond the syntactic nature of IT and delv
    3 KB (380 words) - 15:10, 1 October 2020
  • ...to enable personalization, customer profiling and segmentation, to enhance information retrieval with social search engine. ...rom Recommender/Trust Systems as well as Data Mining, Multi-agent Systems, Information Retrieval, Machine learning and Human Computer Interaction.
    4 KB (600 words) - 19:11, 18 February 2010
  • The 2010 International Conference of Information Engineering The 2010 International Conference of Information Security and Internet Engineering
    4 KB (559 words) - 08:31, 9 March 2010
  • ...ng together researchers and practitioners interested in the application of information and communication technologies (ICT) to healthcare and medicine in general › Confidentiality and Data Security
    2 KB (238 words) - 13:37, 10 March 2010
  • ...ected to continue as the powers of microprocessors continue to improve and information gets cheaper. ...chnology has the capacity to destroy African commodity markets. This poses security threats if plans are not developed to retrain those that will be displaced
    4 KB (631 words) - 06:05, 16 March 2010
  • * Information and Service Economy * Cloud Security
    4 KB (405 words) - 20:45, 3 November 2010
  • |Field=information systems, ebanking, ecommerce - Security for enabling eCommerce
    4 KB (601 words) - 00:22, 28 March 2010
  • |Title=8th Australian Information Security Management Conference |Field=Information science
    2 KB (217 words) - 16:50, 19 November 2020
  • |Superevent=2010 secau Security Congress '''INFORMING SECURITY'''
    2 KB (215 words) - 06:52, 13 April 2010
  • |Title=3rd Australian Security and Intelligence Conference |Field=Computer security and reliability
    2 KB (181 words) - 07:03, 13 April 2010
  • |Field=Computer security and reliability |Superevent=2010 secau Security Congress
    2 KB (200 words) - 16:55, 27 December 2015
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • * security, access control, and licensing issues of Linked Data ==Contact Information==
    4 KB (608 words) - 10:39, 29 May 2016
  • ...here around the world are not connected between them as well as associated information systems are not integrated. This scenario can be summarized as too much dat ...tion are formally defined. Semantics should integrate web-centric standard information infrastructures improving the capabilities of collecting, retrieving, shari
    5 KB (639 words) - 16:17, 20 May 2010
  • ...a larger and larger group of end-user applications (e.g., climate change, security, land use, weather). ...S or textual data. Thus, new specific techniques of Knowledge Bases, Image Information Mining, KDD and Visualization need to be integrated.
    4 KB (582 words) - 16:22, 20 May 2010
  • ...s. The success of these technologies heavily relies on their users and the information produced and organized by them, reflecting aspects related to the user expe * Communication, collaboration, sharing, security, social norms and other aspects of sociability;
    4 KB (657 words) - 19:43, 12 June 2010
  • 1. INFORMATION TECHNOLOGIES SUPPORTING LEARNING AREA 1: INFORMATION TECHNOLOGIES SUPPORTING LEARNING
    5 KB (532 words) - 12:25, 16 June 2010
  • |Title=7th International Conference on Web Information Systems and Technologies (WEBIST) Conference name: 7th International Conference on Web Information Systems and Technologies (WEBIST)
    5 KB (627 words) - 12:33, 16 June 2010
  • ...the most popular, dependable and low cost methods of sending out important information and documents over long distances. ...These fax services also far overpower the traditional providers in ways of security, ease of accessibility and functionality.
    4 KB (626 words) - 14:16, 29 July 2010
  • ...nal Conference on the Theory and Application of Cryptology and Information Security
    208 bytes (27 words) - 18:56, 29 March 2020
  • |Title=19th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN) ...signal and image processing, information and coding theory, databases and information management, distributed algorithms, networks and protocols, wireless commun
    3 KB (412 words) - 09:52, 27 February 2020
  • |Title=13th International Conference on Enterprise Information Systems (ICEIS) Conference name: 13th International Conference on Enterprise Information Systems (ICEIS)
    19 KB (2,462 words) - 19:10, 26 August 2010
  • ...happen to be new to these service providers and might be worried about the security of using these online services then, the following benefits are sure to get To get more information about this please [http://www.800vanitynumbers.org '''Visit this website'''
    3 KB (610 words) - 16:33, 27 August 2010
  • The 2011 International Conference of Information Engineering The 2011 International Conference of Information Security and Internet Engineering
    3 KB (458 words) - 08:06, 31 August 2010
  • |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium
    3 KB (343 words) - 16:31, 6 May 2020
  • |Title=32nd International Conference on Advanced Information Systems Engineering |Field=Information Systems
    3 KB (395 words) - 15:14, 24 September 2020
  • * Probabilistic and information-theoretic methods * Security applications
    5 KB (574 words) - 15:58, 6 March 2020
  • * Security in distributed computing, cryptographic protocols affiliations, or email addresses. The contact information of the
    3 KB (344 words) - 11:30, 21 April 2020
  • to mean: the recording and visualisation of information recorded from radiation - Image Security
    2 KB (298 words) - 18:24, 10 September 2010
  • |Title=International Conference on Information Society ...d industry. The conference covers a wide spectrum of topics that relate to information society, which includes technical and non-technical research areas.
    6 KB (732 words) - 05:52, 5 December 2010
  • ...nym=CALL FOR PAPER Journal: International Journal of Computer Science and Security (IJCSS) |Title=International Journal of Computer Science and Security (IJCSS)
    2 KB (298 words) - 16:47, 5 July 2020
  • |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)
    5 KB (609 words) - 17:01, 5 July 2020
  • To build its International reputation, we are disseminating the publication information through Google Books, Google Scholar, Directory of Open Access Journals (DO • Information Theory • Local Area Networks
    3 KB (318 words) - 16:46, 5 July 2020
  • Clinical Informatics and Hospital Information Systems Security, Ethics and Privacy
    5 KB (693 words) - 10:44, 14 November 2010
  • |Title=14th International Conference on Business Information Systems ...alleviate the business-IT gap; in information management, ways to organize information have been simplified; in semantic web automatic linking of data is a Holy G
    6 KB (806 words) - 14:48, 16 November 2010
  • mechanics with electronics and information processing. This integration is between the components (hardware) and the information-driven
    12 KB (1,378 words) - 21:13, 28 November 2010
  • Security in network, systems, and applications<br> Information technologies<br>
    4 KB (554 words) - 12:34, 14 October 2020
  • Security in network, systems, and applications<br> Information technologies<br>
    4 KB (556 words) - 12:33, 14 October 2020
  • Security in network, systems, and applications<br> Information technologies<br>
    4 KB (552 words) - 08:13, 10 December 2010
  • Security in network, systems, and applications<br> Information technologies<br>
    4 KB (554 words) - 10:24, 6 July 2020
  • Security in network, systems, and applications<br> Information technologies<br>
    4 KB (554 words) - 12:33, 14 October 2020
  • |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability
    2 KB (217 words) - 16:57, 27 December 2015
  • ...and practical implementation for low-power/energy, high dependability and security, etc.. The SAAES special session addresses these important and challenging ...elf-aware and Adaptive Operations for Energy Efficiency, Dependability and Security
    4 KB (598 words) - 18:55, 23 December 2010
  • ...ges and emails, using intelligent tools that can be used to extract useful information, using technologies from diverse knowledge areas such as machine learning, ...eb user profiling, recommender systems, email organization and processing, security, etc.
    3 KB (344 words) - 19:33, 23 December 2010
  • ...and practical implementation for low-power/energy, high dependability and security, etc.. The SAAES special session addresses these important and challenging ...elf-aware and Adaptive Operations for Energy Efficiency, Dependability and Security
    4 KB (593 words) - 17:49, 7 January 2011
  • ...ct and reliable software systems, and an emerging awareness of privacy and security. Even though curriculum committees recognize formal methods as an essential Registration Information
    3 KB (448 words) - 17:58, 7 January 2011
  • ...n from the consequences of its actions. The algorithms can make use of the information gathered from the protocol in order to sense the environment, plan actions - Smart security protocols and algorithms
    6 KB (833 words) - 15:16, 24 September 2020
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev
    3 KB (462 words) - 11:51, 22 March 2020
  • |Title=International Workshop on Visualization and Information Security Management |Field=Security Management
    3 KB (468 words) - 00:17, 2 March 2011
  • Information Security For further information about the conference, (extended) abstract
    3 KB (467 words) - 11:43, 6 October 2011
  • Information Security and Applied Cryptography. − Intelligent Information Systems.
    3 KB (367 words) - 16:37, 27 December 2015
  • ...on protocols, services, distributed platforms, middleware, controllers and security infrastructures. The ICTSS is the successor of previous (joint) conferences - kind of testing: functional, interoperability, performance, conformance, security, reliability, robustness, etc.;
    6 KB (822 words) - 14:44, 18 March 2011
  • ...Computer Science (Cloud Computing, Informational Retrieval, Informational Security, Mobile Platforms and others); You can find all the details of registration, information about courses, terms of participation and payment on a website of AACIMP-20
    2 KB (306 words) - 14:54, 12 November 2020
  • ...ng together researchers and practitioners interested in the application of information and communication technologies (ICT) to healthcare and medicine in general * Confidentiality and Data Security
    2 KB (216 words) - 17:51, 29 June 2011
  • |Title=International Conference on Knowledge Management and Information Sharing Conference name: KMIS- International Conference on Knowledge Management and Information Sharing
    2 KB (250 words) - 14:52, 1 October 2020
  • ...re aspects related to node behaviour, node nature, node interactions, node security, node privacy, network lifecycle, network performance, network security, network privacy, etc.
    7 KB (1,019 words) - 18:29, 8 April 2011
  • ...om his/her way, customs or duties, through the promise of money, honors or security. History shows that this phenomenon has generally been manifesting in diffe For more information and updates please visit www.ars.identitatis.org
    5 KB (676 words) - 16:03, 31 May 2011
  • ...ng together researchers and practitioners interested in the application of information and communication technologies (ICT) to healthcare and medicine in general * Confidentiality and Data Security
    2 KB (260 words) - 17:46, 29 June 2011
  • * Information Systems * Security
    3 KB (283 words) - 11:37, 1 July 2011
  • |Title=International Conference on Information Visualization Theory and Applications (IVAPP) Conference name: International Conference on Information Visualization Theory and Applications (IVAPP)
    4 KB (461 words) - 11:48, 1 July 2011
  • * Media Watermarking, Security, and Forensics Please check the website for further information (http://www.grapp.visigrapp.org/best_paper_awards.asp).
    4 KB (538 words) - 11:34, 21 February 2020
  • Service and Systems Design and QoS Network Security Information and Service Economy
    5 KB (677 words) - 11:59, 1 July 2011
  • 1. INFORMATION TECHNOLOGIES SUPPORTING LEARNING AREA 1: INFORMATION TECHNOLOGIES SUPPORTING LEARNING
    4 KB (517 words) - 12:03, 1 July 2011
  • |Title=8th International Conference on Web Information Systems and Technologies (WEBIST) Conference name: 8th International Conference on Web Information Systems and Technologies (WEBIST)
    5 KB (612 words) - 12:07, 1 July 2011
  • *Information Systems *Network Security
    13 KB (1,774 words) - 18:35, 31 August 2011
  • ...lease contact us at whf_paper@unesco.or.kr. Abstracts will be reviewed and information regarding acceptance and schedules will be sent to authors by September 9th ...tion but potentially one tied to questions of greater human well-being and security. How do we begin to reevaluate the beautiful in terms of psychic well-being
    10 KB (1,552 words) - 17:04, 24 February 2016
  • ...ause they allow for capturing architectural, functional and non-functional information about such complex systems in precise, domain-specific models. The techniqu ...ional aspects (such as performance, quality of service, real-time aspects, security, etc.)
    5 KB (598 words) - 17:05, 24 February 2016
  • Security and emergency applications ...to register and present their demo at the conference. Please also provide information in the email message with the submission (not in the extended abstract itse
    6 KB (809 words) - 16:26, 28 September 2011
  • The 2012 International Conference of Information Engineering The 2012 International Conference of Information Security and Internet Engineering
    7 KB (909 words) - 16:30, 10 September 2020
  • |Field=Information and Communication Technology ...ss communication has fundamentally changed our daily communication and how information flows in commercial and private networks. New issues came up with this tren
    5 KB (669 words) - 14:40, 20 December 2011
  • |Title=The 2012 International Conference of Information Engineering |Field=Information Engineering
    8 KB (1,085 words) - 16:28, 6 February 2012
  • |Title=International Conference on Information Society ...d researchers to share existing and generate new knowledge in the field of information society.
    5 KB (595 words) - 05:03, 15 January 2012
  • - Security, Privacy and Trust ...dered for possible publication in the International Journal of Cooperative Information Systems (IJCIS).
    6 KB (745 words) - 15:27, 1 November 2016
  • Chair Professor in Department of Information Engineering and Computer Science, Feng Chia University, Taiwan Associate Professor, Department of Information Systems, Vilnius Gedinimas Technical University, Lithuania
    11 KB (1,490 words) - 11:59, 27 January 2012
  • ...rge. The doctors and nurses of today will access the electronic record for information rather than consult a colleague, go to the web for images rather than to th ...ng together researchers and practitioners interested in the application of information and communication technologies (ICT) to healthcare and Biomedical Engineeri
    9 KB (1,186 words) - 17:44, 24 February 2012
  • ...bringing together researchers and practitioners who are interested in both Information and Communication Technology and the ecological impact of computing on th ...ost scientists would attribute a key role to technology in achieving this. Information technology, in particular, can provide monitoring facilities, control syste
    10 KB (1,297 words) - 17:49, 24 February 2012
  • ...venth International Workshop on Frontiers in Availability, Reliability and Security |Field=Computer security and reliability
    2 KB (221 words) - 16:12, 29 February 2012
  • |Title=The Fourth International Workshop on Organizational Security Aspects |Field=Computer security and reliability
    3 KB (368 words) - 16:16, 29 February 2012
  • ...ore.ieee.org/Xplorehelp/Help_Publishing_and_Indexing_Partners.htm for more information about indexing. - Middleware of SON: self-localization, security, data fusion, etc.
    5 KB (633 words) - 14:08, 2 March 2012
  • ...ore.ieee.org/Xplorehelp/Help_Publishing_and_Indexing_Partners.htm for more information about indexing. ...s, the efficiency denotes the time cost of transmission processes, and the security denotes the protection of the transmitted media content. Recently, various
    5 KB (726 words) - 15:28, 2 March 2012
  • DNS resolvers; Scheduling streamed information; Adaptive streaming; TCP-based streaming; Impatience in cellular networks; ...t; Communications networks security; Information security; IPR and network security;
    13 KB (1,580 words) - 19:35, 18 February 2021
  • |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security
    4 KB (581 words) - 18:48, 24 February 2020
  • |Title=29th ACM International Conference on Information and Knowledge Management |Field=Information and Knowledge Management
    5 KB (653 words) - 13:04, 3 August 2023
  • ...erse fields including (but not limited to) art, anthropology, computer and information sciences, communication, criminology, economics, geography, health sciences ...rity & Trust: Safeguarding and governance of the Web and/or AI; anonymity, security and trust for Web access; false news; data for the public good; and crime o
    6 KB (910 words) - 12:04, 31 January 2020
  • *Information extraction and summarization *Search and information retrieval
    4 KB (535 words) - 21:32, 11 February 2020
  • *Search and information retrieval *Security, privacy, and trust
    4 KB (500 words) - 17:29, 6 January 2021

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)