Search results

Jump to: navigation, search
  • |Title=The Fourth International Conference on Internet and Web Applications and Services he Fourth International Conference on Internet and Web Applications and Services) continues a series of co-located events
    18 KB (2,408 words) - 02:37, 16 December 2008
  • ...self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-x operations to the maximum extent possible without human in ...that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interact
    9 KB (1,216 words) - 17:32, 14 October 2008
  • Most of critical activities in the areas of communications (telephone, Internet), energy & fluids (electricity, gas, water), transportation (railways, airl ...ing. Considering system and feature dependability becomes crucial for data protection and recoverability when implementing mission critical applications and serv
    15 KB (2,175 words) - 21:03, 19 March 2013
  • ...r, PVR, Interconnects, Game Systems, Interactive and Directed Programming, Internet Integration, Next-Generation DVD, Displays Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability, Application Control, H
    3 KB (354 words) - 20:06, 14 October 2008
  • However, for reasons such as: password protection, FORM based interfaces published as special issue of International Journal on WWW/Internet
    7 KB (875 words) - 23:10, 14 October 2008
  • infrastructure protection and operation, emergency and crisis intervention, healthcare servic Internet to reduce cost of deployment and maintenance and to enhance reachability an
    5 KB (549 words) - 17:15, 5 July 2020
  • SIGNAL-IMAGE TECHNOLOGY & INTERNET- BASED SYSTEMS (SITIS'08) - Digital Rights Management and Intellectual Property Protection
    4 KB (587 words) - 23:30, 14 October 2008
  • ...e physical world in multiple ways, and at multiple scales, from the global Internet scale down to micro- and nano-devices. Many of these devices are highly mob ...e physical world in multiple ways, and at multiple scales, from the global Internet scale down to micro- and nano-devices. Many of these devices are highly mob
    5 KB (694 words) - 23:11, 14 October 2008
  • Internet Security & Applications Virus, worms, Trojon Protection
    5 KB (628 words) - 23:15, 14 October 2008
  • ...entation (rather than theory). A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security tec The proceedings are published by the Internet Society.
    5 KB (673 words) - 23:19, 14 October 2008
  • ...esearch can be used to enable innovation and defeat the "dark side" of the Internet. The theme of PST 2008 is �??PST - Enabling Innovation.�?? Like in the * Critical Infrastructure Protection
    6 KB (736 words) - 23:20, 14 October 2008
  • - Multimedia security and content protection - Multimedia analysis and social media on the Internet
    3 KB (425 words) - 23:20, 14 October 2008
  • Mobile learning became a fact, due to the technical accessibility and Internet communications. Many online classes, learning systems, university curricula ...dditionally, they require new monitoring and management paradigms, as self-protection, self-diagnosing, self-maintenance become core design features.
    6 KB (765 words) - 23:26, 14 October 2008
  • * Critical infrastructure protection. * Internet dependability and quality of service.
    4 KB (528 words) - 23:27, 14 October 2008
  • ...n, process automation, CAD/CAM/CAT/CIM and LANs, industrial application of internet technologies, multimedia, wireless communications, data privacy and securit ...and FACTS, Power market, Power distribution network and automation, Power protection, SCADA, EMS, WAMS and substation automation, Green power.
    4 KB (504 words) - 23:33, 14 October 2008
  • International Conference on Internet and Web Applications and Services, as web personalization and protection of users privacy in service
    8 KB (1,075 words) - 23:52, 14 October 2008
  • ...es and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software d Internet security; Security in wireless; Sensor/cellular network security; Ad hoc ne
    13 KB (1,617 words) - 19:03, 24 November 2008
  • o Internet broadcasting * Optical network protection and restoration (single layer and multilayer)
    14 KB (1,518 words) - 13:01, 18 January 2009
  • * Content protection and DRM for UCS * Journal of Internet Technology, MoE, Taiwan
    6 KB (793 words) - 15:12, 1 October 2020
  • - Denial of Service Protection - Internet and Router Security
    8 KB (967 words) - 17:07, 27 February 2009
  •  Web 2.0 Security, Mobile InternetInternet Security & Applications
    5 KB (578 words) - 10:21, 20 November 2020
  • Internet Security & Applications • Virus, worms, Trojon Protection
    3 KB (339 words) - 11:32, 2 August 2009
  •  Web 2.0 Security, Mobile InternetInternet Security & Applications
    5 KB (599 words) - 10:21, 20 November 2020
  • ...es and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software d Internet security; Security in wireless; Sensor/cellular network security; Ad hoc ne
    6 KB (746 words) - 11:35, 2 August 2009
  • |Title=The Fifth International Conference on Internet Monitoring and Protectio ICIMP 2010: The Fifth International Conference on Internet Monitoring and Protection
    14 KB (1,651 words) - 15:56, 15 February 2017
  • ...ate of available security technology. The proceedings are published by the Internet Society (ISOC). Symposium website: -Intellectual property protection: protocols, implementations, metering, watermarking, digital rights managem
    6 KB (766 words) - 10:54, 26 April 2010
  • - Web 2.0 Security, Mobile Internet - Internet Security & Applications
    5 KB (667 words) - 14:27, 13 September 2009
  • |Title=The 5th International Conference for Internet Technology and Secured Transactions, Technical Co-Sponsored by IEEE UK/RI C The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), Technical Co-Sponsored
    5 KB (607 words) - 18:01, 3 December 2009
  • - Enterprise management and consumer protection - Real-time Internet E-Services
    7 KB (982 words) - 19:13, 3 January 2010
  • ...e systems and services. The ongoing rapid growth of online data due to the Internet and the widespread use of large databases have created an important need fo › Privacy protection and ethics
    3 KB (451 words) - 19:25, 16 February 2010
  • * Software Protection * Internet Security
    2 KB (217 words) - 16:50, 19 November 2020
  • ...n tracks, covering different aspects of Web Information Systems, including Internet Technology, Web Interfaces and Applications, Society, e-Communities, e-Busi 1. INTERNET TECHNOLOGY
    5 KB (627 words) - 12:33, 16 June 2010
  • ...fax services] demonstrate that everyday more and more people are utilizing internet faxing services because the offer very effective, efficiency user friendlin The benefits of [http://www.faxfromcomputer.org/ internet fax] over traditional fax machine is a lot and it provides with flexible us
    4 KB (626 words) - 14:16, 29 July 2010
  • ...he advances of online services effectively [http://www.faxfromcomputer.org internet fax] has also gone wireless so now that it is accessible just about from an ...r cost effectiveness, ease of use and it is even safe for the environment. Internet faxing has in time become the next step in smart business and most of the l
    4 KB (623 words) - 14:06, 1 September 2010
  • ...with good safety, simplicity and reliability. With the changes of wireless internet services effectively electronic fax has also gone wireless making it access ...yday more and more people are switching to [http://www.faxfromcomputer.org internet fax service] because the offer cost effectiveness, ease of use and even eco
    3 KB (600 words) - 10:49, 8 September 2010
  • • Intellectual property protection • Intrusion detection • Network and Internet security • Network forensics
    5 KB (609 words) - 17:01, 5 July 2020
  • * Software Protection * Internet Security
    2 KB (217 words) - 16:57, 27 December 2015
  • - Security and Data Protection - Increasing Affordability and Access to the Internet
    6 KB (784 words) - 03:09, 22 November 2011
  • Computer occupational diseases and INTERNET harmful information filtering Applications in environment protection, healthcare, creature conservation, mobile, avionics, aerospace, control, e
    10 KB (1,297 words) - 17:49, 24 February 2012
  • ...Telecommunications in Smart Cities; IoT virtual networks; Device-to-device Internet; Mobile clouds; Smart and sustainable cities; Public data centers; Traffic ...ion; Signal separation and Interference rejection; Critical infrastructure protection
    13 KB (1,580 words) - 19:35, 18 February 2021
  • ...ssing of personal data in AI, which is increasingly a requirement for data protection regulation. They can be used to assess the value of datasets and the contri ...y being part of the Federated conferences Event "On the Move to Meaningful Internet Systems 2019 (OnTheMove'19)" that co-locates three conferences: ODBASE'19,
    6 KB (872 words) - 23:11, 24 February 2020
  • - Multilingualism and cultural diversity in the digital age: preservation and protection vs assimilation and absorption - Internet regulation
    5 KB (702 words) - 10:02, 5 March 2013
  • * Denial of Service Protection * Insider Threat protection
    2 KB (264 words) - 15:32, 7 January 2021
  • ...ssing of personal data in AI, which is increasingly a requirement for data protection regulation. They can be used to assess the value of datasets and the contri ...y being part of the Federated conferences Event "On the Move to Meaningful Internet Systems 2020 (OnTheMove'20)" that co-locates three conferences: ODBASE'20,
    6 KB (877 words) - 23:06, 24 February 2020
  • - Security and Data Protection - Increasing Affordability and Access to the Internet
    6 KB (790 words) - 13:45, 24 July 2016
  • - Security and Data Protection - Increasing Affordability and Access to the Internet
    6 KB (777 words) - 23:29, 29 July 2016
  • Schneier’s article “The Internet is a surveillance state” summarised the state of Internet privacy as “Welcome to an Internet without privacy,
    7 KB (901 words) - 11:13, 16 July 2017
  • * Multimedia analysis and Internet * Multimedia security and content protection
    3 KB (384 words) - 13:28, 28 July 2017
  • software is being developed for a variety of applications - web, Internet, * Software Security for Web and Internet Applications
    4 KB (562 words) - 12:05, 3 September 2017
  • * Internet Security & Applications * Virus, worms, Trojon Protection
    4 KB (628 words) - 13:34, 28 July 2017

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)