Search results

Jump to: navigation, search

Page title matches

Page text matches

  • ...mation of the various fields of science available {{SITENAME}} relies on a network of volunteer editors and associate editors. The tasks of an editor are to m ====Computer security and reliability====
    6 KB (714 words) - 12:19, 11 December 2020
  • |Title=7th International Conference on Network and Computing Technologies 7th International Conference on Network and Computing Technologies (ICNCT 2019), will be held in Nagoya Institute
    5 KB (571 words) - 09:22, 19 July 2019
  • |Title=1st International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    522 bytes (65 words) - 13:51, 6 November 2020
  • |Title=2nd International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    535 bytes (66 words) - 14:23, 6 November 2020
  • |Title=3rd International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    482 bytes (60 words) - 13:55, 6 November 2020
  • |Title=4th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    470 bytes (56 words) - 13:57, 6 November 2020
  • |Title=5th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    474 bytes (60 words) - 13:58, 6 November 2020
  • |Title=International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    322 bytes (46 words) - 08:58, 13 February 2021
  • ...cial issues of a high quality international journal and also in Journal of Security and Communication Networks published by John Wiley & Sons. * Security in Wireless and Pervasive systems
    5 KB (645 words) - 18:19, 15 September 2008
  • * Operating system and network support for mobile devices * Security issues of data management in wireless networks
    5 KB (611 words) - 15:43, 16 September 2008
  • ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d ...cations for a unique user or multiple users requires special platforms and network capabilities.
    18 KB (2,408 words) - 02:37, 16 December 2008
  • * High-speed Communication and Network * Wireless Communication and Network
    34 KB (4,565 words) - 22:20, 10 January 2018
  • * High-speed Communication and Network * Wireless Communication and Network
    8 KB (1,037 words) - 22:20, 10 January 2018
  • * High-speed Communication and Network * Wireless Communication and Network
    9 KB (1,189 words) - 22:20, 10 January 2018
  • * High-speed Communication and Network * Wireless Communication and Network
    26 KB (3,456 words) - 22:20, 10 January 2018
  • * Security and Privacy * Network-based Computing Systems
    10 KB (1,263 words) - 22:20, 10 January 2018
  • * Security and Privacy * Network-based Computing Systems
    12 KB (1,537 words) - 22:19, 10 January 2018
  • * Security and Privacy * Network-based Computer Graphics System
    8 KB (1,040 words) - 22:20, 10 January 2018
  • - Network management and troubleshooting - Wireless security and dependability
    4 KB (495 words) - 09:22, 22 August 2023
  • S-CUBE - the First Conference on wireless Sensor network (WSN) Systems and Software - provides an ideal venue to address the researc ...lds such as embedded systems, distributed systems, data management, system security and applications. The conference places emphasis on layers well above the t
    4 KB (519 words) - 16:13, 14 October 2008
  • understanding of complex network dynamics and leads to better design of * Distributed network resource allocation
    6 KB (722 words) - 17:32, 14 October 2008
  • ...es, digital and video libraries, compression and coding, security over the network. ...e, OCR and document analysis, mobile robots and visual navigation, network security, remote sensing and environment control, video surveillance and intelligent
    2 KB (268 words) - 17:47, 14 October 2008
  • o Applications of network coding in cross-layer design o Security aspects in cross-layer designs
    3 KB (424 words) - 17:47, 14 October 2008
  • Network estimation and processing techniques • Wireless network security and privacy
    6 KB (731 words) - 10:33, 14 August 2023
  • * Wireless privacy and security * Wireless network architecture and technologies systems
    3 KB (456 words) - 18:10, 14 October 2008
  • ...ity, the current series of events starting with INTERNET 2009 is targeting network calculi and supporting mechanisms for these challenging issues. ...ents using microeconomics, topological routing vs. table-based routing vs. network coding, power-efficient routing
    11 KB (1,385 words) - 17:48, 14 October 2008
  • .Network Protocol and Security
    3 KB (375 words) - 17:48, 14 October 2008
  • * Trust, security and privacy Network protocols, routing, algorithms
    19 KB (2,503 words) - 13:25, 28 October 2020
  • * Security and privacy in vehicular networks * In-network processing and aggregation
    3 KB (378 words) - 14:22, 24 August 2016
  • - Peer-to-Peer and overlay network support in SPSs - Security and privacy in SPSs
    3 KB (490 words) - 20:05, 14 October 2008
  • rent out network presence, computation power, and data storage space + Security and information assurance
    7 KB (907 words) - 21:51, 14 October 2008
  • • MAC, Network, Transport, Application Protocols and Cross-Layer Design • Network Coding, MIMO, Cooperative Communications and Other Novel Techniques
    2 KB (244 words) - 20:05, 14 October 2008
  • * Analysis and design of network architectures and algorithms * Experimental results from operational networks or network applications
    3 KB (353 words) - 20:31, 14 October 2008
  • * › Mobile Network Protocols and Packet Services * › Adaptive Wireless Network Protocols
    9 KB (1,219 words) - 20:05, 14 October 2008
  • * Cryptography and Security * Network Analysis
    2 KB (216 words) - 20:05, 14 October 2008
  • • Ethical, Social, Privacy, Security and moral Issues in an e-societ • Mobile Network Architecture
    5 KB (530 words) - 10:27, 24 June 2011
  • Computer and Network Security
    3 KB (332 words) - 20:06, 14 October 2008
  • o Security and Privacy o Network and Internet Support for Distributed Applications
    2 KB (303 words) - 20:06, 14 October 2008
  • ...mic experts to present and discuss communications quality, reliability and security issues as they relate to real world issues. The output from the workshops a * Network Architecture and Design
    4 KB (505 words) - 22:15, 14 October 2008
  • | Title = Sixth International Conference on Wireless On-demand Network Systems and Services On-demand Network Systems and Services
    6 KB (686 words) - 20:06, 14 October 2008
  • * Security and trust management in collaborative networks, systems, and applications * Workflow technology and workflow management for collaborative network management
    6 KB (674 words) - 22:45, 14 October 2008
  • Database Security and Transaction Support Advanced Applications of Neural Network
    9 KB (1,240 words) - 22:56, 14 October 2008
  • ...ame studies/game design, e) graphics and interfaces and f ) networking and security. Papers that fall outside these topic areas are strongly encouraged and sho Networks and Security
    9 KB (1,275 words) - 14:46, 27 December 2015
  • - Social network analysis - Trust, privacy, and security on the semantic web
    6 KB (827 words) - 23:04, 14 October 2008
  • * Error tolerance, security and robustness * Network protocols and middleware for embedded systems
    2 KB (316 words) - 23:05, 14 October 2008
  • * Cryptography and Network Security * Voice-over-IP and Security
    2 KB (167 words) - 23:05, 14 October 2008
  • bioinformatics; Network computing; Neural computing; programs; foundations of security; term rewriting;
    5 KB (698 words) - 23:08, 14 October 2008
  • This track is dedicated to communication and network technologies that are of specific relevance to developing countries. The tr * Innovations in femtocells, picocells and relay network technologies
    9 KB (1,127 words) - 17:19, 26 April 2011
  • * Data Portability and Social Network Portability * Policies, authentication, security, and trust within
    5 KB (709 words) - 23:08, 14 October 2008
  • * Security and data integrity * Telecommunications, network and systems management
    5 KB (634 words) - 15:36, 14 December 2008

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)