Search results
Create the page "Security systems" on this wiki! See also the search results found.
Page title matches
- * Privacy concerns in Ubiquitous Computing Systems * Trust concerns in Ubiquitous Computing Systems2 KB (205 words) - 05:10, 23 September 2009
- 26 bytes (2 words) - 11:46, 8 August 2017
- 25 bytes (2 words) - 12:30, 3 September 2017
- 24 bytes (2 words) - 11:59, 3 September 2017
- 25 bytes (2 words) - 10:51, 3 September 2017
- 26 bytes (3 words) - 21:04, 29 October 2020
Page text matches
- Service Oriented Systems were born with the aim of building large adaptive applications as compositi ...ting with classic Web Services. Finally, features like Quality of Service, security and dependability need to be taken seriously into account, and this investi7 KB (957 words) - 15:15, 11 August 2008
- |Title=The 10th International Conference on Mobile Data Mangement (MDM'09): Systems, Services and Middleware scope to cover research issues in mobile systems, services and middleware.13 KB (1,468 words) - 01:23, 22 August 2008
- | Title=The 3rd KES International Symposium on Agents and Multi-agent Systems - Technologies and applications (KES-AMSTA-09) ...fic research in the technologies and applications of agent and multi-agent systems.6 KB (777 words) - 22:54, 14 August 2008
- ====Computer security and reliability==== ==== Information systems (Business informatics) ====6 KB (714 words) - 12:19, 11 December 2020
- *Network Security *Communication Systems and Networks5 KB (571 words) - 09:22, 19 July 2019
- * Mobile/Wireless computing systems and services in pervasive computing * Programming paradigms for pervasive systems12 KB (1,560 words) - 15:03, 27 August 2008
- ...011 International Conference of Computational Intelligence and Intelligent Systems The 2011 International Conference of Information Security and Internet Engineering3 KB (454 words) - 12:34, 8 October 2020
- systems, biomedical informatics, virtual digital libraries, and * Data Streams and Publish-Subscribe Systems9 KB (1,189 words) - 14:53, 28 August 2008
- ...m for the communication of research advances on the principles of database systems. This year, for the first time, ICDT will be held jointly with [[EDBT 2009] ...uctive databases and knowledge bases; Distributed databases; Integrity and security; Logic and databases; Multimedia databases; Query optimization; Query proce5 KB (753 words) - 18:59, 25 June 2012
- system of systems, etc. inter-operability, security, trusted and dependable systems, fault5 KB (715 words) - 17:43, 11 September 2008
- |Title=International Conference on Autonomous Agents and Multi-Agent Systems |Field=Multi-Agent Systems10 KB (1,371 words) - 16:14, 12 November 2020
- Software Systems The Verisoft Approach to Systems Verification5 KB (686 words) - 12:27, 12 September 2008
- ...cial issues of a high quality international journal and also in Journal of Security and Communication Networks published by John Wiley & Sons. * Security in Wireless and Pervasive systems5 KB (645 words) - 18:19, 15 September 2008
- ...d applications, and interactions of these applications with other types of systems. Management aspects related to these applications and challenges on special ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d18 KB (2,408 words) - 02:37, 16 December 2008
- |Title=8th International Conference on Information Systems Technology |Field=Information systems7 KB (763 words) - 12:25, 6 October 2011
- ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...Spatial databases; Time-series databases; RDF stores; Hybrid DB management systems11 KB (1,371 words) - 12:28, 18 May 2020
- ...emedicine, bioinformatics, finance and marketing, geographical positioning systems put pressure on database communities to push the ‘de facto’ methods to ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.)11 KB (1,446 words) - 18:26, 13 October 2008
- |Title=The 5th International Conference on Open Source Systems (F/OSS 2009) ** Testing, assuring and certifying F/OSS quality and security10 KB (1,349 words) - 16:42, 24 September 2008
- Software Security Agent-Based Software Systems2 KB (293 words) - 10:35, 24 June 2011
- ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust34 KB (4,565 words) - 22:20, 10 January 2018
- ...eory,design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust8 KB (1,037 words) - 22:20, 10 January 2018
- ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust9 KB (1,189 words) - 22:20, 10 January 2018
- systems. Aside from the regular presentations, the conference will include * Security, Privacy and Trust26 KB (3,456 words) - 22:20, 10 January 2018
- ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Fault-tolerant Distributed Systems10 KB (1,263 words) - 22:20, 10 January 2018
- ...ory, design and application of computer networks and distributed computing systems. Aside the regular presentation, the AINA meeting will include keynote addr * Fault-tolerant Distributed Systems12 KB (1,537 words) - 22:19, 10 January 2018
- ...design and application of communication networks and distributed computing systems. Aside from the regular presentation, the AINA meeting will include keynote * Security and Privacy8 KB (1,040 words) - 22:20, 10 January 2018
- | Title = Israeli Experimental Systems Conference | Field = Operating systems5 KB (777 words) - 05:50, 14 October 2008
- - Networking services for pervasive systems - Third and fourth generation systems4 KB (495 words) - 09:22, 22 August 2023
- • Cluster Architecture and Hardware Systems ◦ Parallel File Systems and I/O Libraries4 KB (452 words) - 17:47, 7 April 2021
- | Field = Embedded systems The first international conference on Sensor Systems and Software4 KB (519 words) - 16:13, 14 October 2008
- - Bring Safe, Self-x and Organic Computing Systems into Reality - ...omic Computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-he9 KB (1,216 words) - 17:32, 14 October 2008
- ...multimedia databases, digital and video libraries, compression and coding, security over the network. ...sing and environment control, video surveillance and intelligent transport systems, visual inspection and quality control, underwater robots.2 KB (268 words) - 17:47, 14 October 2008
- IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009) IEEE Workshop on Computational Intelligence in Vehicles and Vehicular Systems (CIVVS 2009)3 KB (376 words) - 17:47, 14 October 2008
- ...he way to innovative solutions for next generation wireless communications systems. o Security aspects in cross-layer designs3 KB (424 words) - 17:47, 14 October 2008
- ...e just entering the era of persuasive technology, of interactive computing systems designed to change people's attitudes and behaviors. Persuasive 2009 builds * Security and privacy8 KB (989 words) - 20:13, 22 February 2009
- | Title = The seventh ACS/IEEE International Conference on Computer Systems and Applications The seventh ACS/IEEE International Conference on Computer Systems4 KB (503 words) - 11:36, 18 October 2008
- | Field = Operating systems The WIOSC focuses on new and innovative concepts in the field of operating systems. The workshop welcomes contributions on general approaches and concepts, ne4 KB (508 words) - 21:48, 14 October 2008
- ...chnologies and radically new solutions relevant to development of computer systems and aims to foster communication among scientists and engineers to achieve ...eory, methodologies, technologies, and implementation of advanced computer systems and focusing on computing paradigms, computational models, application para4 KB (591 words) - 17:48, 14 October 2008
- ...of RFID technologies, their supporting large-scale distributed information systems and their applications. ...ed to the theory and practice of RF-based identification and communication systems. All submissions must describe original work not previously published or cu3 KB (431 words) - 17:48, 14 October 2008
- ...and academics interested in the latest development and design of wireless systems and networks. Sponsored by the IEEE Communications Society, IEEE WCNC has a • Machine learning for communication systems6 KB (731 words) - 10:33, 14 August 2023
- | Title = The Sixth IEEE International Symposium on Wireless Communication Systems 2009 ...sixth symposium, intends to bring together various wireless communication systems developers to discuss the current status, technical challenges, standards,3 KB (456 words) - 18:10, 14 October 2008
- ...ence series serves as the premier international forum addressing networks, systems, algorithms, and * Design, implementation, and evaluation of mobile systems and applications7 KB (974 words) - 12:28, 3 August 2023
- * Trust, reputation, security, and privacy in MBC Dickson K.W. Chiu, Dickson Computer Systems, HK, China5 KB (647 words) - 22:05, 14 October 2008
- ...e plays an important role in the scientific study at large and a number of systems have already furnished limited related functionalities, provenance has only ...ware engineering, workflow system, information retrieval, web service, and security research. At the same time, it also requires understanding of problems from3 KB (416 words) - 17:48, 14 October 2008
- * formal models of norms, normative systems, norm-governed societies * Intelligent legal tutoring systems7 KB (998 words) - 17:48, 14 October 2008
- | Title = The 6th IEEE International Conference on Embedded Software and Systems | Field = Embedded systems3 KB (375 words) - 17:48, 14 October 2008
- ...deployment of large-scale and high-performance FPGA-based applications and systems - e.g. DSP, networking or embedded system tools and methodologies. ...mpiled accelerators, reconfigurable computing, adaptive computing devices, systems and software, rapid-prototyping.4 KB (561 words) - 17:48, 14 October 2008
- ...Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability7 KB (960 words) - 17:48, 14 October 2008
- International Conference on Hybrid Systems: ...heory, as well as two additional areas of special emphasis: cyber-physical systems and embedded applications, benchmarks and tools.8 KB (939 words) - 17:48, 14 October 2008
- ...decade has witnessed a proliferation of powerful parallel and distributed systems and an ever increasing demand for practice of high performance computing an * Embedded systems19 KB (2,503 words) - 13:25, 28 October 2020