Search results

Jump to: navigation, search

Page title matches

Page text matches

  • Service Oriented Systems were born with the aim of building large adaptive applications as compositi ...ting with classic Web Services. Finally, features like Quality of Service, security and dependability need to be taken seriously into account, and this investi
    7 KB (957 words) - 15:15, 11 August 2008
  • |Title=The 10th International Conference on Mobile Data Mangement (MDM'09): Systems, Services and Middleware scope to cover research issues in mobile systems, services and middleware.
    13 KB (1,468 words) - 01:23, 22 August 2008
  • | Title=The 3rd KES International Symposium on Agents and Multi-agent Systems - Technologies and applications (KES-AMSTA-09) ...fic research in the technologies and applications of agent and multi-agent systems.
    6 KB (777 words) - 22:54, 14 August 2008
  • ====Computer security and reliability==== ==== Information systems (Business informatics) ====
    6 KB (714 words) - 12:19, 11 December 2020
  • *Network Security *Communication Systems and Networks
    5 KB (571 words) - 09:22, 19 July 2019
  • * Mobile/Wireless computing systems and services in pervasive computing * Programming paradigms for pervasive systems
    12 KB (1,560 words) - 15:03, 27 August 2008
  • ...011 International Conference of Computational Intelligence and Intelligent Systems The 2011 International Conference of Information Security and Internet Engineering
    3 KB (454 words) - 12:34, 8 October 2020
  • systems, biomedical informatics, virtual digital libraries, and * Data Streams and Publish-Subscribe Systems
    9 KB (1,189 words) - 14:53, 28 August 2008
  • ...m for the communication of research advances on the principles of database systems. This year, for the first time, ICDT will be held jointly with [[EDBT 2009] ...uctive databases and knowledge bases; Distributed databases; Integrity and security; Logic and databases; Multimedia databases; Query optimization; Query proce
    5 KB (753 words) - 18:59, 25 June 2012
  • system of systems, etc. inter-operability, security, trusted and dependable systems, fault
    5 KB (715 words) - 17:43, 11 September 2008
  • |Title=International Conference on Autonomous Agents and Multi-Agent Systems |Field=Multi-Agent Systems
    10 KB (1,371 words) - 16:14, 12 November 2020
  • Software Systems The Verisoft Approach to Systems Verification
    5 KB (686 words) - 12:27, 12 September 2008
  • ...cial issues of a high quality international journal and also in Journal of Security and Communication Networks published by John Wiley & Sons. * Security in Wireless and Pervasive systems
    5 KB (645 words) - 18:19, 15 September 2008
  • ...d applications, and interactions of these applications with other types of systems. Management aspects related to these applications and challenges on special ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d
    18 KB (2,408 words) - 02:37, 16 December 2008
  • |Title=8th International Conference on Information Systems Technology |Field=Information systems
    7 KB (763 words) - 12:25, 6 October 2011
  • ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...Spatial databases; Time-series databases; RDF stores; Hybrid DB management systems
    11 KB (1,371 words) - 12:28, 18 May 2020
  • ...emedicine, bioinformatics, finance and marketing, geographical positioning systems put pressure on database communities to push the ‘de facto’ methods to ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.)
    11 KB (1,446 words) - 18:26, 13 October 2008
  • |Title=The 5th International Conference on Open Source Systems (F/OSS 2009) ** Testing, assuring and certifying F/OSS quality and security
    10 KB (1,349 words) - 16:42, 24 September 2008
  • Software Security Agent-Based Software Systems
    2 KB (293 words) - 10:35, 24 June 2011
  • ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust
    34 KB (4,565 words) - 22:20, 10 January 2018
  • ...eory,design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust
    8 KB (1,037 words) - 22:20, 10 January 2018
  • ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust
    9 KB (1,189 words) - 22:20, 10 January 2018
  • systems. Aside from the regular presentations, the conference will include * Security, Privacy and Trust
    26 KB (3,456 words) - 22:20, 10 January 2018
  • ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Fault-tolerant Distributed Systems
    10 KB (1,263 words) - 22:20, 10 January 2018
  • ...ory, design and application of computer networks and distributed computing systems. Aside the regular presentation, the AINA meeting will include keynote addr * Fault-tolerant Distributed Systems
    12 KB (1,537 words) - 22:19, 10 January 2018
  • ...design and application of communication networks and distributed computing systems. Aside from the regular presentation, the AINA meeting will include keynote * Security and Privacy
    8 KB (1,040 words) - 22:20, 10 January 2018
  • | Title = Israeli Experimental Systems Conference | Field = Operating systems
    5 KB (777 words) - 05:50, 14 October 2008
  • - Networking services for pervasive systems - Third and fourth generation systems
    4 KB (495 words) - 09:22, 22 August 2023
  • • Cluster Architecture and Hardware Systems ◦ Parallel File Systems and I/O Libraries
    4 KB (452 words) - 17:47, 7 April 2021
  • | Field = Embedded systems The first international conference on Sensor Systems and Software
    4 KB (519 words) - 16:13, 14 October 2008
  • - Bring Safe, Self-x and Organic Computing Systems into Reality - ...omic Computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-he
    9 KB (1,216 words) - 17:32, 14 October 2008
  • ...multimedia databases, digital and video libraries, compression and coding, security over the network. ...sing and environment control, video surveillance and intelligent transport systems, visual inspection and quality control, underwater robots.
    2 KB (268 words) - 17:47, 14 October 2008
  • IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009) IEEE Workshop on Computational Intelligence in Vehicles and Vehicular Systems (CIVVS 2009)
    3 KB (376 words) - 17:47, 14 October 2008
  • ...he way to innovative solutions for next generation wireless communications systems. o Security aspects in cross-layer designs
    3 KB (424 words) - 17:47, 14 October 2008
  • ...e just entering the era of persuasive technology, of interactive computing systems designed to change people's attitudes and behaviors. Persuasive 2009 builds * Security and privacy
    8 KB (989 words) - 20:13, 22 February 2009
  • | Title = The seventh ACS/IEEE International Conference on Computer Systems and Applications The seventh ACS/IEEE International Conference on Computer Systems
    4 KB (503 words) - 11:36, 18 October 2008
  • | Field = Operating systems The WIOSC focuses on new and innovative concepts in the field of operating systems. The workshop welcomes contributions on general approaches and concepts, ne
    4 KB (508 words) - 21:48, 14 October 2008
  • ...chnologies and radically new solutions relevant to development of computer systems and aims to foster communication among scientists and engineers to achieve ...eory, methodologies, technologies, and implementation of advanced computer systems and focusing on computing paradigms, computational models, application para
    4 KB (591 words) - 17:48, 14 October 2008
  • ...of RFID technologies, their supporting large-scale distributed information systems and their applications. ...ed to the theory and practice of RF-based identification and communication systems. All submissions must describe original work not previously published or cu
    3 KB (431 words) - 17:48, 14 October 2008
  • ...and academics interested in the latest development and design of wireless systems and networks. Sponsored by the IEEE Communications Society, IEEE WCNC has a • Machine learning for communication systems
    6 KB (731 words) - 10:33, 14 August 2023
  • | Title = The Sixth IEEE International Symposium on Wireless Communication Systems 2009 ...sixth symposium, intends to bring together various wireless communication systems developers to discuss the current status, technical challenges, standards,
    3 KB (456 words) - 18:10, 14 October 2008
  • ...ence series serves as the premier international forum addressing networks, systems, algorithms, and * Design, implementation, and evaluation of mobile systems and applications
    7 KB (974 words) - 12:28, 3 August 2023
  • * Trust, reputation, security, and privacy in MBC Dickson K.W. Chiu, Dickson Computer Systems, HK, China
    5 KB (647 words) - 22:05, 14 October 2008
  • ...e plays an important role in the scientific study at large and a number of systems have already furnished limited related functionalities, provenance has only ...ware engineering, workflow system, information retrieval, web service, and security research. At the same time, it also requires understanding of problems from
    3 KB (416 words) - 17:48, 14 October 2008
  • * formal models of norms, normative systems, norm-governed societies * Intelligent legal tutoring systems
    7 KB (998 words) - 17:48, 14 October 2008
  • | Title = The 6th IEEE International Conference on Embedded Software and Systems | Field = Embedded systems
    3 KB (375 words) - 17:48, 14 October 2008
  • ...deployment of large-scale and high-performance FPGA-based applications and systems - e.g. DSP, networking or embedded system tools and methodologies. ...mpiled accelerators, reconfigurable computing, adaptive computing devices, systems and software, rapid-prototyping.
    4 KB (561 words) - 17:48, 14 October 2008
  • ...Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability
    7 KB (960 words) - 17:48, 14 October 2008
  • International Conference on Hybrid Systems: ...heory, as well as two additional areas of special emphasis: cyber-physical systems and embedded applications, benchmarks and tools.
    8 KB (939 words) - 17:48, 14 October 2008
  • ...decade has witnessed a proliferation of powerful parallel and distributed systems and an ever increasing demand for practice of high performance computing an * Embedded systems
    19 KB (2,503 words) - 13:25, 28 October 2020

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)