Search results

Jump to: navigation, search
  • 9) Memory management, smart caches and compiler controlled memories efforts to conceal their identity. Submissions not adhering to these
    11 KB (1,352 words) - 00:33, 15 October 2008
  • * Tools and Methodologies for Large Scale Semantic Web Data - Management * Semantic Web-based Knowledge Management
    4 KB (573 words) - 23:31, 14 October 2008
  • * Memory management ...please provide that information to the PC chair separately. Note that the identity of the authors will be revealed to the reviewers once the review is submitt
    5 KB (678 words) - 20:58, 26 November 2016
  • ...l or distributed simulation, including synchronization, scheduling, memory management, and load balancing. ...submissions will be reviewed using a double-blind review process,i.e., the identity of authors, and referees will not be revealed to each other. To ensure blin
    3 KB (372 words) - 23:32, 14 October 2008
  • Service marketing and customer relationship management Knowledge modeling, management, and application
    8 KB (1,075 words) - 23:52, 14 October 2008
  • | Field = Management ...expanding field by focusing on issues relevant to electronic business and management. Academics and practitioners are invited to submit conceptually and empiric
    3 KB (391 words) - 23:36, 14 October 2008
  • risk management, collaborative filtering, social/business networking * Trust management, reputation management and identity management
    4 KB (499 words) - 23:42, 14 October 2008
  • * SECMAN: Security management ...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance
    13 KB (1,617 words) - 19:03, 24 November 2008
  • * Distributed Access Control and Trust Management * Identity Management and Authentication
    12 KB (1,669 words) - 12:58, 18 January 2009
  • - Organisational Design and Management - Identity
    6 KB (860 words) - 13:00, 18 January 2009
  • * Mashups and federated identity * Mashups for corporate knowledge management
    6 KB (684 words) - 13:00, 18 January 2009
  • management of customers? data in Web stores can help building trust by - Trust management frameworks for secure collaborations
    5 KB (602 words) - 13:44, 23 January 2009
  • * Authentication and identity management in UE * Risk assessment, and management in UE
    6 KB (793 words) - 15:12, 1 October 2020
  • - Identity management - Key management and authentication
    6 KB (852 words) - 13:02, 18 January 2009
  • - Digital Rights Management - Identity and Trust Management
    8 KB (967 words) - 17:07, 27 February 2009
  • | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business 2009 World Congress on Privacy, Security, Trust and the Management of e-Business
    12 KB (1,690 words) - 17:08, 27 February 2009
  • ...current network architectures and the Internet, autonomous and spontaneous management will be a key feature of future networks and information systems. In this c * Identity management
    3 KB (480 words) - 17:08, 27 February 2009
  • - digital right management - transaction management
    6 KB (828 words) - 17:08, 27 February 2009
  • - QoS management in WMS - Authentication, identity management in WMS
    3 KB (477 words) - 16:54, 8 August 2009
  • ...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance ...e protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillance; Database security
    6 KB (746 words) - 11:35, 2 August 2009
  • ...erification; Performance on firewall protected real-time systems; Security management in real-time systems; Metrics and techniques for security risk assessment; ...methodologies and ID Cards; Security on hardware and smart cards; Identity management; Automated security analysis; Electronic Privacy; Anonymity and pseudo-anon
    14 KB (1,651 words) - 15:56, 15 February 2017
  • Identity Management, Security and Trust Management in P2P and Grid applications,
    3 KB (352 words) - 12:39, 11 August 2009
  • -Implementation, deployment and management of network security policies ...ection: protocols, implementations, metering, watermarking, digital rights management
    6 KB (766 words) - 10:54, 26 April 2010
  • * Digital Rights Management * Identity and Trust management
    4 KB (484 words) - 14:20, 14 December 2009
  • - Enterprise management and consumer protection - Identity and Trust Management
    7 KB (982 words) - 19:13, 3 January 2010
  • - QoS management in WMS - Authentication, identity management in WMS
    3 KB (497 words) - 03:43, 28 February 2010
  • * Formal relations: parthood, identity, connection, dependence, constitution, subsumption, instantiation * Identity and change
    4 KB (551 words) - 14:54, 27 December 2015
  • * › Knowledge Management * › e-Procurement and Web-based Supply Chain Management
    19 KB (2,462 words) - 19:10, 26 August 2010
  • - identity management, anonymity
    5 KB (701 words) - 05:52, 14 April 2011
  • Identity Management Security and Trust Management in P2P and Grid applications
    5 KB (597 words) - 10:45, 21 August 2020
  • |Title=International Workshop on Visualization and Information Security Management |Field=Security Management
    3 KB (468 words) - 00:17, 2 March 2011
  • Identity Management Information Security Management
    3 KB (368 words) - 16:16, 29 February 2012
  • ...Management of non-unique physical cell identities, IP address and VLAN ID management. ...ation; Node load balancing, Tracking area optimization, Quality of Service Management, Transport Path Optimization, Green approaches and energy efficiency mechan
    5 KB (633 words) - 14:08, 2 March 2012
  • ...Web-based communication services; Node localizations; Indoor positioning; Management plane; Community structure detection; Preventing DDoS attacks; Multifactor ...n of network functions; Software defined networking (SDN) and 5G; Mobility management, energy efficiency, power cost reduction in 5G networks; Network function v
    13 KB (1,580 words) - 19:35, 18 February 2021
  • ...manifold, including an unprecedented flexibility for network operation and management, and a favorable environment for delivering innovative network applications ...us security aspects of next-generation networking technologies and service management frameworks.
    4 KB (581 words) - 18:48, 24 February 2020
  • ...as include conceptual modeling, database design, knowledge engineering and management, software engineering, organizational modeling, artificial intelligence, ro * Formal relations: parthood, identity, connection, dependence, constitution, causality, subsumption, instantiatio
    6 KB (751 words) - 14:08, 22 February 2020
  • *Business Process Management ...tion of the paper and any other reference that may disclose the authors’ identity.
    7 KB (938 words) - 11:06, 6 September 2020
  • |Field=Research of Data Management Theory ...prestigious forum for the exchange of the latest research results in data management. Held in an attractive European location, the conference provides unique op
    5 KB (580 words) - 13:29, 4 February 2019
  • ...al issues arises out of this. What impact does this have on the self whose identity in the time/space continuum, in the rapidly changing environment, and in th Business and Management Ethics
    4 KB (563 words) - 11:14, 17 September 2020
  • ...ost prominently the Model-Driven Architecture (MDA) fostered by the Object Management Group (OMG). In the scope of MDA, a couple of technologies have been develo Workflow Management Systems
    8 KB (1,165 words) - 17:11, 18 July 2012
  • Special Theme: "Connectedness, Identity and Alienation in the Arts and Humanities" ...suggestion of an optional themes to concentrate the mind; "Connectedness, Identity and Alienation in the Arts and Humanities", and the organizers encourage su
    3 KB (351 words) - 11:10, 17 September 2020
  • Economics and Management Ethnicity, Difference, Identity
    2 KB (291 words) - 19:26, 2 March 2021
  • • Ecological management • Social identity
    6 KB (728 words) - 01:01, 25 August 2012
  • Special Theme: "Connectedness, Identity and Alienation in the Arts and Humanities" The conference theme is "Connectedness, Identity and Alienation in the Arts and Humanities", and the organizers encourage su
    2 KB (289 words) - 09:59, 4 March 2013
  • Economics and Management Ethnicity, Difference, Identity
    3 KB (402 words) - 10:00, 4 March 2013
  • * Enterprise Security Management * Identity Management
    2 KB (264 words) - 15:32, 7 January 2021
  • ...es and affiliations. Furthermore, self-references that reveal the author's identity, e.g., "We previously showed (Smith, 1991) ..." must be avoided. Instead, u Submission is electronic, using the Softconf START conference management system at
    10 KB (1,480 words) - 23:28, 13 December 2017
  • |Field=technology, biometrics, identity management, security
    467 bytes (59 words) - 13:50, 25 September 2016
  • |Title=Detection, Representation and Management of Concept Drift in Linked Open Data Drift-a-LOD2017: Detection, Representation and Management of Concept Drift in Linked Open Data
    4 KB (531 words) - 12:59, 8 July 2017
  • * Data Management and Knowledge Representation ...tion of the paper and any other reference that may disclose the authors’ identity.
    5 KB (615 words) - 10:58, 15 May 2020

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)