Search results

Jump to: navigation, search
  • |Title=The IEEE 22nd International Conference on Advanced Information Networking and Applications ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-08) will be held in Ginowan City , Okinaw
    8 KB (1,037 words) - 22:20, 10 January 2018
  • |Title=The IEEE 21st International Conference on Advanced Information Networking and Applications (AINA-07) ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-07) will be held in Niagara Falls, Canada
    9 KB (1,189 words) - 22:20, 10 January 2018
  • |Title=The IEEE 20th International Conference on Advanced Information Networking and Applications on Advanced Information Networking and Applications (AINA2006) will
    26 KB (3,456 words) - 22:20, 10 January 2018
  • |Title=The IEEE 19th International Conference on Advanced Information Networking and Applications ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA 2005) will be held in Tamkang University,
    10 KB (1,263 words) - 22:20, 10 January 2018
  • |Title=The 18th International Conference on Advanced Information Networking and Applications (AINA 2004) The International Conference on Advanced Information Networking and Applications (AINA 2004) will be held in Fukuoka, Kyushu, Ja
    12 KB (1,537 words) - 22:19, 10 January 2018
  • |Title=The International Conference on Advanced Information Networking and Applications The International Conference on Advanced Information Networking and Application will be held in Xi'an, China in March 27-29, 200
    8 KB (1,040 words) - 22:20, 10 January 2018
  • Users will be able to retrieve, publish, and manage information, - Wireless security and dependability
    4 KB (495 words) - 09:22, 22 August 2023
  • ...traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. - Trust-related Security and Privacy: Trust-related secure architecture, framework, policy, intrusio
    9 KB (1,216 words) - 17:32, 14 October 2008
  • * Security assessment and enhancement * Games of imperfect or asymmetric information
    6 KB (722 words) - 17:32, 14 October 2008
  • ...raction and representation, shape and motion primitives, texture and color information, statistical, structural and syntactic pattern recognition, neural networks ...multimedia databases, digital and video libraries, compression and coding, security over the network.
    2 KB (268 words) - 17:47, 14 October 2008
  • Persuasive Technology is all about using Information and Communications Technology to change what we think and do. We are just e * Security and privacy
    8 KB (989 words) - 20:13, 22 February 2009
  • Geographical Information Systems/ Global Navigation Satellite Systems Security and Information Assurance
    4 KB (503 words) - 11:36, 18 October 2008
  • - System management and security; For more information visit the conference web site at http://www.computingfrontiers.org
    4 KB (591 words) - 17:48, 14 October 2008
  • ...n the areas of RFID technologies, their supporting large-scale distributed information systems and their applications. * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques
    3 KB (431 words) - 17:48, 14 October 2008
  • Information-theoretic aspects of wireless communications • Wireless network security and privacy
    6 KB (731 words) - 10:33, 14 August 2023
  • ...ireless communications and networking employed to support the needs of the Information Society. This sixth symposium, intends to bring together various wireless c * Wireless privacy and security
    3 KB (456 words) - 18:10, 14 October 2008
  • session that includes the ACM Student Research Competition. More information on these activities, including submission * Security, privacy, and trustworthiness of mobile and wireless systems
    7 KB (974 words) - 12:28, 3 August 2023
  • ...uming but also error-prone. The systematic and timely capture of the above information may accurately keep track of the various stages that data go through and he ...ware engineering, workflow system, information retrieval, web service, and security research. At the same time, it also requires understanding of problems from
    3 KB (416 words) - 17:48, 14 October 2008
  • Information theory: distributed network coding, Shannon's entropy, Nash equilibrium Internet security enforcement and validation
    11 KB (1,385 words) - 17:48, 14 October 2008
  • * legal and quasi-legal applications of AI and other advanced information technologies * Conceptual or model-based legal information retrieval
    7 KB (998 words) - 17:48, 14 October 2008
  • ...nal Conference on the Theory and Application of Cryptology and Information Security
    556 bytes (69 words) - 15:16, 10 March 2020
  • ...ternational Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability
    7 KB (960 words) - 17:48, 14 October 2008
  • The 8th ACM/IEEE Conference on Information Processing in ...cations o real-time resource management and scheduling o embedded system security o programming languages and software engineering for real-time or
    8 KB (939 words) - 17:48, 14 October 2008
  • * Trust, security and privacy Trust, security and privacy
    19 KB (2,503 words) - 13:25, 28 October 2020
  • Ubiquitous sensors, devices, networks and information are paving the way * Security, Privacy, Safety and Legal Issues
    7 KB (942 words) - 20:05, 14 October 2008
  • | Title = The 3rd International Symposium on Security and Multimodality in Pervasive Environments ...er hand, while enlarging and easing the ways to access to the environment, security threads arise and the environment must be properly equipped in order to pro
    3 KB (393 words) - 21:18, 14 October 2008
  • | Field = Computer security and reliability ...the “tour guide” and save you time by collecting and summarizing this information to bring you up to date in a particular area as efficiently as possible.
    3 KB (467 words) - 21:39, 16 October 2008
  • - Information dissemination and publish/subscribe functionality in SPSs - Information integration and data source wrapping in SPSs
    3 KB (490 words) - 20:05, 14 October 2008
  • |Title=First IEEE Workshop on Information and Software as Services First IEEE Workshop on Information & Software as Services (WISS'09)
    7 KB (907 words) - 21:51, 14 October 2008
  • # Semantic Information Retrieval # Semantic Web Trust, Privacy, Security and Intellectual Property Rights
    4 KB (450 words) - 20:05, 14 October 2008
  • | Title = International Conference on Wireless Information Networks and System WINSYS is organized by INSTICC – Institute for Systems and Technologies of Information, Control and Communication
    9 KB (1,219 words) - 20:05, 14 October 2008
  • [For more information, please visit URL: http://www.sis.uncc.edu/~mshehab/trustcol08/ ] ...enerate added momentum towards research in finding viable solutions to the security and privacy challenges faced by the current and future collaborative system
    4 KB (520 words) - 20:05, 14 October 2008
  • * Cryptography and Security * Information Retrieval
    2 KB (216 words) - 20:05, 14 October 2008
  • • Ethical, Social, Privacy, Security and moral Issues in an e-societ • Information Society
    5 KB (530 words) - 10:27, 24 June 2011
  • Information Systems Computer and Network Security
    3 KB (332 words) - 20:06, 14 October 2008
  • |Field=Computer security and reliability ...ctions), or refinery& chemical systems rely on networked communication and information systems. Moreover, there are other dedicated systems for data mining, recom
    15 KB (2,175 words) - 21:03, 19 March 2013
  • Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability AUTOMOTIVE ENTERTAINMENT and INFORMATION
    3 KB (354 words) - 20:06, 14 October 2008
  • ...in eESociety, eGovernment /eGovernance, eHealth, Information Systems, and Information Management. These broad areas are divided into more detailed areas (see bel * Topics related to the Information Society are of interest. These include, but are not limited to the followin
    6 KB (780 words) - 20:06, 14 October 2008
  • | Title = Fourth International Conference on Intelligent Computing and Information Systems ...vances of artificial and computational intelligence as well as intelligent information systems.
    2 KB (193 words) - 20:06, 14 October 2008
  • Information and Knowledge Engineering Intelligent Information Processing Systems
    3 KB (359 words) - 20:06, 14 October 2008
  • o Security and Privacy For further information, please contact the program chair, Professor Xiaodong Zhang at zhang@cse.oh
    2 KB (303 words) - 20:06, 14 October 2008
  • ...cess management and modelling, Grid computing, Web services notifications, information dissemination, event stream processing, and message-oriented middleware. Th * Security issues
    6 KB (829 words) - 15:30, 29 January 2021
  • ...ssist in the development of best practice and relevant standards. For more information, please visit: http://www.ieee-cqr.org/ . * Security and Reliability Issues
    4 KB (505 words) - 22:15, 14 October 2008
  • Enterprise Information Systems Homeland Security
    6 KB (708 words) - 22:49, 14 October 2008
  • ...ologies in complex and demanding settings, like manufacturing, healthcare, security, control systems, etc. ...echnologies with other technologies used to support organisations, such as information systems, production systems, decision support systems, knowledge management
    2 KB (261 words) - 22:45, 14 October 2008
  • * Security and privacy in pervasive healthcare * Using mobile devices for healthcare information storage, update, and transmission
    6 KB (732 words) - 22:45, 14 October 2008
  • * Data management and middleware support for collaborative information systems * Security and trust management in collaborative networks, systems, and applications
    6 KB (674 words) - 22:45, 14 October 2008
  • ...d task identification, personalized access to information and personalized information management, to name but a few. The advantages of such data are numerous, st ...biquitous computing, activity-driven computing, context-driven computing, information retrieval, database systems, digital libraries, metadata, data mining, user
    6 KB (890 words) - 22:53, 14 October 2008
  • ...e are promoting society integration and disseminating the digital culture. Information and Communication Technologies (ICT) are intensely used by Brazilian popula ...diversity of interactive systems usage, like in entertainment, security in information exchange and broadcast, participation in social and democratic processes as
    3 KB (502 words) - 22:53, 14 October 2008
  • - Databases: query processing; information integration; - Security and Privacy: cryptography; access control; security in
    9 KB (1,193 words) - 22:53, 14 October 2008

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)