Search results

Jump to: navigation, search
  • technologies; implementations that must be carefully tuned for Methods and Algorithms:
    4 KB (520 words) - 20:02, 26 February 2020
  • .... In addition, significant progress in ground, air- and space-borne sensor technologies has led to an unprecedented access to earth science data for scientists fro Spatial classification: methods that explicitly model spatial context
    7 KB (888 words) - 23:19, 14 October 2008
  • -Privacy-Enhancing Technologies -Process based Security Models and Methods
    4 KB (487 words) - 10:42, 21 August 2020
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural Ad Hoc networking, Sensor networks, Self-organizing mesh networks and autonomic systems ⿢ Wireless
    4 KB (502 words) - 23:20, 14 October 2008
  • Specialized systems [sensor-based, mobile, multimedia, biometrics, etc.] Formal methods to specify systems' behavior
    11 KB (1,492 words) - 23:26, 14 October 2008
  • hotbed of innovation - where state-of-the-art technologies and applications in the Virtual + Multi-resolution and Multi-scale Methods, Level of Detail, Model Compression and Simplification
    4 KB (552 words) - 23:27, 14 October 2008
  • Heuristic searching methods Learning and adaptive sensor fusion
    3 KB (397 words) - 10:23, 24 June 2011
  • ...latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies. ...ochastic systems; ?Distributed control systems; Networked control systems; Sensor network systems; Fault diagnosis and fault-tolerant control; Delay systems;
    6 KB (814 words) - 23:28, 14 October 2008
  • platforms supported by innovative technologies, methodologies and networked embedded systems technology; wireless sensor networks;
    3 KB (342 words) - 23:29, 14 October 2008
  • technologies that allows for the decomposition of a complex system - COMPOSITIONAL FORMAL METHODS: compositional techniques for
    6 KB (707 words) - 23:29, 14 October 2008
  • time synchronization; wireless sensor networks. SOFTWARE TECHNOLOGIES: compiler support; component-based approaches;
    7 KB (870 words) - 23:30, 14 October 2008
  • ...obots; aerial vehicles; grippers; Intelligent sensors and actuators, multi-sensor fusion, microsensors and microactuators, instrumentation electronics, indus ...s automation, CAD/CAM/CAT/CIM and LANs, industrial application of internet technologies, multimedia, wireless communications, data privacy and security, authentifi
    4 KB (504 words) - 23:33, 14 October 2008
  • | Title = IASTED International Conference on Sensor Networks | Field = Sensor networks
    11 KB (1,533 words) - 23:38, 14 October 2008
  • Analytical Methods D2. Differential Equation Methods
    4 KB (564 words) - 23:41, 14 October 2008
  • ...ird International Conference on Emerging Security Information, Systems and Technologies * SECTECH: Security technologies
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...chniques; systems on chip; time engines and time synchronization; wireless sensor networks. ...compiler support; component-based approaches; middleware and distribution technologies; programming languages and operating systems.
    5 KB (720 words) - 14:46, 17 January 2009
  • commercial activities and plays a unique role in exploiting ICT innovative technologies. 1. Computational Methods, Algorithms and Scientific Applications
    10 KB (1,321 words) - 13:01, 18 January 2009
  • ...ving. Typically, in such networks, the interaction of different layers and technologies creates many situations that cannot be foreseen during the design and testi ...nts in different network environments (wireless and wired infrastructures, sensor, social networks)
    5 KB (431 words) - 13:03, 18 January 2009
  • ...y of modern applications, such as network monitoring, traffic engineering, sensor networks, RFID tags applications, telecom call records, financial applicati ...ti-disciplinary approach which will provide the abstractions, foundations, methods, and tools required to give answer to questions concerning reasoning over s
    5 KB (644 words) - 22:00, 27 February 2009
  • ...oad, for discussing problems related to the main topics in modern database technologies. Traditionally, SBBD has gathered nearly 500 attendees. In past editions, S The Research Track covers all the aspects related to the development of new technologies for solving problems inherent to the database field. The topics of interest
    9 KB (1,249 words) - 08:42, 7 October 2011
  • ...ibilities for research of novel communication protocols, architectures and methods towards Future Multimedia Networking Syste! • Multimedia in personal, sensor and ad-hoc networks
    11 KB (1,463 words) - 17:07, 27 February 2009
  • • Intelligent transportation technologies • Formal Methods, Verification
    3 KB (319 words) - 17:07, 27 February 2009
  • ...n and Response Surfaces, Parallel and Distributed Systems, Virtual Worlds, Methods for Special Applications, Practice, Extensions, XML, Open Source, Model Dev ...n and Design, Manufacturing Modeling Architectures, Manufacturing Modeling Methods, Simulation of Manufacturing Operations, Optical Engineering and Thermoflui
    38 KB (4,832 words) - 17:07, 27 February 2009
  •  Security and Privacy in Wired, Wireless, Mobile, Sensor Ad Hoc Networks  Wireless Network Architecture and Technologies Systems
    5 KB (578 words) - 10:21, 20 November 2020
  • ...nd industry in the world - a hotbed of innovation - where state-of-the-art technologies and applications in the Virtual Reality Continuum (VRC) will be explored an + Multi-resolution and Multi-scale Methods, Level of Detail, Model Compression and Simplification
    4 KB (536 words) - 11:34, 2 August 2009
  •  Security and Privacy in Wired, Wireless, Mobile, Sensor Ad Hoc Networks  Wireless Network Architecture and Technologies Systems
    5 KB (599 words) - 10:21, 20 November 2020
  • ...al of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2) ...al of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)
    6 KB (746 words) - 11:35, 2 August 2009
  • • System Design Methods, Algorithm and Tools • Formal Methods and Formal Verification
    5 KB (605 words) - 15:11, 27 December 2015
  • Privacy-Enhancing Technologies, Process based Security Models and Methods,
    3 KB (352 words) - 12:39, 11 August 2009
  • - Security and Privacy in Wired, Wireless, Mobile, Sensor Ad Hoc Networks - Wireless Network Architecture and Technologies Systems
    5 KB (667 words) - 14:27, 13 September 2009
  • ...uting systems in an intelligent way using the state-of-the-art methods and technologies. ...as e-Science, e-Business, e-Learning, e-Finance, e-Government and related technologies
    3 KB (421 words) - 16:11, 10 November 2009
  • * Blended Internet security methods * Broadband access technologies
    5 KB (607 words) - 18:01, 3 December 2009
  • ...on systems and applications in the context of wireless networks and mobile technologies. * › Sensor and Mobile Ad Hoc Network Security
    4 KB (409 words) - 15:40, 5 February 2010
  • ...ded, wearable and/or mobile technologies. Intelligent software systems and technologies involving some sort of digital signal processing are present in many applic * Sensors and Sensor Networks
    8 KB (1,066 words) - 19:39, 8 July 2010
  • optimal balance between the basic mechanical structure, sensor and * Sensor Networks & Networked Embedded Systems
    12 KB (1,378 words) - 21:13, 28 November 2010
  • ...We encourage authors to submit papers describing original work, including methods, techniques, recent advances, applications and tools.
    3 KB (397 words) - 18:52, 23 December 2010
  • The increasing adoption of methods from computational intelligence, biologically inspired computing, and optim ------------------------------Algorihtms and Methods for Self-X and Autonomous Control------------------------------------------
    8 KB (678 words) - 09:03, 2 January 2011
  • ...cate network devices and exchange data between them. The appearance of new technologies usually comes with a protocol procedure and communication rules that allows Smart communication protocols and algorithms make use of several methods and techniques (such as machine learning techniques, decision making techni
    6 KB (833 words) - 15:16, 24 September 2020
  • Privacy-Enhancing Technologies Process based Security Models and Methods
    5 KB (597 words) - 10:45, 21 August 2020
  • ...cademia and industry, and practitioners who develop and who use simulation technologies in a variety of areas. Simulation methods: discrete event, parallel and distributed, hybrid, load balancing, partitio
    6 KB (809 words) - 16:26, 28 September 2011
  • Methods for physical analysis and measurement Sensor materials and devices
    7 KB (1,002 words) - 17:21, 30 December 2011
  • ...formatics. Mobility and ubiquity in healthcare systems, standardization of technologies and procedures, certification, privacy are some of the issues that medical ...actitioners interested in the application of information and communication technologies (ICT) to healthcare and Biomedical Engineering.
    9 KB (1,186 words) - 17:44, 24 February 2012
  • New telecommunications technologies Architectures and communication technologies for 4G and 5G wireless networks
    13 KB (1,580 words) - 19:35, 18 February 2021
  • |Title=24th IEEE Conference on Emerging Technologies and Factory Automation ...The ultimate goal is fostering the development and adoption of scientific methods, models, and tools for the efficient design and operation of industrial and
    3 KB (329 words) - 11:51, 5 September 2019
  • |Field=sensors, sensor technologies/methods, sensor standards, IOT
    407 bytes (50 words) - 11:16, 5 September 2016
  • ...ormation systems, based on innovative ideas and computational intelligence methods. The conference addresses a wide scientific community and experts involved *digital curation technologies
    10 KB (1,309 words) - 10:29, 5 June 2019
  • ...sh, document and link their data and metadata, and also on how statistical methods can be applied on linked data. It is the fifth workshop in a series that st How to use statistical methods on IoT data streams?
    5 KB (710 words) - 15:30, 6 July 2017
  • ...sing. Stream Reasoning aims at combing data stream management and semantic technologies to perform reasoning over massive, heterogeneous and dynamic data;, while R ...mmunity interested in integrating stream processing and reasoning by using methods inspired by data and knowledge management.
    5 KB (668 words) - 12:57, 8 July 2017
  • technologies; M2M Communications; Sensing and IoT architectures; Cloud computing Trust in smart cities ecosystems; Sensor networks, smart sensors, smart
    4 KB (508 words) - 13:23, 28 July 2017
  • |Acronym=Technologies for Security of EHR 2017 |Title=Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportun
    5 KB (650 words) - 13:24, 28 July 2017

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)