Search results

Jump to: navigation, search
  • ...concerns a broad range of concepts including trustworthy infrastructures, cloud computing, services, hardware, software and protocols. Topics of interest i Trust, Security and Privacy in embedded systems
    4 KB (451 words) - 12:27, 30 November 2011
  • Communications modeling; Communications security; Computer (everything, things, people, etc.); Internet, Virtualization and Cloud;
    6 KB (725 words) - 19:58, 22 November 2020
  • ...and practitioners from multiple disciplines to focus on service-oriented, cloud-based innovative for the 21st century enterprises. The conference will feat ...t impact on the field of service-oriented computing and also in particular cloud services.
    6 KB (745 words) - 15:27, 1 November 2016
  • Energy-efficient grid, cloud, and data center technology Relationship among energy consumption, speed, security , safety, availability, fault tolerance and reliability
    10 KB (1,297 words) - 17:49, 24 February 2012
  • |Title=European Conference on Service-Oriented and Cloud Computing 2012 The European Conference on Service-Oriented and Cloud Computing (ESOCC)
    4 KB (504 words) - 18:21, 5 March 2012
  • ...tion; Man-in-the-middle attacks; Bundle streaming service; Self-organizing cloud cells; Soft-coded and hard-coded relaying ...hnologies and networking; Mobile network expansion solutions (small cells, Cloud-RAN, etc.); 5G radio-access networks (RAN); D2D communications in cellular
    13 KB (1,580 words) - 19:35, 18 February 2021
  • |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security
    4 KB (581 words) - 18:48, 24 February 2020
  • *Cloud data management *Security, privacy, and trust
    4 KB (535 words) - 21:32, 11 February 2020
  • *Cloud data management Recommendation systems *Security, privacy, and trust
    4 KB (500 words) - 17:29, 6 January 2021
  • *Cyber Security and Privacy *Semantic Web, Cloud Computing, and Web Information Systems
    5 KB (663 words) - 11:49, 18 February 2020
  • ...gineering || Education || Parallel, distributed, and concurrent systems || Security, privacy and trust | Cloud computing || Fault localization || Software process || Software product lin
    6 KB (738 words) - 11:21, 6 July 2020
  • ...ecture, distributed search, metasearch, peer-to-peer search, search in the cloud). * Information Security (e.g., privacy, surveillance, censorship, encryption, security).
    8 KB (1,024 words) - 09:57, 13 May 2020
  • • Information and data governance, information assurance, security, compliance • Semantic cloud computing, edge computing, fog computing
    6 KB (872 words) - 23:11, 24 February 2020
  • *Cloud computing and data centers *Security and privacy, cryptographic protocols
    2 KB (299 words) - 11:51, 8 April 2020
  • ...etworks , Network Modeling and Simulation, Computer Network : Performance, Security and Applications, Neural Networks and Applications, Remote Sensing, Self Or ...lication, Multimedia and Its applications, Information processing and data security Software Engineering, Software Testing, Testing tools, Mutation Testing and
    3 KB (434 words) - 22:46, 30 May 2012
  • |Title=3rd International Conference on Cloud Computing and Services Science ...D COMPUTING FUNDAMENTALS, SERVICES SCIENCE FOUNDATION FOR CLOUD COMPUTING, CLOUD COMPUTING PLATFORMS AND APPLICATIONS, LOUD COMPUTING ENABLING TECHNOLOGY
    5 KB (662 words) - 18:50, 20 June 2012
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • - Cloud Computing<br /> - Security and Access Control<br />
    3 KB (466 words) - 13:00, 16 August 2012
  • ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. • Cloud-enabled large-scale simulation
    6 KB (728 words) - 01:01, 25 August 2012
  • |Field=Enterprise Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...are "Enterprise Software Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".
    6 KB (801 words) - 11:04, 14 April 2020
  • Information Security Cloud Computing and Green Computing
    2 KB (224 words) - 08:27, 26 October 2012
  • |Title=6th International Conference on Information Security and Cryptology 6th International Conference on Information Security and Cryptology
    3 KB (351 words) - 09:52, 28 October 2012
  • ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Cloud-based IS engineering
    3 KB (375 words) - 15:06, 24 September 2020
  • ...ge of concepts including, but not limited to, trustworthy infrastructures, cloud computing, services, hardware, software and protocols. ● Trust, Security and Privacy in embedded systems
    5 KB (677 words) - 15:19, 19 December 2012
  • * Cloud Computing, Map Reduce, Parallel, Distributed, P2P Systems * Security, Privacy, Authenticated Query Processing
    5 KB (584 words) - 14:44, 14 January 2013
  • ACSET Stream 6: Technology and Society: ICT & Security: Questions of Privacy, Governance & Trust - Implications for Security, Privacy, International Law and the Cloud
    5 KB (702 words) - 10:02, 5 March 2013
  • ...e emerged; besides, other novel techniques, such as virtualization and the cloud paradigm, have taken roots. All in all, these bring about new requirements - Security solutions for managed and infrastructureless networks
    9 KB (1,145 words) - 16:57, 11 April 2013
  • • Privacy, safety and securityCloud Computing
    4 KB (438 words) - 14:04, 8 May 2013
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • *Cloud Computing *Cyber Security
    3 KB (308 words) - 17:30, 26 May 2016
  • *Information Security and Cryptography *Network and Cyber Security
    2 KB (227 words) - 11:30, 21 June 2016
  • ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.
    3 KB (422 words) - 12:09, 24 April 2016
  • *Cloud Services and Networking *Security, Privacy and Content Protection
    1 KB (129 words) - 09:41, 4 September 2023
  • Information Security Cloud Computing, Computing Models
    3 KB (359 words) - 22:34, 30 September 2016
  • * Cloud Computing * Web Security and Trust Management
    2 KB (230 words) - 00:37, 28 May 2016
  • * Cloud Computing * Information Assurance and Security
    9 KB (1,131 words) - 23:18, 24 February 2020
  • * Information and data governance, information assurance, security, compliance * Semantic cloud computing, edge computing, fog computing
    6 KB (877 words) - 23:06, 24 February 2020
  • |Title=MEDES 2016 : Special Track: Secure Cloud Computing |Field=cloud computing, security, watermarking, risk management
    430 bytes (50 words) - 16:17, 8 July 2016
  • |Title=CISSI 2016 : International Symposium on Information Systems Security |Field=computer sciences, security, big data, cloud computing
    329 bytes (35 words) - 17:36, 8 July 2016
  • - Cloud Computing and Big Data Analytics - Security and Privacy
    12 KB (1,565 words) - 04:15, 5 August 2023
  • |Title=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things
    870 bytes (100 words) - 18:53, 2 March 2021
  • ...r Papers for Thematic Series on 'Cloud Forensics and Security' (Journal of Cloud Computing) |Field=cloud forensics, cloud security, cybercrime investigation, digital forensics
    454 bytes (52 words) - 17:01, 10 February 2021
  • * Cloud Computing Services * Security and Privacy Issues
    925 bytes (116 words) - 11:05, 24 August 2016
  • |Field=networks, computing, cloud computing, network security
    443 bytes (50 words) - 09:31, 19 July 2019
  • |Field=cloud computing, multimedia, network security, networking
    416 bytes (48 words) - 10:48, 11 September 2016
  • ...ining; Graph-based data mining; Multilabel information; Multimodal mining; Cloud-based mining; Mining using neurocomputing techniques ...igration and dissemination in mobile environments; Web data processing and security on mobile devices; Resource advertising and discovery techniques
    10 KB (1,305 words) - 00:29, 12 December 2020
  • * Cloud Computing Services * Security and Privacy of Information and IS
    3 KB (434 words) - 10:28, 26 July 2016
  • ...uages and integration, interfaces, and applications including biomed, IoT, cloud computing, SDN, wearable computing, context awareness, mobile computing, se * cloud computing
    5 KB (580 words) - 20:22, 28 January 2017
  • ...d graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, and novel statistical techniqu ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (282 words) - 10:48, 8 February 2020
  • ...d graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, and novel statistical techniqu ...g model selection, visualization, asymptotic analysis, information theory, security and privacy, graph and link mining, rule and pattern mining, web mining, di
    2 KB (270 words) - 10:49, 8 February 2020

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)