Search results

Jump to: navigation, search
  • * Security and privacy in vehicular networks * Experimental systems for vehicular networks
    3 KB (378 words) - 14:22, 24 August 2016
  • landscape because it will enable new breeds of applications and systems to systems.
    7 KB (942 words) - 20:05, 14 October 2008
  • * Testing of object-oriented systems * Distributed and concurrent object systems
    3 KB (328 words) - 20:05, 14 October 2008
  • | Title = The 3rd International Symposium on Security and Multimodality in Pervasive Environments ...er hand, while enlarging and easing the ways to access to the environment, security threads arise and the environment must be properly equipped in order to pro
    3 KB (393 words) - 21:18, 14 October 2008
  • | Field = Computer security and reliability ...nd test and stress equipment are on hand to demonstrate their products and systems to individuals and small groups. Attendees are encouraged to bring samples
    3 KB (467 words) - 21:39, 16 October 2008
  • | Title = 3rd International Workshop on Scalable Stream Processing Systems 3rd International Workshop on Scalable Stream Processing Systems (SSPS 2009)
    3 KB (490 words) - 20:05, 14 October 2008
  • + Security and information assurance Abstract: Database Management Systems form the core of the information
    7 KB (907 words) - 21:51, 14 October 2008
  • # Semantics in P2P systems and grids # Semantic Web Trust, Privacy, Security and Intellectual Property Rights
    4 KB (450 words) - 20:05, 14 October 2008
  • Security, Survivability and Fault Tolerance ...rs and practitioners in the field of sensor, mesh, and ad hoc networks and systems. IEEE SECON grew out of the
    2 KB (244 words) - 20:05, 14 October 2008
  • WINSYS is organized by INSTICC – Institute for Systems and Technologies of Information, Control and Communication ...ogether researchers, engineers and practitioners interested on information systems and applications in the context of wireless networks and mobile technologie
    9 KB (1,219 words) - 20:05, 14 October 2008
  • ...urity and privacy challenges faced by the current and future collaborative systems and infrastructures. ...ns/experiences related to security and privacy solutions for collaborative systems. Topics of interest include, but are not limited to:
    4 KB (520 words) - 20:05, 14 October 2008
  • | Title = 9th International Conference on New Technologies of Distributed Systems ...cits submissions on all topics related to New technologies and distributed systems, including but not limited to the following :
    2 KB (208 words) - 20:05, 14 October 2008
  • • Ad-Hoc Wireless Networks, Adaptive Antenna Systems • Communciations Systems Software
    5 KB (530 words) - 10:27, 24 June 2011
  • Expert Systems Information Systems
    3 KB (332 words) - 20:06, 14 October 2008
  • |Field=Computer security and reliability ...communication and information systems. Moreover, there are other dedicated systems for data mining, recommenders, sensing, conflict detection, intrusion detec
    15 KB (2,175 words) - 21:03, 19 March 2013
  • Home Gateway, DTV, Home Theater, PVR, Interconnects, Game Systems, Interactive and Directed Programming, Internet Integration, Next-Generatio Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability
    3 KB (354 words) - 20:06, 14 October 2008
  • ...ital Services in eESociety, eGovernment /eGovernance, eHealth, Information Systems, and Information Management. These broad areas are divided into more detai - Delivery Systems and Environments
    6 KB (780 words) - 20:06, 14 October 2008
  • ...= Fourth International Conference on Intelligent Computing and Information Systems ...tificial and computational intelligence as well as intelligent information systems.
    2 KB (193 words) - 20:06, 14 October 2008
  • Adaptive Systems Agent-Based Systems
    3 KB (359 words) - 20:06, 14 October 2008
  • | Title = The 29th Int'l Conference on Distributed Computing Systems (ICDCS 2009) o Distributed Operating Systems and Middleware
    2 KB (303 words) - 20:06, 14 October 2008
  • |Title=3rd International Conference on Distributed Event-Based Systems ...sage-oriented middleware. The various communities dealing with event based systems have made progress in different aspects of the problem. The DEBS conference
    6 KB (829 words) - 15:30, 29 January 2021
  • | Title = Sixth International Conference on Wireless On-demand Network Systems and Services On-demand Network Systems and Services
    6 KB (686 words) - 20:06, 14 October 2008
  • | Title = IEEE International Conference on Systems, Man and Cybernetics 2009 IEEE International Conference on Systems, Man& Cybernetics
    6 KB (708 words) - 22:49, 14 October 2008
  • ...and demanding settings, like manufacturing, healthcare, security, control systems, etc. ...ystems, production systems, decision support systems, knowledge management systems, etc.
    2 KB (261 words) - 22:45, 14 October 2008
  • ...vasive healthcare seeks to respond to a variety of pressures on healthcare systems, including the increased incidence of life-style related and chronic diseas * Security and privacy in pervasive healthcare
    6 KB (732 words) - 22:45, 14 October 2008
  • ...ectronic collaboration requires advancements in networking, technology and systems, user interfaces and interaction paradigms, and interoperation with applica ...oners, and students interested in collaborative networking, technology and systems, and applications.
    6 KB (674 words) - 22:45, 14 October 2008
  • Data about the activities of user across systems and applications and within a multitude of contexts are an enabler for acce ...iven computing, context-driven computing, information retrieval, database systems, digital libraries, metadata, data mining, user modelling, social networks,
    6 KB (890 words) - 22:53, 14 October 2008
  • | Title = VIII Brazilian Symposium on Human Factors in Computing Systems The Brazilian Symposium of Human Factors on Computer Systems (IHC) is the main forum of the Brazilian Human-Computer Interaction (HCI) c
    3 KB (502 words) - 22:53, 14 October 2008
  • Theme: Computing for Next Generation Systems software development; COTS-based systems; requirements elicitation
    9 KB (1,193 words) - 22:53, 14 October 2008
  • ...ktop interfaces, 3D virtual world environments, and multiple user embedded systems. ...machine interfaces, frameworks, reference models, architectures, tools and systems for CE
    4 KB (468 words) - 22:54, 14 October 2008
  • | Title = Conference on Enterprise Information Systems | Field = Information systems
    9 KB (1,240 words) - 22:56, 14 October 2008
  • ...ntific discovery, data visualization, causal induction and knowledge-based systems. B10. Security and Intrusion Detection
    2 KB (295 words) - 12:03, 18 October 2008
  • ...ter presentations (25, 26, 27th Nov) and demonstrations of neuro-computing systems (26th Nov), followed by workshops. One Workshop on Perception and Control o ...ontrol, Arts and Design; Adaptive integrated/embedded systems; Agent based systems.
    5 KB (699 words) - 23:04, 14 October 2008
  • | Title = Workshop on Logics for Intelligent Agents and Multi-Agent Systems Workshop on Logics for Intelligent Agents and Multi-Agent Systems (WLIAMAS 2008)
    5 KB (670 words) - 23:04, 14 October 2008
  • CAART is organized by INSTICC (Institute for Systems and Technologies of Information, Control and Communication), with technical ...of Computational Intelligence and many other areas related to intelligent systems, on the other hand.
    18 KB (2,457 words) - 23:04, 14 October 2008
  • ...ential specification language for anything ranging from real-time critical systems to networked infrastructures. It is logical techniques that link implementa - Foundations of security
    5 KB (799 words) - 21:49, 26 February 2020
  • ...ases, social networks, distributed computing, web engineering, information systems, natural language processing, soft computing, and human-computer interactio ** Representing and reasoning about trust, privacy, and security
    6 KB (854 words) - 12:05, 28 May 2016
  • �?� Artificial Intelligence and Intelligent Systems �?� Systems Modelling and Optimization
    13 KB (1,775 words) - 23:04, 14 October 2008
  • | Title = International Conference on Artificial Intelligence: Methodology, Systems, Applications Artificial Intelligence: Methodology, Systems, Applications
    6 KB (827 words) - 23:04, 14 October 2008
  • | Title = Sixth International Workshop on Intelligent Solutions in Embedded Systems | Field = Embedded systems
    2 KB (316 words) - 23:05, 14 October 2008
  • ...ational Workshop on Computational Intelligence in Security for Information Systems
    568 bytes (62 words) - 23:05, 14 October 2008
  • * Communication Systems and Networks * Cryptography and Network Security
    2 KB (167 words) - 23:05, 14 October 2008
  • ...amalgamate ongoing research in distributed systems and complex multi-agent systems with the aim of strengthening the synergy between the two fields. * Security, Trust and Privacy
    4 KB (536 words) - 17:55, 10 February 2021
  • |Title=International Conference on Autonomous Agents and Multi-Agent Systems - case studies and implemented systems
    2 KB (334 words) - 17:14, 12 November 2020
  • * models of concurrency, security, and mobility * real-time, embedded and hybrid systems
    8 KB (1,085 words) - 18:01, 12 February 2009
  • ...first-rate research that defines the cutting edge of future translations systems; case studies on practical uses of current translation systems in government and industry;
    16 KB (2,200 words) - 20:51, 18 February 2021
  • languages; Cellular automata and systems; Combinatorial, analysis, foundations of hybrid and real-time systems; lambda
    5 KB (698 words) - 23:08, 14 October 2008
  • |Title=ACM Symposium on Principles of Database Systems |Field=Database Systems
    3 KB (457 words) - 13:09, 7 December 2016
  • * Energy-aware ICT infrastructure, e.g., energy aware systems and networking * Network and IT security issues in developing countries
    9 KB (1,127 words) - 17:19, 26 April 2011
  • - Other aspects of modern information systems such as security, privacy,
    7 KB (851 words) - 05:29, 15 October 2008

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)