Search results

Jump to: navigation, search

Page title matches

Page text matches

  • ...puting has been a primary gathering forum for applied computer scientists, computer engineers, software engineers, and application developers from around the w ...ting with classic Web Services. Finally, features like Quality of Service, security and dependability need to be taken seriously into account, and this investi
    7 KB (957 words) - 15:15, 11 August 2008
  • |Title=Annual Computer Security Applications Conference
    297 bytes (35 words) - 16:50, 16 February 2021
  • ** Privacy, safety and security ** Privacy, safety, and security
    6 KB (777 words) - 22:54, 14 August 2008
  • === Computer sciences=== ==== Computer communications (networks)====
    6 KB (714 words) - 12:19, 11 December 2020
  • | title = Transactions on Information and System Security | Field = Computer security and reliability
    272 bytes (32 words) - 16:33, 18 August 2008
  • |Field=computer science *Network Security
    5 KB (571 words) - 09:22, 19 July 2019
  • |Title=1st International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    522 bytes (65 words) - 13:51, 6 November 2020
  • |Title=2nd International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    535 bytes (66 words) - 14:23, 6 November 2020
  • |Title=3rd International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    482 bytes (60 words) - 13:55, 6 November 2020
  • |Title=4th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    470 bytes (56 words) - 13:57, 6 November 2020
  • |Title=5th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    474 bytes (60 words) - 13:58, 6 November 2020
  • | Title= Conference on Computer and Communications Security 1997 | Field = Computer security and reliability
    334 bytes (35 words) - 20:56, 4 October 2016
  • |Field=Computer and Communications Security
    272 bytes (33 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    256 bytes (30 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    251 bytes (30 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    264 bytes (32 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    264 bytes (32 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    278 bytes (33 words) - 17:56, 4 October 2016
  • |Title=International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    322 bytes (46 words) - 08:58, 13 February 2021
  • | Title = Conference on Computer and Communications Security | Field = Computer security and reliability
    141 bytes (16 words) - 00:24, 22 August 2008
  • * IEEE, IEEE Computer Society * Trust, security and privacy issues in pervasive systems
    12 KB (1,560 words) - 15:03, 27 August 2008
  • |Field=Computer science ...ocus on the frontier topics in the theoretical and applied engineering and computer science subjects. The WCE conferences serve as good platforms for our membe
    3 KB (454 words) - 12:34, 8 October 2020
  • This is the twelfth IEEE Computer Society symposium dealing with the inter-operability, security, trusted and dependable systems, fault
    5 KB (715 words) - 17:43, 11 September 2008
  • - privacy and security Keith S. Decker, Dept. of Computer and Information Sciences,
    10 KB (1,371 words) - 16:14, 12 November 2020
  • |Field=Computer networking * Security issues of data management in wireless networks
    5 KB (611 words) - 15:43, 16 September 2008
  • ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d Additionally, P2P systems require special attention from the security point of view. Trust, reputation, copyrights, and intellectual property are
    18 KB (2,408 words) - 02:37, 16 December 2008
  • ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.) The DB 2009 Proceedings will be published by IEEE Computer Society Press and on-line via IEEE XPlore Digital Library. IEEE will index
    11 KB (1,446 words) - 18:26, 13 October 2008
  • |Field=Computer science ** Testing, assuring and certifying F/OSS quality and security
    10 KB (1,349 words) - 16:42, 24 September 2008
  • Software Security Human-Computer Interaction
    2 KB (293 words) - 10:35, 24 June 2011
  • |Field=Computer networking ...May 26-29, 2009. The conference covers theory, design and application of computer networks and distributed computing systems. Aside from the regular presenta
    34 KB (4,565 words) - 22:20, 10 January 2018
  • |Field=Computer networking ...March 25-28, 2008. The conference covers theory,design and application of computer networks and distributed computing systems. Aside from the regular presenta
    8 KB (1,037 words) - 22:20, 10 January 2018
  • |Field=Computer networking ..., May 21-23, 2007. The conference covers theory, design and application of computer networks and distributed computing systems. Aside from the regular presenta
    9 KB (1,189 words) - 22:20, 10 January 2018
  • |Field=Computer networking the TCDP of the IEEE Computer Society, the International Conference
    26 KB (3,456 words) - 22:20, 10 January 2018
  • |Field=Computer networking ...- March 30, 2005. The conference covers theory, design and application of computer networks and distributed computing systems. Aside from the regular presenta
    10 KB (1,263 words) - 22:20, 10 January 2018
  • |Field=Computer networking ...will include sessions on all aspects of theory, design and application of computer networks and distributed computing systems. Aside the regular presentation,
    12 KB (1,537 words) - 22:19, 10 January 2018
  • |Field=Computer networking * Security and Privacy
    8 KB (1,040 words) - 22:20, 10 January 2018
  • * General computer systems issues in operating systems, architecture, memory hierarchy, compil ...issues such as workload modeling, performance metrics, power consumption, security, usability, and experience with real systems and failures
    5 KB (777 words) - 05:50, 14 October 2008
  • - Wireless security and dependability ...fp/servlet/event.showcfp?eventid=3852&copyownerid=2 WikiCFP][[Category:Computer networking]]
    4 KB (495 words) - 09:22, 22 August 2023
  • ...traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. - Trust-related Security and Privacy: Trust-related secure architecture, framework, policy, intrusio
    9 KB (1,216 words) - 17:32, 14 October 2008
  • | Field = Computer networking communication networks, computer networks, social networks, biological
    6 KB (722 words) - 17:32, 14 October 2008
  • ...multimedia databases, digital and video libraries, compression and coding, security over the network. ...e, OCR and document analysis, mobile robots and visual navigation, network security, remote sensing and environment control, video surveillance and intelligent
    2 KB (268 words) - 17:47, 14 October 2008
  • | Field = Computer networking o Security aspects in cross-layer designs
    3 KB (424 words) - 17:47, 14 October 2008
  • ===Design, Human Computer Interaction=== * Security and privacy
    8 KB (989 words) - 20:13, 22 February 2009
  • | Title = The seventh ACS/IEEE International Conference on Computer Systems and Applications | Field = Computer science
    4 KB (503 words) - 11:36, 18 October 2008
  • | Field = Computer architecture ...vanced technologies and radically new solutions relevant to development of computer systems and aims to foster communication among scientists and engineers to
    4 KB (591 words) - 17:48, 14 October 2008
  • | Field = Computer networking * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques
    3 KB (431 words) - 17:48, 14 October 2008
  • | Field = Computer networking • Wireless network security and privacy
    6 KB (731 words) - 10:33, 14 August 2023
  • | Field = Computer networking * Wireless privacy and security
    3 KB (456 words) - 18:10, 14 October 2008
  • |Field=Computer networking * Security, privacy, and trustworthiness of mobile and wireless systems
    7 KB (974 words) - 12:28, 3 August 2023
  • |Field=Informatics, Computer Science, COP * Computer Science Security.
    3 KB (317 words) - 18:42, 7 October 2011
  • * Trust, reputation, security, and privacy in MBC ...sent the work. Papers should not exceed 15 pages in LNCS (Lecture Notes in Computer Science) format: http://www.springer.de/comp/lncs/authors.html
    5 KB (647 words) - 22:05, 14 October 2008
  • ...d functionalities, provenance has only recently attracted the attention of computer scientists. Provenance poses many fundamental challenges, such as performan ...ware engineering, workflow system, information retrieval, web service, and security research. At the same time, it also requires understanding of problems from
    3 KB (416 words) - 17:48, 14 October 2008
  • ...nd panel sessions. The INTERNET 2009 Proceedings will be published by IEEE Computer Society and posted on Xplore IEEE system. A best paper award will be grante Internet security enforcement and validation
    11 KB (1,385 words) - 17:48, 14 October 2008
  • | Title = IEEE International Conference on Intelligence and Security Informatics | Field = Computer security and reliability
    438 bytes (45 words) - 21:41, 16 October 2008
  • * Computer-assisted legal drafting and document management ...legal norm-governed systems (e.g. e-commerce rules, organization rules and security regulations)
    7 KB (998 words) - 17:48, 14 October 2008
  • | Title = The First International Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability
    7 KB (960 words) - 17:48, 14 October 2008
  • | Field = Computer networking * Trust, security and privacy
    19 KB (2,503 words) - 13:25, 28 October 2020
  • |Field=Computer science * Security and privacy in vehicular networks
    3 KB (378 words) - 14:22, 24 August 2016
  • * Security, Privacy, Safety and Legal Issues Computer Science (LNCS, EI indexed). At least one author of each accepted
    7 KB (942 words) - 20:05, 14 October 2008
  • | Title = The 3rd International Symposium on Security and Multimodality in Pervasive Environments | Field = Computer science
    3 KB (393 words) - 21:18, 14 October 2008
  • | Field = Computer security and reliability
    3 KB (467 words) - 21:39, 16 October 2008
  • - Security and privacy in SPSs - SPS exploiting emerging computer architectures (multi-core, cell)
    3 KB (490 words) - 20:05, 14 October 2008
  • + Security and information assurance Biography: Dr. Divyakant Agrawal is a Professor of Computer
    7 KB (907 words) - 21:51, 14 October 2008
  • | Field = Computer networking • Security, Survivability and Fault Tolerance
    2 KB (244 words) - 20:05, 14 October 2008
  • | Field = Computer networking ...seeks papers describing significant research contributions to the field of computer and data communication networks. We invite submissions on various aspects o
    3 KB (353 words) - 20:31, 14 October 2008
  • | Field = Computer networking * › Security Aspects of Mobile Software
    9 KB (1,219 words) - 20:05, 14 October 2008
  • Computer Vision • Ethical, Social, Privacy, Security and moral Issues in an e-societ
    5 KB (530 words) - 10:27, 24 June 2011
  • Human-Computer Interface & Visualization Computer-aided Design/manufacturing
    3 KB (332 words) - 20:06, 14 October 2008
  • |Field=Computer security and reliability ...(railways, airlines, road), life related (health, emergency response, and security), manufacturing (chips, computers, cars) or financial (credit cards, on-lin
    15 KB (2,175 words) - 21:03, 19 March 2013
  • Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability USER INTERFACE and HUMAN COMPUTER INTERACTION
    3 KB (354 words) - 20:06, 14 October 2008
  • - Data Security Issues - IS Security Issues
    6 KB (780 words) - 20:06, 14 October 2008
  • The Faculty of computer and information science organizes this important conference.this conferenc * Computer Networks
    2 KB (193 words) - 20:06, 14 October 2008
  • Computer Vision Intelligent Networks and Security
    3 KB (359 words) - 20:06, 14 October 2008
  • | Field = Computer networking o Security and Privacy
    2 KB (303 words) - 20:06, 14 October 2008
  • | Field = Computer networking ...mic experts to present and discuss communications quality, reliability and security issues as they relate to real world issues. The output from the workshops a
    4 KB (505 words) - 22:15, 14 October 2008
  • | Field = Computer networking * Security
    6 KB (686 words) - 20:06, 14 October 2008
  • Homeland Security Human-Computer Interaction
    6 KB (708 words) - 22:49, 14 October 2008
  • | Title = The 11th European Conference on Computer Supported Co-operative Work | Field = Human-computer interaction
    2 KB (261 words) - 22:45, 14 October 2008
  • | Field = Human-computer interaction * Security and privacy in pervasive healthcare
    6 KB (732 words) - 22:45, 14 October 2008
  • | Field = Human-computer interaction the International Computer Sciences, and Social Informatics and Telecommunications Engineering (ICST)
    6 KB (674 words) - 22:45, 14 October 2008
  • | Field = Human-computer interaction - Privacy and security issues
    6 KB (890 words) - 22:53, 14 October 2008
  • | Field = Human-computer interaction ...ionals, educators and students of various HCI-related disciplines, such as Computer Science, Psychology, Ergonomics and Graphic Design, among others.
    3 KB (502 words) - 22:53, 14 October 2008
  • | Title = 18th annual international conference on computer science and software engineering - Security and Privacy: cryptography; access control; security in
    9 KB (1,193 words) - 22:53, 14 October 2008
  • | Field = Human-computer interaction computer science education) to present original research on software
    3 KB (355 words) - 22:53, 14 October 2008
  • | Field = Human-computer interaction �?� Multi-resolution and other efficient computer graphics, visualization algorithms for cooperative visualization
    4 KB (468 words) - 22:54, 14 October 2008
  • | Title = Human Computer Interaction 2008 | Field = Human-computer interaction
    3 KB (322 words) - 22:41, 4 February 2009
  • 5. Human-Computer Interaction Database Security and Transaction Support
    9 KB (1,240 words) - 22:56, 14 October 2008
  • ...08), this year's conference expands its scope to encompass all aspects of Computer Science focused game research, along with game-oriented education research, ...ame studies/game design, e) graphics and interfaces and f ) networking and security. Papers that fall outside these topic areas are strongly encouraged and sho
    9 KB (1,275 words) - 14:46, 27 December 2015
  • ...bringing together researchers from the fields of modal logics, theoretical computer science and multi-agent systems as well as researchers who are interested i * security, privacy and trust issues in multi-agent systems
    5 KB (670 words) - 23:04, 14 October 2008
  • | Title = European Conference on Intelligence and Security Informatics | Field = Computer security and reliability
    592 bytes (64 words) - 23:04, 14 October 2008
  • ...ntelligence. Because of its ubiquity, logic has acquired a central role in Computer Science education. - Foundations of security
    5 KB (799 words) - 21:49, 26 February 2020
  • ...nformation systems, natural language processing, soft computing, and human-computer interaction. ** Representing and reasoning about trust, privacy, and security
    6 KB (854 words) - 12:05, 28 May 2016
  • Notes in Computer Science�?? (LNCS). share research results in Computer Science and Informatics as well as
    13 KB (1,775 words) - 23:04, 14 October 2008
  • - Computer vision - AI and Human-computer interaction
    6 KB (827 words) - 23:04, 14 October 2008
  • * Cryptography and Network Security * Voice-over-IP and Security
    2 KB (167 words) - 23:05, 14 October 2008
  • | Acronym = Computer Journal 2008 the Computer Journal
    4 KB (536 words) - 17:55, 10 February 2021
  • * models of concurrency, security, and mobility * type and category theory in computer science
    8 KB (1,085 words) - 18:01, 12 February 2009
  • b. Security/accreditation c. Cyber Security
    16 KB (2,200 words) - 20:51, 18 February 2021
  • | Title = 5th IFIP International Conference on Theoretical Computer Science 5th IFIP International Conference on Theoretical Computer Science
    5 KB (698 words) - 23:08, 14 October 2008
  • data; security; semi-structured data; spatial data; temporal data; LaTeX2e style llncs for Lecture Notes in Computer Science, which is
    5 KB (660 words) - 14:52, 2 March 2012
  • * Network and IT security issues in developing countries Abdelfettah Belghith, National School of Computer Sciences (ENSI), Tunisia;
    9 KB (1,127 words) - 17:19, 26 April 2011
  • ...tes to attend sessions in any conference participating in the Australasian Computer Science Week. * Privacy and Security in Databases.
    2 KB (308 words) - 23:08, 14 October 2008
  • primary and international forum for applied computer scientists, computer engineering, and other computer related professionals to gather, interact, present,
    7 KB (1,006 words) - 23:08, 14 October 2008
  • non-functional system properties (e.g. availability, reliability, security, performance, by using the Springer Lecture Notes in Computer Science (LNCS) style
    7 KB (791 words) - 23:09, 14 October 2008
  • Security, Personalization Department of Computer Science, University of California-Santa Cruz,
    3 KB (437 words) - 23:20, 14 October 2008
  • ...will be included in a separate workshop proceedings published by the IEEE Computer Society Press. * Mining and link analysis in networked settings: web, social and computer networks, and online communities
    5 KB (634 words) - 15:36, 14 December 2008
  • * Security techniques * Concurrent engineering and computer integrated manufacturing
    29 KB (4,077 words) - 18:04, 18 August 2023
  • * Privacy and security issues ...ns of the conference. The conference proceedings will be published by IEEE Computer Society. The extended version of the best papers would also be invited for
    3 KB (452 words) - 23:09, 14 October 2008
  • ...t/event.showcfp?eventid=2563&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]
    589 bytes (67 words) - 23:09, 14 October 2008
  • - Human-Computer Interaction - Security and Access Control
    4 KB (595 words) - 23:09, 14 October 2008
  • * mobile database security Institute of Computer Science IV, University of Bonn
    7 KB (875 words) - 23:09, 14 October 2008
  • * Flexible techniques for security and intrusion detection in Information Systems and Databases ...ers, formatted following the formatting instructions available on the IEEE Computer Society web site; the LaTeX style files can be dowloaded here as well. Pape
    7 KB (917 words) - 23:09, 14 October 2008
  • Information systems and database systems have always been a central topic of computer science. Additionally the * Data and Information Privacy and Security
    4 KB (457 words) - 16:14, 16 December 2020
  • * Security, reliability and availability in distributed storage systems, .../servlet/event.showcfp?eventid=2250&copyownerid=598 WikiCFP][[Category:Computer networking]]
    5 KB (644 words) - 23:10, 14 October 2008
  • - security and privacy All accepted papers, between 5 and 11 pages long, will be published by IEEE Computer Society.
    4 KB (539 words) - 23:10, 14 October 2008
  • Sponsored by: Database Society, Chinese Computer Federation; Natural Science Foundation of China - Database security
    10 KB (1,376 words) - 23:10, 14 October 2008
  • ...nce proceedings, as in previous years, by Springer in the Lecture Notes in Computer Science (LNCS) series. * Data security, privacy and trust
    4 KB (593 words) - 23:10, 14 October 2008
  • · Security control in grid workflow systems ...Indexed). Selected papers will be invited to a special issue in Journal of Computer and System Sciences.
    7 KB (886 words) - 23:10, 14 October 2008
  • * Data analysis for network traffic estimation and security ...fp/servlet/event.showcfp?eventid=1749&copyownerid=2 WikiCFP][[Category:Computer networking]]
    3 KB (332 words) - 23:10, 14 October 2008
  • * Privacy and security in Auto ID systems ...fp/servlet/event.showcfp?eventid=1118&copyownerid=2 WikiCFP][[Category:Computer networking]]
    4 KB (471 words) - 23:10, 14 October 2008
  • reliability, integrity, privacy, and security issues are still being policy. Furthermore, the complexity of security increases as
    7 KB (908 words) - 23:10, 14 October 2008
  • ...WSES 07 will appear in the International Journal of Future Generations of Computer Systems (FGCS). Selected papers of WSES 06 have appeared in a special issue * Security control in managing workflow
    4 KB (560 words) - 23:10, 14 October 2008
  • | Field = Computer networking and military operations. Such networking is essential for safety, security and economic vitality in
    5 KB (549 words) - 17:15, 5 July 2020
  • | Field = Computer networking Security issues
    3 KB (364 words) - 23:11, 14 October 2008
  • | Field = Computer networking * Network Security and Cooperation
    3 KB (339 words) - 23:11, 14 October 2008
  • | Field = Computer networking Quality of service, authentication and security, multimedia protocols, web architectures and protocols, network measurement
    7 KB (981 words) - 03:18, 6 January 2009
  • * Security and privacy ...fp/servlet/event.showcfp?eventid=3261&copyownerid=2 WikiCFP][[Category:Computer networking]]
    2 KB (243 words) - 23:11, 14 October 2008
  • | Field = Computer networking 9. Information Security Technologies
    2 KB (200 words) - 23:11, 14 October 2008
  • | Field = Computer networking * Network Security
    4 KB (465 words) - 23:11, 14 October 2008
  • | Field = Computer networking * Network Security & Reliability
    4 KB (559 words) - 23:11, 14 October 2008
  • |Field=Computer networking 11. Communication and Information Systems Security Symposium
    3 KB (431 words) - 09:18, 4 August 2023
  • ...orks and sensor networks are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enab Network Security and Privacy
    7 KB (990 words) - 23:11, 14 October 2008
  • | Title = Security and Privacy in Telecommunications and Information Systems | Field = Computer security and reliability
    4 KB (587 words) - 23:30, 14 October 2008
  • | Field = Computer networking - Computer and Communications Network Security
    3 KB (375 words) - 23:37, 14 October 2008
  • | Field = Computer networking ...t bringing together researchers and scientists from several disciplines in computer science and engineering where bio-inspired methods are investigated.
    5 KB (694 words) - 23:11, 14 October 2008
  • | Field = Computer networking + Security for CE Communications
    5 KB (584 words) - 09:43, 4 September 2023
  • | Title = New Technologies, Mobility and Security | Field = Computer networking
    2 KB (209 words) - 23:12, 14 October 2008
  • | Field = Computer networking 7. Security Signal Processing
    4 KB (496 words) - 23:12, 14 October 2008
  • - Security and privacy of mobile/wireless systems Note: A special issue With Elsevier, Computer Networks is planned for
    4 KB (596 words) - 23:12, 14 October 2008
  • Security/privacy in wireless systems ...fp/servlet/event.showcfp?eventid=2439&copyownerid=2 WikiCFP][[Category:Computer networking]]
    2 KB (244 words) - 23:12, 14 October 2008
  • 1 .2 Computer Communication and Networks 5 .54 Network Security
    2 KB (250 words) - 23:12, 14 October 2008
  • | Title = Fourth International Conference on Security and Privacy for Communication Networks | Field = Computer security and reliability
    615 bytes (67 words) - 23:12, 14 October 2008
  • | Field = Computer networking o Security and privacy
    9 KB (1,117 words) - 23:12, 14 October 2008
  • | Field = Computer networking * Security architectures and mechanisms
    3 KB (382 words) - 23:12, 14 October 2008
  • | Field = Computer networking ...seeks papers describing significant research contributions to the field of computer and data communication networks. We invite submissions on network architect
    3 KB (352 words) - 23:12, 14 October 2008
  • - Network Security - Trust, Security, and Privacy
    3 KB (465 words) - 23:13, 14 October 2008
  • | Field = Computer networking ...rage contributions on policy-based techniques in support of management and security of all types of wireless networks: cellular, Wi-Fi, Mobile Ad Hoc, hybrids,
    5 KB (667 words) - 23:13, 14 October 2008
  • | Field = Computer networking ...rch results and to exchange new ideas and practical experience in data and computer communications, optical fiber communications, microwaves, antennas and prop
    2 KB (260 words) - 23:13, 14 October 2008
  • | Title = International Conference on Computer and Communication Engineering | Field = Computer networking
    2 KB (283 words) - 23:13, 14 October 2008
  • | Field = Computer networking * Security
    3 KB (413 words) - 23:13, 14 October 2008
  • | Field = Computer networking * Security and resilience of networked systems
    4 KB (528 words) - 23:13, 14 October 2008
  • | Field = Computer networking application-level reliability & performance, security, QoS assurance,
    5 KB (651 words) - 23:13, 14 October 2008
  • | Field = Computer networking - Wireless network security and privacy
    3 KB (343 words) - 10:31, 14 August 2023
  • * Self-Protection, Security, and Trust ...references, using 10 fonts, and number each page. You can confirm the IEEE Computer Society Proceedings Author Guidelines at the following web page:
    3 KB (415 words) - 23:13, 14 October 2008
  • | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.
    4 KB (457 words) - 23:13, 14 October 2008
  • | Homepage = conferences.computer.org/icws/2008 http://conferences.computer.org/icws/2008
    8 KB (1,158 words) - 23:14, 14 October 2008
  • | Title = The 2nd International Workshop on Web and Pervasive Security ...t/event.showcfp?eventid=1628&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]
    582 bytes (69 words) - 23:14, 14 October 2008
  • | Field = Computer architecture ...ew ground or present insightful results based on practical experience with computer systems. The USENIX conference has a broad scope, and specific topics of in
    6 KB (869 words) - 23:14, 14 October 2008
  • * Security of WiMAX in NGN .../servlet/event.showcfp?eventid=2244&copyownerid=590 WikiCFP][[Category:Computer networking]]
    1 KB (181 words) - 23:14, 14 October 2008
  • * Security ...fp/servlet/event.showcfp?eventid=3273&copyownerid=2 WikiCFP][[Category:Computer networking]]
    3 KB (308 words) - 23:15, 14 October 2008
  • | Field = Computer networking * Security, robustness, and fault-tolerance in networked environments
    8 KB (1,093 words) - 23:15, 14 October 2008
  • |Field=Computer Science, Artificial Intelligence,Multi Agent Systems * Values in multi-agent systems, including privacy, safety, security and transparency
    6 KB (659 words) - 17:41, 11 February 2021
  • ...phics, artificial intelligence, games, animation, multimedia design, human-computer interaction, educational media and software engineering. Even though high-t * QoS and Security Support for Entertainment
    8 KB (1,011 words) - 23:15, 14 October 2008
  • | Field = Computer networking * Security and Robustness in P2P Information Search
    5 KB (554 words) - 23:15, 14 October 2008
  • | Field = Computer networking distributed teams of humans, computer applications, and/or autonomous robots to achieve higher productivity and
    8 KB (1,093 words) - 23:15, 14 October 2008
  • | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)
    5 KB (628 words) - 23:15, 14 October 2008
  • | Field = Computer networking 1-07 Computer networks
    5 KB (623 words) - 23:15, 14 October 2008
  • | Field = Computer networking ...ng difficult social and policy issues such as those related to privacy and security
    8 KB (1,003 words) - 23:15, 14 October 2008
  • | Field = Computer networking NPSec 2008 particularly welcomes new ideas on security in the context of
    4 KB (493 words) - 23:15, 14 October 2008
  • | Field = Computer networking * Giuseppe Persiano: Security of networks of low capability devices
    4 KB (563 words) - 23:15, 14 October 2008
  • * Network Security .../servlet/event.showcfp?eventid=2391&copyownerid=548 WikiCFP][[Category:Computer networking]]
    5 KB (598 words) - 10:18, 29 May 2016
  • | Field = Computer networking * Security, privacy and social issues of mobile and ubiquitous systems
    5 KB (599 words) - 23:15, 14 October 2008
  • Multimedia security ...fp/servlet/event.showcfp?eventid=1731&copyownerid=2 WikiCFP][[Category:Computer networking]]
    3 KB (322 words) - 23:15, 14 October 2008
  • |Title=6th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    509 bytes (65 words) - 14:00, 6 November 2020
  • |Title=7th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    509 bytes (62 words) - 14:01, 6 November 2020
  • |Title=9th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    496 bytes (63 words) - 14:05, 6 November 2020
  • |Title=15th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    506 bytes (61 words) - 14:16, 6 November 2020
  • |Title=8th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    475 bytes (60 words) - 14:03, 6 November 2020
  • |Title=14th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    485 bytes (60 words) - 14:15, 6 November 2020
  • |Title=12th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    497 bytes (60 words) - 14:11, 6 November 2020
  • |Title=13th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    516 bytes (64 words) - 14:12, 6 November 2020
  • |Title=10th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    491 bytes (60 words) - 14:07, 6 November 2020
  • |Title=11th International Conference on Applied Cryptography and Network Security |Field=Computer security and reliability
    507 bytes (62 words) - 14:09, 6 November 2020
  • | Title = First ACM Conference on Wireless Network Security | Field = Computer security and reliability
    2 KB (197 words) - 23:15, 14 October 2008
  • | Field = Computer networking ...fp/servlet/event.showcfp?eventid=1201&copyownerid=2 WikiCFP][[Category:Computer networking]]
    625 bytes (69 words) - 23:15, 14 October 2008
  • M. Computer Vision & VR N. Multimedia & Human-computer Interaction
    2 KB (226 words) - 23:17, 14 October 2008
  • | Title = Fifth International Conference on Computer Vision, Image and Signal Processing | Field = Computer graphics
    4 KB (438 words) - 23:17, 14 October 2008
  • |Title=The First International Workshop on the Critical Computer Based Systems The construction of dependable and complex computer-based systems demands the interaction and involvement of industry and acade
    5 KB (660 words) - 16:46, 27 December 2015
  • ...d papers will be included in the conference proceedings and published IEEE Computer Society and referenced in IEEE explore and major indexes. The proceedings w * OSS and security, security implication of OSS, security concerns in using OSS
    5 KB (697 words) - 23:18, 14 October 2008
  • |Homepage=conferences.computer.org/icebe/2008 (ICEBE 2008) http://conferences.computer.org/icebe/
    5 KB (594 words) - 16:29, 25 March 2020
  • (e.g., QoS, security, fault tolerance, messaging, Please follow the IEEE Computer Society Press Proceedings Author
    4 KB (504 words) - 23:18, 14 October 2008
  • # security technology and systems * Computer-Supported Cooperative Work
    6 KB (733 words) - 12:48, 27 October 2016
  • | Title = The Second IEEE International Workshop on Security in Software Engineering | Field = Computer security and reliability
    5 KB (615 words) - 09:55, 29 May 2016
  • Computer Huamn Interaction Computer Graphics and Multimedia
    3 KB (427 words) - 17:01, 29 May 2016
  • ...from cognate areas such as formal methods, systems engineering, human and computer interaction, economics and management and social sciences are very welcome * quality goals (e.g., security),
    4 KB (503 words) - 23:18, 14 October 2008
  • | Title = Symposium on Requirements Engineering for Information Security ...t/event.showcfp?eventid=1752&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]
    583 bytes (64 words) - 23:18, 14 October 2008
  • ...his has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society tha IEEE Computer Society
    3 KB (404 words) - 23:18, 14 October 2008
  • ...ieval, data and text mining, statistics, computational intelligence, human-computer interaction and intelligent software agents. - Human-computer interaction aspects of personalization
    4 KB (570 words) - 23:19, 14 October 2008
  • blog mining, security mining, taxation mining, scientific data IEEE Computer Society Press Proceedings Author Guidelines at
    4 KB (510 words) - 23:19, 14 October 2008
  • ...ense. Debates over the need for privacy protection vs. service to national security and business interests were held in newspapers, magazines, research article It is clear that privacy is a domain dependent concept: homeland security, healthcare, business secrecy, entertainment, web 2.0, and ubiquitous compu
    5 KB (721 words) - 23:19, 14 October 2008
  • ...e = Sixth International Conference on Cryptography, Coding and Information Security | Field = Computer security and reliability
    3 KB (448 words) - 23:19, 14 October 2008
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • | Title = Second ACM Conference on Wireless Network Security | Field = Computer security and reliability
    2 KB (291 words) - 23:19, 14 October 2008
  • * Security and survivability [[Category:Computer security and reliability]]
    2 KB (322 words) - 00:35, 15 October 2008
  • | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability
    5 KB (673 words) - 23:19, 14 October 2008
  • | Title = Ubiquitous Computing Security Systems | Field = Computer security and reliability
    3 KB (328 words) - 06:40, 22 December 2012
  • | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability
    6 KB (697 words) - 23:19, 14 October 2008
  • | Field = Computer security and reliability
    631 bytes (73 words) - 17:05, 24 February 2016
  • | Title = The First ACM Computer Security Architecture Workshop | Field = Computer security and reliability
    5 KB (619 words) - 23:19, 14 October 2008
  • | Field = Computer security and reliability
    580 bytes (67 words) - 17:01, 27 December 2015
  • | Field = Computer security and reliability
    570 bytes (64 words) - 23:19, 14 October 2008
  • | Title = International Workshop on Security and Privacy in Enterprise Computing | Field = Computer security and reliability
    574 bytes (65 words) - 23:19, 14 October 2008
  • | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability
    6 KB (736 words) - 23:20, 14 October 2008
  • | Title = 3rd International Workshop on Security | Field = Computer security and reliability
    524 bytes (59 words) - 10:04, 29 May 2016
  • | Title = Information Security South Africa (ISSA) Conference 2008 | Field = Computer security and reliability
    4 KB (465 words) - 23:20, 14 October 2008
  • | Title = New Security Paradigms Workshop | Field = Computer security and reliability
    8 KB (1,072 words) - 23:20, 14 October 2008
  • | Title = 13th European Symposium on Research in Computer Security | Field = Computer security and reliability
    556 bytes (64 words) - 23:20, 14 October 2008
  • | Field = Computer security and reliability ...t/event.showcfp?eventid=2738&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]
    621 bytes (70 words) - 23:20, 14 October 2008
  • | Title = International Symposium on Electronic Commerce and Security | Field = Computer science
    657 bytes (71 words) - 23:20, 14 October 2008
  • | Title = The Sixth International Workshop on Security In Information Systems | Field = Computer security and reliability
    590 bytes (68 words) - 23:20, 14 October 2008
  • | Title = The 11th Information Security Conference | Field = Computer security and reliability
    528 bytes (59 words) - 23:20, 14 October 2008
  • | Title = 3rd IEEE International Workshop on Security, Trust, and Privacy for Software Applications | Homepage = conferences.computer.org/compsac/2008/workshops/STPSA2008.html
    656 bytes (73 words) - 23:20, 14 October 2008
  • | Title = Special Session on Systems and Information Security | Field = Computer security and reliability
    541 bytes (61 words) - 23:20, 14 October 2008
  • | Title = 2008 Workshop on Security and High Performance Computing Systems | Field = Computer security and reliability
    574 bytes (65 words) - 23:20, 14 October 2008
  • services. The major emphasis of the workshop this year is security of wireless applications. What are the real security threats towards
    5 KB (663 words) - 23:20, 14 October 2008
  • | Field = Computer security and reliability # Building security into products
    3 KB (337 words) - 23:20, 14 October 2008
  • | Title = IEEE 21st Computer Security Foundations Symposium | Field = Computer science
    597 bytes (69 words) - 23:20, 14 October 2008
  • | Title = Workshop in Information Security Theory and Practices 2008: Smart Devices, Convergence and Next Generation N | Field = Computer security and reliability
    606 bytes (68 words) - 23:20, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security | Field = Computer security and reliability
    4 KB (565 words) - 23:20, 14 October 2008
  • | Title = 23rd International Information Security Conference | Field = Computer security and reliability
    5 KB (637 words) - 23:20, 14 October 2008
  • | Title = IEEE International Conference on Intelligence and Security Informatics | Field = Computer security and reliability
    436 bytes (45 words) - 21:41, 16 October 2008
  • | Field = Computer security and reliability
    554 bytes (65 words) - 23:20, 14 October 2008
  • | Field = Computer security and reliability
    2 KB (276 words) - 23:20, 14 October 2008
  • | Title = IEEE Symposium on Security and Privacy | Field = Computer security and reliability
    2 KB (262 words) - 23:20, 14 October 2008
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • ...who need to become acquaintedwith new theories and technologies related to security and privacy challenges in collaborative environments. ...Worksharing, (CollaborateCom-2007), which is jointly sponsored by the IEEE Computer Society, Create-Net and the International Communication Sciences and Techno
    1 KB (185 words) - 23:20, 14 October 2008
  • | Acronym = Security in RFID 2008 | Title = Security in RFID and its Industrial Applications
    617 bytes (71 words) - 23:20, 14 October 2008
  • | Title = The 3rd International Symposium on Ubiquitous Application and Security Service | Field = Computer security and reliability
    574 bytes (65 words) - 23:20, 14 October 2008
  • | Title = SPIE Defense and Security Symposium | Field = Computer security and reliability
    1 KB (167 words) - 23:20, 14 October 2008
  • |Field=Computer and Communications Security
    278 bytes (33 words) - 17:56, 4 October 2016
  • |Title=ACM SIGSAC Conference on Computer and Communications Security |Field=Computer and Communications Security
    538 bytes (66 words) - 10:02, 25 February 2021
  • |Field=Computer and Communications Security
    279 bytes (33 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    270 bytes (33 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    276 bytes (33 words) - 17:58, 4 October 2016
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability
    4 KB (502 words) - 23:20, 14 October 2008
  • IEEE societies (the Computer Society, the Signal Processing Society, the Circuits and - Multimedia security and content protection
    3 KB (425 words) - 23:20, 14 October 2008
  • - Personalization, Privacy and Security in Mobile Computing - Security and Privacy of Mobile/Wireless Systems
    10 KB (1,262 words) - 23:20, 14 October 2008
  • * Multimedia security including digital watermark and encryption ...d e-mail address. The Conference Proceedings will be published by the IEEE Computer Society Press. A number of the papers presented at the conference will be s
    5 KB (595 words) - 23:20, 14 October 2008
  • ...ost comprehensive conference focused on the various aspects of advances in Computer Science. -Security issues on UMC
    4 KB (573 words) - 23:20, 14 October 2008
  • ...cluding the Circuits and Systems Society, the Com-munications Society, the Computer Society, and the Signal Processing Society. The conference will feature wor *Multimedia security and content protection
    2 KB (296 words) - 23:20, 14 October 2008
  • | Title = Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML08)
    6 KB (837 words) - 23:21, 14 October 2008
  • · Forensic Studies and Security Issues [[Category:Computer graphics]]
    3 KB (364 words) - 23:21, 14 October 2008
  • | Field = Computer security and reliability
    545 bytes (61 words) - 23:22, 14 October 2008
  • | Field = Computer security and reliability
    612 bytes (70 words) - 23:22, 14 October 2008
  • | Field = Computer security and reliability
    409 bytes (42 words) - 21:40, 16 October 2008
  • * Functional Programming and Security [[Category:Computer science]]
    5 KB (636 words) - 23:22, 14 October 2008
  • | Field = Computer science | Homepage = conferences.computer.org/scc/2008
    18 KB (2,352 words) - 23:23, 14 October 2008
  • | Field = Computer science This Conference is to bring together computer scientists, applied mathematicians, engineers in different disciplines and
    3 KB (357 words) - 23:23, 14 October 2008
  • | Title = IEEE 8th International Conference on Computer and Information Technology | Field = Computer science
    3 KB (415 words) - 23:23, 14 October 2008
  • |Title=23rd Annual IEEE Symposium on Logic in Computer Science ...ess calculi, programming language semantics, proof theory, reasoning about security, rewriting, specifications, type systems and type theory, and verification.
    2 KB (285 words) - 15:11, 7 November 2016
  • | Field = Computer networking Information Security and Cryptography
    3 KB (412 words) - 19:34, 12 November 2020
  • | Field = Computer graphics ...ring the past decade. They come in diverse forms: business support, public security, entertainment, welfare and many more. Video streaming, video conferencing,
    4 KB (567 words) - 23:24, 14 October 2008
  • | Field = Computer graphics ...g in a wide range of areas, as diverse as medicine, robotics, defense, and security. As a rule, the processed data are discrete; therefore, the "discrete appro
    6 KB (814 words) - 23:25, 14 October 2008
  • ..., computer vision, image analysis, signal processing, statistics, computer security, etc. The purpose of this conference is to provide a scientific forum for r * computer vision
    3 KB (325 words) - 23:50, 14 October 2008
  • | Field = Computer graphics ...ntification techniques playing a key role in human-computer interfaces for security and restricted-access systems.
    4 KB (550 words) - 23:25, 14 October 2008
  • ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design Security and protection systems
    11 KB (1,492 words) - 23:26, 14 October 2008
  • | Field = Computer security and reliability Current computer technology trends present to the hardware and software designer novel oppor
    5 KB (598 words) - 01:12, 31 May 2012
  • ...isciplinary conference for research that spans the boundaries of hardware, computer has captured some of the major computer systems innovations of the past two decades (e.g., RISC and VLIW
    3 KB (406 words) - 17:39, 30 September 2016
  • * Security and Trust in Distributed Systems ...tion will be published in the Conference Proceedings published by the IEEE Computer Society.
    6 KB (761 words) - 03:28, 6 January 2009
  • | Field = Computer architecture The IEEE Computer Society Technical Committee on Scalable Computing
    5 KB (577 words) - 23:27, 14 October 2008
  • | Field = Computer architecture ...areas of innovative computing systems that extend the current frontiers of computer science and engineering and that will provide advanced systems for current
    3 KB (376 words) - 23:27, 14 October 2008
  • | Title = The 35th Annual International Symposium on Computer Architecture | Field = Computer architecture
    2 KB (259 words) - 10:14, 29 May 2016
  • | Field = Computer architecture ...ns and required attributes, such as reliability, availability, safety, and security, as well as human factors.
    4 KB (528 words) - 23:27, 14 October 2008
  • | Field = Computer architecture The goal of this workshop is to bring together researchers, computer architects, and engineers working on a broad spectrum of topics pertaining
    4 KB (575 words) - 23:27, 14 October 2008
  • | Title = 8th International Symposium on Computer Networks ISCN'08 is organized by The Department of Computer Engineering at Bogaziçi University, Istanbul, Turkey
    3 KB (413 words) - 23:28, 14 October 2008
  • ...energy, Waste management, Waste treatment and recycling, Water network and security, Sensor technologies, Intelligent Micro-grids Signal Processing: Image processing, Computer vision, Bio-image processing, Audio/video processing, Data processing, Esti
    4 KB (561 words) - 23:29, 14 October 2008
  • * Robots in security applications ...queries, please contact the program chair, Dr. Gal Kaminka, MAVERICK Group Computer Science Department, Bar Ilan University.
    3 KB (423 words) - 23:29, 14 October 2008
  • |Field=Computer Science, Embedded systems, Embedded Network Sensor Systems, Sensor Systems Security and privacy
    6 KB (771 words) - 16:09, 16 September 2019
  • 10) Networked embedded systems and security .../servlet/event.showcfp?eventid=2303&copyownerid=421 WikiCFP][[Category:Computer architecture]]
    11 KB (1,352 words) - 00:33, 15 October 2008
  • o Language features to enhance reliability and security o Interaction between embedded computer architecture, operating
    5 KB (673 words) - 23:30, 14 October 2008
  • service, security and dependability. Rich interfaces have been o security
    4 KB (537 words) - 23:30, 14 October 2008
  • ...g, information systems, natural language processing, multimedia, and human-computer interaction. ...proceedings of ASWC 2008 will be published in Springer's Lecture Notes in Computer Science series. Paper submission and reviewing will be electronic via the c
    4 KB (573 words) - 23:31, 14 October 2008
  • | Homepage = conferences.computer.org/compsac/2008/workshops/ESAS2008.html ...cooperation and goal seeking through sharing policy and ontology, safety & security in systems, other QoS issues, and so on.
    10 KB (1,391 words) - 23:31, 14 October 2008
  • Security in distributed systems Autonomic access control and security issues
    5 KB (702 words) - 23:31, 14 October 2008
  • - Ontologies and computer supported collaborative work - Ontologies and security
    4 KB (523 words) - 23:31, 14 October 2008
  • Sponsored by IEEE Computer Society Technical Committee on Services Computing (http://tab.computer.org/tcsc)
    6 KB (750 words) - 23:31, 14 October 2008
  • This is the eleventh IEEE Computer Society symposium dealing with the rapidly expanding field of object/compon ...ms, protocols, peer-to-peer computing, sensor networks, inter-operability, security, trusted and dependable systems, fault tolerance, virtual subnets for ORC.
    3 KB (377 words) - 23:31, 14 October 2008
  • ...semantics, program verification, static analysis, testing, language-based security. ...The proceedings will be published in the Springer-Verlag Lecture Notes in Computer Science series. Final papers will be in the format specified by Springer-Ve
    6 KB (824 words) - 23:32, 14 October 2008
  • Sponsored by IEEE Computer Society TC-uARCH and ACM SIGMICRO in cooperation with ACM SIGPLAN ...he conference covers optimization for parallelism, performance, power, and security, where that optimization occurs in the mapping from an input (including API
    3 KB (342 words) - 23:32, 14 October 2008
  • |Title=35th Annual ACM/IEEE Symposium on Logic in Computer Science |Field=Theoretical Computer Science
    5 KB (656 words) - 11:29, 27 August 2020
  • |Title=International Conference on Computer Aided Verification * Formal models and methods for security
    2 KB (291 words) - 11:09, 20 November 2020
  • |Title=26th International Symposium on High-Performance Computer Architecture ...d. Authors are invited to submit papers on all aspects of high-performance computer architecture.
    3 KB (327 words) - 13:11, 11 May 2020
  • | Field = Computer architecture �?� Optimization techniques for security and reliability
    2 KB (201 words) - 23:32, 14 October 2008
  • ...more. Application disciplines covered include advanced telecommunication; computer systems; military, government & aerospace; environment, energy, and other i * Symposium on Simulation of Systems Security (SSSS)
    6 KB (735 words) - 23:32, 14 October 2008
  • ...ternet technologies, multimedia, wireless communications, data privacy and security, authentification, authorization and federation. Computer and Control Systems (Chairs: Farhat Fnaiech, Tunisia; Sandrine Moreau, Fran
    4 KB (504 words) - 23:33, 14 October 2008
  • | Field = Computer science SLAECE 2009 Proceedings will be published by IEEE Computer Society Press and on-line via IEEE XPlore Digital Library together with ICI
    8 KB (1,075 words) - 23:52, 14 October 2008
  • ...izations ?e-culture ?e-Science ?e-Business ?e-Learning ?e-Government ?Grid Security ?Sensor networks and Grid applications ...wing SCI-indexed international journals after extension: Future Generation Computer System (FGCS), Concurrency and Computation: Practice and Experience (CCPE),
    3 KB (367 words) - 23:35, 14 October 2008
  • |Title=Current Trends in Theory and Practice of Computer Science Current Trends in Theory and Practice of Computer Science
    6 KB (682 words) - 10:18, 14 April 2020
  • | Title = Ninth International Conference on Deontic Logic in Computer Science ...these general themes, DEON2008 will encourage a special focus on the topic Security and Trust.
    5 KB (587 words) - 23:37, 14 October 2008
  • fields in computer communications and distributed systems such as sensor - Security
    4 KB (483 words) - 23:37, 14 October 2008
  • | Title = IEEE 28th Conference on Computer Communications | Field = Computer networking
    3 KB (380 words) - 19:34, 17 November 2008
  • | Field = Computer networking Recent advances in electronic and computer technologies have paved the way for the proliferation of ubiquitous computi
    3 KB (386 words) - 23:39, 14 October 2008
  • Human-computer interface Security & biometrics
    3 KB (360 words) - 23:39, 14 October 2008
  • * Microarchitecture support for reliability, dependability, and security .../servlet/event.showcfp?eventid=2838&copyownerid=619 WikiCFP][[Category:Computer architecture]]
    3 KB (326 words) - 17:43, 8 November 2008
  • ...the HotOS tradition, participants will present and discuss new ideas about computer systems research and how technological advances and new applications are sh ...perating systems, storage, networking, languages and language engineering, security, dependability, and manageability. We are also interested in contributions
    6 KB (781 words) - 23:39, 14 October 2008
  • engineering domain on advanced (parallel) computer architectures. In # Security challenges and solutions for interoperability/interoperation of
    7 KB (959 words) - 23:40, 14 October 2008
  • brings together researchers in computer science and * Computer Assisted Surgery
    7 KB (876 words) - 23:40, 14 October 2008
  • | Field = Computer security and reliability * Integrated system reliability, availability, security, safety, and timing analysis and evaluation methods
    6 KB (748 words) - 14:43, 27 December 2015
  • | Field = Computer security and reliability
    414 bytes (43 words) - 21:46, 16 October 2008
  • | Field = Computer security and reliability
    554 bytes (63 words) - 23:40, 14 October 2008
  • | Field = Computer security and reliability
    572 bytes (66 words) - 23:40, 14 October 2008
  • | Field = Computer security and reliability
    453 bytes (48 words) - 15:33, 17 October 2008
  • * Security in e-Learning o Human Computer Interaction (HCI)
    2 KB (324 words) - 23:41, 14 October 2008
  • | Title = Fourth International Workshop on the Value of Security through Collaboration ...ties of the ecosystem where the nodes operate may be guaranteed. Thus, the security property of the ecosystem may be driven by self-organizing mechanisms. Depe
    3 KB (420 words) - 23:42, 14 October 2008
  • ward data management. The use of a mobile wireless infrastructure can lead to security and reliability problems. Mobile devices often have usability This theme involves the application of computer science theories of dependability to provide guarantees for required qualit
    6 KB (771 words) - 23:42, 14 October 2008
  • ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network - Multimedia content recognition, indexing, search - Human Computer Interaction
    2 KB (303 words) - 23:42, 14 October 2008
  • and related fields, computer scientists, students and IT professionals. - Privacy, security and trust
    6 KB (763 words) - 23:42, 14 October 2008
  • | Title = 32nd Annual IEEE International Computer Software and Applications Conference | Homepage = conferences.computer.org/compsac/2008
    2 KB (249 words) - 23:44, 14 October 2008
  • |Field=Computer and Communications Security
    275 bytes (33 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    273 bytes (33 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    254 bytes (31 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    256 bytes (31 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    273 bytes (33 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    258 bytes (32 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    277 bytes (33 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    274 bytes (33 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    258 bytes (32 words) - 17:56, 4 October 2016
  • |Field=Computer and Communications Security
    262 bytes (31 words) - 17:57, 4 October 2016
  • I research solutions to problems in computer security, currently in the employ of IBM T.J. Watson Research Center.
    234 bytes (40 words) - 00:10, 17 October 2008
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • |Field=Computer networking **Publisher: IEEE Computer Society Press
    5 KB (670 words) - 15:15, 16 February 2009
  • |Field=Computer networking ** Publisher: IEEE Computer Society Press
    7 KB (883 words) - 17:35, 7 January 2021
  • ...of this forum is to promote new research and applications in the filed of Computer science and Engineering and interdisciplinary fields. ...Networks, HCI, Agents, Data Semantics, Medical, Healthcare, Entertainment, Security.
    3 KB (440 words) - 12:20, 12 December 2008
  • |Field=Computer Engineering |Type=Computer dependability, Critical Infrastructure Security
    1 KB (186 words) - 17:22, 5 February 2009
  • ...cience at New Mexico Tech includes courses in both theoretical and applied computer science. These courses cover current concepts and major applications of the ...broaden their knowledge in major computer science areas. Graduates of the computer science bachelor's program will be well prepared for industry employment or
    2 KB (331 words) - 05:33, 5 January 2009
  • |Homepage=conferences.computer.org/compsac/2009/workshops/RTSOAA2009.html * http://conferences.computer.org/compsac/2009/workshops/RTSOAA2009.html
    7 KB (922 words) - 00:58, 9 January 2009
  • |Title=4th International Conference on Interactive Mobile and Computer Aided Learning |Field=Computer-supported learning
    11 KB (1,366 words) - 16:44, 14 January 2009
  • ...WANN is included in the ranking of the best conferences established by the Computer Science Conference Ranking based on the "Estimated Impact of Conference (EI - Computer GRID
    6 KB (812 words) - 12:55, 18 January 2009
  • Security, Trust, Privacy, and other Socio-technical Issues in Pervasive Computing ICPCA2009 extends its interests in pervasive computer with special tracks on collaborative work, health care, e-learning, etc. In
    4 KB (597 words) - 13:46, 23 January 2009
  • | Field = Computer networking ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance.
    5 KB (526 words) - 01:02, 2 February 2009
  • | Field = Computer networking Fast Track on Computer Communications Journal
    5 KB (650 words) - 13:43, 23 January 2009
  • | Title = 3rd International Conference on Network and System Security | Field = Computer networking
    12 KB (1,669 words) - 12:58, 18 January 2009
  • | Field = Computer networking o Security
    5 KB (567 words) - 12:58, 18 January 2009
  • Trust, Privacy & Security in Digital Business (TrustBus'09) Security patterns have arrived to a stage where there are a significant
    6 KB (740 words) - 12:58, 18 January 2009
  • The natural focus of the conference is on computer science issues, but * Security, Privacy, Encryption, and Digital Rights, including
    9 KB (1,221 words) - 12:58, 18 January 2009
  • | Field = Computer science part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009)
    5 KB (633 words) - 12:58, 18 January 2009
  • | Title = 2nd ACM International Conference on Security of Information and Networks | Field = Computer networking
    16 KB (2,178 words) - 12:59, 18 January 2009
  • - Safety and security for mobile MAS deployment Notes in Computer Science series by Springer-Verlag.
    8 KB (977 words) - 12:59, 18 January 2009
  • ...o raises a host of ethical issues, such as those pertaining to information security, privacy, data mining, and intellectual property. Therefore, as e-business ...nd management, information technology, philosophy, communication sciences, computer science, and consumer studies. In providing a broad overview of the various
    6 KB (856 words) - 13:00, 18 January 2009
  • with Special Issue of Journal of Computer and System Sciences (http://www.elsevier.com/locate/jcss), Elsevier (http:/ ...e workshop will be invited for submission to a special issue of Journal on Computer and System Sciences (http://www.elsevier.com/locate/jcss), Elsevier (http:/
    7 KB (1,030 words) - 13:00, 18 January 2009
  • part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...mpetencies, human and psychological aspects, feelings are all of interest. Computer Science and IT related disciplines work more and more together with various
    6 KB (860 words) - 13:00, 18 January 2009
  • Security and Access Control Information Content Security
    4 KB (529 words) - 13:00, 18 January 2009
  • - Data warehouse privacy, security, and reliability - Security, privacy and social impact of data mining
    7 KB (1,006 words) - 13:00, 18 January 2009
  • brings together researchers from all areas of computer science that - time-dependent security policies
    6 KB (872 words) - 13:00, 18 January 2009
  • | Title = The 1st International Workshop on Security, Reliability and Quality in Cloud Computing computing brings on security, reliability and quality? In other words, what new issues raised
    5 KB (624 words) - 13:00, 18 January 2009
  • Many aspects contribute to the functioning of e-transactions systems such as security aspects (authentication, confidentiality, ..), architecture (such as Cap, 3 Trust, privacy and security issues in e-commerce
    6 KB (772 words) - 13:00, 18 January 2009
  • | Title = The 11th ACM workshop on Multimedia and Security The 11th ACM workshop on Multimedia and Security will be held in Princeton, New Jersey, USA on September 7th and 8th of 2009
    3 KB (303 words) - 17:06, 24 February 2016
  • ...es such as as Services Computing, which has been formally promoted by IEEE Computer Society since 2003. From a technology perspective, Services Computing has b * Security Systems & Services
    9 KB (1,183 words) - 13:41, 23 January 2009
  • components of computer tools (i.e. algorithms, architectures and languages). - AI in Computer Security
    4 KB (582 words) - 14:47, 2 December 2010
  • | Field = Computer networking o Security in Power Line Communications
    14 KB (1,518 words) - 13:01, 18 January 2009
  • Security in wireless networks ...servlet/event.showcfp?eventid=4391&copyownerid=2799 WikiCFP][[Category:Computer networking]]
    3 KB (320 words) - 16:40, 27 December 2015
  • | Field = Computer networking on networking (wired and wireless), high-performance computer architecture,
    10 KB (1,206 words) - 13:01, 18 January 2009
  • part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...of their papers to selected journals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from
    4 KB (564 words) - 13:01, 18 January 2009
  • part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...of their papers to selected journals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from
    4 KB (588 words) - 13:01, 18 January 2009
  • - Computer and Network Architecture - Computer Graphics
    10 KB (1,321 words) - 13:01, 18 January 2009
  • • Decision Support Systems and Computer Aided Diagnosis • Security, Ethics and Privacy
    4 KB (528 words) - 13:01, 18 January 2009
  • |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments |Field=Computer networking
    6 KB (793 words) - 15:12, 1 October 2020
  • | Field = Computer networking * Privacy, security, ethics, culture, and anonymity issues
    6 KB (767 words) - 13:01, 18 January 2009
  • previous years, by Springer in the Lecture Notes in Computer Science papers in a special BNCOD section of The Computer Journal
    4 KB (568 words) - 13:01, 18 January 2009
  • - Safety and security for mobile MAS deployment Notes in Computer Science series by Springer-Verlag.
    7 KB (917 words) - 13:02, 18 January 2009
  • ...hysical or social sciences alone. These systems also transcend traditional computer-controlled - Security, privacy, trust and safety of cyber physical & social computing
    3 KB (446 words) - 13:02, 18 January 2009
  • | Title = Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Device Use | Field = Computer security and reliability
    11 KB (1,539 words) - 13:02, 18 January 2009
  • * Security and privacy All accepted papers, between 5 and 11 pages long, will be published by IEEE Computer Society.
    4 KB (532 words) - 15:04, 27 December 2015
  • | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)
    6 KB (852 words) - 13:02, 18 January 2009
  • Security in Knowledge-based Multimedia Systems Knowledge-based Human-Computer Interaction
    6 KB (693 words) - 13:03, 18 January 2009
  • | Field = Computer networking ...ssues can expose the network infrastructure to stability, performance, and security problems.
    5 KB (431 words) - 13:03, 18 January 2009
  • Security, privacy and trust published in the conference proceedings (by the IEEE Computer Society
    4 KB (599 words) - 13:27, 28 January 2009
  • ...ps and conferences as part of the 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing. - Speech and language processing/advanced computer vision
    7 KB (976 words) - 23:35, 28 January 2009
  • |Title=European Symposium On Research In Computer Security
    599 bytes (75 words) - 10:59, 11 March 2020
  • ...Service composition, Functional and Non Functional Requirements (NFR: QoS, security), and management and diagnosis, who investigate concepts, methods, techniq * NFR (quality, security, robustness, adaptability) management in choreographed and/or
    7 KB (960 words) - 16:33, 27 February 2009
  • ...ages will be charged. The Conference Proceedings will be published by IEEE Computer Society. Most papers in the past proceedings have been indexed by EI. All a B-09 Web-page Security Monitoring
    4 KB (459 words) - 16:33, 27 February 2009
  • Technical-sponsored by IEEE and IEEE Computer Society Information Security
    4 KB (512 words) - 16:33, 27 February 2009
  • * security in distributed computing, cryptographic protocols [[Category:Computer networking]]
    7 KB (890 words) - 15:05, 27 December 2015
  • ...temas, Wireless communications, Technologies and applications, Information security o Computer vision
    8 KB (977 words) - 16:33, 27 February 2009
  • ...s in Internet connection speeds, modular web applications, and advances in computer graphics will play the key role in the evolution of the World Wide Web. - Web Security
    4 KB (630 words) - 16:33, 27 February 2009
  • FACS 2009 will be published in Science of Computer Programming. Process Architectures), FAST (Formal Aspects in Security and Trust),
    8 KB (1,079 words) - 17:05, 27 February 2009
  • 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.
    7 KB (897 words) - 17:05, 27 February 2009
  • The proceedings will be published in the Lecture Notes in Computer for publication in a Special Issue of Science of Computer
    7 KB (1,094 words) - 11:42, 29 September 2016
  • * Security and trustworthy in multi-tenancy service hosting environment ....5 x 11 inch pages, as per IEEE 8.5 x 11 manuscript guidelines (http://www.computer.org/cspress/instruct.htm). You can download the paper template in word form
    6 KB (855 words) - 17:06, 27 February 2009
  • | Field = Computer networking • Network security
    5 KB (654 words) - 17:06, 27 February 2009
  • ...s an interdisciplinary scope, encompassing research from computer science, computer engineering and telecommunication/communication engineering with focus on h - Security issues and technologies
    5 KB (646 words) - 17:06, 27 February 2009
  • ...ear in conference proceedings published by the Springer's Lecture Notes in Computer Science (LNCS) and the IEEE, respectively. (All accepted papers at WISM’0 Information Security
    5 KB (604 words) - 17:06, 27 February 2009
  • ...ponsored by IEEE Technical Committee on Scalable Computing (TCSC) and IEEE Computer Society. · Computer networks
    8 KB (1,050 words) - 18:04, 5 January 2017
  • | Homepage = conferences.computer.org/compsac/2009/workshops/ME2009.html The 33rd Annual IEEE International Computer Software and Applicaiton Conference
    6 KB (800 words) - 22:11, 27 February 2009
  • | Title = The 29th IEEE Conference on Computer Communications | Field = Computer networking
    4 KB (559 words) - 17:06, 27 February 2009
  • * Security and privacy in P2P systems the IEEE Computer Society digital library. A CD containing full papers will be
    5 KB (623 words) - 17:06, 27 February 2009
  • | Field = Computer networking VoIP, NGN and IMS Security
    4 KB (621 words) - 17:06, 27 February 2009
  • | Title = 6th Swedish National Computer Networking Workshop (SNCNW 2009) 6th Swedish National Computer Networking Workshop (SNCNW 2009)
    3 KB (456 words) - 17:06, 27 February 2009
  • ...ed papers will be published by Springer as proceedings in Lecture Notes in Computer Science (LNCS) . The space limit for full papers is 18 pages LNCS style. De * Security and Integrity
    4 KB (534 words) - 17:07, 27 February 2009
  • | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability
    8 KB (967 words) - 17:07, 27 February 2009
  • | Title = 3rd WORKSHOP ON Practice and Theory of IT Security | Field = Computer security and reliability
    4 KB (506 words) - 17:07, 27 February 2009
  • | Title = Workshop on Trust, Risk and Security Assessments for Network Dependability in Digital Ecosystems (TRSDE) | Field = Computer security and reliability
    4 KB (600 words) - 17:07, 27 February 2009
  • | Title = 5th IEEE International Workshop on Wireless and Sensor Networks Security Wireless and Sensor Networks Security (WSNS'09)
    4 KB (485 words) - 17:07, 27 February 2009
  • * Cryptography, Security and trust ...hardcopy proceedings, which are planned to appear in the Lecture Notes in Computer Science (LNCS) Series of Springer Verlag after August 2009
    6 KB (750 words) - 16:50, 27 December 2015
  • SBBD is the official database event of the Brazilian Computer Society (SBC). It has been the largest venue in Latin America for presentat * Authorization, Privacy and Security
    9 KB (1,249 words) - 08:42, 7 October 2011
  • Computer System, Information Security and Networks • Security and Privacy in E-Commerce
    3 KB (319 words) - 17:07, 27 February 2009
  • This session covers: Computer Assisted Learning and Simulation Trainers, Customizing of ERP Systems using ...and distributed systems; High-speed networks; Network simulation software; Computer and telecommunication systems; Telecommunication devices and systems; Intel
    38 KB (4,832 words) - 17:07, 27 February 2009
  • IEEE Computer Society Task Force on Information Assurance by the special interest group Security - Intrusion Detection and
    8 KB (1,020 words) - 17:07, 27 February 2009
  • | Field = Computer networking It has evolved from a small number of interconnected computer networks to a
    11 KB (1,440 words) - 17:08, 27 February 2009
  • | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability
    12 KB (1,690 words) - 17:08, 27 February 2009
  • | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability
    3 KB (480 words) - 17:08, 27 February 2009
  • | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability
    6 KB (828 words) - 17:08, 27 February 2009
  • the IEEE Computer Society and the Technical Committee on Computer Architecture
    4 KB (589 words) - 17:08, 27 February 2009
  • * Information assurance and security Springer-Verlag volume in the Lecture Notes in Computer Science Series.
    8 KB (1,144 words) - 20:59, 27 February 2009
  • |Title=IEEE Computer Security Foundations Symposium (was CSFW) |Homepage=https://www.ieee-security.org/TC/CSF2020/
    223 bytes (28 words) - 17:08, 27 February 2020
  • |Title=IEEE Symposium on Security and Privacy |Homepage=https://www.ieee-security.org/TC/SP2018/
    586 bytes (78 words) - 14:41, 6 November 2020
  • |Title=IEEE Symposium on Security and Privacy |Homepage=http://www.ieee-security.org/TC/SP2019/index.html
    519 bytes (70 words) - 14:37, 6 November 2020
  • * Computer games and gamification * Project, risk and security management
    4 KB (571 words) - 12:58, 9 March 2020
  • |Title=European Symposium on Research in Computer Security
    626 bytes (80 words) - 11:06, 11 March 2020
  • |Title=23rd European Symposium on Research in Computer Security,
    629 bytes (73 words) - 11:16, 11 March 2020
  • |Title=35th Annual Computer Security Applications Conference (ACSAC) |Has coordinator=Applied Computer Security Associates
    676 bytes (83 words) - 15:29, 7 January 2021
  • |Title=34th Annual Computer Security Applications Conference (ACSAC) |Has coordinator=Applied Computer Security Associates
    540 bytes (63 words) - 15:30, 7 January 2021
  • |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security
    5 KB (578 words) - 10:21, 20 November 2020
  • |Title=International Conference on Computer Supported Education |Field=Computer science education
    5 KB (661 words) - 15:49, 8 December 2009
  • |Title=5th European Conference on Computer Network Defence |Field=Computer security and reliability
    4 KB (530 words) - 15:02, 27 December 2015
  • |Title=International Workshop on Wireless Multimedia Computing and Security Services - Security, privacy, and cryptographic protocols for WMC
    3 KB (477 words) - 16:54, 8 August 2009
  • ...ST 2009 papers will be in the ADAPTIVE 2009 Proceedings, published by IEEE Computer Society Press, and posted on-line via IEEE XPlore Digital Library. IEEE wil ...tion Retrieval, HCI) interested in topics like trust, provenance, privacy, security, reputation and spam, in order to address current challenges of their adapt
    5 KB (642 words) - 20:34, 9 June 2009
  • -Trust and security issues in P2P systems -Security and cheat-prevention mechanisms for P2P games
    5 KB (738 words) - 16:48, 10 August 2009
  • | Title = The 2nd International Conference on Computer Modeling and Simulation (ICCMS 2010) ...lation. ICCMS 2010 will bring together leading engineers and scientists in Computer Modeling and Simulation from around the world. Topics of interest for submi
    4 KB (435 words) - 11:32, 2 August 2009
  • | Title = The 2nd International Conference on Computer and Electrical Engineering (ICCEE 2009) | Field = Computer science
    3 KB (412 words) - 19:29, 2 August 2009
  • | Title = International journal of Network Security & Its Applications (IJNSA) International journal of Network Security & Its Applications (IJNSA)
    3 KB (339 words) - 11:32, 2 August 2009
  • Network Security [[Category:Computer networking]]
    2 KB (230 words) - 11:32, 2 August 2009
  • * Design aspects for robust design, human factors, safety, security and usability Computer (CS) § Communications (ComSoc)
    6 KB (706 words) - 11:33, 2 August 2009
  • ...(SAC) has been a primary gathering forum for applied computer scientists, computer engineers, software engineers, and application developers from around the w ...ware reuse, dynamic software adaptation, efficiency on multicore hardware, security, and safety.
    5 KB (743 words) - 17:02, 27 December 2015
  • * Human-Computer Interaction including GIS Interfaces ...l track organised by the University of Washington Conference on Safety and Security Education & Research (SASER):
    4 KB (528 words) - 11:33, 2 August 2009
  • | Field = Computer networking ...y,ISSN 2072-1471 (Print) is Published in 4 issues per year by Internatonal Computer Science Publisher.
    2 KB (258 words) - 11:33, 2 August 2009
  • Ambient Systems Security and Privacy ...r the conference will be published in the proceedings of Communications in Computer and Information Science series, Springer. Selected papers will be invited f
    6 KB (751 words) - 16:59, 27 December 2015
  • - Personalization, security and privacy www.computer.org/portal/pages/intelligent/mc/author.html).
    4 KB (525 words) - 11:34, 2 August 2009
  • †Principal; Professor, Department of Computer Science & Engineering, *Assistant Professor, Department of Inf Web Security and Privacy
    4 KB (564 words) - 12:01, 6 November 2020
  • * Trust Integration and Security in Grid and P2P Systems ...references, using 10 fonts, and number each page. You can confirm the IEEE Computer Society Proceedings Author Guidelines at one of the following web pages:
    7 KB (912 words) - 17:36, 5 November 2020
  • |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY |Field=Computer science
    5 KB (599 words) - 10:21, 20 November 2020
  • * Network self-healing, security and self-defence to 2 columns, 10pt fonts, using the IEEE Computer Society 8.5" x 11" authors
    4 KB (479 words) - 11:35, 2 August 2009
  • | Acronym = Security 2009 ...S International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)
    6 KB (746 words) - 11:35, 2 August 2009
  • ...ned, dynamic and distributed nature of the sensory systems involved, their security weaknesses, and so on. Novel mechanisms and designs are required which inte - Trust, security, privacy, and data provenance issues in QoI and QoS
    5 KB (734 words) - 11:35, 2 August 2009
  • published by the IEEE Computer Society Press. One author from each accepted 8.5x11 inch two-column format (http://www2.computer.org/portal/web/cscps).
    8 KB (1,112 words) - 11:35, 2 August 2009
  • * Security issues and solutions for mobile multimedia retrieval. ...pear in the conference proceedings to be published by ACM and the Austrian Computer Society (OCG) books@ocg.at series.
    5 KB (674 words) - 11:35, 2 August 2009
  • |Field=computer networking - Security
    8 KB (1,119 words) - 09:57, 27 February 2020
  • ? Security and privacy ? Wireless & Mobile network Security
    5 KB (571 words) - 11:35, 2 August 2009
  • | Field = Computer networking ...onse time, resource consumption, throughput, availability, reliability and security.
    9 KB (1,206 words) - 11:40, 2 August 2009
  • ...guistics (LTC 2009), a meeting organized by the Faculty of Mathematics and Computer Science of Adam Mickiewicz University, Poznań, Poland in cooperation with ...of our everyday technological environment. Since the very beginning of the Computer and Information Age these fields have influenced and stimulated each other
    14 KB (1,872 words) - 19:26, 2 August 2009
  • | Field = Computer networking ...ons and Technologies - Applications, Protocols, Algorithms, Simulators and Security
    3 KB (339 words) - 11:36, 2 August 2009
  • |Field=Computer networking Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )
    14 KB (1,651 words) - 15:56, 15 February 2017
  • 5. Human-Computer Interaction * Database Security and Transaction Support
    5 KB (552 words) - 17:06, 12 August 2009
  • |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability
    6 KB (766 words) - 10:54, 26 April 2010
  • |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security
    5 KB (667 words) - 14:27, 13 September 2009
  • QSIC 2010 will include the main conference and co-located workshops. IEEE Computer Society Press will publish the conference proceedings consisting of careful ...benchmarking, review, inspection and walkthrough, reliability, safety and security
    4 KB (583 words) - 12:17, 25 November 2009
  • |Field=Computer and society - Human Computer Interaction
    4 KB (507 words) - 22:37, 18 November 2009
  • a platform for researchers and practitioners from computer * Agent-enabled human-computer interaction and interface design
    4 KB (449 words) - 11:04, 26 November 2009
  • * Application security * Blended Internet security methods
    5 KB (607 words) - 18:01, 3 December 2009
  • |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust
    4 KB (484 words) - 14:20, 14 December 2009
  • |Title=7th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS |Field=Computer security and reliability
    7 KB (982 words) - 19:13, 3 January 2010
  • ...ometrics Technologies and Applications, Pattern Recognition and Biometrics Security, Bioinformatics and IT Applications in the above themes. Computer and network security
    3 KB (382 words) - 18:27, 20 January 2010
  • |Title=3rd International Conference on Security of Information and Networks |Field=Computer security
    10 KB (1,270 words) - 17:12, 20 April 2010
  • Sponsored by ICST (Institute for Computer Sciences, Social-Informatics ...ale computing and networking, optimization, pervasive computing, robotics, security, software engineering, and systems engineering.
    3 KB (338 words) - 16:53, 27 December 2015
  • |Title=International Conference on Security and Cryptography |Field=Computer security and reliability
    4 KB (409 words) - 15:40, 5 February 2010
  • |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    4 KB (429 words) - 08:55, 1 August 2019
  • |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    9 KB (1,092 words) - 09:35, 1 August 2019
  • ...well as Data Mining, Multi-agent Systems, Information Retrieval and Human Computer Interaction. Topics of interest include, but are not limited to: * Web Security, Integrity, Privacy and Trust
    6 KB (765 words) - 14:01, 11 April 2010
  • ...ng, Multi-agent Systems, Information Retrieval, Machine learning and Human Computer Interaction. * Web Security, Integrity, Privacy and Trust in processing web-logs
    4 KB (600 words) - 19:11, 18 February 2010
  • |Title=Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments |Field=Computer security and reliability
    3 KB (498 words) - 02:52, 22 December 2012
  • |Field=Computer communications http://conferences.computer.org/WiMob2010/
    5 KB (624 words) - 21:14, 4 March 2010
  • |Field=Computer science ...ocus on the frontier topics in the theoretical and applied engineering and computer science subjects. The WCE conferences serve as good platforms for our membe
    4 KB (559 words) - 08:31, 9 March 2010
  • |Field=Computer science education |Superevent=2010 secau Security Congress
    2 KB (215 words) - 06:52, 13 April 2010
  • |Title=3rd Australian Security and Intelligence Conference |Field=Computer security and reliability
    2 KB (181 words) - 07:03, 13 April 2010
  • |Field=Computer security and reliability |Superevent=2010 secau Security Congress
    2 KB (200 words) - 16:55, 27 December 2015
  • |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy
    4 KB (490 words) - 14:42, 6 November 2020
  • - Security of Communication Networks ...ttp://www.cloudbus.org/cdn/idcs10. Each submitted paper should follow IEEE Computer Society 8.5x11-inch Conference Proceedings format (Available in the worksh
    5 KB (667 words) - 12:08, 19 May 2010
  • |Title=Workshop on Aspects of Human-Computer Interaction for the Social Web |Field=Human-computer interaction
    4 KB (657 words) - 19:43, 12 June 2010
  • |Title=3rd International Conference on Computer Supported Education (CSEDU 2011) Conference Name: 3rd International Conference on Computer Supported Education (CSEDU 2011)
    5 KB (532 words) - 12:25, 16 June 2010
  • * Security and Privacy * Human-Computer Interaction
    8 KB (1,066 words) - 19:39, 8 July 2010
  • ...virtual environment (DVE) or collaborative virtual environment (CVE), is a computer-generated virtual world where multiple users can assume virtual representat ...pages, to the workshop. Submitted papers should be in accordance with IEEE Computer Society guidelines, and will be refereed by reviewers in terms of relevance
    6 KB (858 words) - 09:18, 19 August 2010
  • With new technology of online communications and computer dependent service providers, even conventional faxing has gone the distance ...These fax services also far overpower the traditional providers in ways of security, ease of accessibility and functionality.
    4 KB (626 words) - 14:16, 29 July 2010
  • |Title=ACM Conference on Computer and Communications Security |Field=Computer security and reliability
    469 bytes (56 words) - 15:30, 14 January 2021
  • |Title=IEEE Computer Security Foundations Symposium (was CSFW)
    114 bytes (16 words) - 22:22, 26 February 2020
  • |Title=European Symposium On Research In Computer Security |Field=Security
    147 bytes (20 words) - 13:59, 11 March 2020
  • |Title=Annual Computer Security Applications Conference |Field=Security
    140 bytes (18 words) - 00:51, 28 February 2020
  • *Security and privacy *Computer vision for resource-constrained and mobile platforms
    3 KB (412 words) - 09:52, 27 February 2020
  • 5. HUMAN-COMPUTER INTERACTION * › Database Security and Transaction Support
    19 KB (2,462 words) - 19:10, 26 August 2010
  • ...happen to be new to these service providers and might be worried about the security of using these online services then, the following benefits are sure to get ...se benefits is the 24/7 customer service and 800 numbers provided by these computer fax providers. Also there is limited amount to the number of faxes that you
    3 KB (610 words) - 16:33, 27 August 2010
  • ...ocus on the frontier topics in the theoretical and applied engineering and computer science subjects. The WCE conferences serve as good platforms for our membe The 2011 International Conference of Computer Science and Engineering
    3 KB (458 words) - 08:06, 31 August 2010
  • |Title=IEEE Winter Conference on Applications of Computer Vision * Human-Computer Interaction
    2 KB (164 words) - 20:17, 12 May 2020
  • |Field=Theoretical computer science Papers presenting original research on all aspects of theoretical computer science are sought. Typical but not exclusive topics of interest are:<br>
    4 KB (602 words) - 06:44, 26 August 2020
  • |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium
    3 KB (343 words) - 16:31, 6 May 2020
  • * Communications and computer networks * Security applications
    5 KB (574 words) - 15:58, 6 March 2020
  • ...rmation Society (i-Society 2011) is Technically Co-Sponsored by IEEE UK/RI Computer Chapter. The i-Society is a global knowledge-enriched collaborative effort - Human Computer Interaction
    6 KB (732 words) - 05:52, 5 December 2010
  • ...blic of Ireland Section, the Chester and North Wales Branch of the British Computer Society (BCS), the Wales North Branch of the Institution of Engineering and • Security
    4 KB (579 words) - 15:24, 13 October 2010
  • ...nym=CALL FOR PAPER Journal: International Journal of Computer Science and Security (IJCSS) |Title=International Journal of Computer Science and Security (IJCSS)
    2 KB (298 words) - 16:47, 5 July 2020
  • |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)
    5 KB (609 words) - 17:01, 5 July 2020
  • |Acronym=CALL FOR PAPER Journal: International Journal of Computer Networks (IJCN) |Title=CALL FOR PAPER Journal: International Journal of Computer Networks (IJCN)
    3 KB (318 words) - 16:46, 5 July 2020
  • Decision Support Systems and Computer Aided Diagnosis Security, Ethics and Privacy
    5 KB (693 words) - 10:44, 14 November 2010

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)