Search results

Jump to: navigation, search

Page title matches

Page text matches

  • |Title=The 10th International Conference on Mobile Data Mangement (MDM'09): Systems, Services and Middleware in mobile data management. The conference provides unique opportunities for researchers,
    13 KB (1,468 words) - 01:23, 22 August 2008
  • Data management constitutes the essential enabling technology for several diverse purposes. Established data management solutions
    9 KB (1,189 words) - 14:53, 28 August 2008
  • ...articular requirements. On the one hand, there are aspects of programming, data handling, and intensive computing applications; on the other hand, there ar ...networks to exist; within groups and between groups there are problems of privacy, identity, anonymity, trust, and confidentiality. Additionally, conflict, d
    18 KB (2,408 words) - 02:37, 16 December 2008
  • ...Twelfth International Conference on Advances in Databases, Knowledge, and Data Applications |Field=data, software, automation
    11 KB (1,371 words) - 12:28, 18 May 2020
  • ...substantial improvements for content processing, information indexing, and data, process and knowledge mining. The push came from Web services, artificial ...de facto’ methods to support new requirements in terms of scalability, privacy, performance, indexing, and heterogeneity of both content and technology.
    11 KB (1,446 words) - 18:26, 13 October 2008
  • Research Data Management Data Repositories and Archives
    5 KB (624 words) - 10:32, 9 May 2019
  • ...these contents comprise a wealth of information often involving multimedia data such as audio, video, pictures and blogs. Further, NTT DoCoMo i-Mode techno * Data models and query languages
    5 KB (746 words) - 18:19, 13 October 2008
  • * Security, Privacy and Trust * Distributed Database and Data Mining
    34 KB (4,565 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust * Distributed Database and Data Mining
    8 KB (1,037 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust * Distributed Database and Data Mining
    9 KB (1,189 words) - 22:20, 10 January 2018
  • * Security, Privacy and Trust * Distributed Database and Data Mining
    26 KB (3,456 words) - 22:20, 10 January 2018
  • ...tributions from many fields such as embedded systems, distributed systems, data management, system security and applications. The conference places emphasi * Security, Privacy & Trust
    4 KB (519 words) - 16:13, 14 October 2008
  • * Security and privacy New tools for measurement and data collection
    8 KB (989 words) - 20:13, 22 February 2009
  • * Data mining and knowledge discovery for MBC * RFID and sensor data management for MBC
    5 KB (647 words) - 22:05, 14 October 2008
  • | Title = 1st International Workshop on Data and Process Provenance ...-produce experiments as well as to greatly assist in the interpretation of data-analyses outcomes. These are all crucial for knowledge discovery.
    3 KB (416 words) - 17:48, 14 October 2008
  • ...re defined radio networks, wireless networks, sensor networks, or Internet data streaming and mining. Internet and data streaming/mining algorithms
    11 KB (1,385 words) - 17:48, 14 October 2008
  • ...e: algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, random
    6 KB (869 words) - 20:22, 22 February 2009
  • data in a truly open way. The Second International Workshop on Location and sharing, privacy issues, and interface design issues. The goal is to create
    5 KB (753 words) - 22:01, 14 October 2008
  • * Database applications and data mining * Trust, security and privacy
    19 KB (2,503 words) - 13:25, 28 October 2020
  • * Security and privacy in vehicular networks * Architecture, algorithms and protocols for data dissemination in vehicular networks
    3 KB (378 words) - 14:22, 24 August 2016
  • - Persistence support and integration of stored data in SPSs - Data mining and knowledge discovery in SPSs
    3 KB (490 words) - 20:05, 14 October 2008
  • # Data Semantics and Linked Data Semantic Web data
    4 KB (450 words) - 20:05, 14 October 2008
  • * › Mobile Agents Support for Data Networks * › Wireless Location Privacy Law and Policies
    9 KB (1,219 words) - 20:05, 14 October 2008
  • Privacy, Trust, and Security is Distributed Systems Data Placement and Storage in Distributed and Mobile Environments
    2 KB (208 words) - 20:05, 14 October 2008
  • ...rental Controls, Legal and Regulatory Issues, Data Collection, Biometrics, Privacy, Encryption
    3 KB (354 words) - 20:06, 14 October 2008
  • - Data Security Issues - Patient Privacy and Confidentiality
    6 KB (780 words) - 20:06, 14 October 2008
  • o Data Management and Data Centers o Security and Privacy
    2 KB (303 words) - 20:06, 14 October 2008
  • * Data fusion in pervasive healthcare environments * Physiological models for interpreting medical sensor data
    6 KB (732 words) - 22:45, 14 October 2008
  • * Data management and middleware support for collaborative information systems * Security an privacy in collaboration
    6 KB (674 words) - 22:45, 14 October 2008
  • ...t provided a suitable model to collect, represent, process and manage such data. Current advances like the Contextualized Attention Metadata Schema (CAM) o ...ing, information retrieval, database systems, digital libraries, metadata, data mining, user modelling, social networks, psychology and cognitive science,
    6 KB (890 words) - 22:53, 14 October 2008
  • semi-structured data; data mining; knowledge discovery; schema migration; digital libraries; data warehousing
    9 KB (1,193 words) - 22:53, 14 October 2008
  • Coupling and Integrating Heterogeneous Data Sources Data Warehouses
    9 KB (1,240 words) - 22:56, 14 October 2008
  • |Title=13th Pacific-Asia Conference on Knowledge Discovery and Data Mining |Field=Data mining
    2 KB (295 words) - 12:03, 18 October 2008
  • - Data Mining - Privacy, safety and security
    18 KB (2,457 words) - 23:04, 14 October 2008
  • ...ent repeatability of their experiments, and share with the community their data and test harnesses. Topics include, but are not limited to, the following. * Management of Semantic Web Data
    6 KB (854 words) - 12:05, 28 May 2016
  • ...search and different scientific communities, such as Software Engineering, Data Bases, Distributed Systems, Information Systems, Information Retrieval, Ser - Data mining and data analysis
    6 KB (827 words) - 23:04, 14 October 2008
  • visualization, personalization, privacy issues - Semantic Web. Meta data analysis and tagging, knowledge extraction,
    4 KB (468 words) - 23:07, 14 October 2008
  • This results in, for example, tools whose algorithms and data structures are poorly primary data by means of standoff annotation. Closely related work deals with
    7 KB (957 words) - 23:08, 14 October 2008
  • | Title = The Alberto Mendelzon Workshop on Foundations of Data Management THE ALBERTO MENDELZON WORKSHOP ON FOUNDATIONS OF DATA MANAGEMENT
    5 KB (660 words) - 14:52, 2 March 2012
  • ...providing new insights in the specification, design, or implementation of data management tools are called for. ...data; security; semantic Web; semi-structured data; spatial data; temporal data; transactions; updates; views; Web services; workflows; XML.
    3 KB (457 words) - 13:09, 7 December 2016
  • |Title=2009 ACM SIGMOD International Conference on Management of Data 2009 ACM SIGMOD International Conference on Management of Data
    7 KB (851 words) - 05:29, 15 October 2008
  • * Data mining/knowledge discovery. * Data warehousing.
    2 KB (308 words) - 23:08, 14 October 2008
  • Data Privacy and Security Data Warehousing, Data Cubes, and
    7 KB (1,006 words) - 23:08, 14 October 2008
  • | Title = 14th International Conference on Management of Data areas but also adds emphasis on Web, Information Retrieval and Data Mining.
    5 KB (661 words) - 16:23, 11 December 2008
  • | Title = The 8th IEEE International Conference on Data Mining | Field = Data mining
    5 KB (634 words) - 15:36, 14 December 2008
  • |Title=ACM Eleventh International Workshop on Data Warehousing and OLAP ACM Eleventh International Workshop on Data Warehousing and OLAP
    10 KB (1,288 words) - 11:52, 18 October 2008
  • | Title = The third Twente Data Management workshop on Privacy Aware Data Management
    557 bytes (65 words) - 23:09, 14 October 2008
  • The term "data and information quality" denotes, in a broad sense, a set of properties of the data that indicate various types of error conditions.
    5 KB (658 words) - 23:09, 14 October 2008
  • * Data quality, integration, warehousing and mining * Privacy and security issues
    3 KB (452 words) - 23:09, 14 October 2008
  • * Data quality, semantics and integration * Data privacy and security
    6 KB (840 words) - 23:10, 14 October 2008
  • ...ics, including traditional database management, as well new challenges for data management in any possible domain. Prospective authors are encouraged to co DATA WAREHOUSING AND KNOWLEDGE DISCOVERY
    3 KB (305 words) - 08:44, 31 July 2020
  • integration of intelligence and data justifies its today's attractiveness. Since 1990 DEXA is an annual internat * Data and Information Modelling
    4 KB (457 words) - 16:14, 16 December 2020
  • stronger over the years as data management research marched through many a data model, with logic keeping up and providing the foundations every step
    5 KB (647 words) - 23:10, 14 October 2008
  • | Title = 3rd Workshop on Data Storage Devices and Systems DS2 2008, the 3rd International Workshop on Data Storage Devices and Systems, will be held at the University of Perugia, Per
    4 KB (539 words) - 23:10, 14 October 2008
  • The theme of BNCOD 2008, the 25th in the series, is "Sharing Data, Information and Knowledge". * Data integration and interoperability
    4 KB (593 words) - 23:10, 14 October 2008
  • * Scientific data management in all domains, e.g. environmental health, biology, genomics, Ea ...* Conceptual models, data models, knowledge representation of scientific data
    3 KB (350 words) - 23:10, 14 October 2008
  • | Title = International Workshop on Privacy and Anonymity in the Information Society Attacks against De-identified Data
    2 KB (193 words) - 23:10, 14 October 2008
  • ...y. Our belief is that XML is the main means towards this new generation of data management systems. Following the experience of previous editions of DataX * Interchange and integration of XML data
    3 KB (475 words) - 23:10, 14 October 2008
  • ...es (and vice versa), to network monitoring systems that depend on advanced data management and analysis capabilities�?? suggests a blurring of the bounda * Data models, query models, and query languages for networking
    3 KB (332 words) - 23:10, 14 October 2008
  • | Title = International Workshop on RFID Data Management International Workshop on RFID Data Management
    4 KB (471 words) - 23:10, 14 October 2008
  • | Title = 3rd Int. Workshop on Dependability Aspects on Data WArehousing and Mining Applications tremendous opportunities for data sharing, integration, and analysis
    7 KB (908 words) - 23:10, 14 October 2008
  • |Title=1st Workshop on Data and Services Management in Mobile Environments ...nt techniques. Therefore, these techniques are evolving and leading to new data and services management systems that consider variable user capabilities an
    2 KB (324 words) - 16:49, 16 December 2020
  • * Data mining and Pattern Recognition in e-learning * Security and privacy;
    4 KB (503 words) - 23:11, 14 October 2008
  • |Title=Second ACM International Conference on Web Search and Data Mining The Second ACM International Conference on Web Search and Data Mining (WSDM) 2009
    2 KB (237 words) - 12:23, 11 September 2020
  • ...e of personal information for the networking operations raise entirely new privacy concerns and require new reflections on security problems. ...shop is to encompass research advances in all areas of security, trust and privacy in Opportunistic and Social Networks.
    4 KB (457 words) - 23:13, 14 October 2008
  • * Technologies for Building and Operating Massive Web Services Data * Privacy-Preserving Web Services Technologies
    8 KB (1,158 words) - 23:14, 14 October 2008
  • * Privacy / intimacy in the social Web * Social software in collaborative maintenance of content and data
    7 KB (860 words) - 11:55, 7 January 2009
  • * Data management and middleware support for collaborative information systems * Security, privacy and trust management in collaborative networks, systems, and applications
    8 KB (1,093 words) - 23:15, 14 October 2008
  • 3-03 Distributed data and knowledge based systems 3-10 Database applications and data mining
    5 KB (623 words) - 23:15, 14 October 2008
  • ...lex, involving difficult social and policy issues such as those related to privacy and security likely in those areas where the right data in the right time have mission-critical importance.
    8 KB (1,003 words) - 23:15, 14 October 2008
  • ...applications, service-oriented computing, middleware, networking, agents, data management and services, all with special focus on mobility and ubiquitous * Security, privacy and social issues of mobile and ubiquitous systems
    5 KB (599 words) - 23:15, 14 October 2008
  • ...in different aspects of the field, ranging from accuracy and robustness to data security and user interface. o Fusion schemes/Data quality estimation/Qualitative-based fusion
    4 KB (526 words) - 23:17, 14 October 2008
  • + Data Management for e-Business TRACK - Data and knowledge engineering for e-Business
    5 KB (594 words) - 16:29, 25 March 2020
  • | Field = Data mining the 25th International Conference on Data Engineering ICDE'09,
    5 KB (592 words) - 23:18, 14 October 2008
  • |Title=The Ninth SIAM International Conference on Data Mining |Field=Data mining
    4 KB (520 words) - 20:02, 26 February 2020
  • | Field = Data mining ...uch as user modeling, machine learning, intelligent information retrieval, data and text mining, statistics, computational intelligence, human-computer int
    4 KB (570 words) - 23:19, 14 October 2008
  • | Title = The 2nd International Workshop on Domain Driven Data Mining | Field = Data mining
    4 KB (510 words) - 23:19, 14 October 2008
  • data mining. Unlike in traditional data mining scenarios, data does not emerge from a small number of (heterogeneous) data sources, but virtually
    5 KB (646 words) - 23:19, 14 October 2008
  • | Title = Practical Privacy - Preserving Data Mining | Field = Data mining
    5 KB (721 words) - 23:19, 14 October 2008
  • applied cryptography intrusion detection data and application security database security privacy-enhancing technology security in IT outsourcing
    5 KB (637 words) - 23:20, 14 October 2008
  • Confidentiality, Data and system integrity Privacy, contract agreements, and payment systems
    4 KB (502 words) - 23:20, 14 October 2008
  • Due to constant changing environments, limited battery life and diverse data types, Mobile - Database and Data Management Mobile Computing
    10 KB (1,262 words) - 23:20, 14 October 2008
  • - Distributed Database and Data Mining - Security, Privacy and Trust
    3 KB (357 words) - 23:23, 14 October 2008
  • * sensor design and data acquisition Biometric Security and Privacy
    3 KB (325 words) - 23:50, 14 October 2008
  • ...cation and networking, embedded systems and hardware, distributed systems, data management, and applications, so we welcome cross-disciplinary work. Data, information, and signal processing
    6 KB (771 words) - 16:09, 16 September 2019
  • * Tools and Methodologies for Large Scale Semantic Web Data - Management Trust, Provenance, Security, Privacy, Identity and the Semantic Web
    4 KB (573 words) - 23:31, 14 October 2008
  • Semantic Annotation of Data Semantic Web Trust, Privacy, Security and Intellectual Property Rights
    2 KB (266 words) - 11:46, 28 May 2016
  • * Online social networks: privacy, reputation, content sharing, search * Cloud computing and data center networks
    4 KB (577 words) - 23:31, 14 October 2008
  • ...application specific fixed function, programmable, reconfigurable, near- data and in-memory accelerators, etc. * Architectural support for security, side-channel attacks and mitigation, privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security
    5 KB (580 words) - 10:32, 12 May 2020
  • * Algorithms and data structures, * Theoretical aspects of areas such as networks, privacy, information retrieval, computational biology, and databases.
    2 KB (283 words) - 18:05, 4 March 2021
  • *Big Data platforms with applications to network management, security, measurements *Innovative uses of network data beyond communication
    4 KB (514 words) - 12:03, 6 April 2020
  • ...cation of internet technologies, multimedia, wireless communications, data privacy and security, authentification, authorization and federation.
    4 KB (504 words) - 23:33, 14 October 2008
  • | Title = The First International Conference on Security and Privacy in Mobile Information and Communication Systems ...ers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymakers.
    4 KB (451 words) - 23:37, 14 October 2008
  • ...e: algorithms and data structures, computational complexity, cryptography, privacy, computational geometry, algorithmic graph theory and combinatorics, random
    5 KB (766 words) - 23:37, 14 October 2008
  • information system is to balance the autonomy of networked data, Agent-based distributed data mining.
    9 KB (1,215 words) - 23:38, 14 October 2008
  • ...describing significant research contributions to thefield of computer and data communication networks. We invite submissions on network architecture, desi * Security, trust, & privacy
    3 KB (380 words) - 19:34, 17 November 2008
  • ...n integrated approaches for assuring reliability, availability, integrity, privacy, confidentiality, safety, and real-time of complex systems and the methods * Policies for reliability, safety, security, integrity, privacy, and confidentiality of high assurance systems
    6 KB (748 words) - 14:43, 27 December 2015
  • - Knowledge discovery and data mining, link analysis, Web mining - Internet search, UCC management, online ...ersonal information management, data integration and federation, security, privacy
    2 KB (303 words) - 23:42, 14 October 2008
  • |title=IEEE Transactions on Big Data |Field=Big Data
    927 bytes (139 words) - 05:14, 9 September 2023
  • ...hitectures and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; ...egrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service discovery; Secure location-based servic
    13 KB (1,617 words) - 19:03, 24 November 2008
  • .../autonomic, on-demand, cloud/etc./; Context-aware and context recognition; Data-centers and nano-centers; Information processing /distribution, discovery, ...otocol translation; IP simplified network management; Security, trust, and privacy; Network stability under topology change; Delay-tolerant IP networks; Trust
    7 KB (883 words) - 17:35, 7 January 2021
  • *Geometric and topological data analysis *Learning with system constraints: e.g. privacy, memory or communication budget
    3 KB (314 words) - 09:33, 1 April 2020
  • data, analysis, decision and execution. As such, real time service-oriented * Security and privacy for RTSOAA based CPS
    7 KB (922 words) - 00:58, 9 January 2009
  • ** Privacy and security ** Inter/intra government applications data exchange
    11 KB (1,366 words) - 16:44, 14 January 2009
  • The Data Grid and Pervasive Computing Data and knowledge management for Pervasive Computing
    4 KB (597 words) - 13:46, 23 January 2009
  • o Databases and data mining * Security, Privacy, Encryption, and Digital Rights, including
    9 KB (1,221 words) - 12:58, 18 January 2009
  • - Data modeling - Privacy
    5 KB (633 words) - 12:58, 18 January 2009
  • * Privacy * Data mining
    16 KB (2,178 words) - 12:59, 18 January 2009
  • ...ethical issues, such as those pertaining to information security, privacy, data mining, and intellectual property. Therefore, as e-business continues to gr ...ent issues in e-business such as those of privacy, information management, data mining, intellectual property, and consumer tracking.
    6 KB (856 words) - 13:00, 18 January 2009
  • ...cessing play a key role in the context of a plethora of modern distributed data, information and knowledge management applications and systems. Distributed - Distributed XML Data Management
    7 KB (1,030 words) - 13:00, 18 January 2009
  • * Stochastic Aspects of Data Hiding * Privacy, trust accountability and dependability
    6 KB (687 words) - 13:00, 18 January 2009
  • | Title = 11th International Conference on Data Warehousing and Knowledge Discovery 11th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2009),
    7 KB (1,006 words) - 13:00, 18 January 2009
  • - temporal data models and query languages - temporal data mining
    6 KB (872 words) - 13:00, 18 January 2009
  • * Data hiding in biometrics, security issues of biometrics, biometric * Practical systems exhibiting data hiding characteristics.
    3 KB (303 words) - 17:06, 24 February 2016
  • | Title = Special Issue of Electronic Commerce Research Journal on Trust and Privacy Aspects of Electronic Commerce Privacy Aspects of Electronic Commerce
    5 KB (602 words) - 13:44, 23 January 2009
  • * High data rate transmission systems * Wireless security and privacy
    14 KB (1,518 words) - 13:01, 18 January 2009
  • and parallel and distributed data storage technologies. NAS 2009 will * Security, trust, and privacy
    10 KB (1,206 words) - 13:01, 18 January 2009
  • - Data Mining 7) Data Storage Devices and Systems - DSDS 09
    10 KB (1,321 words) - 13:01, 18 January 2009
  • • Security, Ethics and PrivacyData Mining and Knowledge Discovery in HI
    4 KB (528 words) - 13:01, 18 January 2009
  • numbers of diverse but interrelated data sources of many varying forms. these disparate data sources, so that they can co-exist comfortably and
    4 KB (568 words) - 13:01, 18 January 2009
  • - Data mining advances on the discovery and analysis of communities - Security, privacy, trust and safety of cyber physical & social computing
    3 KB (446 words) - 13:02, 18 January 2009
  • | Title = 4th Workshop on Data Storage Devices and Systems DS2 2009, the 4th International Workshop on Data Storage Devices and Systems, will be held at the Kyung Hee University, Yong
    4 KB (532 words) - 15:04, 27 December 2015
  • ...ecurity risks in ubiquitous resource sharing, which could be occurred when data resources are connected and accessed by anyone in UC. Therefore, security i - Data privacy and trustiness
    6 KB (852 words) - 13:02, 18 January 2009
  • + Middleware solutions for Security, Privacy and Trust service, and data access service
    6 KB (800 words) - 22:11, 27 February 2009
  • systems that cooperate to exchange data. These systems have emerged as the * Security and privacy in P2P systems
    5 KB (623 words) - 17:06, 27 February 2009
  • * Data Types and Query Languages * Data Stream Technologies
    4 KB (534 words) - 17:07, 27 February 2009
  • _ Data Governance _ Data Scrubbing and Cleaning
    5 KB (690 words) - 17:07, 27 February 2009
  •    * Aggregation techniques and data management    * Privacy and security services
    6 KB (861 words) - 17:07, 27 February 2009
  • ...ves. In this context analysing concepts like Trust, Reliability, Security, Privacy and Risk would help the users to make informed judgements of what their lev • Security and Privacy
    4 KB (600 words) - 17:07, 27 February 2009
  • ...RFID, GSM, GPRS, 3G Digital Pens, PDAs, Mobile Phones, VoIP, Video, Voice, Data, other devices) for improvement of our human lives, not just organizations, Security and Privacy
    7 KB (941 words) - 17:07, 27 February 2009
  • * Authorization, Privacy and Security * Data Mining and Knowledge Discovery
    9 KB (1,249 words) - 08:42, 7 October 2011
  • Data and Knowledge Engineering for E-Business • Security and Privacy in E-Commerce
    3 KB (319 words) - 17:07, 27 February 2009
  • * Security, data handling, and privacy * Spontaneous integration of public/private data & devices
    5 KB (670 words) - 17:08, 27 February 2009
  • privacy, resilience, availability and manageability, and the ability to -Databases and Data Mining
    11 KB (1,440 words) - 17:08, 27 February 2009
  • | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business 2009 World Congress on Privacy, Security, Trust and the Management of e-Business
    12 KB (1,690 words) - 17:08, 27 February 2009
  • - data integrity - data and application security
    6 KB (828 words) - 17:08, 27 February 2009
  • ...has been tightly intertwined with the collection of identifiable personal data. It is the time for researchers in this field to get together and think abo - Data acquisition and process
    5 KB (711 words) - 17:08, 27 February 2009
  • .... Paradigms and algorithms for information visualization, personalization, privacy issue * Semantic Web. Meta data analysis and tagging, knowledge extraction, inference, and maintenance
    3 KB (400 words) - 21:02, 27 February 2009
  • * Data-centric issues, including anonymization, querying, and storage ...nally identifiable information, and etiquette for using shared measurement data (see Allman and Paxson, IMC '07). If applicable, authors are also urged to
    6 KB (774 words) - 17:08, 27 February 2009
  •  Security and Privacy in Wired, Wireless, Mobile, Sensor Ad Hoc Networks  Computer Networks and Data Communication, QoS and Traffic Analysis
    5 KB (578 words) - 10:21, 20 November 2020
  • - XML and data management - Web Security and Privacy
    3 KB (440 words) - 15:25, 9 December 2009
  • - Data mining applications for WMC - Security, privacy, and cryptographic protocols for WMC
    3 KB (477 words) - 16:54, 8 August 2009
  • | Title = International Conference on Management of Data | Field = Data mining
    4 KB (553 words) - 11:33, 2 August 2009
  • ...rs such as the different tags assigned to the same Web. Second, social Web data cover a vast number of heterogeneous entities and distinct feature represen - Exploitation of unannotated social Web data
    4 KB (525 words) - 11:34, 2 August 2009
  • XML and Data Management Web Security and Privacy
    4 KB (564 words) - 12:01, 6 November 2020
  • | Title = 11th International Conference on Mobile Data Management ...though substantial research has been conducted, several areas in mobile data management remain ripe with open research challenges.
    5 KB (530 words) - 11:34, 2 August 2009
  •  Security and Privacy in Wired, Wireless, Mobile, Sensor Ad Hoc Networks  Computer Networks and Data Communication, QoS and Traffic Analysis
    5 KB (599 words) - 10:21, 20 November 2020
  • ...hitectures and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; ...egrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service discovery; Secure location-based servic
    6 KB (746 words) - 11:35, 2 August 2009
  • ...or deployments. Thus, the traditional study of QoS in transporting sensory data in pervasive systems ought to be balanced with the study of QoI in deliveri - Energy-efficient data fusion, sensor fault analysis, sensor data cleansing
    5 KB (734 words) - 11:35, 2 August 2009
  • | Title = International Workshop on Data Mining for Biomarker Discovery | Field = Data mining
    5 KB (670 words) - 11:35, 2 August 2009
  • ? Data management issues ? Security and privacy
    5 KB (571 words) - 11:35, 2 August 2009
  • ...ul interception; Multi-modal undesired traffic detection; Measurements and data mining correlation; Countermeasures on undesired traffic ...of plane tickets; Platforms for electronic distribution of hotel booking; Data accuracy; E-trade strengths and weaknesses; Malicious spyware; Blocking wit
    14 KB (1,651 words) - 15:56, 15 February 2017
  • * Coupling and Integrating Heterogeneous Data Sources * Data Warehouses
    5 KB (552 words) - 17:06, 12 August 2009
  • - Visual Data Analysis and Knowledge Discovery - Data Acquisition and Information Processing
    2 KB (245 words) - 18:52, 7 January 2010
  • - Security and Privacy in Wired, Wireless, Mobile, Sensor Ad Hoc Networks - Computer Networks and Data Communication, QoS and Traffic Analysis
    5 KB (667 words) - 14:27, 13 September 2009
  • - Data mining and knowledge discovery in distributed environments - Intelligent integration of data and processes
    4 KB (508 words) - 13:29, 13 July 2010
  • *Intelligent data management - Data Mining
    4 KB (507 words) - 22:37, 18 November 2009
  • * Data mining security * Trust, privacy, and data security
    5 KB (607 words) - 18:01, 3 December 2009
  • ...lity. Verification and validation. E-business agents. Pervasive computing. Privacy, safety, and security. Andrzej Skowron (Discovery of processes and their interactions from data and domain knowledge),
    6 KB (733 words) - 18:19, 24 September 2020
  • ...ive sensing networks, higher processing power, and the ability to transfer data more quickly through both wired and wireless systems. Thus, particularly dr ...ld only make adequate value if patients’ data is treated in a secure and privacy-sensitive way.
    6 KB (889 words) - 13:48, 26 February 2010
  • |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust
    4 KB (484 words) - 14:20, 14 December 2009
  • |Title=7th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (TrustBus´10)
    7 KB (982 words) - 19:13, 3 January 2010
  • - Data mining applications for WMC - Security, privacy, and cryptographic protocols for WMC
    3 KB (497 words) - 03:43, 28 February 2010
  • |Title=5th International Conference on Software and Data Technologies Conference name: 5th International Conference on Software and Data Technologies(ICSOFT)
    3 KB (392 words) - 13:50, 30 April 2020
  • • Big data analytics for cybersecurity<br> '''Data Science and Analytics in Security Informatics:'''
    4 KB (429 words) - 08:55, 1 August 2019
  • *Big data analytics for cybersecurity '''Data Science and Analytics in Security Informatics:'''
    9 KB (1,092 words) - 09:35, 1 August 2019
  • ...ur that can resists malicious attack, low quality information and preserve privacy. ...mmendation and trust systems, personalization techniques, users models and data mining in the field of social search, user analysis and understanding. Part
    6 KB (765 words) - 14:01, 11 April 2010
  • ...es including statistics, databases, pattern recognition, machine learning, data visualization, optimization, and high-performance computing, to deliver adv ...th gathering relevant information from unstructured and semantically fuzzy data in texts and other media, searching for information within documents and fo
    3 KB (451 words) - 19:25, 16 February 2010
  • ...el of noise, represented by non-pertinent, untrustworthy or even malicious data. Trust and Recommender systems, along with personalization techniques, appe ...y pattern-matching trust concept into logs, by implicit techniques such as data mining or machine learning. This workshop focuses on discussing and identif
    4 KB (600 words) - 19:11, 18 February 2010
  • - Security, encryption and privacy for vehicular systems - Data dissemination and delay-tolerant networking techniques for VCS
    5 KB (624 words) - 21:14, 4 March 2010
  • * › Data Mining * › Privacy, safety and security
    4 KB (418 words) - 14:18, 10 March 2010
  • * Data Security * Privacy
    2 KB (217 words) - 16:50, 19 November 2020
  • * › XML and data management * › Web Security and Privacy
    5 KB (627 words) - 12:33, 16 June 2010
  • |Field=systems and network telemetry, Machine learning, data science, High-performance computing, Distributed systems ...ntax and semantics, which makes organizing and incorporating the generated data difficult for extensive analysis.
    4 KB (584 words) - 17:42, 13 March 2020
  • *Sensor data storage, retrieval, processing *Security and privacy
    3 KB (412 words) - 09:52, 27 February 2020
  • ...revenue maximization; pricing; fair division; computational social choice; privacy and ethics. ...ction markets; recommender, reputation and trust systems; social learning; data markets.
    5 KB (718 words) - 12:00, 11 September 2020
  • ...revenue maximization; pricing; fair division; computational social choice; privacy and ethics. ...ction markets; recommender, reputation and trust systems; social learning; data markets.
    3 KB (330 words) - 13:12, 27 February 2020
  • ...patibility, prediction markets, recommender, reputation and trust systems, privacy ...ND SYSTEMS, including: machine learning, automated agents, trading agents, data mining, experience with e-commerce and systems, economics of the Cloud, soc
    3 KB (316 words) - 14:07, 27 February 2020
  • * › Coupling and Integrating Heterogeneous Data Sources * › Data Warehouses
    19 KB (2,462 words) - 19:10, 26 August 2010
  • ...your internet email account as a way for sending out and getting back fax data. If you happen to be new to these service providers and might be worried ab ...ve internet connection. Now you shouldn’t worry about having to lose the privacy of your sensitive documents. It may be very affordable when being compared
    3 KB (610 words) - 16:33, 27 August 2010
  • * Data Structures * Foundations of Privacy, Trust and Reputation in Network
    4 KB (602 words) - 06:44, 26 August 2020
  • ...grammers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 29th USENIX Security Symposium will b ...ns are solicited in all areas relating to systems research in security and privacy, including but not limited to:
    3 KB (343 words) - 16:31, 6 May 2020
  • * Application of AI and big data in IS * Data and business analytics
    3 KB (395 words) - 15:14, 24 September 2020
  • *Intelligent data management - Data Mining
    6 KB (732 words) - 05:52, 5 December 2010
  • ...or the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community • Public key cryptography and key management • Confidentiality, privacy, integrity, authenticatio
    5 KB (609 words) - 17:01, 5 July 2020
  • Security, Ethics and Privacy Data Mining and Knowledge Discovery in HI
    5 KB (693 words) - 10:44, 14 November 2010
  • * Data Security * Privacy
    2 KB (217 words) - 16:57, 27 December 2015
  • and of the privacy and integrity of the user model data, both of which are the user’s data is very important, since it determines the user’s acceptance
    6 KB (880 words) - 13:14, 1 February 2011
  • * Data Mining * Privacy, Safety and Security
    4 KB (439 words) - 17:54, 29 June 2011
  • XML and data management Web Security and Privacy
    5 KB (612 words) - 12:07, 1 July 2011
  • ...ew threats accompany these trends as well, though. Social hacking, lost of privacy, vague or complex copy rights are just one of them. *Data Mining in Social Networks
    5 KB (669 words) - 14:40, 20 December 2011
  • ...e-Business, e-Science, Green Computing, Secured Technologies, Intelligent Data Management *Intelligent data management
    5 KB (595 words) - 05:03, 15 January 2012
  • - Security, Privacy and Trust - Data- and compute- intensive applications
    6 KB (745 words) - 15:27, 1 November 2016
  • ...ng and trust in the system's functioning and the way it manages the user's data is very important, since it determines the user's acceptance of the applica - Models and mechanisms for privacy
    7 KB (975 words) - 06:13, 18 February 2012
  • ...re systems, standardization of technologies and procedures, certification, privacy are some of the issues that medical informatics professionals and the ICT i Confidentiality and Data Security in Healthcare
    9 KB (1,186 words) - 17:44, 24 February 2012
  • ...s; Cooperative data exchange; Energy efficient-contention protocols; Named data networking; Adaptive contention window; Network mobility models; Spectrum a ...ds; Smart and sustainable cities; Public data centers; Traffic profiles in data centers; Smart energy; Car Connectivity; Green communications systems
    13 KB (1,580 words) - 19:35, 18 February 2021
  • ...grids or industrial systems has become real but also emphasizes particular privacy and security issues to be overcome, especially when interconnected with Int ...ire not only revisiting existing solutions (e.g., for intrusion detection, privacy preserving, and resilience against attacks), but also designing novel secur
    4 KB (581 words) - 18:48, 24 February 2020
  • '''2020 Theme: Data and knowledge for the next generation: sustainability, transparency and fai ...y situated to highlight technologies and insights that materialize the big data and artificial intelligence vision of the future.
    5 KB (653 words) - 13:04, 3 August 2023
  • *Big data *Cloud data management
    4 KB (535 words) - 21:32, 11 February 2020
  • *Big data *Probabilistic and uncertain data
    4 KB (500 words) - 17:29, 6 January 2021
  • ...cience, Free University of Bozen-Bolzano, Research Centre on Knowledge and Data (KRDB) *Trust and privacy in knowledge representation
    5 KB (579 words) - 13:18, 17 February 2020
  • '''Data/Object Management''' *Data Semantics and Integrity Constraints
    5 KB (663 words) - 11:49, 18 February 2020
  • ...|| Education || Parallel, distributed, and concurrent systems || Security, privacy and trust | Big data || End-user software engineering || Program comprehension || Software model
    6 KB (738 words) - 11:21, 6 July 2020
  • * Web Semantics & Linked (Open) Data * Enterprise Knowledge Graphs, Graph Data Management and Deep Semantics
    6 KB (872 words) - 14:00, 22 February 2020
  • * Linked Data and Semantic Data Integration * Trust, Privacy, and Security for Knowledge Graphs
    4 KB (531 words) - 14:14, 22 February 2020
  • |Title=ACM International Conference on Web Search and Data Mining |Field=Information retrieval, Data mining
    4 KB (508 words) - 15:49, 14 May 2020
  • * Search in Structured Data (e.g., XML search, graph search, ranking in databases, desktop search, emai ...o user-centric aspects of IR including user interfaces, behavior modeling, privacy, interactive systems, such as:
    8 KB (1,024 words) - 09:57, 13 May 2020
  • *Cloud computing and data centers *Design and analysis of concurrent and distributed data structures
    2 KB (299 words) - 11:51, 8 April 2020
  • *Web Big Data and Web data analytics *Semantic Web and Linked Open Data applications
    7 KB (991 words) - 11:15, 12 July 2019
  • * Linked Data * Big Data and semantics, exchange and integration
    5 KB (663 words) - 14:34, 5 December 2018
  • * Linked Data * Big Data and semantics, exchange and integration
    5 KB (699 words) - 14:57, 5 December 2018
  • Visual Data Analysis and Knowledge Discovery Data Acquisition and Information Processing
    4 KB (466 words) - 16:27, 19 June 2012
  • ...Sensor Networks Software and Architectures, Wireless Information Networks, Data Manipulation, Signal Processing, Localization and Object Tracking through S 4. DATA MANIPULATION
    5 KB (600 words) - 14:41, 20 June 2012
  • *Big data analytics for cybersecurity<br> '''Data Science and Analytics in Security Informatics:'''
    5 KB (575 words) - 10:16, 1 August 2019
  • Data mining/Text mining/Web mining • Geographical data mining
    6 KB (728 words) - 01:01, 25 August 2012
  • |Acronym=DATA 2013 |Title=2nd International Conference on Data Management Technologies and Applications
    5 KB (558 words) - 13:27, 27 November 2020
  • ICSOFT 2013 will be held in conjunction with DATA 2013 and SIMULTECH 2013 Registration to ICSOFT allows free access to the DATA and SIMULTECH conferences (as a non-speaker)
    6 KB (801 words) - 11:04, 14 April 2020
  • but also more subjects will be discussed at the conference such as Data Privacy, Cryptology, Information Security, E-Governance Security, Public Key
    3 KB (351 words) - 09:52, 28 October 2012
  • ...enough for digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Big data application in IS
    3 KB (375 words) - 15:06, 24 September 2020
  • data engineering researchers, practitioners, developers, * Big Data and Advanced Analytics
    5 KB (584 words) - 14:44, 14 January 2013
  • *Intelligent data management - Data Mining
    4 KB (535 words) - 14:38, 17 January 2013
  • - Data and Metadata Communications Technologies - Cyber-identities and privacy
    5 KB (702 words) - 10:02, 5 March 2013
  • ...Sensor Networks Software and Architectures, Wireless Information Networks, Data Manipulation, Signal Processing, Localization and Object Tracking through S 4. DATA MANIPULATION
    5 KB (647 words) - 19:06, 5 April 2013
  • Privacy, safety and security • Data Mining
    4 KB (438 words) - 14:04, 8 May 2013
  • where "content" may be anything including structured data, video, - Data and web mining
    5 KB (609 words) - 11:08, 26 July 2016
  • * Privacy & Data Protection * Security and Privacy of the Internet of Things [https://www.acsac.org/2016/cfp/hardtopic/ Hard T
    2 KB (264 words) - 15:32, 7 January 2021
  • ** Reasoning over Semantic Web data ** Lightweight semantics (linked data, microformats, etc.)
    5 KB (711 words) - 19:02, 7 March 2020
  • ...TELLIGENCE AND BIG DATA ANALYTICS: Soft computing, knowledge discovery and data mining, machine learning, computational biology, agent-based systems, seman ...d computing, mobile and ubiquitous computing, big data systems, security & privacy.
    3 KB (422 words) - 12:09, 24 April 2016
  • |Title=1st International Conference on Security and Privacy in Vehicular Networks |Field=Security and Privacy in Vehicular Networks
    2 KB (233 words) - 06:32, 20 September 2016
  • ...discussing research results and directions in the areas related to Linked Data, knowledge representation and reasoning, and semantic technologies. Its aim Scalable Data Access
    6 KB (898 words) - 14:42, 24 September 2016
  • ...the domain of Web, information systems, data analytics, and knowledge and data engineering. The decision on acceptance/rejection of workshop proposals wil * Big Data Techniques and Applications
    2 KB (230 words) - 00:37, 28 May 2016
  • |Title=16th IEEE International Conference on Data Mining |Field=Data mining
    2 KB (239 words) - 15:26, 26 February 2020
  • ...is includes change management, trend detection, model evolution, streaming data and stream reasoning, event processing, time-and space dependent models, co * Mining the Semantic Web and the Web of Data
    8 KB (1,067 words) - 12:26, 7 July 2018
  • * Data Warehousing, Data Mining, and Big Data * Social Networks, Web, and Personal Data Management
    4 KB (464 words) - 11:38, 4 September 2020
  • - Cloud Computing and Big Data Analytics - Data Integration and Data Provenance
    12 KB (1,565 words) - 04:15, 5 August 2023
  • * Privacy and Confidentiality * Big Data and Data Mining
    870 bytes (100 words) - 18:53, 2 March 2021
  • * Big Data Analytics * Security and Privacy Issues
    925 bytes (116 words) - 11:05, 24 August 2016
  • |Field=data mining, network, mechanisms&methods Trends in mining/retrieving/handling data
    10 KB (1,305 words) - 00:29, 12 December 2020
  • * Big Data * Security and Privacy of Information and IS
    3 KB (434 words) - 10:28, 26 July 2016
  • |Title=15th IEEE International Conference on Data Mining |Field=Data mining
    2 KB (242 words) - 15:26, 26 February 2020
  • ...ntext awareness, mobile computing, search engines, question answering, big data, multimedia, and services. * Structured data
    5 KB (580 words) - 20:22, 28 January 2017
  • |Title=13th IEEE International Conference on Data Mining |Field=Data mining
    3 KB (407 words) - 10:17, 27 July 2016
  • |Title=22nd ACM SIGKDD Conference on Knowledge Discovery and Data Mining |Field=Data mining
    2 KB (282 words) - 10:48, 8 February 2020
  • |Title=21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining |Field=Data mining
    2 KB (270 words) - 10:49, 8 February 2020
  • *Intelligent data management - Data Mining
    5 KB (641 words) - 22:32, 29 July 2016
  • ...data management is relevant to this symposium. Contributions that connect data management to other areas of theoretical computer science, and those which * graph databases and (semantic) Web data
    4 KB (557 words) - 10:14, 15 May 2019
  • * Data Warehousing, Data Mining, and Big Data * Social Networks, Web, and Personal Data Management
    3 KB (340 words) - 11:27, 4 September 2020
  • ...e transference of methods between both domains. The theme this year is big data and software engineering & knowledge engineering. Submission of papers and * Data modeling, mining and data analytics
    18 KB (2,288 words) - 12:48, 27 October 2016
  • ...search, content management, knowledge management, recommendation systems, data integration, etc.). [BLINK] Benchmarking Linked Data
    10 KB (1,424 words) - 09:54, 6 March 2020
  • Big and Smart Data * Linked (Open) Data
    9 KB (1,190 words) - 10:12, 5 June 2019
  • * Data Warehousing, Data Mining, and Big Data * Social Networks, Web, and Personal Data Management
    3 KB (361 words) - 10:38, 4 September 2020
  • cloud computing, big data, and mobile cloud services, to build innovative smart - Smart city data management and warehouse
    4 KB (565 words) - 09:46, 7 February 2017
  • ...s, Information Technology Audit, Steganalysis, Data Remanence, Information Privacy, Usable Security, etc...
    2 KB (323 words) - 13:36, 6 March 2017
  • ====Scalable Data Access==== * Big Linked Data processing
    7 KB (988 words) - 09:50, 14 August 2019
  • ===Big and Smart Data and Artifical Intelligence=== *data science and digital transformation
    10 KB (1,309 words) - 10:29, 5 June 2019
  • *Big Data and data analytics *Security, privacy, and identity on the Web
    5 KB (671 words) - 11:07, 12 July 2019
  • ===Scalable Web and Data Architectures and Infrastructures=== *Crawling, Caching and Querying Linked (Semantic) Data
    18 KB (2,394 words) - 16:28, 29 January 2018
  • |Title=12th International Workshop on Data Privacy Management |Field=Data Privacy
    7 KB (887 words) - 15:22, 15 July 2017
  • 4) Novel approaches to apply Semantic Web and Linked Data techniques to to their research products: data, software, methods and execution traces.
    5 KB (719 words) - 10:18, 16 July 2017
  • * Privacy and authentication * Data Integrity
    4 KB (597 words) - 13:28, 28 July 2017
  • ...y of access technologies, sensors, terminals, users’ needs and services (data, content, live streams or complex network services). - E-Health and Big Data analysis, summarization, prediction
    4 KB (509 words) - 11:36, 8 August 2017
  • SEMANTiCS 2017 - The Linked Data Conference This year, SEMANTiCS features a special Data Science track, which is an
    6 KB (759 words) - 15:52, 5 December 2018
  • |Title=5th International Workshop on Society, Privacy and the Semantic Web Policy and Technology 5th International Workshop on Society, Privacy and the Semantic Web
    7 KB (901 words) - 11:13, 16 July 2017
  • Technology, (v) Big Data as a Service. - Big Data Cloud Services
    7 KB (1,009 words) - 13:39, 3 September 2017
  • ...le=Ei - ICBDA - IEEE 2018 : 2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA 2018)--IEEE Xplore and Ei Compendex 2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA 2018)--IEEE
    3 KB (461 words) - 13:22, 3 September 2017
  • such as data mining and big data. Empowering the existing infrastructure by Big data security, Database security
    3 KB (464 words) - 09:30, 3 September 2017
  • |Title=CODASPY 2018 : Conference on Data and Application Security and Privacy 8th ACM Conference on Data and Application Security and Privacy will be held on
    6 KB (807 words) - 13:40, 3 September 2017
  • - Design and analysis of concurrent and distributed data structures - Distributed storage and file systems, large-scale systems, and big data
    7 KB (1,009 words) - 15:54, 3 September 2019
  • |Title=IEEE Bigcomp 2018 : 2018 IEEE International Conference on Big Data and Smart Computing Big data and smart computing are emerging research fields that have recently
    3 KB (436 words) - 10:46, 27 May 2020
  • computing, data management, related software and hardware technologies, and * Privacy and Security in Mobile Computing and Wireless Systems
    6 KB (751 words) - 13:28, 28 July 2017
  • Big Data: models for data in the Cloud, programming languages for big data, Security in Information and Knowledge Systems: identity theft, privacy,
    9 KB (1,118 words) - 13:41, 3 September 2017
  • |Title=SPDF-Mobile 2017 : Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” ...-communications-and-networks/call-for-papers/special-issue-on-the-security-privacy-and-digital-forensics
    4 KB (536 words) - 09:59, 21 August 2017
  • * Data management on mobile and wireless computing * Cryptography, security and privacy of mobile & wireless networks
    6 KB (820 words) - 13:30, 28 July 2017
  • - Big Data Management - Service Security and Privacy
    6 KB (873 words) - 13:30, 28 July 2017
  • Biometric recognition from data captured in unconstrained settings, commonly numerous application domains that deal with unconstrained data acquisition
    3 KB (403 words) - 13:30, 28 July 2017
  • * Data Communication and Computer Networks * Data Mining and Knowledge Management Process
    3 KB (347 words) - 10:20, 20 November 2020
  • informatics to solve privacy, security, healthcare, education, poverty, and * Business Intelligence and Data Warehousing
    4 KB (570 words) - 13:30, 28 July 2017
  • * Data Communication and Computer Networks * Data Mining and Knowledge Management Process
    3 KB (346 words) - 17:32, 18 February 2021
  • Data management Security and privacy in heterogeneous IoT
    4 KB (483 words) - 10:00, 21 August 2017
  • theory, methodology and applications of Computer Networks & Data Communications. Wireless Networks, Data Communication Technologies, and Network Security. The
    4 KB (486 words) - 11:57, 8 August 2017
  • to split the control and data plane and to introduce open interfaces network functions to cloud services create new challenges on data
    4 KB (515 words) - 11:28, 6 November 2020
  • Research in Information Security and Privacy (SRISP). The acceptance ratio of • Data Security and Privacy
    5 KB (626 words) - 12:02, 3 September 2017
  • for data storage and data processing gives the ability to collect numerous amounts of data about individuals, and other things in the smart city. Hence,
    5 KB (722 words) - 10:00, 21 August 2017
  • Data Protection RFID Security and Privacy
    2 KB (308 words) - 11:50, 3 September 2017
  • robustness, security, privacy, and ergonomics of EEG-based biometric systems and Data preprocessing, feature extraction, recognition, and matching for EEG-based
    3 KB (450 words) - 15:32, 9 October 2020
  • |Title=ASPMI 2018 : Advances in Security and Privacy of Multimodal Interfaces Advances in Security and Privacy of Multimodal Interfaces
    4 KB (592 words) - 13:34, 28 July 2017
  • |Title=SPIoT 2017 : The 6th International Symposium on Security and Privacy on Internet of Things The 6th International Symposium on Security and Privacy on Internet of Things
    3 KB (379 words) - 12:01, 3 September 2017
  • data hungry smartphones, especially in crowded areas. wireless networks, traffic management, complex graphs, semantic Web, Big Data,
    4 KB (442 words) - 10:00, 21 August 2017
  • |Field=data mining NetworksKnowledge ProcessingData and Information Privacy and SecurityMetadata
    3 KB (398 words) - 13:34, 28 July 2017
  • |Field=data mining * Database and Data Mining
    5 KB (589 words) - 11:46, 8 August 2017
  • • Big data and data mining for smart environments and urban networking • Routing, mobility management, data collection, data dissemination, QoS and QoE
    5 KB (696 words) - 11:36, 8 August 2017
  • and networking of the data. This conference intends to be the meeting point of Architectures, Wireless Information Networks, Data Manipulation, Signal
    5 KB (632 words) - 12:30, 3 September 2017
  • |Title=BDCAT 2017 : The 4th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies |Field=data mining
    4 KB (583 words) - 10:01, 3 September 2017
  • * privacy and security for microservices; * microservices’ role in architecting big data systems;
    2 KB (245 words) - 13:34, 28 July 2017
  • - Security and Privacy - Green/Sustainable Data-Center Management
    8 KB (1,150 words) - 10:11, 7 August 2019
  • |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)
    5 KB (640 words) - 13:34, 28 July 2017
  • * Training data ready and challenges CFP sent : 01 December 2017 * Challenge test data published : 14 February 2018
    12 KB (1,422 words) - 10:18, 5 October 2023
  • Data Mining DM Data Streams DS
    5 KB (660 words) - 13:50, 8 April 2020
  • * Cryptography, Security and Privacy of Mobile & Wireless Networks * Data Management on Mobile and Wireless Computing
    5 KB (616 words) - 13:19, 28 July 2017
  • New forms of multimedia data (such as text, numbers, tags, networking, signals, geo-tagged information, graphs/relationships, 3D/VR/AR and sensor data, etc.)
    5 KB (654 words) - 09:58, 21 August 2017
  • useful human-sensing data and solve complex problems. -Data analytics and data services in and for SOC-based systems
    4 KB (494 words) - 13:20, 28 July 2017
  • |Field=linked data - Linked Data
    7 KB (903 words) - 13:23, 28 July 2017
  • Big data acquisition; Urban security; Biometrics; Enabling wireless and mobile and network infrastructures; Crowd sourcing; Reliability, Security, Privacy and
    4 KB (508 words) - 13:23, 28 July 2017
  • |Title=IEEE PAC 2017 : The 1st IEEE Symposium on Privacy-Aware Computing |Field=privacy
    4 KB (532 words) - 13:24, 28 July 2017
  • Track 3: Data Modeling and Analysis Topics: knowledge discovery; data mining; differential privacy, pattern
    5 KB (670 words) - 13:24, 28 July 2017
  • system is accompanied by a number of challenges which include privacy and preserving the privacy of healthcare systems entirely trust the system
    5 KB (650 words) - 13:24, 28 July 2017
  • |Title=The Eleventh International Conference on Web Search and Data Mining |Field=Data Mining
    8 KB (1,069 words) - 08:17, 6 February 2020
  • |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) Similarly because many CPS systems collect sensor data non-intrusively, users of
    4 KB (565 words) - 17:27, 18 February 2021
  • emerging topics pertaining to IoT and Big Data Analytics, High Speed Track I: IoT, Smart Cities & Big Data Analytics :
    6 KB (743 words) - 11:45, 8 August 2017
  • ...P 2018 : 4th International Conference on Information Systems Security and Privacy 4th International Conference on Information Systems Security and Privacy ICISSP
    3 KB (380 words) - 12:30, 3 September 2017
  • about cloud security, privacy, availability, and data protection. To discuss and * NoSQL data stores
    6 KB (799 words) - 13:28, 28 July 2017
  • |Field=data mining Online Learning, Data Stream Mining, and Dynamic Data Mining
    2 KB (205 words) - 12:56, 3 September 2017
  • positioning, location privacy preserving, secure location sharing and • Secure Location Data Analytics
    4 KB (500 words) - 09:56, 21 August 2017
  • |Title=ICBDE--EI and Scopus 2018 : 2018 International Conference on Big Data and Education (ICBDE 2018)--EI Compendex and Scopus |Field=data mining
    2 KB (233 words) - 13:21, 3 September 2017
  • |Title=IoTBDS 2018 : 3rd International Conference on Internet of Things, Big Data and Security 3rd International Conference on Internet of Things, Big Data and Security IoTBDS
    8 KB (1,170 words) - 13:40, 3 September 2017
  • - Security and Privacy - Green Data Centers
    6 KB (825 words) - 13:22, 3 September 2017
  • sustaining privacy and trust has been a key focus of research. The WorldCIS aims Security, trust, and privacy
    5 KB (571 words) - 11:53, 3 September 2017
  • ...SI 2017 : IET Intelligent Transport Systems, Special Issue on Big Traffic Data Analysis and Mining SPECIAL ISSUE ON: Big Traffic Data Analysis and Mining
    3 KB (374 words) - 10:00, 21 August 2017
  • |Title=ICDIS 2018 : 2018 First International Conference on Data Intelligence and Security |Field=big data
    4 KB (484 words) - 10:00, 21 August 2017
  • Security, Privacy and Trust Issues in IoP Topic 5: Applied Mathematics, Computational Methods and Algorithms, Data and
    2 KB (269 words) - 11:57, 3 September 2017
  • |Field=big data and processing of linked data and devices, distributed computing and cooperative
    6 KB (876 words) - 09:59, 21 August 2017
  • ...ansactions on Emerging Topics in Computing, Special Issue on Scholarly Big Data Data
    4 KB (566 words) - 10:00, 21 August 2017
  • compute and data intensive workloads. The special session also aims at - Security and Privacy aspects of data management in clouds and IoT systems
    6 KB (880 words) - 10:00, 21 August 2017
  • - RESTful systems (design aspects, hypermedia, linked data, mashups, other - Cloud-enabled applications, migration to/from the Cloud, big data
    7 KB (1,046 words) - 10:36, 26 November 2017
  • ...eaning”, "context", “intention”) for all types of resource including data, document, tool, device, process and people. ...ntext awareness, mobile computing, search engines, question answering, big data, multimedia, and services.
    12 KB (1,578 words) - 14:54, 24 September 2020
  • * Ethical challenges of technologies, data, algorithms, platforms, and people in the Web * Modeling Web-related structures, data, users and behaviours
    8 KB (1,023 words) - 19:05, 7 March 2020
  • ...e submission of original research contributions relating to all aspects of data management defined broadly, and particularly encourage submissions on topic * Data models, semantics, query languages
    4 KB (419 words) - 10:40, 23 February 2020
  • ...r science. The ever increasing need to distribute, exchange, and integrate data, information, and knowledge has added further importance to this subject. A * Authenticity, Privacy, Security, and Trust
    4 KB (548 words) - 08:05, 13 September 2019
  • ...h talks, tutorials, demonstrations, and workshops. It will cover issues in data management, database and information systems research, since they are the t ...listed below are intended to serve primarily as indicators of the kinds of data-centric subjects that are of interest to PVLDB – they do not represent an
    6 KB (826 words) - 09:45, 19 February 2021
  • SEMANTiCS 2018 - The Linked Data Conference Important Dates (Research & Innovation incl. Data Science Track)
    11 KB (1,487 words) - 13:45, 13 May 2019
  • |Field=Data Science THEME: FROM BIG DATA AND BIG INFORMATION TO BIG KNOWLEDGE
    4 KB (546 words) - 14:37, 3 August 2023
  • |Title=13th International Conference on Data Integration in the Life Sciences The Thirteenth International Conference on Data Integration in the Life Sciences 2018 (DILS2018) will be held by TIB – Le
    5 KB (751 words) - 11:13, 21 April 2020
  • * Authenticity, Privacy, Security, and Trust * Big Data Management and Analytics
    4 KB (510 words) - 09:37, 21 April 2020
  • * privacy and security issues * Sketch and Gesture based interaction with data
    4 KB (436 words) - 11:49, 21 April 2020
  • We encourage submissions of research papers related to all aspects of data management defined broadly, and particularly encourage work on topics of em * Big data storage, processing and transformation
    2 KB (281 words) - 09:35, 25 March 2020
  • *Learning with system constraints (e.g., privacy, computational, memory, communication) *Learning from complex data: e.g., networks, time series
    3 KB (430 words) - 14:33, 9 April 2020
  • *Big Data platforms with applications to network management, security, measurements *Innovative uses of network data beyond communication
    2 KB (290 words) - 11:16, 6 April 2020
  • *Applications and Big Data *Data Centers and CyberInfrastructure
    2 KB (288 words) - 09:18, 6 June 2019
  • *Cyber-security, Privacy and Ethics of IS *Analytics and Data Science
    2 KB (215 words) - 10:18, 12 June 2019
  • * Structured data * big data
    2 KB (238 words) - 18:42, 7 March 2020
  • * Data management for mobile and wireless applications, * Security and privacy in mobile and wireless systems,
    4 KB (479 words) - 10:05, 17 August 2023
  • * Linked data and semantics enrichment, linking techniques and standards * Documents and privacy
    3 KB (368 words) - 07:27, 17 April 2020
  • * Big Data, Business Intelligence, and Data Analytics * Information Security, Privacy, and Risk Management
    1 KB (188 words) - 07:35, 17 April 2020
  • * Learning with system constraints: e.g. privacy, memory or communication budget. * Learning from complex data: e.g., networks, time series.
    1 KB (156 words) - 15:01, 4 March 2021
  • * Data management for mobile applications * Security and privacy in mobile systems
    5 KB (759 words) - 15:21, 18 June 2020
  • * Big data security and privacy * Blockchain security and privacy
    11 KB (1,549 words) - 11:34, 17 April 2020
  • * algorithms and data structures * privacy and security
    2 KB (192 words) - 08:38, 14 April 2020
  • * Security and privacy protection mechanisms * Data-driven techniques for engineering dependable systems
    5 KB (617 words) - 11:54, 19 June 2020
  • === Technological Aspects of e-Governance & Privacy === * Privacy and Personal Data Protection (PDP); Models of PDP, Registration and Regulation; Policy and Pr
    3 KB (314 words) - 11:52, 27 March 2020
  • |Title=47th International Conference on Very Large Data Bases ...listed below are intended to serve primarily as indicators of the kinds of data-centric subjects that are of interest to PVLDB and they do not represent an
    3 KB (396 words) - 09:53, 19 February 2021
  • |Title=17th International Conference on Trust, Privacy and Security in Digital Business New computing paradigms, such as cloud computing, big data and the Internet of Things open new horizons to businesses by making possib
    5 KB (690 words) - 12:02, 26 March 2020
  • |Title=16th EAI International Conference on Security and Privacy in Communication Networks * Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
    2 KB (299 words) - 13:10, 30 March 2020
  • ...=34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
    728 bytes (92 words) - 16:44, 22 January 2021
  • * Data management for mobile applications * Security and privacy in mobile systems
    5 KB (732 words) - 15:22, 18 June 2020
  • *Big data platforms with applications to network management, security, measurements *Innovative uses of network data beyond communication
    2 KB (238 words) - 11:18, 6 April 2020
  • * big data processing, * data center and internet-scale systems.
    2 KB (210 words) - 12:33, 22 December 2020
  • * Data science * Data privacy
    550 bytes (65 words) - 15:15, 2 April 2020
  • * Data management for mobile applications * Security and privacy in mobile systems
    6 KB (944 words) - 15:24, 18 June 2020
  • * Data management for mobile applications * Security and privacy in mobile systems
    5 KB (721 words) - 10:07, 17 August 2023
  • * Learning with system constraints: e.g. privacy, memory or communication budget. * Learning from complex data: e.g., networks, time series, etc.
    1 KB (170 words) - 09:05, 17 April 2020
  • |Has host organization=Strategic Centre for Research in Privacy-Preserving Technological Systems * Privacy and anonymity technologies
    2 KB (208 words) - 10:19, 9 April 2020
  • * Privacy and anonymity technologies * Privacy enhanced technology
    2 KB (195 words) - 11:08, 9 April 2020
  • Topic 1: Data, Information, and Knowledge Engineering: * Data Structures in Shared Information Systems
    2 KB (254 words) - 08:59, 14 April 2020
  • * Data modeling, mining and data analytics * Data modeling, aggregation, integration, and transformation
    5 KB (608 words) - 13:03, 15 April 2020
  • *big data processing, *data center and internet-scale systems.
    3 KB (303 words) - 08:58, 16 April 2020
  • * big data processing, * data center and internet-scale systems,
    2 KB (222 words) - 11:23, 16 April 2020
  • * Big Data in Ubiquitous Systems * Security, Privacy, Safety and Ethical & Legal Issues
    3 KB (284 words) - 15:23, 16 April 2020
  • * – Big Data in Ubiquitous Systems * – Security, Privacy, Safety and Ethical & Legal Issues
    2 KB (243 words) - 15:46, 16 April 2020
  • * Big Data, Data Analytics, and Business Intelligence * Information Security, Privacy, and Risk Management
    1 KB (158 words) - 08:18, 17 April 2020
  • ...fast broadband signals; High speed optical broadcasting fibers lines; High data rates; Ultra fast access of Internet; Full home automation and home applica ...maging; Visual saliency; Computational photography; Perceptual metrics; 3D Data analysis; Visual content analysis; Video retrieval; Videoconfences; Healthc
    10 KB (1,215 words) - 14:46, 19 April 2020
  • ...icing for energy shared storage; Energy-efficient datacenters; Sustainable data centers; Emerging power markets; Energy-aware cooling and heating models; F ...g; Energy-efficient networking; Technology as Green Enablers (Grid, Cloud, Data Centers, Virtualization); Energy-efficient methodologies for infrastructure
    10 KB (1,331 words) - 14:52, 19 April 2020
  • ...ting protocols; Femto-Clouds; Services in urban environments; Services for data handling in smart cities; Wideband massive MMO; Cache performance; Energy-e ...Service open architecture (SOA); Profiling and service adaptation; Service privacy and security; Quality of service, service level agreement [QoS/SLA]; Servic
    14 KB (1,770 words) - 14:56, 19 April 2020
  • |Field=data, software, automation ...2M infrastructures; Self-organizing socio-technical systems; Context-aware data self-adaptation; Multi-level loop encapsulation in smart systems; Uncertain
    16 KB (1,897 words) - 12:31, 18 May 2020
  • |Field=data, software, automation Trends on WEB-based data processing/analytics
    11 KB (1,390 words) - 12:35, 18 May 2020
  • Linked data and semantics enrichment, linking techniques and standards Documents and privacy
    3 KB (361 words) - 14:48, 22 April 2020
  • ...to engineer agent and multi-agent systems that are secure and protect the privacy concerns of users? big data applications
    8 KB (1,092 words) - 12:49, 22 April 2020
  • * security and privacy protection mechanisms for safety-related and safety-critical systems * data-driven techniques for engineering dependable systems, software and hardware
    3 KB (419 words) - 10:51, 19 June 2020
  • Linked data and semantics enrichment, linking techniques and standards Documents and privacy
    3 KB (363 words) - 14:44, 22 April 2020
  • * Data modeling, mining and data analytics * Data modeling, aggregation, integration, and transformation
    4 KB (490 words) - 09:38, 23 April 2020
  • ...thods, as applied to biological problems, with emphasis on applications in data-rich areas of molecular biology. * Pattern Recognition in Biomedical Data: Challenges in putting big data to work
    3 KB (406 words) - 15:30, 30 April 2020
  • Privacy Statement ...o introduce and implement new technology (such as artificial intelligence, data analytics, virtual reality, rapid machining, rapid testing, and additive ma
    5 KB (712 words) - 09:07, 4 May 2020
  • ...s, application specific fixed function, programmable, reconfigurable, near-data and in-memory accelerators, etc. * Architectural support for security, side-channel attacks and mitigation, privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security
    4 KB (457 words) - 10:25, 6 May 2020
  • |Title=22nd International Conference on Big Data Analytics and Knowledge Discovery * Schema-free Data Repositories
    2 KB (217 words) - 12:15, 7 May 2020
  • ...etwork management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more. ...stems; parallel and distributed systems; storage; networking; security and privacy; virtualization; software-hardware interactions; performance evaluation and
    8 KB (1,078 words) - 09:27, 12 May 2020
  • * Big data infrastructure * Security, privacy, and trust
    6 KB (729 words) - 09:28, 12 May 2020
  • |Title=12th ACM International Conference on Web Search and Data Mining |Field=Information retrieval, Data mining
    4 KB (534 words) - 13:54, 13 May 2020
  • * Data Stream Mining * Data Cleaning & Preprocessing
    2 KB (203 words) - 20:29, 14 May 2020
  • |Title=IEEE International Conference on Big Data * 1. Big Data Science and Foundations
    4 KB (563 words) - 15:55, 23 June 2020
  • |Title=IEEE International Conference on Big Data * Big Data Science and Foundations
    5 KB (543 words) - 21:14, 18 May 2020
  • |Title=24th Pacific-Asia Conference on Knowledge Discovery and Data Mining * Data pre-processing
    2 KB (261 words) - 20:06, 20 May 2020
  • |Title=23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining ...eory, practice, and applications on all aspects of knowledge discovery and data mining. Topics of relevance for the conference include, but not limited to,
    2 KB (268 words) - 20:28, 20 May 2020
  • |Title=22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining ...PAKDD’18 welcomes all submissions on all aspects of knowledge discovery, data mining and machine learning. Suggestive topics of relevance for the confere
    2 KB (272 words) - 21:17, 20 May 2020
  • |Title=IEEE International Conference on Data Science and Advanced Analytics |Field=Data science
    4 KB (515 words) - 16:39, 25 May 2020
  • |Title=5th IEEE International Conference on Data Science and Advanced Analytics * Heterogeneous data/information integration.
    3 KB (308 words) - 16:50, 16 December 2020
  • * Best practices in the archiving and reuse of learner data in safe, ethical ways ...ds that reconcile the opportunities of open science with the challenges of privacy protection
    4 KB (555 words) - 19:06, 26 May 2020
  • |Title=2020 IEEE International Conference on Big Data |Field=big data, cloud computing, artificial intelligence, database
    9 KB (1,187 words) - 14:18, 27 May 2020
  • |Title=6th IEEE International Conference on Big Data and Smart Computing |Field=big data, cloud computing, artificial intelligence, database
    3 KB (389 words) - 06:51, 9 June 2020
  • TRINT: Trends on Internet-based data, applications and services ...aming; Internet-scale real-time analytics; Real-time data aggregation; Big Data and Industrial 4.0 systems; Internet and Crowdsourcing; Mobile and wearable
    14 KB (1,804 words) - 13:49, 5 June 2020
  • ...le services and energy-aware applications; Mobility data and high utility; Data management in the mobile Web; Hierarchical mobility management ...otection and safety of distributed mobile data; Context-aware mobility and privacy; Mobile emergency communication and public safety; Location-based services;
    7 KB (918 words) - 13:51, 5 June 2020
  • * Big multimedia data design and creation * Multimedia security, privacy and forensics
    1 KB (140 words) - 18:05, 9 June 2020
  • * Semantic Analysis of Multimedia and Contextual Data * Multimedia Privacy, Security and Content Protection
    2 KB (240 words) - 20:30, 10 June 2020
  • * Semantic Analysis of Multimedia and Contextual Data * Multimedia Privacy, Security and Content Protection
    2 KB (220 words) - 14:09, 11 June 2020
  • * - Semantic Analysis of Multimedia and Contextual Data * - Multimedia Privacy, Security and Content Protection
    5 KB (552 words) - 21:42, 10 June 2020
  • ...machine learning for cybersecurity; Behavioral biometrics authentication; Privacy by design; Anonymity of blockchain and cryptocurrencies; Threat categorizat ...Monitoring 5G LTE-Advanced networks; LTE-R measurements; Traffic with Big Data; QoE-aware traffic; QoS and QoE in LTE networks; Fraud detection Smart Citi
    17 KB (2,088 words) - 12:49, 14 June 2020
  • Trends in mining/retrieving/handling data ...Holistic indexing; Crowd mining; Mining subjective properties on the Web; Data semantics and information extraction; Community detection in social network
    11 KB (1,356 words) - 12:56, 14 June 2020
  • ...ensing and detection of mental health systems; Hiding sensitive smartphone data; Environments for smart textiles; Wearable reducing anxiety systems; Ambien ...nufacturing challenges; Societal implications, health risk, environmental, privacy aspects
    8 KB (1,041 words) - 12:55, 14 June 2020
  • ...limited to, analytics, semantics description languages and integration (of data and services), interfaces, and applications. * structured data
    4 KB (529 words) - 11:04, 17 June 2020
  • * Indoor Spatial Data Model & Indoor Mobile Mapping * Location Privacy
    2 KB (190 words) - 13:25, 30 June 2020
  • * Indoor Spatial Data Model & Indoor Mobile Mapping * Location Privacy
    1 KB (157 words) - 13:20, 30 June 2020
  • ...hings, people, etc.); Internet, Virtualization and Cloud; Internet and Big Data; Sensing and sensor networks; Energy-aware networks; Content-oriented netwo ...y; MAC protocols for ad-hoc and sensor networks (801.11, Bluetooth, etc.); Data, information, and signal processing in mobile networks; Complexity analysis
    13 KB (1,636 words) - 11:51, 10 July 2020
  • * Data Structures * Databases, Semi-Structured Data and Finite Model Theory
    4 KB (556 words) - 06:42, 26 August 2020
  • * Algorithmic Aspects of Security and Privacy * Data Structures
    4 KB (503 words) - 06:44, 26 August 2020
  • Big Data and Naturalistic Datasets Security, Privacy and Safety Systems
    1 KB (156 words) - 13:41, 10 July 2020
  • Security, privacy and safety systems Big data and naturalistic datasets
    1 KB (175 words) - 13:45, 10 July 2020
  • Security, Privacy and Safety Systems Big Data and Naturalistic Datasets
    2 KB (266 words) - 13:43, 10 July 2020
  • * Data mining for software engineering * Software security and trust; data privacy
    5 KB (557 words) - 07:07, 13 July 2020
  • ...cyclists safety; Evacuation dynamics; Sparse and noisy smartphone location data; Energy management for plug-in hybrid electric vehicles; Heavy-duty vehicle ...cal layer and RF level technologies; Algorithms, protocols and systems for data dissemination; Channel modeling; Modulation and coding; Multi-channel organ
    8 KB (915 words) - 19:45, 9 July 2020
  • ...ence for celebrities on microblogs; Sentiment analysis in the blogosphere; Data-mining twitter; Detection of persistent topics; Attraction similarity metri ...uction and restoration techniques; Preservation analytics; Historic linked data; Digital photos collection analytics; Industrial heritage analytics; Citysc
    9 KB (1,068 words) - 19:47, 9 July 2020
  • ...taneous emergence of consensus; Mining complaints; Big Data Privacy; Large Data Sets; Administrative models for collaborative management; Sustainable commu ...Open research access; Open sources for collaboration; Open web and public data research; Education for Open research; Scientific trust and legal aspects i
    8 KB (897 words) - 17:15, 22 March 2021
  • ...ormance in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality of Service) and QoE (Quality of Experience); Stand ...hings, people, etc.); Internet, Virtualization and Cloud; Internet and Big Data; Sensing and sensor networks; Energy-aware networks; Content-oriented netwo
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ...everything, things, people, etc.); Internet, Virtualization and Cloud; Big Data and mobile networks; Sensing and sensor networks; Energy-aware in mobile ne Security and robustness in wireless networks; Privacy, Authentication Authorization and Accounting (AAA); Encryption and Cryptogr
    11 KB (1,335 words) - 02:28, 10 July 2020
  • ...laboration; Crowdsourcing; Voluntary professional associations; Big social data; e-Government services; Ethical considerations ...arch for information systems; Crowd wisdom in IS; Mining and analyzing Big data; Competitive use of information technology; Cloud-based IS and business fle
    18 KB (2,036 words) - 02:36, 10 July 2020
  • ...ser-centric professional attackers; User-centric data mining; User-centric data aggregation; Personalized seeking and personalized sharing; Contextual user ...cision Making; Human Interpretable and Explainable AI; Data Annotation and Data Labeling Problems; Detecting and Dealing with AI Bias; User Acceptance of A
    10 KB (1,232 words) - 16:20, 22 March 2021
  • ...nergy optimization; Mobile applications-oriented software; Interactive Big data processing; Crowd-Sourcing Programming; Open source challenges; Emphasizing ...ce computing; Approaches to service process improvement; Approaches to Big Data Software Engineering; Approaches to Software Engineering Analytics; Approac
    13 KB (1,573 words) - 12:00, 10 July 2020
  • ...devices; 3d MRI and optical mapping; Semantic representation of human body data; Trusted information for personal wellness; Cloud outsourcing of medical im ...special diseases (Parkinson, Alzheimer, Diabetes, etc.); Real-time medical data collection
    8 KB (970 words) - 16:50, 14 July 2020
  • * Data Warehouse Systems * Big Data and Analytical Systems
    1 KB (159 words) - 13:38, 29 July 2020
  • ...Flow-based security; Adaptive trust; Security operations centers; Trusted data marketplaces; IoT Cloud-based videoconferencing systems; Large-scale datace ...hings, people, etc.); Internet, Virtualization and Cloud; Internet and Big Data; Sensing and sensor networks; Energy-aware networks; Content-oriented netwo
    7 KB (904 words) - 12:32, 22 January 2021
  • ...gs, people, etc.); Security for Virtualization and Cloud; Security and Big Data; Security in sensing and sensor networks; Security and energy-aware network ...ecurity during system migration or updates; Security integration pitfalls; Data leakage, vulnerabilities, failures and lessons learned; Security standards
    15 KB (1,886 words) - 16:16, 25 August 2020
  • ...orks; Encryption algorithms for sensor networks; Sensor secure management; Data integrity; Trustworthiness issues in sensor networks; Trade-off analysis ...s social sensors (Mobile sensing); Wearable sensing; Spatial epidemiology; Data availability and quality; Dataprotection and confidentiality, Social mining
    15 KB (1,880 words) - 14:45, 27 August 2020
  • ...ystem integration; Effective live cloud migration; Big Data, Fast Data and Data Lake in system integration; Vulnerabilities in software product lines; Cons Data Integration
    6 KB (769 words) - 14:09, 24 August 2020
  • Data-aware greed computing Energy-efficient Data Centers
    6 KB (815 words) - 20:27, 30 July 2020
  • * Privacy, security, ethical, and social issues * Data Warehouses and Data Mining
    9 KB (896 words) - 16:31, 6 August 2020
  • ...gration of geographical information systems; Geo-processing of distributed data; Geo-information processing; Use of computational geometry for GIS problems ...apes; Pedestrian mobility behavior patterns; Business news spatio-temporal data; Geo-social co-location mining; Spatial drift analysis; Processing cascadin
    11 KB (1,423 words) - 14:47, 27 August 2020
  • ...valuation; Interface generators and other tools for developing interfaces; Data visualization; Visualization techniques; Interactive visualization ...ng in medicine; Multidimensional projections with application to medicine; Data mining and image retrieval techniques for medical applications; Imaging int
    16 KB (1,964 words) - 13:34, 7 January 2021
  • * Big data * Privacy and security
    973 bytes (104 words) - 07:27, 13 August 2020
  • ...cy in healthcare; ePoint.telemed; Home monitoring on chronic diseases; Big Data and Smart Health; eHealth and education via visual analytics; Experiences i ...l knowledge; Visualizing patient data; Biomedical datasets; Global patient-data exchanges; Challenges for patient-records standardizing
    16 KB (2,024 words) - 13:33, 24 August 2020
  • # Big data analytics and business intelligence # Security and privacy issues
    3 KB (327 words) - 10:00, 25 August 2020
  • * Algorithms for information security and privacy * Algorithms for big data
    4 KB (436 words) - 12:06, 25 August 2020
  • ...um on Security and Privacy 2018]] ||[[:39th IEEE Symposium on Security and Privacy]] ||43 ...um on Security and Privacy 2019]] ||[[:40th IEEE Symposium on Security and Privacy]] ||43
    24 KB (2,633 words) - 18:53, 15 October 2020
  • * Big data analysis for localization * Data Fusion and Hybrid Localization
    3 KB (292 words) - 12:44, 3 September 2020
  • Data Intensive Computing and Data Centre Architecture Big Data Platforms
    2 KB (246 words) - 15:08, 3 September 2020
  • *Data Warehousing, Data Mining, and Big Data *Social Networks, Web, and Personal Data Management
    4 KB (447 words) - 12:37, 4 September 2020
  • |Title=13th International Conference on Security and Privacy in Communications Networks Also known as: 13th EAI International Conference on Security and Privacy in Communication Networks (EAI = European Alliance for Innovation)
    3 KB (326 words) - 09:35, 10 September 2020
  • |Title=12th International Conference on Security and Privacy in Communications Networks Also known as: 12th EAI International Conference on Security and Privacy in Communication Networks (EAI = European Alliance for Innovation)
    3 KB (336 words) - 09:51, 10 September 2020
  • * Data Warehousing, Data Mining, and Big Data * Web and Personal Data Management
    4 KB (478 words) - 11:05, 11 September 2020
  • * Big Data, Data Science and Analytics * Big Data architectures
    3 KB (346 words) - 16:20, 24 September 2020
  • Data centers Data reduction, inference, and signal processing
    4 KB (587 words) - 12:07, 5 November 2020
  • Compression of random data; Recompression of compressed data; 2D projection of 3D data; Stereo data matching; Emerging applications
    11 KB (1,377 words) - 20:26, 22 November 2020
  • ...nth International Conference on Big Data, Small Data, Linked Data and Open Data |Field=Big Data
    9 KB (1,239 words) - 14:37, 29 December 2020
  • ...ting protocols; Femto-Clouds; Services in urban environments; Services for data handling in smart cities; Wideband massive MMO; Cache performance; Energy-e ...Service open architecture (SOA); Profiling and service adaptation; Service privacy and security; Quality of service, service level agreement [QoS/SLA]; Servic
    13 KB (1,574 words) - 12:11, 24 November 2020
  • ...2M infrastructures; Self-organizing socio-technical systems; Context-aware data self-adaptation; Multi-level loop encapsulation in smart systems; Uncertain ...abstractions; Programming languages for machine learning; Visualization of data, models, and predictions; Hardware-efficient machine learning methods; Mode
    16 KB (1,874 words) - 12:15, 24 November 2020
  • ...icing for energy shared storage; Energy-efficient datacenters; Sustainable data centers; Emerging power markets; Energy-aware cooling and heating models; F ...g; Energy-efficient networking; Technology as Green Enablers (Grid, Cloud, Data Centers, Virtualization); Energy-efficient methodologies for infrastructure
    10 KB (1,235 words) - 18:42, 26 November 2020
  • ...irteenth International Conference on Advances in Databases, Knowledge, and Data Applications |Field=Advances in Databases, Knowledge, and Data Applications
    11 KB (1,360 words) - 18:45, 26 November 2020
  • ...machine learning for cybersecurity; Behavioral biometrics authentication; Privacy by design; Anonymity of blockchain and cryptocurrencies; Threat categorizat ...Monitoring 5G LTE-Advanced networks; LTE-R measurements; Traffic with Big Data; QoE-aware traffic; QoS and QoE in LTE networks; Fraud detection Smart Citi
    17 KB (2,035 words) - 14:45, 18 February 2021
  • ...le services and energy-aware applications; Mobility data and high utility; Data management in the mobile Web; Hierarchical mobility management ...otection and safety of distributed mobile data; Context-aware mobility and privacy; Mobile emergency communication and public safety; Location-based services;
    7 KB (868 words) - 15:11, 18 February 2021
  • ...of Things) systems; Observational data and simulations; Complex scientific data sets; Massively scalable task parallelism; Routing-aware tasks; Multi-tenan ...ales; Sharing in IaaS clouds; Large-scale visualization; Distributed NoSQL data stores
    11 KB (1,325 words) - 15:01, 18 February 2021
  • Big Data and mobile networks; Sensing and sensor networks; Energy-aware Security and robustness in wireless networks; Privacy, Authentication
    12 KB (1,454 words) - 19:21, 30 November 2020
  • driving systems; A priori map data; Multi-lane vehicular traffic models; dynamics; Sparse and noisy smartphone location data; Energy management
    8 KB (1,014 words) - 19:25, 30 November 2020
  • of Everything (IoE); Improving reliability; Congestion-adaptive data privacy in data-centers; Identity and privacy management; QoS (Quality
    13 KB (1,607 words) - 19:32, 30 November 2020
  • ...fast broadband signals; High speed optical broadcasting fibers lines; High data rates; Ultra fast access of Internet; Full home automation and home applica ...maging; Visual saliency; Computational photography; Perceptual metrics; 3D Data analysis; Visual content analysis; Video retrieval; Videoconfences; Healthc
    9 KB (1,125 words) - 10:54, 8 December 2020
  • ...n Software-Defined Networks (SDN); Self-aware adaptation for analyzing big data; Self-adaptation in high-speed signals processing; Self-adapting e-Health s ...ganizing and autonomics systems; Agent-based trust models for cooperation; Privacy and Security in self-organizing and adaptive systems; Human and social fact
    8 KB (931 words) - 15:28, 29 December 2020
  • ...n Cloud infrastructures; Untrusted Cloud environments; Multiple Clouds and data centers; Power Constrained VMs; Cloud Green abstraction layer; Managing app ...amming and application development; Scalability, discovery of services and data in Cloud computing infrastructures; Trust and clouds; Client-cloud computin
    8 KB (964 words) - 18:54, 8 December 2020
  • ...orage, collection, and processing; Formal conceptual models of human brain data; Knowledge representation and discovery in neuroimaging; Brain-computer int ...ogic, neural networks, and uncertainty; State space search, ontologies and data mining; Games, planning and scheduling; Natural languages processing and ad
    8 KB (972 words) - 18:55, 8 December 2020
  • ...ies; Crowd-oriented content; Biological content (genes); Stream data; Text data; Underwater content (images); Geographic and atmospheric content modeling; ...ated content; Social semiotic mining; Social tags and Linked Data; Linking Data (social, open, public, and enterprise)
    13 KB (1,567 words) - 18:56, 8 December 2020
  • ...n and management of ubiquitous and pervasive services; Security, trust and privacy management in ubiquitous and pervasive services; Semantics and ontology for ...y, matching, and integration of Web services; SLA/QoS/QoE in Web services (privacy, security, performance, reliability, fault tolerance); Testing and validati
    10 KB (1,221 words) - 18:57, 8 December 2020
  • digital signal processing; Compression of random data; Recompression of compressed data; 2D projection of 3D data; Stereo data matching;
    19 KB (2,346 words) - 10:51, 9 December 2020
  • Dealing with Big data and media; Processing swarm-data and self-organizing; Trimming similar data; Processing high speed and
    10 KB (1,212 words) - 14:36, 29 December 2020
  • ...ensing and detection of mental health systems; Hiding sensitive smartphone data; Environments for smart textiles; Wearable reducing anxiety systems; Ambien ...nufacturing challenges; Societal implications, health risk, environmental, privacy aspects
    8 KB (991 words) - 00:37, 12 December 2020
  • |Field=information systems, big data, software design Data Analytics, Public/Private Data, Linked/Open Data
    5 KB (640 words) - 21:39, 17 December 2020
  • TRINT: Trends on Internet-based data, applications and services ...ming; Internet-scale real-time analytics; Real-time data aggregation; Big Data and Industrial 4.0 systems; Internet and Crowdsourcing; Mobile and wearable
    15 KB (1,921 words) - 01:00, 12 December 2020
  • ...hth International Conference on Big Data, Small Data, Linked Data and Open Data ...hth International Conference on Big Data, Small Data, Linked Data and Open Data
    9 KB (1,229 words) - 03:37, 3 December 2021
  • * big data processing, * data center and internet-scale systems.
    2 KB (245 words) - 17:00, 6 January 2021
  • ...ference methods for networks ▪ Explainable AI, fairness, accountability, privacy, transparency and ethics in vision ▪ Image and video synthesis ▪ Image
    946 bytes (113 words) - 15:49, 7 January 2021
  • Security and Privacy for IoT: *Privacy data protection
    6 KB (804 words) - 11:42, 28 January 2021
  • ...ting protocols; Femto-Clouds; Services in urban environments; Services for data handling in smart cities; Wideband massive MMO; Cache performance; Energy-e ...Service open architecture (SOA); Profiling and service adaptation; Service privacy and security; Quality of service, service level agreement [QoS/SLA]; Servic
    13 KB (1,653 words) - 14:44, 10 February 2021
  • ...2M infrastructures; Self-organizing socio-technical systems; Context-aware data self-adaptation; Multi-level loop encapsulation in smart systems; Uncertain ...abstractions; Programming languages for machine learning; Visualization of data, models, and predictions; Hardware-efficient machine learning methods; Mode
    16 KB (1,874 words) - 14:47, 10 February 2021
  • ...icing for energy shared storage; Energy-efficient datacenters; Sustainable data centers; Emerging power markets; Energy-aware cooling and heating models; F ...g; Energy-efficient networking; Technology as Green Enablers (Grid, Cloud, Data Centers, Virtualization); Energy-efficient methodologies for infrastructure
    10 KB (1,237 words) - 14:50, 10 February 2021
  • ...irteenth International Conference on Advances in Databases, Knowledge, and Data Applications |Field=Advances in Databases, Knowledge, and Data Applications
    11 KB (1,361 words) - 14:52, 10 February 2021
  • * • Blockchain Security and Privacy * • Peer-to-Peer Security & Privacy
    2 KB (197 words) - 17:40, 11 February 2021
  • = List of Data Donations = ||206||206||2006||Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Se
    13 KB (1,402 words) - 09:13, 21 February 2021
  • * Data center networks * Data models and semantic models
    3 KB (291 words) - 11:57, 25 February 2021
  • ...ting protocols; Femto-Clouds; Services in urban environments; Services for data handling in smart cities; Wideband massive MMO; Cache performance; Energy-e ...Service open architecture (SOA); Profiling and service adaptation; Service privacy and security; Quality of service, service level agreement [QoS/SLA]; Servic
    14 KB (1,718 words) - 11:30, 3 March 2021
  • ...2M infrastructures; Self-organizing socio-technical systems; Context-aware data self-adaptation; Multi-level loop encapsulation in smart systems; Uncertain ...abstractions; Programming languages for machine learning; Visualization of data, models, and predictions; Hardware-efficient machine learning methods; Mode
    16 KB (1,956 words) - 11:50, 3 March 2021
  • ...icing for energy shared storage; Energy-efficient datacenters; Sustainable data centers; Emerging power markets; Energy-aware cooling and heating models; F ...g; Energy-efficient networking; Technology as Green Enablers (Grid, Cloud, Data Centers, Virtualization); Energy-efficient methodologies for infrastructure
    10 KB (1,277 words) - 11:56, 3 March 2021
  • ...irteenth International Conference on Advances in Databases, Knowledge, and Data Applications ...Data query, access, mining, and correlation, Data and process provenance, Data management
    12 KB (1,409 words) - 12:01, 3 March 2021
  • * Security, Privacy and Trust * Distributed Database and Data Mining
    2 KB (230 words) - 12:18, 4 March 2021
  • * Privacy-preserving data analysis. * Adaptive data analysis and selective inference.
    1 KB (162 words) - 15:10, 4 March 2021
  • Big data management Database systems and data analytics frameworks
    2 KB (273 words) - 04:32, 17 March 2021
  • - Multimedia big data analytics - Streaming, security and privacy for healthcare
    2 KB (246 words) - 10:59, 19 March 2021
  • |Title=4th International Conference on Computing and Big Data ...Geo Intelligence; Big Data for Logistics; Big Data for Power Systems; Big Data for Robotics; Blockchain in cyber physical systems; Blockchain in social ne
    2 KB (267 words) - 11:29, 9 April 2021
  • ...y situated to highlight technologies and insights that materialize the big data and artificial intelligence vision of the future. CIKM 2021 will take place ...arch papers on all topics in the general areas of artificial intelligence, data science, databases, information retrieval, and knowledge management. Topics
    37 KB (5,185 words) - 11:25, 3 August 2023
  • Big data and machine learning for networks Business Analytics and Big Data
    2 KB (240 words) - 09:51, 13 April 2021
  • ...m data; Recompression of compressed data; 2D projection of 3D data; Stereo data matching; Emerging applications requiring new compression tools; Unified co DATA: Data processing
    19 KB (2,317 words) - 02:40, 26 November 2021
  • ...m data; Recompression of compressed data; 2D projection of 3D data; Stereo data matching; Emerging applications requiring new compression tools; Unified co ...; Synthetic aperture radar (SAR) image process modeling; Quality of remote data (spatial, spectral, radiometric and temporal resolutions); Remote sensing t
    11 KB (1,294 words) - 02:42, 26 November 2021
  • ...storage; Data analytics and multimedia; Visualizing and multimedia; Mobile data and multimedia; Signal processing and multimedia ...d wireless multimedia systems; Distributed multimedia systems; Multisensor data integration and fusion; Multimedia and P2P; Multimedia standards
    10 KB (1,221 words) - 03:35, 3 December 2021
  • Data Communication and Networking, Information Privacy and Security,
    4 KB (494 words) - 10:28, 27 September 2022
  • |Title=2nd International Conference on Big Data and Privacy Computing
    1 KB (144 words) - 05:36, 7 November 2023
  • ...ntax and semantics, which makes organizing and incorporating the generated data difficult for extensive analysis. ...visions of investigating new approaches and methods at the intersection of data sciences and HPC/distributed computing systems.
    4 KB (612 words) - 16:54, 7 March 2023
  • Authorization, data privacy and security Data quality, provenance, adaptability and reusability
    6 KB (723 words) - 07:11, 16 August 2023
  • Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc Networks, Communication Privacy and Anonymity,
    4 KB (517 words) - 04:36, 29 June 2023

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)