Search results
Create the page "Data security" on this wiki! See also the search results found.
Page title matches
- 23 bytes (2 words) - 11:54, 8 August 2017
- 25 bytes (2 words) - 13:40, 3 September 2017
- ...ICDIS 2018 : 2018 First International Conference on Data Intelligence and Security |Field=big data4 KB (484 words) - 10:00, 21 August 2017
- 26 bytes (2 words) - 13:40, 3 September 2017
Page text matches
- |Title=The 10th International Conference on Mobile Data Mangement (MDM'09): Systems, Services and Middleware in mobile data management. The conference provides unique opportunities for researchers,13 KB (1,468 words) - 01:23, 22 August 2008
- ...prehensively represented this includes future events as well as historical data about e.g. about acceptance rates of the main conferences in the field ====Computer security and reliability====6 KB (714 words) - 12:19, 11 December 2020
- *Network Security *Data Warehousing, Ontologies and Databases5 KB (571 words) - 09:22, 19 July 2019
- The 2011 International Conference of Computational Statistics and Data Engineering The 2011 International Conference of Data Mining and Knowledge Engineering3 KB (454 words) - 12:34, 8 October 2020
- Data management constitutes the essential enabling technology for several diverse purposes. Established data management solutions9 KB (1,189 words) - 14:53, 28 August 2008
- ...Temporal data; Concurrency and recovery; Transaction management; Views and data warehousing.5 KB (753 words) - 18:59, 25 June 2012
- |Title=International Workshop on Data Management as well as directions for future research directions on data5 KB (611 words) - 15:43, 16 September 2008
- ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d ...articular requirements. On the one hand, there are aspects of programming, data handling, and intensive computing applications; on the other hand, there ar18 KB (2,408 words) - 02:37, 16 December 2008
- * Data warehouse and multidimensional modelling, analysis and mining * Security issues in information systems7 KB (763 words) - 12:25, 6 October 2011
- ...Twelfth International Conference on Advances in Databases, Knowledge, and Data Applications |Field=data, software, automation11 KB (1,371 words) - 12:28, 18 May 2020
- ...substantial improvements for content processing, information indexing, and data, process and knowledge mining. The push came from Web services, artificial ...s on databases, evolution of relation between databases and other domains, data base technologies and content processing, as well as specifics in applicati11 KB (1,446 words) - 18:26, 13 October 2008
- * Security, Privacy and Trust * Distributed Database and Data Mining34 KB (4,565 words) - 22:20, 10 January 2018
- * Security, Privacy and Trust * Distributed Database and Data Mining8 KB (1,037 words) - 22:20, 10 January 2018
- * Security, Privacy and Trust * Distributed Database and Data Mining9 KB (1,189 words) - 22:20, 10 January 2018
- * Security, Privacy and Trust * Distributed Database and Data Mining26 KB (3,456 words) - 22:20, 10 January 2018
- ...issues such as workload modeling, performance metrics, power consumption, security, usability, and experience with real systems and failures ...losive growth in storage and the increasing need to store, find and manage data for long periods5 KB (777 words) - 05:50, 14 October 2008
- ◦ Data Distribution, Load Balancing & Scaling ◦ Security and Reliability4 KB (452 words) - 17:47, 7 April 2021
- ...lds such as embedded systems, distributed systems, data management, system security and applications. The conference places emphasis on layers well above the t * Security, Privacy & Trust4 KB (519 words) - 16:13, 14 October 2008
- IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009) IEEE Symposium on Computational Intelligence and Data Mining (CIDM 2009)3 KB (376 words) - 17:47, 14 October 2008
- * Security and privacy New tools for measurement and data collection8 KB (989 words) - 20:13, 22 February 2009
- Database and Data Mining Security and Information Assurance4 KB (503 words) - 11:36, 18 October 2008
- * Data mining and knowledge discovery for MBC * RFID and sensor data management for MBC5 KB (647 words) - 22:05, 14 October 2008
- | Title = 1st International Workshop on Data and Process Provenance ...-produce experiments as well as to greatly assist in the interpretation of data-analyses outcomes. These are all crucial for knowledge discovery.3 KB (416 words) - 17:48, 14 October 2008
- ...re defined radio networks, wireless networks, sensor networks, or Internet data streaming and mining. Internet and data streaming/mining algorithms11 KB (1,385 words) - 17:48, 14 October 2008
- | Title = IEEE International Conference on Intelligence and Security Informatics | Field = Computer security and reliability438 bytes (45 words) - 21:41, 16 October 2008
- * Database applications and data mining * Trust, security and privacy19 KB (2,503 words) - 13:25, 28 October 2020
- * Security and privacy in vehicular networks * Architecture, algorithms and protocols for data dissemination in vehicular networks3 KB (378 words) - 14:22, 24 August 2016
- - Persistence support and integration of stored data in SPSs - Data mining and knowledge discovery in SPSs3 KB (490 words) - 20:05, 14 October 2008
- Conference on Data Engineering in Shanghai, China) rent out network presence, computation power, and data storage space7 KB (907 words) - 21:51, 14 October 2008
- # Data Semantics and Linked Data Semantic Web data4 KB (450 words) - 20:05, 14 October 2008
- ...describing significant research contributions to the field of computer and data communication networks. We invite submissions on various aspects of network * Network security, vulnerability, and defenses3 KB (353 words) - 20:31, 14 October 2008
- * › Mobile Agents Support for Data Networks * › Security Aspects of Mobile Software9 KB (1,219 words) - 20:05, 14 October 2008
- Privacy, Trust, and Security is Distributed Systems Data Placement and Storage in Distributed and Mobile Environments2 KB (208 words) - 20:05, 14 October 2008
- ...ithm engineering techniques in the design and evaluation of algorithms and data structures. Submissions should present significant contributions supported * Cryptography and Security2 KB (216 words) - 20:05, 14 October 2008
- Data Mining and Knowledge Discovery Computer and Network Security3 KB (332 words) - 20:06, 14 October 2008
- |Field=Computer security and reliability ...n and information systems. Moreover, there are other dedicated systems for data mining, recommenders, sensing, conflict detection, intrusion detection, or15 KB (2,175 words) - 21:03, 19 March 2013
- Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability SECURITY and RIGHTS MANAGEMENT3 KB (354 words) - 20:06, 14 October 2008
- - Data Security Issues - Electronic Data Interchange (EDI)6 KB (780 words) - 20:06, 14 October 2008
- * Data Warehousing and Data Mining * Security Technologies2 KB (193 words) - 20:06, 14 October 2008
- Data mining Intelligent Networks and Security3 KB (359 words) - 20:06, 14 October 2008
- o Data Management and Data Centers o Security and Privacy2 KB (303 words) - 20:06, 14 October 2008
- ...ction, logistics and networking to complex event processing in finance and security. The event based paradigm has gathered momentum as witnessed by current eff ...ages for event correlation and patterns, streaming and continuous queries, data fusion6 KB (829 words) - 15:30, 29 January 2021
- * Security * Data dissemination and Peer-to-Peer systems6 KB (686 words) - 20:06, 14 October 2008
- * Data fusion in pervasive healthcare environments * Physiological models for interpreting medical sensor data6 KB (732 words) - 22:45, 14 October 2008
- * Data management and middleware support for collaborative information systems * Security and trust management in collaborative networks, systems, and applications6 KB (674 words) - 22:45, 14 October 2008
- ...t provided a suitable model to collect, represent, process and manage such data. Current advances like the Contextualized Attention Metadata Schema (CAM) o ...ing, information retrieval, database systems, digital libraries, metadata, data mining, user modelling, social networks, psychology and cognitive science,6 KB (890 words) - 22:53, 14 October 2008
- semi-structured data; data mining; knowledge discovery; schema migration; digital libraries; data warehousing9 KB (1,193 words) - 22:53, 14 October 2008
- -Visualization of data and processes in applications -Visualization of data base schemes3 KB (355 words) - 22:53, 14 October 2008
- �?� Large scale, massive data storage, access, exploration, and manipulation, for cooperative visualizati ...ent process modeling, product modeling, reference models, business models, data representations and standards.4 KB (468 words) - 22:54, 14 October 2008
- Coupling and Integrating Heterogeneous Data Sources Database Security and Transaction Support9 KB (1,240 words) - 22:56, 14 October 2008
- ...ame studies/game design, e) graphics and interfaces and f ) networking and security. Papers that fall outside these topic areas are strongly encouraged and sho ...istributed database techniques and consistency models for networked games; data management for games that cross physical and virtual worlds.9 KB (1,275 words) - 14:46, 27 December 2015
- |Title=13th Pacific-Asia Conference on Knowledge Discovery and Data Mining |Field=Data mining2 KB (295 words) - 12:03, 18 October 2008
- - Data Mining - Security and Reputation18 KB (2,457 words) - 23:04, 14 October 2008
- ...ent repeatability of their experiments, and share with the community their data and test harnesses. Topics include, but are not limited to, the following. * Management of Semantic Web Data6 KB (854 words) - 12:05, 28 May 2016
- �?� Bases de Datos, Data Warehouses y Minería de Datos �?� Networks and Data Communications13 KB (1,775 words) - 23:04, 14 October 2008
- ...search and different scientific communities, such as Software Engineering, Data Bases, Distributed Systems, Information Systems, Information Retrieval, Ser - Data mining and data analysis6 KB (827 words) - 23:04, 14 October 2008
- * Error tolerance, security and robustness * Data gathering, aggregation and dissemination2 KB (316 words) - 23:05, 14 October 2008
- * Cryptography and Network Security * Data Mining and Knownledge Discovery2 KB (167 words) - 23:05, 14 October 2008
- ...t the field of MT continues to grow and attract more and more researchers. Data-driven approaches have become particularly fashionable in recent years. The Advances in data-driven MT (Statistical MT, Example-based MT, etc.)16 KB (2,200 words) - 20:51, 18 February 2021
- | Title = The Alberto Mendelzon Workshop on Foundations of Data Management THE ALBERTO MENDELZON WORKSHOP ON FOUNDATIONS OF DATA MANAGEMENT5 KB (660 words) - 14:52, 2 March 2012
- ...providing new insights in the specification, design, or implementation of data management tools are called for. ...data; security; semantic Web; semi-structured data; spatial data; temporal data; transactions; updates; views; Web services; workflows; XML.3 KB (457 words) - 13:09, 7 December 2016
- |Title=2009 ACM SIGMOD International Conference on Management of Data 2009 ACM SIGMOD International Conference on Management of Data7 KB (851 words) - 05:29, 15 October 2008
- * Data mining/knowledge discovery. * Data warehousing.2 KB (308 words) - 23:08, 14 October 2008
- Data Privacy and Security Data Warehousing, Data Cubes, and7 KB (1,006 words) - 23:08, 14 October 2008
- | Title = 14th International Conference on Management of Data areas but also adds emphasis on Web, Information Retrieval and Data Mining.5 KB (661 words) - 16:23, 11 December 2008
- | Title = 1st Social Data on the Web workshop CfP: 1st Social Data on the Web workshop (SDoW2008)5 KB (709 words) - 23:08, 14 October 2008
- | Title = 10th ACM International Workshop on Web Information and Data Management and Data Management (WIDM 2008)3 KB (437 words) - 23:20, 14 October 2008
- | Title = The 8th IEEE International Conference on Data Mining | Field = Data mining5 KB (634 words) - 15:36, 14 December 2008
- |Title=ACM Eleventh International Workshop on Data Warehousing and OLAP ACM Eleventh International Workshop on Data Warehousing and OLAP10 KB (1,288 words) - 11:52, 18 October 2008
- ...n disciplines such as databases, artificial intelligence, semantic web, or data extraction. Also, ODBASE'08 encourages the submission of papers that examin ...stributed Applications), and IS'08 (International Symposium on Information Security).8 KB (1,081 words) - 08:21, 22 December 2011
- ...rch on information and knowledge management, as well as recent advances on data and knowledge bases. The purpose of the conference is to identify challengi * Automatic acquisition of data and knowledge bases (especially raw text)29 KB (4,077 words) - 18:04, 18 August 2023
- * Data quality, integration, warehousing and mining * Privacy and security issues3 KB (452 words) - 23:09, 14 October 2008
- | Title = 5th VLDB Workshop on Secure Data Management ...t/event.showcfp?eventid=2563&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]589 bytes (67 words) - 23:09, 14 October 2008
- - Data and Information Quality Management - Data Grids, Data and Information Quality4 KB (595 words) - 23:09, 14 October 2008
- | Title = 7th ACM International Workshop on Data Engineering for Wireless and Mobile Access as a bridge between the data management, wireless networking, and7 KB (875 words) - 23:09, 14 October 2008
- ...tructured (XML) or unstructured (textual) documents are becoming important data sources for enterprises and organizations. ...typical question is �??how to take advantage from such large volumes of data, in order to extract useful information for decision making, for discoverin7 KB (917 words) - 23:09, 14 October 2008
- * Data quality, semantics and integration * Data privacy and security6 KB (840 words) - 23:10, 14 October 2008
- ...ics, including traditional database management, as well new challenges for data management in any possible domain. Prospective authors are encouraged to co DATA WAREHOUSING AND KNOWLEDGE DISCOVERY3 KB (305 words) - 08:44, 31 July 2020
- integration of intelligence and data justifies its today's attractiveness. Since 1990 DEXA is an annual internat * Data and Information Modelling4 KB (457 words) - 16:14, 16 December 2020
- | Title = Second Workshop on Scalable Data Management, Applications and Systems Second International Workshop on Scalable Data Management Applications and Systems5 KB (644 words) - 23:10, 14 October 2008
- stronger over the years as data management research marched through many a data model, with logic keeping up and providing the foundations every step5 KB (647 words) - 23:10, 14 October 2008
- | Title = 3rd Workshop on Data Storage Devices and Systems DS2 2008, the 3rd International Workshop on Data Storage Devices and Systems, will be held at the University of Perugia, Per4 KB (539 words) - 23:10, 14 October 2008
- ...d tools for querying, retrieving, integrating, analyzing, and managing the data on the Web. ...s, results, experience, techniques and tools related to all aspects of Web data management. The conference invites original research and industrial papers10 KB (1,376 words) - 23:10, 14 October 2008
- The theme of BNCOD 2008, the 25th in the series, is "Sharing Data, Information and Knowledge". * Data integration and interoperability4 KB (593 words) - 23:10, 14 October 2008
- · Workflow description languages targeting computation, data and transaction intensive tasks · Security control in grid workflow systems7 KB (886 words) - 23:10, 14 October 2008
- Attacks against De-identified Data Data Anonymity2 KB (193 words) - 23:10, 14 October 2008
- ...y. Our belief is that XML is the main means towards this new generation of data management systems. Following the experience of previous editions of DataX * Interchange and integration of XML data3 KB (475 words) - 23:10, 14 October 2008
- ...es (and vice versa), to network monitoring systems that depend on advanced data management and analysis capabilities�?? suggests a blurring of the bounda * Data models, query models, and query languages for networking3 KB (332 words) - 23:10, 14 October 2008
- | Title = International Workshop on RFID Data Management International Workshop on RFID Data Management4 KB (471 words) - 23:10, 14 October 2008
- | Title = 3rd Int. Workshop on Dependability Aspects on Data WArehousing and Mining Applications tremendous opportunities for data sharing, integration, and analysis7 KB (908 words) - 23:10, 14 October 2008
- ...layers of middleware, e.g., for managing Grid resources, computing tasks, data, and information, form the basic framework for realising an e-Science envir * Security control in managing workflow4 KB (560 words) - 23:10, 14 October 2008
- |Title=1st Workshop on Data and Services Management in Mobile Environments ...nt techniques. Therefore, these techniques are evolving and leading to new data and services management systems that consider variable user capabilities an2 KB (324 words) - 16:49, 16 December 2020
- * Data mining and Pattern Recognition in e-learning * Security and privacy;4 KB (503 words) - 23:11, 14 October 2008
- * Architectures for Voice/Data Services * Network Data Mining3 KB (339 words) - 23:11, 14 October 2008
- 7. Security Signal Processing 1. Analog Circuits, Filters and Data Conversion4 KB (496 words) - 23:12, 14 October 2008
- 1 .9 Data Communications 5 .54 Network Security2 KB (250 words) - 23:12, 14 October 2008
- ...SIGCOMM is the flagship annual conference of the Special Interest Group on Data Communications, a special interest group of the Association for Computing M ...describing significant research contributions to the field of computer and data communication networks. We invite submissions on network architecture, desi3 KB (352 words) - 23:12, 14 October 2008
- ...est research results and to exchange new ideas and practical experience in data and computer communications, optical fiber communications, microwaves, ante ...peaceful country in a turbulent area, enjoys extreme levels of safety and security. Jordanian people are internationally known for generosity, hospitality and2 KB (260 words) - 23:13, 14 October 2008
- * Computer Networks and Security * Data Mining and Database Applications2 KB (283 words) - 23:13, 14 October 2008
- * Security * Data dissemination and Peer-to-Peer systems3 KB (413 words) - 23:13, 14 October 2008
- networks could mean a set of collaborative data processing nodes that application-level reliability & performance, security, QoS assurance,5 KB (651 words) - 23:13, 14 October 2008
- |Title=Second ACM International Conference on Web Search and Data Mining The Second ACM International Conference on Web Search and Data Mining (WSDM) 20092 KB (237 words) - 12:23, 11 September 2020
- | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.4 KB (457 words) - 23:13, 14 October 2008
- | Title = 1st Workshop on Mining Social Data | Field = Data mining3 KB (453 words) - 23:14, 14 October 2008
- * Technologies for Building and Operating Massive Web Services Data * Security Challenges for Web Services8 KB (1,158 words) - 23:14, 14 October 2008
- ...knowledge and opinions about problems and solutions at the intersection of data management and the\ * Data-oriented aspects of Web application development environments...3 KB (250 words) - 23:14, 14 October 2008
- * P2P Data Mining and Knowledge Discovery for Information Search * Security and Robustness in P2P Information Search5 KB (554 words) - 23:15, 14 October 2008
- * Security aspects in network management * Data management for real-time dynamic service provisioning6 KB (663 words) - 23:15, 14 October 2008
- * Data management and middleware support for collaborative information systems * Security, privacy and trust management in collaborative networks, systems, and appli8 KB (1,093 words) - 23:15, 14 October 2008
- 3-03 Distributed data and knowledge based systems 3-10 Database applications and data mining5 KB (623 words) - 23:15, 14 October 2008
- ...ng difficult social and policy issues such as those related to privacy and security likely in those areas where the right data in the right time have mission-critical importance.8 KB (1,003 words) - 23:15, 14 October 2008
- NPSec 2008 particularly welcomes new ideas on security in the context of Internet security and new primitives for supporting secure network protocol4 KB (493 words) - 23:15, 14 October 2008
- * Giuseppe Persiano: Security of networks of low capability devices of several communities: Algorithms, Formal Methods, Information systems, Data4 KB (563 words) - 23:15, 14 October 2008
- * Data-centric issues, including anonymization, querying, and storage * Network security threats and countermeasures3 KB (313 words) - 23:15, 14 October 2008
- ...applications, service-oriented computing, middleware, networking, agents, data management and services, all with special focus on mobility and ubiquitous * Security, privacy and social issues of mobile and ubiquitous systems5 KB (599 words) - 23:15, 14 October 2008
- As data and knowledge volume keep increasing while global means for analyze huge volume of data and knowledge.4 KB (491 words) - 23:16, 14 October 2008
- ...fferent aspects of the field, ranging from accuracy and robustness to data security and user interface. o Fusion schemes/Data quality estimation/Qualitative-based fusion4 KB (526 words) - 23:17, 14 October 2008
- ...an information processing system and applications to multimodal multimedia data fusion/integration. ...mation, pre/post-processing of digital video, joint source/channel coding, data streaming, speech/audio, image/video coding and processing4 KB (443 words) - 17:06, 24 February 2016
- Data Compression and Source Coding Cryptology and Data Security3 KB (362 words) - 23:17, 14 October 2008
- Machine Learning and Data Mining Image and Data Representation4 KB (438 words) - 23:17, 14 October 2008
- Data processing, storage and management Security4 KB (570 words) - 23:17, 14 October 2008
- * Innovative file or data storage system design * Security3 KB (345 words) - 14:50, 26 December 2011
- * Performance, dependability and security evaluation using analytical models, simulation or empirical approaches * Model-based security engineering and design for security5 KB (660 words) - 16:46, 27 December 2015
- ...ge, and multimedia data to traditional structured data and semi-structured data found in the web. SITIS spans two inter-related research domains that incre * OSS and security, security implication of OSS, security concerns in using OSS5 KB (697 words) - 23:18, 14 October 2008
- + Data Management for e-Business TRACK - Data and knowledge engineering for e-Business5 KB (594 words) - 16:29, 25 March 2020
- (e.g., QoS, security, fault tolerance, messaging, orchestration/composition, data integration and data retention)4 KB (504 words) - 23:18, 14 October 2008
- # security technology and systems * Agent-based distributed data mining6 KB (733 words) - 12:48, 27 October 2016
- Cyber Security Data Structure and Algorithm3 KB (427 words) - 17:01, 29 May 2016
- | Title = 2008 ESA Workshop on Avionics Data, Control and Software Systems ESA Workshop on Avionics Data, Control and Software Systems (ADCSS)18 KB (2,714 words) - 23:23, 14 October 2008
- | Field = Data mining ...his has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society tha3 KB (404 words) - 23:18, 14 October 2008
- | Field = Data mining the 25th International Conference on Data Engineering ICDE'09,5 KB (592 words) - 23:18, 14 October 2008
- | Field = Data mining ...uch as user modeling, machine learning, intelligent information retrieval, data and text mining, statistics, computational intelligence, human-computer int4 KB (570 words) - 23:19, 14 October 2008
- | Title = The 2nd International Workshop on Domain Driven Data Mining | Field = Data mining4 KB (510 words) - 23:19, 14 October 2008
- | Title = Practical Privacy - Preserving Data Mining | Field = Data mining5 KB (721 words) - 23:19, 14 October 2008
- | Title = 23rd International Information Security Conference | Field = Computer security and reliability5 KB (637 words) - 23:20, 14 October 2008
- | Title = SPIE Defense and Security Symposium | Field = Computer security and reliability1 KB (167 words) - 23:20, 14 October 2008
- | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability4 KB (502 words) - 23:20, 14 October 2008
- 1.6 Semantic Analysis of Multimedia Data 1.7 Statistical Modeling of Multimedia Data3 KB (340 words) - 18:41, 10 June 2020
- Due to constant changing environments, limited battery life and diverse data types, Mobile - Database and Data Management Mobile Computing10 KB (1,262 words) - 23:20, 14 October 2008
- ...learning techniques to address reliability, performance, power management, security, fault diagnosis, or manageability issues in computer systems * Experience with online data collection and machine learning analysis6 KB (837 words) - 23:21, 14 October 2008
- - Distributed Database and Data Mining - Security, Privacy and Trust3 KB (357 words) - 23:23, 14 October 2008
- * Database and Data Mining * Information Security3 KB (415 words) - 23:23, 14 October 2008
- ...It is based on studying combinatorial properties of the considered digital data sets. Combinatorial image analysis often features various advantages (in te6 KB (814 words) - 23:25, 14 October 2008
- ..., computer vision, image analysis, signal processing, statistics, computer security, etc. The purpose of this conference is to provide a scientific forum for r * sensor design and data acquisition3 KB (325 words) - 23:50, 14 October 2008
- ...ntification techniques playing a key role in human-computer interfaces for security and restricted-access systems. �?� Classification and browsing of multimodal data4 KB (550 words) - 23:25, 14 October 2008
- ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design Security and protection systems11 KB (1,492 words) - 23:26, 14 October 2008
- * Innovative file or data storage system design * Security4 KB (547 words) - 23:26, 14 October 2008
- Grid computing enables the sharing of distributed computing and data - Distributed and Large-Scale Data Access and Management5 KB (577 words) - 23:27, 14 October 2008
- * Hardware support for security * Instruction level, thread level, and data level parallelism2 KB (259 words) - 10:14, 29 May 2016
- ...ns and required attributes, such as reliability, availability, safety, and security, as well as human factors. * Architecture and protocols for security.4 KB (528 words) - 23:27, 14 October 2008
- ...ermining the right memory subsystem, ensuring coherence and consistency of data, and trying to limit the area and power budgets, all require a deep underst ...P architectures for solving problems, e.g. using multiple cores to enhance security, reliability, improve single-thread performance, reduce power, etc.4 KB (575 words) - 23:27, 14 October 2008
- ...uzzy systems, Genetic algorithm, Evolutionary computing, Machine learning, Data mining ...energy, Waste management, Waste treatment and recycling, Water network and security, Sensor technologies, Intelligent Micro-grids4 KB (561 words) - 23:29, 14 October 2008
- ...cation and networking, embedded systems and hardware, distributed systems, data management, and applications, so we welcome cross-disciplinary work. Data, information, and signal processing6 KB (771 words) - 16:09, 16 September 2019
- o Language features to enhance reliability and security handling, for reliability and security5 KB (673 words) - 23:30, 14 October 2008
- * Tools and Methodologies for Large Scale Semantic Web Data - Management Trust, Provenance, Security, Privacy, Identity and the Semantic Web4 KB (573 words) - 23:31, 14 October 2008
- Semantic Annotation of Data Semantic Web Trust, Privacy, Security and Intellectual Property Rights2 KB (266 words) - 11:46, 28 May 2016
- * Cloud computing and data center networks * Architectural support for improving security or availability4 KB (577 words) - 23:31, 14 October 2008
- ...ity when compared to traditional critical systems, where dependability and security are fairly well understood as complementary concepts and a variety of prove ...lopment tools with middleware, traditional dependability, fault tolerance, security, and adaptivity concepts, together with social and psychological aspects, t8 KB (952 words) - 23:31, 14 October 2008
- Security in distributed systems Data grid5 KB (702 words) - 23:31, 14 October 2008
- or remote data and service resources to perform various in silico computations and data repositories in a distributed environment,6 KB (750 words) - 23:31, 14 October 2008
- * Techniques that treat programs/models as data objects including meta-programming, generative programming, staged computat ...distributed and web-based applications, resource-limited computation, and security.4 KB (468 words) - 23:32, 14 October 2008
- ...he conference covers optimization for parallelism, performance, power, and security, where that optimization occurs in the mapping from an input (including API * Memory management, including data distribution, synchronization and GC3 KB (342 words) - 23:32, 14 October 2008
- ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser ...application specific fixed function, programmable, reconfigurable, near- data and in-memory accelerators, etc.5 KB (580 words) - 10:32, 12 May 2020
- *Big Data platforms with applications to network management, security, measurements *Innovative uses of network data beyond communication4 KB (514 words) - 12:03, 6 April 2020
- �?� Optimization techniques for security and reliability �?� Memory management, including data distribution and synchronization2 KB (201 words) - 23:32, 14 October 2008
- ...ternet technologies, multimedia, wireless communications, data privacy and security, authentification, authorization and federation.4 KB (504 words) - 23:33, 14 October 2008
- ** integration of data and processes ** data integration from Web information sources9 KB (1,134 words) - 01:18, 1 February 2009
- ...Web-based user interfaces and services that securely access Grid resource, data, application, and collaboration services for communities of scientists. As ...n Social and Facebook APIs for socially networked applications, OpenID for security, and cloud computing offerings from Amazon, Microsoft, Google, and others w3 KB (378 words) - 23:34, 14 October 2008
- | Title = The First International Conference on Security and Privacy in Mobile Information and Communication Systems ...edge researchers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymaker4 KB (451 words) - 23:37, 14 October 2008
- * algorithms and data structures including sequential, parallel, * foundations of security6 KB (682 words) - 10:18, 14 April 2020
- offer applications easy and efficient access to sensor data at the scale selected types of sensor data, a GSN provides an application with4 KB (483 words) - 23:37, 14 October 2008
- �?� Data aggregation �?� Data storage and retrieval11 KB (1,533 words) - 23:38, 14 October 2008
- information system is to balance the autonomy of networked data, Agent-based distributed data mining.9 KB (1,215 words) - 23:38, 14 October 2008
- ...describing significant research contributions to thefield of computer and data communication networks. We invite submissions on network architecture, desi * Security, trust, & privacy3 KB (380 words) - 19:34, 17 November 2008
- - Data Distribution, Load Balancing & Scaling - Security and Reliability5 KB (606 words) - 14:17, 8 April 2021
- MEASUREMENT-DATA ACQUISITION MEASUREMENT-DATA PROCESSING3 KB (360 words) - 23:39, 14 October 2008
- * Architectures and designs for concurrency: superscalar, VLIW, data parallel, multithreaded, multicore, transactional, etc. * Microarchitecture support for reliability, dependability, and security3 KB (326 words) - 17:43, 8 November 2008
- # Security challenges and solutions for interoperability/interoperation of # Interoperability of digital repositories and data storage technologies in7 KB (959 words) - 23:40, 14 October 2008
- * Grid Infrastructures for Biomedical Data Analysis and Management * Security in Biomedical Data Grids7 KB (876 words) - 23:40, 14 October 2008
- | Field = Computer security and reliability * Integrated system reliability, availability, security, safety, and timing analysis and evaluation methods6 KB (748 words) - 14:43, 27 December 2015
- | Title = Fourth International Workshop on the Value of Security through Collaboration ...ties of the ecosystem where the nodes operate may be guaranteed. Thus, the security property of the ecosystem may be driven by self-organizing mechanisms. Depe3 KB (420 words) - 23:42, 14 October 2008
- ward data management. The use of a mobile wireless infrastructure can lead to security and reliability problems. Mobile devices often have usability 3.Data integration across different health service settings.6 KB (771 words) - 23:42, 14 October 2008
- ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network - Knowledge discovery and data mining, link analysis, Web mining - Internet search, UCC management, online2 KB (303 words) - 23:42, 14 October 2008
- - peer-to-peer systems, overlay networks, distributed data management - security in distributed computing, cryptographic protocols6 KB (766 words) - 13:19, 28 November 2016
- |title=IEEE Transactions on Big Data |Field=Big Data927 bytes (139 words) - 05:14, 9 September 2023
- |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols13 KB (1,617 words) - 19:03, 24 November 2008
- .../autonomic, on-demand, cloud/etc./; Context-aware and context recognition; Data-centers and nano-centers; Information processing /distribution, discovery, ...ion; All-IP versus protocol translation; IP simplified network management; Security, trust, and privacy; Network stability under topology change; Delay-toleran7 KB (883 words) - 17:35, 7 January 2021
- ...a platform for data gathering or the management of information related to data collection that helps researchers demonstrate the validity of their experim * Virtual organization and security issues of instruments and sensors on the Grid4 KB (642 words) - 21:17, 9 December 2008
- Call For Papers: International Journal on Data Engineering and Management ...DEMFoundation) is a non profit organization promoting data engineering and data management research worldwide with out any discrimination. Its acting as3 KB (440 words) - 12:20, 12 December 2008
- - The role of Software Architecture in the engineering and testing of data analytics software systems (AKA BigData); - Safety & Security Assurance of Avionic & Medical Cyber-Physical Systems.1 KB (187 words) - 21:13, 12 July 2020
- data, analysis, decision and execution. As such, real time service-oriented * Security and privacy for RTSOAA based CPS7 KB (922 words) - 00:58, 9 January 2009
- As the Web data is very diverse, WIS are seeking efficient and flexible approaches to provide integrated views over heterogeneous data sources.8 KB (1,101 words) - 15:16, 12 January 2009
- ** Privacy and security ** Inter/intra government applications data exchange11 KB (1,366 words) - 16:44, 14 January 2009
- - Security - Data Analysis6 KB (812 words) - 12:55, 18 January 2009
- The Data Grid and Pervasive Computing Data and knowledge management for Pervasive Computing4 KB (597 words) - 13:46, 23 January 2009
- ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Fusion and Data Collection5 KB (526 words) - 01:02, 2 February 2009
- o Security o Knowledge discovery and data mining5 KB (567 words) - 12:58, 18 January 2009
- o Databases and data mining * Security, Privacy, Encryption, and Digital Rights, including9 KB (1,221 words) - 12:58, 18 January 2009
- - Data modeling - Security5 KB (633 words) - 12:58, 18 January 2009
- | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)16 KB (2,178 words) - 12:59, 18 January 2009
- ...ethical issues, such as those pertaining to information security, privacy, data mining, and intellectual property. Therefore, as e-business continues to gr ...ent issues in e-business such as those of privacy, information management, data mining, intellectual property, and consumer tracking.6 KB (856 words) - 13:00, 18 January 2009
- ...cessing play a key role in the context of a plethora of modern distributed data, information and knowledge management applications and systems. Distributed - Distributed XML Data Management7 KB (1,030 words) - 13:00, 18 January 2009
- Information and Data Management Data and Network mining4 KB (529 words) - 13:00, 18 January 2009
- | Title = 11th International Conference on Data Warehousing and Knowledge Discovery 11th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2009),7 KB (1,006 words) - 13:00, 18 January 2009
- - temporal data models and query languages - temporal data mining6 KB (872 words) - 13:00, 18 January 2009
- | Title = The 1st International Workshop on Security, Reliability and Quality in Cloud Computing computing brings on security, reliability and quality? In other words, what new issues raised5 KB (624 words) - 13:00, 18 January 2009
- | Title = The 11th ACM workshop on Multimedia and Security The 11th ACM workshop on Multimedia and Security will be held in Princeton, New Jersey, USA on September 7th and 8th of 20093 KB (303 words) - 17:06, 24 February 2016
- - AI in Computer Security - AI in Databases and Data Mining4 KB (582 words) - 14:47, 2 December 2010
- Web Data Integration Web Data Mashup2 KB (240 words) - 17:46, 21 July 2016
- o Security in Power Line Communications * High data rate transmission systems14 KB (1,518 words) - 13:01, 18 January 2009
- Knowledge Discovery and Data Mining Security in wireless networks3 KB (320 words) - 16:40, 27 December 2015
- Network Security Data Management2 KB (210 words) - 13:01, 18 January 2009
- and parallel and distributed data storage technologies. NAS 2009 will * Security, trust, and privacy10 KB (1,206 words) - 13:01, 18 January 2009
- - Security Engineering - Data Mining10 KB (1,321 words) - 13:01, 18 January 2009
- • Security, Ethics and Privacy • Data Mining and Knowledge Discovery in HI4 KB (528 words) - 13:01, 18 January 2009
- numbers of diverse but interrelated data sources of many varying forms. these disparate data sources, so that they can co-exist comfortably and4 KB (568 words) - 13:01, 18 January 2009
- - Data mining advances on the discovery and analysis of communities - Security, privacy, trust and safety of cyber physical & social computing3 KB (446 words) - 13:02, 18 January 2009
- | Title = 4th Workshop on Data Storage Devices and Systems DS2 2009, the 4th International Workshop on Data Storage Devices and Systems, will be held at the Kyung Hee University, Yong4 KB (532 words) - 15:04, 27 December 2015
- | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)6 KB (852 words) - 13:02, 18 January 2009
- ...place in conjunction with the 3rd International Conference on Information Security and Assurance, Seoul, Korea http://www.sersc.org/ISA2009. ? MAC and link layer security protocol3 KB (450 words) - 13:02, 18 January 2009
- ...ssues can expose the network infrastructure to stability, performance, and security problems. ...acks and intrusions requires the analysis of detailed traces. Furthermore, data collection and analysis is important for generating and validating models o5 KB (431 words) - 13:03, 18 January 2009
- B-09 Web-page Security Monitoring C-08 Uncertainty Management in Data Mining4 KB (459 words) - 16:33, 27 February 2009
- As volume of data and knowledge keeps increasing, new methods, modeling paradigms, and struct Scalable Data Mining4 KB (512 words) - 16:33, 27 February 2009
- * security in distributed computing, cryptographic protocols * peer-to-peer systems, overlay networks, distributed data management7 KB (890 words) - 15:05, 27 December 2015
- ...temas, Wireless communications, Technologies and applications, Information security ...temas, Wireless communications, Technologies and applications, Information security8 KB (977 words) - 16:33, 27 February 2009
- * Virtualization in data centers * Security aspects of using virtualization in a distributed environment5 KB (576 words) - 16:34, 27 February 2009
- * Security and trustworthy in multi-tenancy service hosting environment * Web services for data intensive computing and scientific workflows6 KB (855 words) - 17:06, 27 February 2009
- systems; concurrency theory; database theory, semi-structured data and finite model theory; models of reactive, hybrid and stochastic * Emerging fields: security and cryptography; ad hoc and mobile systems;2 KB (282 words) - 11:28, 21 April 2021
- XML and semi-structured data Information Security5 KB (604 words) - 17:06, 27 February 2009
- |Field=Big Data · Reliability, fault-tolerance, and security8 KB (1,050 words) - 18:04, 5 January 2017
- + Middleware solutions for Security, Privacy and Trust service, and data access service6 KB (800 words) - 22:11, 27 February 2009
- systems that cooperate to exchange data. These systems have emerged as the * Security and privacy in P2P systems5 KB (623 words) - 17:06, 27 February 2009
- Special Issue of IEEE Transactions on Knowledge and Data Engineering into a huge repository of cross-referenced, machine-understandable data and7 KB (883 words) - 17:06, 27 February 2009
- * Data Types and Query Languages * Data Stream Technologies4 KB (534 words) - 17:07, 27 February 2009
- | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability8 KB (967 words) - 17:07, 27 February 2009
- _ Data Governance _ Data Scrubbing and Cleaning5 KB (690 words) - 17:07, 27 February 2009
- * Aggregation techniques and data management * Privacy and security services6 KB (861 words) - 17:07, 27 February 2009
- | Title = Workshop on Trust, Risk and Security Assessments for Network Dependability in Digital Ecosystems (TRSDE) | Field = Computer security and reliability4 KB (600 words) - 17:07, 27 February 2009
- ...RFID, GSM, GPRS, 3G Digital Pens, PDAs, Mobile Phones, VoIP, Video, Voice, Data, other devices) for improvement of our human lives, not just organizations, Security and Privacy7 KB (941 words) - 17:07, 27 February 2009
- * Data propagation and routing * Data aggregation/data compression6 KB (750 words) - 16:50, 27 December 2015
- * Authorization, Privacy and Security * Data Mining and Knowledge Discovery9 KB (1,249 words) - 08:42, 7 October 2011
- Computer System, Information Security and Networks • Data and Knowledge Engineering for E-Business3 KB (319 words) - 17:07, 27 February 2009
- * Security, data handling, and privacy * Spontaneous integration of public/private data & devices5 KB (670 words) - 17:08, 27 February 2009
- in harmony with societal values and economic viability, with enhanced security, -Databases and Data Mining11 KB (1,440 words) - 17:08, 27 February 2009
- The functionality provided by modern database management systems (DBMS), data in hardware architectures, new data storage requirements, and new usage patterns6 KB (817 words) - 17:08, 27 February 2009
- | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability12 KB (1,690 words) - 17:08, 27 February 2009
- | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability6 KB (828 words) - 17:08, 27 February 2009
- * Data-centric issues, including anonymization, querying, and storage * Network security threats and countermeasures6 KB (774 words) - 17:08, 27 February 2009
- * Middleware for data intensive computing * Information assurance and security8 KB (1,144 words) - 20:59, 27 February 2009
- |Title=Financial Cryptography and Data Security 2018475 bytes (53 words) - 13:18, 10 March 2020
- |Title=Financial Cryptography and Data Security 2019402 bytes (48 words) - 13:26, 10 March 2020
- * Data analytics and decision support systems * Big Data for business4 KB (571 words) - 12:58, 9 March 2020
- |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security5 KB (578 words) - 10:21, 20 November 2020
- - Security Aspects - Ontologies and meta-data standards5 KB (661 words) - 15:49, 8 December 2009
- - XML and data management - Web Security and Privacy3 KB (440 words) - 15:25, 9 December 2009
- |Title=International Workshop on Wireless Multimedia Computing and Security Services - Data mining applications for WMC3 KB (477 words) - 16:54, 8 August 2009
- ...ing solutions for consistency control, persistent data storage, multimedia data dissemination, cheat-prevention, topology mismatching, and virtual world in -Trust and security issues in P2P systems5 KB (738 words) - 16:48, 10 August 2009
- Security and Cryptography Data Management3 KB (412 words) - 19:29, 2 August 2009
- Network Security Data Management2 KB (230 words) - 11:32, 2 August 2009
- | Title = International Conference on Management of Data | Field = Data mining4 KB (553 words) - 11:33, 2 August 2009
- ...rging Technologies, Components & Subsystems, Antenna Technology, and Civil/Security Radar Applications.2 KB (203 words) - 11:33, 2 August 2009
- Information security IT and network security2 KB (258 words) - 11:33, 2 August 2009
- ...rs such as the different tags assigned to the same Web. Second, social Web data cover a vast number of heterogeneous entities and distinct feature represen - Exploitation of unannotated social Web data4 KB (525 words) - 11:34, 2 August 2009
- ...as driven focus to technologies required to manage and effectively use the data. Continuous innovation in the algorithms, processing power and the methodol DATA WAREHOUSING AND DATA MINING5 KB (657 words) - 11:34, 2 August 2009
- XML and Data Management Web Security and Privacy4 KB (564 words) - 12:01, 6 November 2020
- ...problems by enabling large-scale aggregation and sharing of computational, data and other geographically distributed resources. Rapid advances are being re * Grid and P2P Infrastructures for Data Storage and Data Mining7 KB (912 words) - 17:36, 5 November 2020
- | Title = 11th International Conference on Mobile Data Management ...though substantial research has been conducted, several areas in mobile data management remain ripe with open research challenges.5 KB (530 words) - 11:34, 2 August 2009
- |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security5 KB (599 words) - 10:21, 20 November 2020
- | Acronym = Security 2009 ...S International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)6 KB (746 words) - 11:35, 2 August 2009
- ...or deployments. Thus, the traditional study of QoS in transporting sensory data in pervasive systems ought to be balanced with the study of QoI in deliveri ...ned, dynamic and distributed nature of the sensory systems involved, their security weaknesses, and so on. Novel mechanisms and designs are required which inte5 KB (734 words) - 11:35, 2 August 2009
- The rapid expansion of digital multimedia data delivered on new generation mobile devices, such as PDA, smart phones, and * Content-based indexing, search and retrieval of multimedia data, particularly for mobile applications.5 KB (674 words) - 11:35, 2 August 2009
- - Data processing, storage and management - Security8 KB (1,119 words) - 09:57, 27 February 2020
- ? Data management issues ? Security and privacy5 KB (571 words) - 11:35, 2 August 2009
- - contribution of HLTs to the Homeland Security problems (technology applications and legal aspects), ...tuation is very different across the different languages. Little or sparse data exist for languages in countries or regions where limited efforts have been14 KB (1,872 words) - 19:26, 2 August 2009
- Cryptography and data security2 KB (217 words) - 11:36, 2 August 2009
- ...ul interception; Multi-modal undesired traffic detection; Measurements and data mining correlation; Countermeasures on undesired traffic RTSEC: Security for Internet-based real-time systems14 KB (1,651 words) - 15:56, 15 February 2017
- * Coupling and Integrating Heterogeneous Data Sources * Database Security and Transaction Support5 KB (552 words) - 17:06, 12 August 2009
- - Visual Data Analysis and Knowledge Discovery - Data Acquisition and Information Processing2 KB (245 words) - 18:52, 7 January 2010
- |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security5 KB (667 words) - 14:27, 13 September 2009
- - Data mining and knowledge discovery in distributed environments - Intelligent integration of data and processes4 KB (508 words) - 13:29, 13 July 2010
- *Intelligent data management - Data Mining4 KB (507 words) - 22:37, 18 November 2009
- * Application security * Blended Internet security methods5 KB (607 words) - 18:01, 3 December 2009
- ...d validation. E-business agents. Pervasive computing. Privacy, safety, and security. Andrzej Skowron (Discovery of processes and their interactions from data and domain knowledge),6 KB (733 words) - 18:19, 24 September 2020
- ...ive sensing networks, higher processing power, and the ability to transfer data more quickly through both wired and wireless systems. Thus, particularly dr ...(remote) support to patients would only make adequate value if patients’ data is treated in a secure and privacy-sensitive way.6 KB (889 words) - 13:48, 26 February 2010
- |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust4 KB (484 words) - 14:20, 14 December 2009
- Digital Campus Construction and Data Security Management2 KB (195 words) - 04:32, 7 January 2010
- |Title=7th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS |Field=Computer security and reliability7 KB (982 words) - 19:13, 3 January 2010
- |Title=3rd International Workshop on Wireless Multimedia Computing and Security Services ...ward for a deeper understanding in wireless multimedia computing (WMC) and security services.3 KB (497 words) - 03:43, 28 February 2010
- ...ometrics Technologies and Applications, Pattern Recognition and Biometrics Security, Bioinformatics and IT Applications in the above themes. Data mining3 KB (382 words) - 18:27, 20 January 2010
- ...ale computing and networking, optimization, pervasive computing, robotics, security, software engineering, and systems engineering.3 KB (338 words) - 16:53, 27 December 2015
- |Title=5th International Conference on Software and Data Technologies Conference name: 5th International Conference on Software and Data Technologies(ICSOFT)3 KB (392 words) - 13:50, 30 April 2020
- * › Multimedia Security * › Semantic Analysis of Multimedia Data3 KB (310 words) - 15:37, 5 February 2010
- |Title=International Conference on Security and Cryptography |Field=Computer security and reliability4 KB (409 words) - 15:40, 5 February 2010
- ...data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, and wirele2 KB (180 words) - 15:49, 5 February 2010
- W5: Workshop on Security and High Performance Computing Systems (SHPCS 2010) SS2: Special Session on High Performance Parallel and Distributed Data Mining4 KB (510 words) - 20:56, 7 February 2010
- |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability4 KB (429 words) - 08:55, 1 August 2019
- |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability9 KB (1,092 words) - 09:35, 1 August 2019
- ...el of noise, represented by non-pertinent, untrustworthy or even malicious data. Moreover, the challenge is to define models of users’ behaviour that can ...mmendation and trust systems, personalization techniques, users models and data mining in the field of social search, user analysis and understanding. Part6 KB (765 words) - 14:01, 11 April 2010
- ...sed for a long time in the information technology (IT) lexicon, related to data exchange, communication protocols and technological infrastructures. Althou * Information security3 KB (380 words) - 15:10, 1 October 2020
- ...el of noise, represented by non-pertinent, untrustworthy or even malicious data. Trust and Recommender systems, along with personalization techniques, appe ...y pattern-matching trust concept into logs, by implicit techniques such as data mining or machine learning. This workshop focuses on discussing and identif4 KB (600 words) - 19:11, 18 February 2010
- - Security, encryption and privacy for vehicular systems - Data dissemination and delay-tolerant networking techniques for VCS5 KB (624 words) - 21:14, 4 March 2010
- The 2010 International Conference of Computational Statistics and Data Engineering The 2010 International Conference of Data Mining and Knowledge Engineering4 KB (559 words) - 08:31, 9 March 2010
- › Confidentiality and Data Security2 KB (238 words) - 13:37, 10 March 2010
- * › Data Mining * › Security and Reputation4 KB (418 words) - 14:18, 10 March 2010
- |Title=8th Australian Information Security Management Conference |Superevent=2010 secau Security Congress2 KB (217 words) - 16:50, 19 November 2020
- |Title=9th Workshop on Linked Data on the Web into a medium for sharing structured data. This trend is fueled on the4 KB (608 words) - 10:39, 29 May 2016
- ...on systems are not integrated. This scenario can be summarized as too much data and not enough knowledge. ...commonly defined as: “Web-accessible sensor networks and archived sensor data that can be discovered and accessed using standard protocols and applicatio5 KB (639 words) - 16:17, 20 May 2010
- |Title=1st International Workshop on Heterogeneous-Data Mining and KDD in Support of Earth Observation - KKDEO 2010 1st International Workshop on Heterogeneous-Data Mining and KDD4 KB (582 words) - 16:22, 20 May 2010
- * › Security Aspects * › Ontologies and meta-data standards5 KB (532 words) - 12:25, 16 June 2010
- 5. WEB SECURITY * › XML and data management5 KB (627 words) - 12:33, 16 June 2010
- ...udies about state consistency control, persistent data storage, multimedia data dissemination, cheat-prevention, topology mismatching, and virtual world in - Trust and security issues in P2P systems6 KB (858 words) - 09:18, 19 August 2010
- |Field=systems and network telemetry, Machine learning, data science, High-performance computing, Distributed systems ...ntax and semantics, which makes organizing and incorporating the generated data difficult for extensive analysis.4 KB (584 words) - 17:42, 13 March 2020
- * Big data, analytics, and data sciences * Data deduplication5 KB (599 words) - 13:41, 26 February 2020
- **Big data, analytics, and data sciences **Data deduplication5 KB (597 words) - 13:44, 26 February 2020
- **Big data, analytics, and data sciences **Data deduplication4 KB (553 words) - 13:45, 26 February 2020
- *Sensor data storage, retrieval, processing *Security and privacy3 KB (412 words) - 09:52, 27 February 2020
- * › Coupling and Integrating Heterogeneous Data Sources * › Database Security and Transaction Support19 KB (2,462 words) - 19:10, 26 August 2010
- ...happen to be new to these service providers and might be worried about the security of using these online services then, the following benefits are sure to get3 KB (610 words) - 16:33, 27 August 2010
- The 2011 International Conference of Computational Statistics and Data Engineering The 2011 International Conference of Data Mining and Knowledge Engineering3 KB (458 words) - 08:06, 31 August 2010
- * Data Structures * Theory of Security in Networks4 KB (602 words) - 06:44, 26 August 2020
- |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium3 KB (343 words) - 16:31, 6 May 2020
- * Application of AI and big data in IS * Data and business analytics3 KB (395 words) - 15:14, 24 September 2020
- * Visualization of data * Analysis of neurophysiological and neuroanatomical data5 KB (574 words) - 15:58, 6 March 2020
- * Distributed and concurrent data structures, replication and consistency * Distributed machine learning and data science3 KB (344 words) - 11:30, 21 April 2020
- *Intelligent data management - Data Mining6 KB (732 words) - 05:52, 5 December 2010
- • Data-mining • Security4 KB (579 words) - 15:24, 13 October 2010
- ...nym=CALL FOR PAPER Journal: International Journal of Computer Science and Security (IJCSS) |Title=International Journal of Computer Science and Security (IJCSS)2 KB (298 words) - 16:47, 5 July 2020
- |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)5 KB (609 words) - 17:01, 5 July 2020
- Security, Ethics and Privacy Data Mining and Knowledge Discovery in HI5 KB (693 words) - 10:44, 14 November 2010
- ...preferences and background knowledge, their context or globally available data. No less important are business related aspects of these solutions. This co # integration of data and processes6 KB (806 words) - 14:48, 16 November 2010
- security * Routing and data dissemination12 KB (1,378 words) - 21:13, 28 November 2010
- Security in network, systems, and applications<br> Knowledge data systems<br>4 KB (554 words) - 12:34, 14 October 2020
- Security in network, systems, and applications<br> Knowledge data systems<br>4 KB (556 words) - 12:33, 14 October 2020
- Security in network, systems, and applications<br> Knowledge data systems<br>4 KB (552 words) - 08:13, 10 December 2010
- Security in network, systems, and applications<br> Knowledge data systems<br>4 KB (554 words) - 10:24, 6 July 2020
- Security in network, systems, and applications<br> Knowledge data systems<br>4 KB (554 words) - 12:33, 14 October 2020
- |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability2 KB (217 words) - 16:57, 27 December 2015
- ...ers who are concerned with exploring large unstructured or semi-structured data repositories, such as webpages and emails, using intelligent tools that can ...eb user profiling, recommender systems, email organization and processing, security, etc.3 KB (344 words) - 19:33, 23 December 2010
- - Data Mining - Security and Trusted Computing4 KB (505 words) - 08:07, 14 April 2011
- ...dware and communication mediums allow proposing new rules, conventions and data structures which could be used by network devices to communicate across the ...ion techniques, and so on), to communicate the network devices to transfer data between them. They can be used to perceive the network conditions, or the u6 KB (833 words) - 15:16, 24 September 2020
- ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...e, handling and analysis of digital evidence in order to prevent damage to data integrity. Such issues combined with the constant evolution of technology p3 KB (462 words) - 11:51, 22 March 2020
- |Title=International Workshop on Visualization and Information Security Management |Field=Security Management3 KB (468 words) - 00:17, 2 March 2011
- − Data Warehousing and Data Mining. − Information Security and Applied Cryptography.3 KB (367 words) - 16:37, 27 December 2015
- ...on protocols, services, distributed platforms, middleware, controllers and security infrastructures. The ICTSS is the successor of previous (joint) conferences - kind of testing: functional, interoperability, performance, conformance, security, reliability, robustness, etc.;6 KB (822 words) - 14:44, 18 March 2011
- * Confidentiality and Data Security * Data Visualization2 KB (216 words) - 17:51, 29 June 2011
- * Data Mining * Privacy, Safety and Security4 KB (439 words) - 17:54, 29 June 2011
- * Confidentiality and Data Security * Data Visualization2 KB (260 words) - 17:46, 29 June 2011
- * Data Mining and Business Analytics * Security3 KB (283 words) - 11:37, 1 July 2011
- * Databases and Visualization, Visual Data Mining * Internet, Web and Security Visualization4 KB (461 words) - 11:48, 1 July 2011
- Security Aspects Ontologies and Meta-Data Standards4 KB (517 words) - 12:03, 1 July 2011
- ...Applications, Society, e-Communities, e-Business, Web Intelligence and Web Security. XML and data management5 KB (612 words) - 12:07, 1 July 2011
- ...d concurrency is an efficient way of sharing interconnected processing and data resources to speed up time-critical computation, lower costs of design and *Data Mining13 KB (1,774 words) - 18:35, 31 August 2011
- ...semantic technologies for HealthCare, Medical Informatics and Computer Security. Projects with high relevance to social networking, low-tech environments ...chnology? How is this application making use of existing infrastructure? Data sources being used, etc.8 KB (1,106 words) - 15:50, 20 July 2011
- ...ility, having miniaturized antennas and terminal sizes, and providing high data rate links. With the unique broadcast nature and ubiquitous coverage of sat - Security related issues of satellite communications9 KB (1,218 words) - 16:06, 1 October 2020
- The 2012 International Conference of Computational Statistics and Data Engineering The 2012 International Conference of Data Mining and Knowledge Engineering7 KB (909 words) - 16:30, 10 September 2020
- - Security and Data Protection6 KB (784 words) - 03:09, 22 November 2011
- ...ese assemble together different resources such as parallel supercomputers, data archives, high-speed storage systems, advanced visualization devices and sc • Security-related performance issues in high-performance computing environments such4 KB (485 words) - 12:22, 22 November 2011
- ...implicit facts. P2P systems are proper answers to an increasing amount of data that shall be exchanged. In 2010, more smart phones than computer are sold *Data Mining in Social Networks5 KB (669 words) - 14:40, 20 December 2011
- Data Structures Information Security8 KB (1,085 words) - 16:28, 6 February 2012
- Communications modeling; Communications security; Computer Internet and Big Data; Sensing and sensor networks; Energy-aware6 KB (725 words) - 19:58, 22 November 2020
- ...e-Business, e-Science, Green Computing, Secured Technologies, Intelligent Data Management *Intelligent data management5 KB (595 words) - 05:03, 15 January 2012
- - Security, Privacy and Trust - Data- and compute- intensive applications6 KB (745 words) - 15:27, 1 November 2016
- Statistical Data Analysis ...ssing and Vision, Director of Studies for the MSc programme in Information Security and Biometrics, Department of Electronics, University of Kent, UK11 KB (1,490 words) - 11:59, 27 January 2012
- Confidentiality and Data Security in Healthcare Machine Learning, Knowledge Discovery and Data Mining in Biomedical9 KB (1,186 words) - 17:44, 24 February 2012
- Green Data Centers Energy-efficient grid, cloud, and data center technology10 KB (1,297 words) - 17:49, 24 February 2012
- - Middleware of SON: self-localization, security, data fusion, etc.5 KB (633 words) - 14:08, 2 March 2012
- ...s, the efficiency denotes the time cost of transmission processes, and the security denotes the protection of the transmitted media content. Recently, various5 KB (726 words) - 15:28, 2 March 2012
- ...s; Cooperative data exchange; Energy efficient-contention protocols; Named data networking; Adaptive contention window; Network mobility models; Spectrum a ...ds; Smart and sustainable cities; Public data centers; Traffic profiles in data centers; Smart energy; Car Connectivity; Green communications systems13 KB (1,580 words) - 19:35, 18 February 2021
- |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security4 KB (581 words) - 18:48, 24 February 2020
- |Title=Financial Cryptography and Data Security129 bytes (18 words) - 21:31, 10 March 2020
- '''2020 Theme: Data and knowledge for the next generation: sustainability, transparency and fai ...y situated to highlight technologies and insights that materialize the big data and artificial intelligence vision of the future.5 KB (653 words) - 13:04, 3 August 2023
- ...b data, surveys, longitudinal studies, interviews, ethnographic and visual data) to better understand user and practice, both online and offline; ...nologies on future society and social transformation, work futures and the data economy, health futures, political futures6 KB (910 words) - 12:04, 31 January 2020
- *Big data *Cloud data management4 KB (535 words) - 21:32, 11 February 2020
- *Big data *Probabilistic and uncertain data4 KB (500 words) - 17:29, 6 January 2021
- ...ly accessible in a high quality through automated processes and scientific data curating. OpenResearch as a sustainable service addresses researchers who s * [[:category:Algorithms|Algorithms]], Data structures, [[:category:Computer architecture|Computer architecture]], [[:c7 KB (815 words) - 18:03, 14 April 2021
- '''Data/Object Management''' *Data Semantics and Integrity Constraints5 KB (663 words) - 11:49, 18 February 2020
- ...gineering || Education || Parallel, distributed, and concurrent systems || Security, privacy and trust | Big data || End-user software engineering || Program comprehension || Software model6 KB (738 words) - 11:21, 6 July 2020
- * Web Semantics & Linked (Open) Data * Enterprise Knowledge Graphs, Graph Data Management and Deep Semantics6 KB (872 words) - 14:00, 22 February 2020
- * Linked Data and Semantic Data Integration * Trust, Privacy, and Security for Knowledge Graphs4 KB (531 words) - 14:14, 22 February 2020
- * Search in Structured Data (e.g., XML search, graph search, ranking in databases, desktop search, emai * Information Security (e.g., privacy, surveillance, censorship, encryption, security).8 KB (1,024 words) - 09:57, 13 May 2020
- ...man-computer interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational linguisti ...establishing sector-specific or international standards for interoperable data governance in AI applications.6 KB (872 words) - 23:11, 24 February 2020
- *Cloud computing and data centers *Design and analysis of concurrent and distributed data structures2 KB (299 words) - 11:51, 8 April 2020
- ...ring and Operations Research, and Advances in Computational Algorithms and Data Analysis, have been published by Springer. Data conversion and sigma-delta modulation10 KB (1,363 words) - 09:26, 7 May 2012
- ...etworks , Network Modeling and Simulation, Computer Network : Performance, Security and Applications, Neural Networks and Applications, Remote Sensing, Self Or ...lication, Multimedia and Its applications, Information processing and data security Software Engineering, Software Testing, Testing tools, Mutation Testing and3 KB (434 words) - 22:46, 30 May 2012
- *Web Big Data and Web data analytics *Semantic Web and Linked Open Data applications7 KB (991 words) - 11:15, 12 July 2019
- * Linked Data * Big Data and semantics, exchange and integration5 KB (663 words) - 14:34, 5 December 2018
- * Linked Data * Big Data and semantics, exchange and integration5 KB (699 words) - 14:57, 5 December 2018
- 3D and Range Data Analysis Data Security10 KB (1,492 words) - 17:22, 26 June 2012
- Visual Data Analysis and Knowledge Discovery Data Acquisition and Information Processing4 KB (466 words) - 16:27, 19 June 2012
- ...Sensor Networks Software and Architectures, Wireless Information Networks, Data Manipulation, Signal Processing, Localization and Object Tracking through S 4. DATA MANIPULATION5 KB (600 words) - 14:41, 20 June 2012
- Security Aspects Ontologies and Meta-Data Standards5 KB (671 words) - 18:54, 20 June 2012
- Smart Grid Security and Reliability Green Data Centers5 KB (649 words) - 10:44, 21 June 2012
- |Field=terrorism, national security, crime, politics, law |Superevent=secau Security Congress4 KB (575 words) - 05:16, 28 June 2012
- |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability5 KB (575 words) - 10:16, 1 August 2019
- *Database and Data Mining *Security and Information Assurance2 KB (274 words) - 18:15, 13 August 2012
- - Information and Data Management<br /> - Security and Access Control<br />3 KB (466 words) - 13:00, 16 August 2012
- Coupling and Integrating Heterogeneous Data Sources Data Mining5 KB (552 words) - 15:08, 21 August 2012
- ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. Data mining/Text mining/Web mining6 KB (728 words) - 01:01, 25 August 2012
- - Energy-efficient mass data storage and processing 3. International Journal of Cyber-Security and Digital Forensics (IJCSDF)4 KB (491 words) - 22:39, 28 August 2012
- The 2013 International Conference of Computational Statistics and Data Engineering The 2013 International Conference of Data Mining and Knowledge Engineering7 KB (903 words) - 16:27, 10 September 2020
- The 2013 International Conference of Computational Statistics and Data Engineering The 2013 International Conference of Data Mining and Knowledge Engineering6 KB (868 words) - 17:21, 29 August 2012
- |Title=Financial Cryptography and Data Security 2020547 bytes (64 words) - 11:40, 23 March 2020
- |Acronym=DATA 2013 |Title=2nd International Conference on Data Management Technologies and Applications5 KB (558 words) - 13:27, 27 November 2020
- |Field=Enterprise Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ICSOFT 2013 will be held in conjunction with DATA 2013 and SIMULTECH 20136 KB (801 words) - 11:04, 14 April 2020
- Network Security Data extraction and Reporting2 KB (234 words) - 08:25, 26 October 2012
- Information Security Data Mining2 KB (224 words) - 08:27, 26 October 2012
- Security and Cryptography Data Management2 KB (211 words) - 08:30, 26 October 2012
- |Title=6th International Conference on Information Security and Cryptology 6th International Conference on Information Security and Cryptology3 KB (351 words) - 09:52, 28 October 2012
- ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness. * Big data application in IS3 KB (375 words) - 15:06, 24 September 2020
- ...ents, logistics and networking, to complex event processing in finance and security. The DEBS conference brings together researchers and practitioners from the ...role, importance and impact of events and event-based technologies in Big Data systems and applications.6 KB (826 words) - 15:44, 29 January 2021
- * Data/Text Mining * Information/Cyber Security3 KB (408 words) - 11:39, 5 January 2013
- data engineering researchers, practitioners, developers, * Big Data and Advanced Analytics5 KB (584 words) - 14:44, 14 January 2013
- *Intelligent data management - Data Mining4 KB (535 words) - 14:38, 17 January 2013
- ...sed for a long time in the information technology (IT) lexicon, related to data exchange, communication protocols and technological infrastructures. Althou Information security3 KB (441 words) - 14:52, 1 October 2020
- - Data and Metadata Communications Technologies ACSET Stream 6: Technology and Society: ICT & Security: Questions of Privacy, Governance & Trust5 KB (702 words) - 10:02, 5 March 2013
- ...Sensor Networks Software and Architectures, Wireless Information Networks, Data Manipulation, Signal Processing, Localization and Object Tracking through S 4. DATA MANIPULATION5 KB (647 words) - 19:06, 5 April 2013
- • Privacy, safety and security • Data Mining4 KB (438 words) - 14:04, 8 May 2013
- where "content" may be anything including structured data, video, - Data and web mining5 KB (609 words) - 11:08, 26 July 2016
- |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability2 KB (264 words) - 15:32, 7 January 2021
- ** Reasoning over Semantic Web data ** Lightweight semantics (linked data, microformats, etc.)5 KB (711 words) - 19:02, 7 March 2020
- *Cyber Security *Data Mining & Information Retrieval3 KB (308 words) - 17:30, 26 May 2016
- |Title=3rd International Conference on Digital Information Processing, Data Mining, and Wireless Communications *Information Security and Cryptography2 KB (227 words) - 11:30, 21 June 2016
- ...istributed platforms, middleware, embedded- and cyber-physical-systems and security infrastructures. *Quality Aspects: Functionality, interoperability, performance, conformance, security, reliability, robustness, etc.3 KB (405 words) - 10:56, 24 April 2016
- ...TELLIGENCE AND BIG DATA ANALYTICS: Soft computing, knowledge discovery and data mining, machine learning, computational biology, agent-based systems, seman ...id and cloud computing, mobile and ubiquitous computing, big data systems, security & privacy.3 KB (422 words) - 12:09, 24 April 2016
- ...en Computing; Hybrid systems; Self-aware systems; Sensor networks; Network security; Petrochemical; Oil & Gas.3 KB (309 words) - 17:11, 18 February 2021
- |Title=1st International Conference on Security and Privacy in Vehicular Networks |Field=Security and Privacy in Vehicular Networks2 KB (233 words) - 06:32, 20 September 2016
- === Data Quality Management === * Data Science (Data Mining, Machine Learning, Network Analytics)10 KB (1,347 words) - 15:01, 26 September 2016
- ...discussing research results and directions in the areas related to Linked Data, knowledge representation and reasoning, and semantic technologies. Its aim Scalable Data Access6 KB (898 words) - 14:42, 24 September 2016
- |Title=Empowering Communities with Big Data Technologies |Field=Big Data3 KB (412 words) - 08:53, 24 September 2016
- Information Security Data Mining & Big Data3 KB (359 words) - 22:34, 30 September 2016
- ...the domain of Web, information systems, data analytics, and knowledge and data engineering. The decision on acceptance/rejection of workshop proposals wil * Big Data Techniques and Applications2 KB (230 words) - 00:37, 28 May 2016
- ...onsideration for publication in a special issue of the Springer Journal on Data Semantics (JoDS). ...mation Systems (ODBASE’16) provides a forum on the use of ontologies and data semantics in novel applications. Of particular relevance to ODBASE are pape9 KB (1,131 words) - 23:18, 24 February 2020
- ...16 : Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics ...ssment, cyber risk management, cyber training technologies, cyber security data analytics514 bytes (63 words) - 20:31, 1 June 2016
- * Integrity, Security, and Fault Tolerance * Data visualization3 KB (352 words) - 06:14, 20 September 2016
- ...man-computer interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational linguisti ...establishing sector-specific or international standards for interoperable data governance in AI applications.6 KB (877 words) - 23:06, 24 February 2020
- |Title=FC 2017 : Financial Cryptography and Data Security 2017 |Field=cryptography, information security364 bytes (45 words) - 16:19, 8 July 2016
- |Field=information security, biomedical informatics, text and web-data analytics426 bytes (51 words) - 16:19, 8 July 2016
- |Title=CISSI 2016 : International Symposium on Information Systems Security |Field=computer sciences, security, big data, cloud computing329 bytes (35 words) - 17:36, 8 July 2016
- * Semantic Analysis of Multimedia and Contextual Data * Multimedia Security and Content Protection2 KB (250 words) - 19:36, 10 June 2020
- |Field=online social networks, security, big data, osn analysis447 bytes (56 words) - 16:21, 8 July 2016
- * Data Warehousing, Data Mining, and Big Data * Social Networks, Web, and Personal Data Management4 KB (464 words) - 11:38, 4 September 2020
- - Cloud Computing and Big Data Analytics - Data Integration and Data Provenance12 KB (1,565 words) - 04:15, 5 August 2023
- - Security and Data Protection6 KB (790 words) - 13:45, 24 July 2016
- - Security and Data Protection6 KB (777 words) - 23:29, 29 July 2016
- ...ation systems, iot-big data, nanoelectronic systems, cyberphysical systems security464 bytes (56 words) - 15:35, 27 August 2016
- |Title=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things870 bytes (100 words) - 18:53, 2 March 2021
- |Field=computer science, information systems, data mining, security472 bytes (58 words) - 15:36, 27 August 2016
- |Title=iDSC 2017 : 1st International Data Science Conference |Field=machine learning, data mining, security in data science, data science applications414 bytes (53 words) - 15:08, 17 August 2016
- * Big Data Analytics * Security and Privacy Issues925 bytes (116 words) - 11:05, 24 August 2016
- |Field=data mining, network, mechanisms&methods Trends in mining/retrieving/handling data10 KB (1,305 words) - 00:29, 12 December 2020
- * Big Data * Security and Privacy of Information and IS3 KB (434 words) - 10:28, 26 July 2016
- ...ntext awareness, mobile computing, search engines, question answering, big data, multimedia, and services. * Structured data5 KB (580 words) - 20:22, 28 January 2017
- |Title=13th IEEE International Conference on Data Mining |Field=Data mining3 KB (407 words) - 10:17, 27 July 2016
- |Title=22nd ACM SIGKDD Conference on Knowledge Discovery and Data Mining |Field=Data mining2 KB (282 words) - 10:48, 8 February 2020
- |Title=21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining |Field=Data mining2 KB (270 words) - 10:49, 8 February 2020
- *Intelligent data management - Data Mining5 KB (641 words) - 22:32, 29 July 2016
- ...S-ACM 2016 : 2016 4th International Conference on Information and Network Security (ICINS 2016)--Ei Compendex |Field=computer science, data mining, signal processing, image processing452 bytes (54 words) - 10:46, 11 September 2016
- ...data management is relevant to this symposium. Contributions that connect data management to other areas of theoretical computer science, and those which * graph databases and (semantic) Web data4 KB (557 words) - 10:14, 15 May 2019
- |Field=semantic web, internet of things, big data, information security431 bytes (45 words) - 21:01, 26 November 2016
- |Field=online social networks, security, big data, communication systems441 bytes (55 words) - 13:49, 25 September 2016
- * Data Warehousing, Data Mining, and Big Data * Social Networks, Web, and Personal Data Management3 KB (340 words) - 11:27, 4 September 2020
- ...e transference of methods between both domains. The theme this year is big data and software engineering & knowledge engineering. Submission of papers and * Data modeling, mining and data analytics18 KB (2,288 words) - 12:48, 27 October 2016
- Big and Smart Data * Linked (Open) Data9 KB (1,190 words) - 10:12, 5 June 2019
- * Data Warehousing, Data Mining, and Big Data * Social Networks, Web, and Personal Data Management3 KB (361 words) - 10:38, 4 September 2020
- Communication Security, Trust, Protocols and Applications Communication Network Security5 KB (588 words) - 18:00, 21 January 2017
- cloud computing, big data, and mobile cloud services, to build innovative smart - Smart city data management and warehouse4 KB (565 words) - 09:46, 7 February 2017
- * Data intensive sciences and databases * Management of large scale data systems3 KB (421 words) - 20:37, 11 February 2021
- ...ocused on all aspect of Image Processing, Computer Vision, and Information security. Like previous conferences, ICIIP 2017 will feature world class speakers, t ...echnology Audit, Steganalysis, Data Remanence, Information Privacy, Usable Security, etc...2 KB (323 words) - 13:36, 6 March 2017
- Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin Network and Information Security Innovative Computing Systems and Applications in S & T domains such as –5 KB (631 words) - 15:09, 10 April 2017
- ...f various data ranging from real/live streams and simulations to analytics data analysis, in support of mining of knowledge. The conference will feature or Data Grids, Data and Information Quality4 KB (528 words) - 18:46, 29 August 2017
- ====Scalable Data Access==== * Big Linked Data processing7 KB (988 words) - 09:50, 14 August 2019
- ===Big and Smart Data and Artifical Intelligence=== *data science and digital transformation10 KB (1,309 words) - 10:29, 5 June 2019
- *Big Data and data analytics *Security, privacy, and identity on the Web5 KB (671 words) - 11:07, 12 July 2019
- ===Scalable Web and Data Architectures and Infrastructures=== *Crawling, Caching and Querying Linked (Semantic) Data18 KB (2,394 words) - 16:28, 29 January 2018
- |Title=12th International Workshop on Data Privacy Management |Field=Data Privacy7 KB (887 words) - 15:22, 15 July 2017
- ontologies, rules and data semantics in novel applications. Of particular data analytics and machine learning, social networks, distributed and mobile6 KB (798 words) - 23:16, 24 February 2020
- * Database and Data Mining * Security and Information Assurance10 KB (1,396 words) - 13:30, 28 July 2017
- |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)4 KB (597 words) - 13:28, 28 July 2017
- * Database and Data Mining * Security and Information Assurance5 KB (679 words) - 13:28, 28 July 2017
- ...y of access technologies, sensors, terminals, users’ needs and services (data, content, live streams or complex network services). - E-Health and Big Data analysis, summarization, prediction4 KB (509 words) - 11:36, 8 August 2017
- SEMANTiCS 2017 - The Linked Data Conference This year, SEMANTiCS features a special Data Science track, which is an6 KB (759 words) - 15:52, 5 December 2018
- resulted in legal uncertainty regarding transatlantic data exchange, while April 2016 saw the ratification of the the new EU Data Protection7 KB (901 words) - 11:13, 16 July 2017
- |Title=RTDPCC II 2017 : 3rd International Symposium on Real-time Data Processing for Cloud Computing data processing applications for handling real-time sensor data are becoming one4 KB (532 words) - 13:28, 28 July 2017
- Technology, (v) Big Data as a Service. - Big Data Cloud Services7 KB (1,009 words) - 13:39, 3 September 2017
- ...le=Ei - ICBDA - IEEE 2018 : 2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA 2018)--IEEE Xplore and Ei Compendex 2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA 2018)--IEEE3 KB (461 words) - 13:22, 3 September 2017
- * Database and Data Mining * Security and Information Assurance5 KB (651 words) - 11:34, 8 August 2017
- such as data mining and big data. Empowering the existing infrastructure by Big data security, Database security3 KB (464 words) - 09:30, 3 September 2017
- |Title=CODASPY 2018 : Conference on Data and Application Security and Privacy 8th ACM Conference on Data and Application Security and Privacy will be held on6 KB (807 words) - 13:40, 3 September 2017
- '''Area 1:''' Abstract Data Visualization: * Visual Data Analysis and Knowledge Discovery5 KB (615 words) - 10:58, 15 May 2020
- Special Session: Big Data and Intelligent Computing Big data and Cloud Computing5 KB (673 words) - 09:53, 3 September 2017
- - Design and analysis of concurrent and distributed data structures - Distributed storage and file systems, large-scale systems, and big data7 KB (1,009 words) - 15:54, 3 September 2019
- research that includes AI and Big Data Analytics, Network Communication & Security, Computer Vision. Following the past successful symposium SoICT 2016,4 KB (559 words) - 11:58, 8 August 2017
- Databases; Security and Cryptography; Operating Systems; Networks, Distributed Data Mining, Natural Language Processing, Business Process Mining and Business3 KB (438 words) - 11:45, 8 August 2017
- |Title=IEEE Bigcomp 2018 : 2018 IEEE International Conference on Big Data and Smart Computing Big data and smart computing are emerging research fields that have recently3 KB (436 words) - 10:46, 27 May 2020
- computing, data management, related software and hardware technologies, and * Mobile communication security issues and requirements6 KB (751 words) - 13:28, 28 July 2017
- Big Data: models for data in the Cloud, programming languages for big data, Security in Information and Knowledge Systems: identity theft, privacy,9 KB (1,118 words) - 13:41, 3 September 2017
- |Title=SPDF-Mobile 2017 : Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” |Field=security4 KB (536 words) - 09:59, 21 August 2017
- * Data management on mobile and wireless computing * Cryptography, security and privacy of mobile & wireless networks6 KB (820 words) - 13:30, 28 July 2017
- - Big Data Management - Service Security and Privacy6 KB (873 words) - 13:30, 28 July 2017
- Big data networking Cryptography and network security4 KB (524 words) - 13:30, 28 July 2017