Search results
Create the page "Information Security" on this wiki! See also the search results found.
Page title matches
- |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security5 KB (667 words) - 14:27, 13 September 2009
- 55 bytes (5 words) - 05:20, 14 September 2009
- 0 bytes (0 words) - 15:23, 15 February 2017
- |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)4 KB (597 words) - 13:28, 28 July 2017
- ...ICINS 2017 : 2017 5th International Conference on Information and Network Security (ICINS 2017)--Ei Compendex and Scopus |Field=network security1 KB (130 words) - 13:34, 28 July 2017
- 23 bytes (2 words) - 11:55, 8 August 2017
- 25 bytes (2 words) - 12:30, 3 September 2017
- 24 bytes (2 words) - 11:59, 3 September 2017
Page text matches
- All these technological developments are expected to bring us a next wave of information * Security and privacy issues for ubiquitous systems13 KB (1,468 words) - 01:23, 22 August 2008
- ** Privacy, safety and security ** Privacy, safety, and security6 KB (777 words) - 22:54, 14 August 2008
- In order to make information of the various fields of science available {{SITENAME}} relies on a network ====Computer security and reliability====6 KB (714 words) - 12:19, 11 December 2020
- | title = Transactions on Information and System Security | Field = Computer security and reliability272 bytes (32 words) - 16:33, 18 August 2008
- *Communication and Information Theory *Network Security5 KB (571 words) - 09:22, 19 July 2019
- * Quality of information (QoI) in sensor-enabled pervasive environments * Trust, security and privacy issues in pervasive systems12 KB (1,560 words) - 15:03, 27 August 2008
- The 2011 International Conference of Information Engineering The 2011 International Conference of Information Security and Internet Engineering3 KB (454 words) - 12:34, 8 October 2020
- are challenged by applications aimed at personal information The new information paradigms and requirements will move our research9 KB (1,189 words) - 14:53, 28 August 2008
- ...uctive databases and knowledge bases; Distributed databases; Integrity and security; Logic and databases; Multimedia databases; Query optimization; Query proce5 KB (753 words) - 18:59, 25 June 2012
- inter-operability, security, trusted and dependable systems, fault resource allocation, scheduling, fault tolerance, security.5 KB (715 words) - 17:43, 11 September 2008
- systems. See http://www.ifaamas.org for more information. INFORMATION FOR AUTHORS10 KB (1,371 words) - 16:14, 12 November 2020
- Local information can be found at http://www.cs.york.ac.uk/vstte08/ Unguessable Atoms: A Logical Foundation for Security5 KB (686 words) - 12:27, 12 September 2008
- number of wireless terminals and information generated by such could call the "Information-Explosion Era."5 KB (611 words) - 15:43, 16 September 2008
- ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d Additionally, P2P systems require special attention from the security point of view. Trust, reputation, copyrights, and intellectual property are18 KB (2,408 words) - 02:37, 16 December 2008
- |Title=8th International Conference on Information Systems Technology |Field=Information systems7 KB (763 words) - 12:25, 6 October 2011
- ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...ons; Target-oriented keyword search; Filter-based profile matching; Mutual information on data streams; Stream processing; Digitized documents streams; Queries wi11 KB (1,371 words) - 12:28, 18 May 2020
- ...ed to databases triggered substantial improvements for content processing, information indexing, and data, process and knowledge mining. The push came from Web se ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.)11 KB (1,446 words) - 18:26, 13 October 2008
- ...ucators and researchers as well as an important aspect of e-government and information society initiatives. F/OSS is a complex phenomenon that requires an interdi ...indings and practical experiences. The conference is also meant to provide information and education to practitioners, identify directions for further research an10 KB (1,349 words) - 16:42, 24 September 2008
- Software Security Internet and Information Systems Development2 KB (293 words) - 10:35, 24 June 2011
- |Title=The IEEE 23rd International Conference on Advanced Information Networking and Applications (AINA-09) ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-09) will be held in Bradford, May 26-29,34 KB (4,565 words) - 22:20, 10 January 2018
- |Title=The IEEE 22nd International Conference on Advanced Information Networking and Applications ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-08) will be held in Ginowan City , Okinaw8 KB (1,037 words) - 22:20, 10 January 2018
- |Title=The IEEE 21st International Conference on Advanced Information Networking and Applications (AINA-07) ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA-07) will be held in Niagara Falls, Canada9 KB (1,189 words) - 22:20, 10 January 2018
- |Title=The IEEE 20th International Conference on Advanced Information Networking and Applications on Advanced Information Networking and Applications (AINA2006) will26 KB (3,456 words) - 22:20, 10 January 2018
- |Title=The IEEE 19th International Conference on Advanced Information Networking and Applications ...CDP of the IEEE Computer Society, the International Conference on Advanced Information Networking and Applications (AINA 2005) will be held in Tamkang University,10 KB (1,263 words) - 22:20, 10 January 2018
- |Title=The 18th International Conference on Advanced Information Networking and Applications (AINA 2004) The International Conference on Advanced Information Networking and Applications (AINA 2004) will be held in Fukuoka, Kyushu, Ja12 KB (1,537 words) - 22:19, 10 January 2018
- |Title=The International Conference on Advanced Information Networking and Applications The International Conference on Advanced Information Networking and Application will be held in Xi'an, China in March 27-29, 2008 KB (1,040 words) - 22:20, 10 January 2018
- Users will be able to retrieve, publish, and manage information, - Wireless security and dependability4 KB (495 words) - 09:22, 22 August 2023
- ...traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable, etc. - Trust-related Security and Privacy: Trust-related secure architecture, framework, policy, intrusio9 KB (1,216 words) - 17:32, 14 October 2008
- * Security assessment and enhancement * Games of imperfect or asymmetric information6 KB (722 words) - 17:32, 14 October 2008
- ...raction and representation, shape and motion primitives, texture and color information, statistical, structural and syntactic pattern recognition, neural networks ...multimedia databases, digital and video libraries, compression and coding, security over the network.2 KB (268 words) - 17:47, 14 October 2008
- Persuasive Technology is all about using Information and Communications Technology to change what we think and do. We are just e * Security and privacy8 KB (989 words) - 20:13, 22 February 2009
- Geographical Information Systems/ Global Navigation Satellite Systems Security and Information Assurance4 KB (503 words) - 11:36, 18 October 2008
- - System management and security; For more information visit the conference web site at http://www.computingfrontiers.org4 KB (591 words) - 17:48, 14 October 2008
- ...n the areas of RFID technologies, their supporting large-scale distributed information systems and their applications. * Security & Privacy: Cryptographic protocols and privacy-enhancing techniques3 KB (431 words) - 17:48, 14 October 2008
- • Information-theoretic aspects of wireless communications • Wireless network security and privacy6 KB (731 words) - 10:33, 14 August 2023
- ...ireless communications and networking employed to support the needs of the Information Society. This sixth symposium, intends to bring together various wireless c * Wireless privacy and security3 KB (456 words) - 18:10, 14 October 2008
- session that includes the ACM Student Research Competition. More information on these activities, including submission * Security, privacy, and trustworthiness of mobile and wireless systems7 KB (974 words) - 12:28, 3 August 2023
- ...uming but also error-prone. The systematic and timely capture of the above information may accurately keep track of the various stages that data go through and he ...ware engineering, workflow system, information retrieval, web service, and security research. At the same time, it also requires understanding of problems from3 KB (416 words) - 17:48, 14 October 2008
- Information theory: distributed network coding, Shannon's entropy, Nash equilibrium Internet security enforcement and validation11 KB (1,385 words) - 17:48, 14 October 2008
- * legal and quasi-legal applications of AI and other advanced information technologies * Conceptual or model-based legal information retrieval7 KB (998 words) - 17:48, 14 October 2008
- ...nal Conference on the Theory and Application of Cryptology and Information Security556 bytes (69 words) - 15:16, 10 March 2020
- ...ternational Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability7 KB (960 words) - 17:48, 14 October 2008
- The 8th ACM/IEEE Conference on Information Processing in ...cations o real-time resource management and scheduling o embedded system security o programming languages and software engineering for real-time or8 KB (939 words) - 17:48, 14 October 2008
- * Trust, security and privacy Trust, security and privacy19 KB (2,503 words) - 13:25, 28 October 2020
- Ubiquitous sensors, devices, networks and information are paving the way * Security, Privacy, Safety and Legal Issues7 KB (942 words) - 20:05, 14 October 2008
- | Title = The 3rd International Symposium on Security and Multimodality in Pervasive Environments ...er hand, while enlarging and easing the ways to access to the environment, security threads arise and the environment must be properly equipped in order to pro3 KB (393 words) - 21:18, 14 October 2008
- | Field = Computer security and reliability ...the “tour guide” and save you time by collecting and summarizing this information to bring you up to date in a particular area as efficiently as possible.3 KB (467 words) - 21:39, 16 October 2008
- - Information dissemination and publish/subscribe functionality in SPSs - Information integration and data source wrapping in SPSs3 KB (490 words) - 20:05, 14 October 2008
- |Title=First IEEE Workshop on Information and Software as Services First IEEE Workshop on Information & Software as Services (WISS'09)7 KB (907 words) - 21:51, 14 October 2008
- # Semantic Information Retrieval # Semantic Web Trust, Privacy, Security and Intellectual Property Rights4 KB (450 words) - 20:05, 14 October 2008
- | Title = International Conference on Wireless Information Networks and System WINSYS is organized by INSTICC – Institute for Systems and Technologies of Information, Control and Communication9 KB (1,219 words) - 20:05, 14 October 2008
- [For more information, please visit URL: http://www.sis.uncc.edu/~mshehab/trustcol08/ ] ...enerate added momentum towards research in finding viable solutions to the security and privacy challenges faced by the current and future collaborative system4 KB (520 words) - 20:05, 14 October 2008
- * Cryptography and Security * Information Retrieval2 KB (216 words) - 20:05, 14 October 2008
- • Ethical, Social, Privacy, Security and moral Issues in an e-societ • Information Society5 KB (530 words) - 10:27, 24 June 2011
- Information Systems Computer and Network Security3 KB (332 words) - 20:06, 14 October 2008
- |Field=Computer security and reliability ...ctions), or refinery& chemical systems rely on networked communication and information systems. Moreover, there are other dedicated systems for data mining, recom15 KB (2,175 words) - 21:03, 19 March 2013
- Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability AUTOMOTIVE ENTERTAINMENT and INFORMATION3 KB (354 words) - 20:06, 14 October 2008
- ...in eESociety, eGovernment /eGovernance, eHealth, Information Systems, and Information Management. These broad areas are divided into more detailed areas (see bel * Topics related to the Information Society are of interest. These include, but are not limited to the followin6 KB (780 words) - 20:06, 14 October 2008
- | Title = Fourth International Conference on Intelligent Computing and Information Systems ...vances of artificial and computational intelligence as well as intelligent information systems.2 KB (193 words) - 20:06, 14 October 2008
- Information and Knowledge Engineering Intelligent Information Processing Systems3 KB (359 words) - 20:06, 14 October 2008
- o Security and Privacy For further information, please contact the program chair, Professor Xiaodong Zhang at zhang@cse.oh2 KB (303 words) - 20:06, 14 October 2008
- ...cess management and modelling, Grid computing, Web services notifications, information dissemination, event stream processing, and message-oriented middleware. Th * Security issues6 KB (829 words) - 15:30, 29 January 2021
- ...ssist in the development of best practice and relevant standards. For more information, please visit: http://www.ieee-cqr.org/ . * Security and Reliability Issues4 KB (505 words) - 22:15, 14 October 2008
- Enterprise Information Systems Homeland Security6 KB (708 words) - 22:49, 14 October 2008
- ...ologies in complex and demanding settings, like manufacturing, healthcare, security, control systems, etc. ...echnologies with other technologies used to support organisations, such as information systems, production systems, decision support systems, knowledge management2 KB (261 words) - 22:45, 14 October 2008
- * Security and privacy in pervasive healthcare * Using mobile devices for healthcare information storage, update, and transmission6 KB (732 words) - 22:45, 14 October 2008
- * Data management and middleware support for collaborative information systems * Security and trust management in collaborative networks, systems, and applications6 KB (674 words) - 22:45, 14 October 2008
- ...d task identification, personalized access to information and personalized information management, to name but a few. The advantages of such data are numerous, st ...biquitous computing, activity-driven computing, context-driven computing, information retrieval, database systems, digital libraries, metadata, data mining, user6 KB (890 words) - 22:53, 14 October 2008
- ...e are promoting society integration and disseminating the digital culture. Information and Communication Technologies (ICT) are intensely used by Brazilian popula ...diversity of interactive systems usage, like in entertainment, security in information exchange and broadcast, participation in social and democratic processes as3 KB (502 words) - 22:53, 14 October 2008
- - Databases: query processing; information integration; - Security and Privacy: cryptography; access control; security in9 KB (1,193 words) - 22:53, 14 October 2008
- �?� Information integration in sensor networks �?� Knowledge management, information systems, large databases, data-mining4 KB (468 words) - 22:54, 14 October 2008
- | Title = Conference on Enterprise Information Systems | Field = Information systems9 KB (1,240 words) - 22:56, 14 October 2008
- | Title = International Conference on Neural Information Processing ...ecision support, business and finance, speech-, image- and multimodal information processing, process control, arts and design. The conference will includ5 KB (699 words) - 23:04, 14 October 2008
- CAART is organized by INSTICC (Institute for Systems and Technologies of Information, Control and Communication), with technical co-sponsorship by the WfMC and ...is connection, therefore, authors are invited to highlight the benefits of Information Technology (IT) in these areas. Ideas on how to solve problems using agents18 KB (2,457 words) - 23:04, 14 October 2008
- ...gence, databases, social networks, distributed computing, web engineering, information systems, natural language processing, soft computing, and human-computer in General Information6 KB (854 words) - 12:05, 28 May 2016
- �?� Security and Cryptography �?� Information Systems13 KB (1,775 words) - 23:04, 14 October 2008
- ...oftware Engineering, Data Bases, Distributed Systems, Information Systems, Information Retrieval, Service Oriented Applications, etc. - Information integration6 KB (827 words) - 23:04, 14 October 2008
- ...tle = International Workshop on Computational Intelligence in Security for Information Systems568 bytes (62 words) - 23:05, 14 October 2008
- * Cryptography and Network Security * Information Assurance2 KB (167 words) - 23:05, 14 October 2008
- More information about each type of submission is included below. ...-time localization of critical information, provision of technical support information, or creation of preliminary translations for post-editing. Submissions shou16 KB (2,200 words) - 20:51, 18 February 2021
- information and communication complexity. programs; foundations of security; term rewriting;5 KB (698 words) - 23:08, 14 October 2008
- distributed databases; information retrieval; knowledge bases; logic; data; security; semi-structured data; spatial data; temporal data;5 KB (660 words) - 14:52, 2 March 2012
- ...languages; query optimization; real-time data; recovery; scientific data; security; semantic Web; semi-structured data; spatial data; temporal data; transacti3 KB (457 words) - 13:09, 7 December 2016
- Information and Communication Technologies (ICTs) have proved to offer immense potentia * Network and IT security issues in developing countries9 KB (1,127 words) - 17:19, 26 April 2011
- - Other aspects of modern information systems such as security, privacy,7 KB (851 words) - 05:29, 15 October 2008
- * Information retrieval, filtering and dissemination. * Privacy and Security in Databases.2 KB (308 words) - 23:08, 14 October 2008
- Library. For additional information, please visit the above official ACM SAC Data Privacy and Security7 KB (1,006 words) - 23:08, 14 October 2008
- areas but also adds emphasis on Web, Information Retrieval and Data Mining. * Data privacy and security5 KB (661 words) - 16:23, 11 December 2008
- new perspectives regarding information sharing, annotation, * Policies, authentication, security, and trust within5 KB (709 words) - 23:08, 14 October 2008
- non-functional system properties (e.g. availability, reliability, security, performance, embedded systems, and that is not the case in information systems). Finally, because of7 KB (791 words) - 23:09, 14 October 2008
- | Title = 10th ACM International Workshop on Web Information and Data Management 10th ACM International Workshop on Web Information3 KB (437 words) - 23:20, 14 October 2008
- ...for possible inclusion, in expanded and revised form, in the Knowledge and Information Systems journal published by Springer-Verlag. * Security and data integrity5 KB (634 words) - 15:36, 14 December 2008
- technologies for the design, management and use of information systems management and analysis given the large amounts of information that are10 KB (1,288 words) - 11:52, 18 October 2008
- ...tion. Also, ODBASE'08 encourages the submission of papers that examine the information needs of various applications, including electronic commerce, electronic go ...stributed Applications), and IS'08 (International Symposium on Information Security).8 KB (1,081 words) - 08:21, 22 December 2011
- |Title=ACM 17th Conference on Information and Knowledge Management |Field=Information retrieval29 KB (4,077 words) - 18:04, 18 August 2023
- | Title = Third International Conference on Digital Information Management Third IEEE International Conference on Digital Information Management (ICDIM 2008)...4 KB (595 words) - 23:09, 14 October 2008
- * mobile database security committee. Detailed submission information will be posted on the web7 KB (875 words) - 23:09, 14 October 2008
- | Title = Third International Workshop on Flexible Database and Information Systems Technology Information systems are able to deal with an incredible amount of data, concerning ever7 KB (917 words) - 23:09, 14 October 2008
- * Data privacy and security * Managing uncertain and imprecise information6 KB (840 words) - 23:10, 14 October 2008
- § Geographic Information Systems § Multimedia Databases and Information Retrieval3 KB (305 words) - 08:44, 31 July 2020
- Information systems and database systems have always been a central topic of computer s * Applications of DB Systems and Information Systems4 KB (457 words) - 16:14, 16 December 2020
- * Security, reliability and availability in distributed storage systems, geographical information systems, image processing, Web retrieval,5 KB (644 words) - 23:10, 14 October 2008
- * incomplete information * privacy/security5 KB (647 words) - 23:10, 14 October 2008
- | Title = The Ninth International Conference on Web-Age Information Management The Ninth International Conference on Web-Age Information Management10 KB (1,376 words) - 23:10, 14 October 2008
- The theme of BNCOD 2008, the 25th in the series, is "Sharing Data, Information and Knowledge". * Data mining and information extraction4 KB (593 words) - 23:10, 14 October 2008
- | Title = International Workshop on Privacy and Anonymity in the Information Society Disclosure Risk and Information Loss Assessment2 KB (193 words) - 23:10, 14 October 2008
- ...e = Third International Workshop on Database Technologies for Handling XML Information on the Web ...ss, and social communities. Peer-to-peer architectures, the Grid, personal information systems, pervasive and ubiquitous computing, networked sensors, biomedical3 KB (475 words) - 23:10, 14 October 2008
- * Putting Auto ID data into context (relating it to business process information) * Privacy and security in Auto ID systems4 KB (471 words) - 23:10, 14 October 2008
- Nowadays, the rapid growth of information technologies has brought reliability, integrity, privacy, and security issues are still being7 KB (908 words) - 23:10, 14 October 2008
- ...middleware, e.g., for managing Grid resources, computing tasks, data, and information, form the basic framework for realising an e-Science environment. By automa * Security control in managing workflow4 KB (560 words) - 23:10, 14 October 2008
- ...g access to information and services. Such technologies contribute to make information and services available anytime and anywhere. This has led to the developmen * Reliability, security and privacy2 KB (324 words) - 16:49, 16 December 2020
- and military operations. Such networking is essential for safety, security and economic vitality in critical information exchange among diverse, widely-dispersed, mobile users. A primary5 KB (549 words) - 17:15, 5 July 2020
- Security issues Dept. of Electronic Engineering and Information Engineering Research, Technology &3 KB (364 words) - 23:11, 14 October 2008
- * Network Security and Cooperation * Web Information Management3 KB (339 words) - 23:11, 14 October 2008
- 9. Information Security Technologies2 KB (200 words) - 23:11, 14 October 2008
- * Network Security ...n the conference Web site. Please see http://www.comsnets.org for detailed information. The authors of accepted papers must guarantee that their paper will be pre4 KB (465 words) - 23:11, 14 October 2008
- 11. Communication and Information Systems Security Symposium3 KB (431 words) - 09:18, 4 August 2023
- ...he fly, based on which all electronic devices will be able to exchange the information with each other whenever necessary. Also, ubiquitous computing is an emergi Network Security and Privacy7 KB (990 words) - 23:11, 14 October 2008
- | Title = Security and Privacy in Telecommunications and Information Systems | Field = Computer security and reliability4 KB (587 words) - 23:30, 14 October 2008
- - Computer and Communications Network Security Further information about the conference is available at IWT official web site. Please, visit h3 KB (375 words) - 23:37, 14 October 2008
- | Title = Third International Conference on Bio-Inspired Models of Network, Information and Computing Systems 3rd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems5 KB (694 words) - 23:11, 14 October 2008
- + Security for CE Communications Multimedia Information Processing on Wireless Sensor Networks5 KB (584 words) - 09:43, 4 September 2023
- ...be held in Bangkok, Thailand. The ISPACS presents every possibility on new information technologies. The ISPACS 2008 will include many regular sessions on the top 7. Security Signal Processing4 KB (496 words) - 23:12, 14 October 2008
- Security/privacy in wireless systems Wireless net. information theory2 KB (244 words) - 23:12, 14 October 2008
- 5. Information and Communication Technologies (ICT) 5 .54 Network Security2 KB (250 words) - 23:12, 14 October 2008
- ...ospective tutorial presenters should contact the Tutorials Chair. For more information please visit the conference web page (see below). - Network Security3 KB (465 words) - 23:13, 14 October 2008
- ...rage contributions on policy-based techniques in support of management and security of all types of wireless networks: cellular, Wi-Fi, Mobile Ad Hoc, hybrids, ...ource allocation, autonomic computing, systems management, QoS adaptation, security5 KB (667 words) - 23:13, 14 October 2008
- * Computer Networks and Security * Information Theory and Coding2 KB (283 words) - 23:13, 14 October 2008
- * Security and resilience of networked systems For more information and submission guidelines, please see4 KB (528 words) - 23:13, 14 October 2008
- Information and Communication Technologies continue to rapidly transform how business i ...values, the real-world impact of e-Business research, and customer-centric information systems respectively. With this year?s workshop being located in Europe, we3 KB (430 words) - 23:13, 14 October 2008
- *Security and privacy in Web search and mining *Information extraction, slot-filling2 KB (237 words) - 12:23, 11 September 2020
- | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.4 KB (457 words) - 23:13, 14 October 2008
- ...published work that demonstrate current research in all areas of Web based information systems and their applications in science, technology, business and commerc Web Services Security3 KB (494 words) - 23:16, 14 October 2008
- ...os, audio recordings) in bibliometrics (publication patterns), in homeland security (terrorist networks). * Mining social data for multimedia information retrieval3 KB (453 words) - 23:14, 14 October 2008
- networks, including user behavior models, security and trust, P2P, - "How salesforce.com Changes Information Technology"7 KB (813 words) - 23:14, 14 October 2008
- * Security Challenges for Web Services * Extended Web Services Specifications (security, QoS, other properties)8 KB (1,158 words) - 23:14, 14 October 2008
- * Data Models for Web Information Systems * Web Information Extraction...3 KB (250 words) - 23:14, 14 October 2008
- * Security, privacy, and trust ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to6 KB (869 words) - 23:14, 14 October 2008
- | Title = IEEE Information Theory Workshop on Networking and Information Theory | Field = Information theory3 KB (308 words) - 23:15, 14 October 2008
- * Security, robustness, and fault-tolerance in networked environments ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to8 KB (1,093 words) - 23:15, 14 October 2008
- ...m for researchers, engineers and academia to exchange the latest technical information and research findings on next-generation networked multimedia concepts, tec * QoS and Security Support for Entertainment8 KB (1,011 words) - 23:15, 14 October 2008
- | Title = The Second International Workshop on Peer-to-Peer Computing for Information Search Peer-to-Peer Computing for Information Search (P2PSearch 2008)5 KB (554 words) - 23:15, 14 October 2008
- across the whole information flow from service creation to deployment * Security aspects in network management6 KB (663 words) - 23:15, 14 October 2008
- * Data management and middleware support for collaborative information systems * Security, privacy and trust management in collaborative networks, systems, and appli8 KB (1,093 words) - 23:15, 14 October 2008
- | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)5 KB (628 words) - 23:15, 14 October 2008
- 4. Security and Privacy 4-03 Distributed systems security5 KB (623 words) - 23:15, 14 October 2008
- ...ng difficult social and policy issues such as those related to privacy and security ...l-mobile technologies, information networking, human-computer interaction, security and privacy.8 KB (1,003 words) - 23:15, 14 October 2008
- | Title = Foundations of Information Management in Networks Foundations of Information Management in Networks4 KB (563 words) - 23:15, 14 October 2008
- * Network Security ...viewer-friendly format). All papers must include a title, complete contact information for all authors, and keywords on the cover page. The corresponding author s5 KB (598 words) - 10:18, 29 May 2016
- * Security, privacy and social issues of mobile and ubiquitous systems ...Applications (MONET) journal. Please visit the Publications page for more information.5 KB (599 words) - 23:15, 14 October 2008
- | Title = The Third International ICST Conference on Scalable Information Systems | Field = Information retrieval4 KB (491 words) - 23:16, 14 October 2008
- - Information forensics and security2 KB (253 words) - 23:16, 14 October 2008
- * Information forensics and security ...special session authors are referred to the ICASSP website for additional information regarding submissions.4 KB (490 words) - 22:46, 4 February 2009
- * A Student Paper Contest with awards sponsored by Canon Information Systems Research Australia (CiSRA). To enter the contest a paper submission * Fusion mechanism of multimodal signals in human information processing system and applications to multimodal multimedia data fusion/int4 KB (443 words) - 17:06, 24 February 2016
- | Title = International Symposium on Information Theory and its Applications | Field = Information theory3 KB (362 words) - 23:17, 14 October 2008
- Information Retrieval Network Security and Information Assurance4 KB (438 words) - 23:17, 14 October 2008
- | Title = International Conference on Information Processing in Sensor Networks ...signal and image processing, information and coding theory, databases and information management, distributed algorithms, networks and protocols, wireless commun4 KB (570 words) - 23:17, 14 October 2008
- Information forensics and security ...special session authors are referred to the ICASSP website for additional information regarding submissions.3 KB (450 words) - 23:04, 4 February 2009
- * Performance, dependability and security evaluation using analytical models, simulation or empirical approaches * Model-based security engineering and design for security5 KB (660 words) - 16:46, 27 December 2015
- | Field = Information technology ...ems across network centric environments to allow distributed computing and information sharing.5 KB (697 words) - 23:18, 14 October 2008
- to exchange information on the engineering design, enabling + Security, Privacy and Open Source TRACK5 KB (594 words) - 16:29, 25 March 2020
- # security technology and systems * Integrity, Security, and Fault Tolerance6 KB (733 words) - 12:48, 27 October 2016
- | Title = The Second IEEE International Workshop on Security in Software Engineering | Field = Computer security and reliability5 KB (615 words) - 09:55, 29 May 2016
- |Title=5th International Conference on Information Technology and Applications (ICITA 2008) |Field=Information technology3 KB (427 words) - 17:01, 29 May 2016
- ...encourage researchers and practitioners from the RE, software engineering, information systems, and embedded systems fields to present original work. Contribution * quality goals (e.g., security),4 KB (503 words) - 23:18, 14 October 2008
- | Title = Symposium on Requirements Engineering for Information Security ...t/event.showcfp?eventid=1752&copyownerid=2 WikiCFP][[Category:Computer security and reliability]]583 bytes (64 words) - 23:18, 14 October 2008
- ...lacing - the software life cycle: the model life cycle. Further background information can be found here. Background information: Model Based Software Engineering18 KB (2,714 words) - 23:23, 14 October 2008
- ...his has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society tha General areas of interest to ASONAM 2009 include information science and mathematics,3 KB (404 words) - 23:18, 14 October 2008
- rich latent information within these networks into actionable o Privacy and security issues.5 KB (592 words) - 23:18, 14 October 2008
- ...tiple research fields such as user modeling, machine learning, intelligent information retrieval, data and text mining, statistics, computational intelligence, hu - Security and privacy aspects of personalization and recommendation4 KB (570 words) - 23:19, 14 October 2008
- areas in information technology. Although many algorithms and blog mining, security mining, taxation mining, scientific data4 KB (510 words) - 23:19, 14 October 2008
- ...polarized opinions: There are those who think an organization can analyze information it has gathered for any purpose it desires and those who think that every t ...ance to the point where privacy would no longer rely on accidental lack of information but rather on intentional and engineered inability to know. This belief is5 KB (721 words) - 23:19, 14 October 2008
- ...e = Sixth International Conference on Cryptography, Coding and Information Security | Field = Computer security and reliability3 KB (448 words) - 23:19, 14 October 2008
- |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability4 KB (487 words) - 10:42, 21 August 2020
- | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability5 KB (673 words) - 23:19, 14 October 2008
- | Title = Ubiquitous Computing Security Systems | Field = Computer security and reliability3 KB (328 words) - 06:40, 22 December 2012
- | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability6 KB (697 words) - 23:19, 14 October 2008
- | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability6 KB (736 words) - 23:20, 14 October 2008
- | Title = Information Security South Africa (ISSA) Conference 2008 | Field = Computer security and reliability4 KB (465 words) - 23:20, 14 October 2008
- | Title = New Security Paradigms Workshop | Field = Computer security and reliability8 KB (1,072 words) - 23:20, 14 October 2008
- | Title = The Sixth International Workshop on Security In Information Systems | Field = Computer security and reliability590 bytes (68 words) - 23:20, 14 October 2008
- | Title = The 11th Information Security Conference | Field = Computer security and reliability528 bytes (59 words) - 23:20, 14 October 2008
- | Title = Special Session on Systems and Information Security | Field = Computer security and reliability541 bytes (61 words) - 23:20, 14 October 2008
- forming, a new way to manage personal information or a new approach to model context information. There is less emphasis on the actual5 KB (663 words) - 23:20, 14 October 2008
- | Title = Workshop in Information Security Theory and Practices 2008: Smart Devices, Convergence and Next Generation N | Field = Computer security and reliability606 bytes (68 words) - 23:20, 14 October 2008
- | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security | Field = Computer security and reliability4 KB (565 words) - 23:20, 14 October 2008
- | Title = 23rd International Information Security Conference | Field = Computer security and reliability5 KB (637 words) - 23:20, 14 October 2008
- | Title = NATO Advanced Research Workshop: Metamaterials for Secure Information and Communication Technologies | Field = Computer security and reliability2 KB (276 words) - 23:20, 14 October 2008
- | Title = IEEE Symposium on Security and Privacy | Field = Computer security and reliability2 KB (262 words) - 23:20, 14 October 2008
- |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability6 KB (689 words) - 10:39, 21 August 2020
- | Title = SPIE Defense and Security Symposium | Field = Computer security and reliability1 KB (167 words) - 23:20, 14 October 2008
- | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability4 KB (502 words) - 23:20, 14 October 2008
- - Multimedia security and content protection contact information for the presenter, and a description of the tutorial and material to be dis3 KB (425 words) - 23:20, 14 October 2008
- - Personalization, Privacy and Security in Mobile Computing - Security and Privacy of Mobile/Wireless Systems10 KB (1,262 words) - 23:20, 14 October 2008
- ...Multimedia (ISM2008) is an international forum for researchers to exchange information regarding advances in the state of the art and practice of multimedia compu * Multimedia security including digital watermark and encryption5 KB (595 words) - 23:20, 14 October 2008
- -Security issues on UMC Contact Information4 KB (573 words) - 23:20, 14 October 2008
- ...learning techniques to address reliability, performance, power management, security, fault diagnosis, or manageability issues in computer systems ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to6 KB (837 words) - 23:21, 14 October 2008
- · Computational Linguistics & Information Integration · Forensic Studies and Security Issues3 KB (364 words) - 23:21, 14 October 2008
- ...ires that referees treat the contents of papers under review as privileged information not to be disclosed to others before publication. It is expected that no on Service Security, Privacy and Trust18 KB (2,352 words) - 23:23, 14 October 2008
- | Title = IEEE 8th International Conference on Computer and Information Technology ...ted many high quality research papers spanning over the various aspects of information technology, computing science and computer engineering. These papers highli3 KB (415 words) - 23:23, 14 October 2008
- ...ess calculi, programming language semantics, proof theory, reasoning about security, rewriting, specifications, type systems and type theory, and verification. All deadlines are firm; late submissions will not be considered. Detailed information about electronic paper submission via EasyChair will be posted at the LICS2 KB (285 words) - 15:11, 7 November 2016
- Information Security and Cryptography Information Systems3 KB (412 words) - 19:34, 12 November 2020
- ...ring the past decade. They come in diverse forms: business support, public security, entertainment, welfare and many more. Video streaming, video conferencing, - Side information refinement4 KB (567 words) - 23:24, 14 October 2008
- | Title = 8th International Workshop on Pattern Recognition in Information Systems Pattern Recognition in Information Systems4 KB (550 words) - 23:25, 14 October 2008
- ...itical problems. Specific requirements in terms of scalability, real-time, security, performance, accuracy, distribution, and user interaction drive the design Security and protection systems11 KB (1,492 words) - 23:26, 14 October 2008
- * Security ...Web form, which will be available here soon. The Web form asks for contact information for the paper and allows for the submission of your full paper file in PDF4 KB (547 words) - 23:26, 14 October 2008
- | Field = Computer security and reliability ...ith at least 10pt font. Submission instructions and other workshop related information will appear here.5 KB (598 words) - 01:12, 31 May 2012
- * Security and Trust in Distributed Systems ** [[has general chair::Sam Joseph]], Dept of Information and Computer Sciences, University of Hawaii at Manoa, Email: srjoseph@hawai6 KB (761 words) - 03:28, 6 January 2009
- - Information Services - Networking and Security5 KB (577 words) - 23:27, 14 October 2008
- * Hardware support for security For more information on the conference and submission instructions, please visit the conference2 KB (259 words) - 10:14, 29 May 2016
- ...ns and required attributes, such as reliability, availability, safety, and security, as well as human factors. * Architecture and protocols for security.4 KB (528 words) - 23:27, 14 October 2008
- ...energy, Waste management, Waste treatment and recycling, Water network and security, Sensor technologies, Intelligent Micro-grids ...n, transmission, processing, fusion, management, simulation and display of information for aerospace systems4 KB (561 words) - 23:29, 14 October 2008
- Data, information, and signal processing Security and privacy6 KB (771 words) - 16:09, 16 September 2019
- suitability to each conference. PLEASE SEE BELOW for topic information 10) Networked embedded systems and security11 KB (1,352 words) - 00:33, 15 October 2008
- reliability, security and survivability in RT systems; scheduling further information.7 KB (870 words) - 23:30, 14 October 2008
- ...es, social networks, Web services, distributed computing, Web engineering, information systems, natural language processing, multimedia, and human-computer intera ...hould not exceed 15 pages in length and must be formatted according to the information for LNCS authors.4 KB (573 words) - 23:31, 14 October 2008
- * Information extraction from the Deep Web, especially from E-commerce sites * Security and privacy issues of Deep Web content extraction and annotation2 KB (225 words) - 23:31, 14 October 2008
- ...cooperation and goal seeking through sharing policy and ontology, safety & security in systems, other QoS issues, and so on. ...es relating to architecture, implementation, coordination, service levels, security, etc. of semantic or otherwise agents.10 KB (1,391 words) - 23:31, 14 October 2008
- .... corporate culture), psychological (perceived dependability), managerial (information management and processes), and economical. Fostering learning is a key, and ...ity when compared to traditional critical systems, where dependability and security are fairly well understood as complementary concepts and a variety of prove8 KB (952 words) - 23:31, 14 October 2008
- Security in distributed systems Autonomic access control and security issues5 KB (702 words) - 23:31, 14 October 2008
- - KBS in Geographic Information Systems (GIS) - Semantic information retrieval4 KB (523 words) - 23:31, 14 October 2008
- workflows to keep track of execution history, such information is o Security of Web services and scientific workflows6 KB (750 words) - 23:31, 14 October 2008
- ...forum where researchers, developers, educators, and practitioners exchange information on the latest practical and experimental work in the design and implementat - Checking or improving the safety, security, or correctness of programs5 KB (667 words) - 14:18, 25 November 2016
- ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more. ...l meeting grounds for the presentation and discussion of the most advanced information on the development of all aspects of computing systems.4 KB (577 words) - 09:28, 12 May 2020
- ...ovel insights from industry. See the HPCA 2020 website: TBD for additional information about HPCA 2020 and submission details. * Security3 KB (327 words) - 13:11, 11 May 2020
- ...m where researchers, developers, educators, and practitioners can exchange information on the latest practical and experimental work in the design and implementat * Security5 KB (678 words) - 20:58, 26 November 2016
- SUMMARY: Reliability, safety, and security are among the most critical requirements of contemporary software. The appl ...process must remain focused on the importance of reliability, safety, and security; our educational institutions must fully integrate these concerns into thei8 KB (1,079 words) - 23:32, 14 October 2008
- o Program Chair: LTC Robert Kewley, PhD, Director of Information Engineering, Systems Engineering Department, US Military Academy at West Po * Symposium on Simulation of Systems Security (SSSS)6 KB (735 words) - 23:32, 14 October 2008
- Topics of legal and social aspects of information systems include but are not limited to: File / information sharing networks and user behavior8 KB (1,075 words) - 23:52, 14 October 2008
- | Title = 12th International Conference on Business Information Systems | Field = Information systems9 KB (1,134 words) - 01:18, 1 February 2009
- ...proaches provide important enhancements to the ways gateways interact with information services, provide rich user interactivity, and build social networks. Exami * Portal security models and solutions;3 KB (378 words) - 23:34, 14 October 2008
- | Field = Information science ...of Knowledge Grid ?Large-Scale Distributed Knowledge Management ?Ontology Information/Knowledge/Service Integration ?Knowledge Flow ?Internet-based Knowledge Eng3 KB (367 words) - 23:35, 14 October 2008
- ...tle = The First International Conference on Security and Privacy in Mobile Information and Communication Systems ...edge researchers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymaker4 KB (451 words) - 23:37, 14 October 2008
- [This information is being posted to multiple lists - we apologise if you get it several times. Please, pass the information to whom it may benefit. Thank6 KB (682 words) - 10:18, 14 April 2020
- ...these general themes, DEON2008 will encourage a special focus on the topic Security and Trust. Specific Security and Trust themes5 KB (587 words) - 23:37, 14 October 2008
- provides access to information of a limited geographical area and - Security4 KB (483 words) - 23:37, 14 October 2008
- ...xpensive sensor nodes to create flexible and robust networks for gathering information is central to this vibrant field. Research is being undertaken to develop SECURITY11 KB (1,533 words) - 23:38, 14 October 2008
- | Title = Twelfth International Workshop on Cooperative Information Agents An intelligent information agent is a computational software entity9 KB (1,215 words) - 23:38, 14 October 2008
- * Security, trust, & privacy * Techical Program Vice-Chair for Information Systems (EDAS)3 KB (380 words) - 19:34, 17 November 2008
- * Information Security and Cryptography * Information Systems3 KB (386 words) - 23:39, 14 October 2008
- ...as now become the mainstream technology for High Performance Computing and Information Technology. - Security and Reliability5 KB (606 words) - 14:17, 8 April 2021
- ...about novel and emergent applications in smart sensors, biology, homeland security, systems health management, and related areas. Collaborate and network with For additional information, please visit the Sensors Applications Symposium website at www.sensorapps.1 KB (164 words) - 23:39, 14 October 2008
- ...perating systems, storage, networking, languages and language engineering, security, dependability, and manageability. We are also interested in contributions ...thors who have committed them. In some cases, program committees may share information about submitted papers with other conference chairs and journal editors to6 KB (781 words) - 23:39, 14 October 2008
- # Security challenges and solutions for interoperability/interoperation of # Experiences with Grid information interoperability (XML, RDF, etc.)7 KB (959 words) - 23:40, 14 October 2008
- WORKSHOP INFORMATION: * Security in Biomedical Data Grids7 KB (876 words) - 23:40, 14 October 2008
- | Field = Computer security and reliability * Integrated system reliability, availability, security, safety, and timing analysis and evaluation methods6 KB (748 words) - 14:43, 27 December 2015
- Security Assessment Security of Supply8 KB (1,082 words) - 23:40, 14 October 2008
- | Title = Information Security and Cryptology Conference519 bytes (56 words) - 23:41, 14 October 2008
- | Title = Fourth International Workshop on the Value of Security through Collaboration ...ties of the ecosystem where the nodes operate may be guaranteed. Thus, the security property of the ecosystem may be driven by self-organizing mechanisms. Depe3 KB (420 words) - 23:42, 14 October 2008
- ...ers in a hospital ward are, by the very nature of their work, mobile. The information that nurses, doctors and other health ward data management. The use of a mobile wireless infrastructure can lead to security and reliability problems. Mobile devices often have usability6 KB (771 words) - 23:42, 14 October 2008
- | Title = The 3rd International Conference on Ubiquitous Information Management and Communication ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network2 KB (303 words) - 23:42, 14 October 2008
- - Privacy, security and trust - Gregory Yovanof, Athens Information Technology, Greece6 KB (763 words) - 23:42, 14 October 2008
- |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols13 KB (1,617 words) - 19:03, 24 November 2008
- ...c./; Context-aware and context recognition; Data-centers and nano-centers; Information processing /distribution, discovery, sharing/; Virtualization; Overlay infr ...ion; All-IP versus protocol translation; IP simplified network management; Security, trust, and privacy; Network stability under topology change; Delay-toleran7 KB (883 words) - 17:35, 7 January 2021
- ...nts together to produce a platform for data gathering or the management of information related to data collection that helps researchers demonstrate the validity * Virtual organization and security issues of instruments and sensors on the Grid4 KB (642 words) - 21:17, 9 December 2008
- The scope of the journal ranges from theories of data, information, semantics and knowledge to innovative methods, tools and domain-specific a ...Networks, HCI, Agents, Data Semantics, Medical, Healthcare, Entertainment, Security.3 KB (440 words) - 12:20, 12 December 2008
- reliability, security and trust). Such quantities play a central role in quantitative information such as time and probabilities either directly in the6 KB (823 words) - 14:28, 14 December 2008
- ...f Academic Excellence in Information Assurance Education from the National Security Agency.2 KB (331 words) - 05:33, 5 January 2009
- * Security and privacy for RTSOAA based CPS ==Paper Submission Information==7 KB (922 words) - 00:58, 9 January 2009
- |Title=Web Information Systems Modeling Modern Web Information Systems need to fulfill a large number of8 KB (1,101 words) - 15:16, 12 January 2009
- ** Privacy and security ** Information/communication applications11 KB (1,366 words) - 16:44, 14 January 2009
- |Field=Internet security Conference registration information will be posted by February 1 at www.ccdcoe.org.2 KB (219 words) - 17:25, 14 January 2009
- * Model-driven development of process-aware information systesm, * Security issues of web-based processes,4 KB (602 words) - 14:34, 17 January 2009
- ...bilistic analysis for RT systems; quality of service support; reliability, security and survivability in RT systems; scheduling and schedulability analysis; wo website later for further information.5 KB (720 words) - 14:46, 17 January 2009
- - Security - Distributed Intelligent Information Systems6 KB (812 words) - 12:55, 18 January 2009
- ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Information Management and Dissemination5 KB (526 words) - 01:02, 2 February 2009
- * Information and Knowledge Management Track (Chair(s): Ralf Kutsche - Bich-Thuy Dong) o Integrated information systems5 KB (567 words) - 12:58, 18 January 2009
- Trust, Privacy & Security in Digital Business (TrustBus'09) Security patterns have arrived to a stage where there are a significant6 KB (740 words) - 12:58, 18 January 2009
- o Prediction/information markets o Economics of information9 KB (1,221 words) - 12:58, 18 January 2009
- part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...elected journals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.5 KB (633 words) - 12:58, 18 January 2009
- | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)16 KB (2,178 words) - 12:59, 18 January 2009
- ...o raises a host of ethical issues, such as those pertaining to information security, privacy, data mining, and intellectual property. Therefore, as e-business ...of widely discussed current issues in e-business such as those of privacy, information management, data mining, intellectual property, and consumer tracking.6 KB (856 words) - 13:00, 18 January 2009
- ...g play a key role in the context of a plethora of modern distributed data, information and knowledge management applications and systems. Distributed XML processi - Distributed XML Information Retrieval7 KB (1,030 words) - 13:00, 18 January 2009
- part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...elected journals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.6 KB (860 words) - 13:00, 18 January 2009
- services and information sources with intelligent information processing in business intranet environments stressing the need for security and6 KB (684 words) - 13:00, 18 January 2009
- Information and Data Management Security and Access Control4 KB (529 words) - 13:00, 18 January 2009
- With the exponentially growing amount of information to be included in the decision making process, the data to be - Data warehouse privacy, security, and reliability7 KB (1,006 words) - 13:00, 18 January 2009
- - temporal information extraction - time-dependent security policies6 KB (872 words) - 13:00, 18 January 2009
- E-transactions systems involve 3 or more partners in the exchange of information concerning trades, payments, services...: a customer communicates through a Many aspects contribute to the functioning of e-transactions systems such as security aspects (authentication, confidentiality, ..), architecture (such as Cap, 36 KB (772 words) - 13:00, 18 January 2009
- * Security Systems & Services ...uire that referees treat the contents of papers under review as privileged information not to be disclosed to others before publication. It is expected that no on9 KB (1,183 words) - 13:41, 23 January 2009
- made considerable advances in closing the information gap between * Privacy and security issues with things and services6 KB (798 words) - 13:01, 18 January 2009
- - AI in Computer Security - AI in Information Assurance4 KB (582 words) - 14:47, 2 December 2010
- |Title=Tenth International Conference Series on Web Information Systems Engineering WISE 2009 invites submissions on all topics related to Web information systems engineering, including but not limited to those listed below:2 KB (240 words) - 17:46, 21 July 2016
- ...itle = International Conference on Communications and Networking in China, Information and Coding Theory Symposium o Security in Power Line Communications14 KB (1,518 words) - 13:01, 18 January 2009
- + Information Integration and Mash-ups + Information Mining and Reporting3 KB (410 words) - 13:01, 18 January 2009
- Visualization and Its Information Information and Its Technical Education3 KB (320 words) - 16:40, 27 December 2015
- part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...elected journals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.4 KB (564 words) - 13:01, 18 January 2009
- part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...elected journals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.4 KB (588 words) - 13:01, 18 January 2009
- College of Electronics and Information, Kyung Hee University, Yongin (South Korea) - Geographical Information Systems10 KB (1,321 words) - 13:01, 18 January 2009
- ...areas and to create the much-needed synergy among medical, biological and Information Technology sectors. HIBIT is one of the few international conferences on t • Clinical Informatics and Hospital Information Systems4 KB (528 words) - 13:01, 18 January 2009
- |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)6 KB (793 words) - 15:12, 1 October 2020
- ...and network systems gradually become the fundamental infrastructure of our information society, many multidisciplinary research topics emerge to reflect the featu * Bio-inspired information and communication systems6 KB (767 words) - 13:01, 18 January 2009
- * Data mining and information extraction * Data security, privacy and trust4 KB (568 words) - 13:01, 18 January 2009
- ...ociety have formed into the world we live in, however the emergence of the information technologies that ...ital systems that support useful functionality by making socially produced information available to physical things.3 KB (446 words) - 13:02, 18 January 2009
- | Title = Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Device Use | Field = Computer security and reliability11 KB (1,539 words) - 13:02, 18 January 2009
- | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)6 KB (852 words) - 13:02, 18 January 2009
- | Title = The 1st International Workshop on Information Assurance in Wireless Sensor Networks ...place in conjunction with the 3rd International Conference on Information Security and Assurance, Seoul, Korea http://www.sersc.org/ISA2009.3 KB (450 words) - 13:02, 18 January 2009
- Department of Information Technologies of University of Milan in conjunction Security in Knowledge-based Multimedia Systems6 KB (693 words) - 13:03, 18 January 2009
- |Title=32nd International Convention on Information and Communication Technology, Electronics and Microelectronics With the 32nd International Convention MIPRO, devoted to information and communication technology, electronics and microelectronics, we enter th4 KB (524 words) - 17:20, 12 February 2009
- ...Service composition, Functional and Non Functional Requirements (NFR: QoS, security), and management and diagnosis, who investigate concepts, methods, techniq * NFR (quality, security, robustness, adaptability) management in choreographed and/or7 KB (960 words) - 16:33, 27 February 2009
- ...to the great needs of economic globalization and the rapid advancement of information technology, Natural Language Processing based on Knowledge Engineering has B-04 Information Retrieval4 KB (459 words) - 16:33, 27 February 2009
- | Title = The 4th International ICST Conference on Scalable Information Systems in terms of information access, storage and retrieval.4 KB (512 words) - 16:33, 27 February 2009
- o Security and privacy issues of UWB-based body-centric networking for personal health ...peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the IJUWBCS web page (http://www.ind5 KB (664 words) - 17:20, 5 July 2020
- * security in distributed computing, cryptographic protocols (5) information whether the paper is a regular submission, or a brief7 KB (890 words) - 15:05, 27 December 2015
- * Knowledge Representation, Distributed Models and Reasoning, Information visualization ...temas, Wireless communications, Technologies and applications, Information security8 KB (977 words) - 16:33, 27 February 2009
- | Title = Second International ICST Symposium on Global Information Second International ICST Symposium on Global Information Governance (ISGIG)4 KB (557 words) - 16:33, 27 February 2009
- - Web Information Filtering and Retrieval - Web Security4 KB (630 words) - 16:33, 27 February 2009
- | Title = IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09) IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09)2 KB (229 words) - 16:33, 27 February 2009
- * Security aspects of using virtualization in a distributed environment For more information:5 KB (576 words) - 16:34, 27 February 2009
- Process Architectures), FAST (Formal Aspects in Security and Trust), information on FMweek,8 KB (1,079 words) - 17:05, 27 February 2009
- 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.7 KB (897 words) - 17:05, 27 February 2009
- * Security and trustworthy in multi-tenancy service hosting environment Ian Gorton, Computational and Information Sciences at Pacific Northwest National Laboratory, US6 KB (855 words) - 17:06, 27 February 2009
- Official publication of the Information Resources Management Association - Security issues and technologies5 KB (646 words) - 17:06, 27 February 2009
- | Title = The 2009 International Conference on Web Information Systems and Mining (WISM’09) and the 2009 International Conference on Art ...orum for scientists and researchers to present the state of the art of web information systems, web mining, artificial intelligence, computational intelligence, w5 KB (604 words) - 17:06, 27 February 2009
- · Reliability, fault-tolerance, and security Jongsuk Ruth Lee, Korea Institute of Science and Technology Information, Korea8 KB (1,050 words) - 18:04, 5 January 2017
- ...cent developments and research issues on e-commerce, enterprise computing, security and developments in the area of social networks. ADDITIONAL INFORMATION4 KB (528 words) - 17:06, 27 February 2009
- + Middleware solutions for Security, Privacy and Trust (Elsevier's Engineering Information Index), and automatically included6 KB (800 words) - 22:11, 27 February 2009
- * Security and privacy in P2P systems Detailed information on electronic submission are provided on the web site5 KB (623 words) - 17:06, 27 February 2009
- ...erence aims to provide a forum to disseminate, to all branches industries, information on the most recent and relevant innovations, theories and applications in I • Information Processing and Engineering3 KB (399 words) - 17:06, 27 February 2009
- VoIP, NGN and IMS Security * Security models of voice, video and text over IP services4 KB (621 words) - 17:06, 27 February 2009
- transform, and integrate information in a platform-independent manner. * Rule languages for exchanging and processing information through the7 KB (883 words) - 17:06, 27 February 2009
- * Geographic Information Retrieval * Security and Integrity4 KB (534 words) - 17:07, 27 February 2009
- | Title = The 8th International Conference on Cryptology and Network Security | Field = Computer security and reliability8 KB (967 words) - 17:07, 27 February 2009
- | Title = 14th International Conference on Information Quality 14th International Conference on Information Quality (ICIQ)5 KB (690 words) - 17:07, 27 February 2009
- | Title = 3rd WORKSHOP ON Practice and Theory of IT Security | Field = Computer security and reliability4 KB (506 words) - 17:07, 27 February 2009
- | Title = Workshop on Trust, Risk and Security Assessments for Network Dependability in Digital Ecosystems (TRSDE) | Field = Computer security and reliability4 KB (600 words) - 17:07, 27 February 2009
- | Title = 5th IEEE International Workshop on Wireless and Sensor Networks Security Wireless and Sensor Networks Security (WSNS'09)4 KB (485 words) - 17:07, 27 February 2009
- ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Web Spam - Adversarial Information Retrieval in Digital Ecosystems7 KB (941 words) - 17:07, 27 February 2009
- * Error and erasure correcting codes for information dispersal * Cryptography, Security and trust6 KB (750 words) - 16:50, 27 December 2015
- * Authorization, Privacy and Security * Geographical Information Systems9 KB (1,249 words) - 08:42, 7 October 2011
- Computer System, Information Security and Networks • Security and Privacy in E-Commerce3 KB (319 words) - 17:07, 27 February 2009
- For latest information see: ...ning, Device and Equipment Technology, Production processes and Sequences, Information Technology38 KB (4,832 words) - 17:07, 27 February 2009
- IEEE Computer Society Task Force on Information Assurance by the special interest group Security - Intrusion Detection and8 KB (1,020 words) - 17:07, 27 February 2009
- * Security, data handling, and privacy ...peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the Author Guidelines page5 KB (670 words) - 17:08, 27 February 2009
- | Title = The 12th International Conference on Network-Based Information Systems The 12th International Conference on Network-Based Information Systems11 KB (1,440 words) - 17:08, 27 February 2009
- | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability12 KB (1,690 words) - 17:08, 27 February 2009
- | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability3 KB (480 words) - 17:08, 27 February 2009
- | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability6 KB (828 words) - 17:08, 27 February 2009
- * Network security threats and countermeasures ...xson, IMC '07). If applicable, authors are also urged to notify parties of security flaws in their products or services in advance of publication. Adherence to6 KB (774 words) - 17:08, 27 February 2009
- * Information assurance and security of the Springer LNCS Style (please check the Information for Authors8 KB (1,144 words) - 20:59, 27 February 2009
- ...nal Conference on the Theory and Application of Cryptology and Information Security602 bytes (67 words) - 15:25, 10 March 2020
- ...nal Conference on the Theory and Application of Cryptology and Information Security433 bytes (48 words) - 15:34, 10 March 2020
- * Business Information Technology Alignment * Project, risk and security management4 KB (571 words) - 12:58, 9 March 2020
- ...nal Conference on the Theory and Application of Cryptology and Information Security178 bytes (23 words) - 21:30, 10 March 2020
- |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security5 KB (578 words) - 10:21, 20 November 2020
- 1. Information Technologies Supporting Learning AREA 1: INFORMATION TECHNOLOGIES SUPPORTING LEARNING5 KB (661 words) - 15:49, 8 December 2009
- |Title=International Conference on Web Information Systems and Technologies (WEBIST) |Field=Web Information Systems3 KB (440 words) - 15:25, 9 December 2009
- |Title=International Workshop on Wireless Multimedia Computing and Security Services - Security, privacy, and cryptographic protocols for WMC3 KB (477 words) - 16:54, 8 August 2009
- ...tion Retrieval, HCI) interested in topics like trust, provenance, privacy, security, reputation and spam, in order to address current challenges of their adapt - Privacy and Security in self-organizing and adaptive systems5 KB (642 words) - 20:34, 9 June 2009
- ...d political point of view. It is critical to provide rescue personnel with information technology tools that enable more effective and efficient mitigation during ...arge-scale multi-agent systems that deals with uncertainty and conflicting information during crisis management,6 KB (783 words) - 17:04, 27 December 2015
- Security and Cryptography Information Retrieval3 KB (412 words) - 19:29, 2 August 2009
- ...and architectures, optimization of FPGA-based cores (e.g. arithmetic, DSP, security, embedded processors, memory interfaces, or other functions). ...entify authors will not be considered. Submission instructions and further information will be available at the conference website: http://www.isfpga.org.5 KB (632 words) - 11:32, 2 August 2009
- ...g practitioners, managers, researchers, and educators to exchange valuable information and develop new synergies to address the complex issues and problems of com For Technical Program information contact:6 KB (706 words) - 11:33, 2 August 2009
- * Network Security ...n the conference Web site. Please see http://www.comsnets.org for detailed information. The authors of accepted papers must guarantee that their paper will be pr7 KB (1,054 words) - 16:43, 27 December 2015
- ...ited not only in traditional database areas but also in Data Quality, Web, Information Retrieval and Data Mining. We invite submission of original research contri * Data privacy and security4 KB (553 words) - 11:33, 2 August 2009
- ...ware reuse, dynamic software adaptation, efficiency on multicore hardware, security, and safety. ...sk rejection. All papers must be submitted by September 08, 2009. For more information please visit the SAC 2010 Website.5 KB (743 words) - 17:02, 27 December 2015
- | Title = 7th International Conference on Information Systems for Crisis Response and Management 7th International Conference on Information Systems for Crisis Response and Management4 KB (528 words) - 11:33, 2 August 2009
- | Title = Journal of Information and Communication Technology JICT is a refereed journal in the field of information and communication technology (ICT), providing an international forum for pr2 KB (258 words) - 11:33, 2 August 2009
- ...tworks (e.g., wireless networks, RFID, etc) in order to share and exchange information and provide services. Ambient systems pose new research challenges due to t Ambient Systems Security and Privacy6 KB (751 words) - 16:59, 27 December 2015
- World Wide Web has transformed into a social platform for communication, information sharing and collaboration between Web users. Social learning is concerned w - Personalization, security and privacy4 KB (525 words) - 11:34, 2 August 2009
- †Professor, Department of Information Technology, *Assistant Professor, Department of Information Technology5 KB (657 words) - 11:34, 2 August 2009
- | Field = Information systems ...er Science & Engineering, *Assistant Professor, Department of Information Technology4 KB (564 words) - 12:01, 6 November 2020
- * Trust Integration and Security in Grid and P2P Systems Department of Information and Communication Engineering7 KB (912 words) - 17:36, 5 November 2020
- |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security5 KB (599 words) - 10:21, 20 November 2020
- guaranteeing communications and collecting information that is vital for * Network self-healing, security and self-defence4 KB (479 words) - 11:35, 2 August 2009
- | Acronym = Security 2009 ...S International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)6 KB (746 words) - 11:35, 2 August 2009
- | Title = International Workshop on Information Quality and Quality of Service for Pervasive Computing ...on, processing, and consumption elements that the broad spectrum of smart, information-intensive, sensor-enabled pervasive applications depend on, such as remote5 KB (734 words) - 11:35, 2 August 2009
- | Title = First Iberic Conference on Web-Applications Security (IBWAS’09) First Iberic Conference on Web-Applications Security (IBWAS’09)9 KB (1,261 words) - 11:35, 2 August 2009
- Mediterranean Conference on Information Systems (MCIS 2009) in Athens, Greece. information assets and market capitalization while creating business ecosystems.4 KB (586 words) - 11:35, 2 August 2009
- | Title = Third International Workshop on Mobile Multimedia Information Retrieval | Field = Information retrieval5 KB (674 words) - 11:35, 2 August 2009
- |Title=The 9th ACM/IEEE International Conference on Information Processing in Sensor Networks The 9th ACM/IEEE Conference on Information Processing in Sensor Networks8 KB (1,119 words) - 09:57, 27 February 2020
- ...ry, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is ? Security and privacy5 KB (571 words) - 11:35, 2 August 2009
- More information: http://ispan2009.comm.ccu.edu.tw/speakers.html -Journal of Information and Science Engineering (JISE) (SCI)4 KB (422 words) - 11:36, 2 August 2009
- Conference Venue information Information and Communication Technology Management4 KB (462 words) - 11:36, 2 August 2009
- ...ected to the Internet. There is a need for those networks to provide their information in an interpretable form and to reduce the complexity of accessing sensor s ...onse time, resource consumption, throughput, availability, reliability and security.9 KB (1,206 words) - 11:40, 2 August 2009
- LTC 2009 - Call for papers and important information ...ay technological environment. Since the very beginning of the Computer and Information Age these fields have influenced and stimulated each other. The European U14 KB (1,872 words) - 19:26, 2 August 2009
- Human Resource Management Information System and the Security Technology2 KB (277 words) - 16:38, 27 December 2015
- | Title = IEEE International Symposium on Information Theory | Field = Information theory2 KB (217 words) - 11:36, 2 August 2009
- * Information-theoretic aspects of cognitive radio networks * Trust and security issues4 KB (549 words) - 11:36, 2 August 2009
- Submitted for indexing: Elsevier's EI Compendex Database, EI's Engineering Information Index RTSEC: Security for Internet-based real-time systems14 KB (1,651 words) - 15:56, 15 February 2017
- |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security3 KB (352 words) - 12:39, 11 August 2009
- |Title= 12th International Conference on Enterprise Information Systems Conference name: 12th International Conference on Enterprise Information Systems (ICEIS)5 KB (552 words) - 17:06, 12 August 2009
- |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability6 KB (766 words) - 10:54, 26 April 2010
- |Title=International Conference on Information Visualization Theory and Applications Conference name: International Conference on Information Visualization Theory and Applications (IVAPP)2 KB (245 words) - 18:52, 7 January 2010
- |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security5 KB (667 words) - 14:27, 13 September 2009
- ...benchmarking, review, inspection and walkthrough, reliability, safety and security design tools, testing tools, information systems engineering, quality tools4 KB (583 words) - 12:17, 25 November 2009
- |Title=Special Issue on Ubiquitous Computing Security Systems |Field=Ubiquitous Computing Security Systems1 KB (187 words) - 04:49, 23 September 2009
- * How does security address the legal and ethical issues in emerging ubiquitous computing syste ===For More Information===2 KB (205 words) - 05:10, 23 September 2009
- ...great impact on the development of new generation intelligent distributed information systems. The aim of this symposium is to bring together researchers involve - Information extraction and retrieval in distributed environments4 KB (508 words) - 13:29, 13 July 2010
- |Title=6th Annual Conference on Peace and Security |Field=Security3 KB (359 words) - 00:15, 17 November 2009
- |Title=International Conference on Information Society (i-Society 2010) - Geographic information systems4 KB (507 words) - 22:37, 18 November 2009
- Mink Spaans (NED), TNO Defence, Security and Safety; ==IC2J Editorial Staff and Contact Information==2 KB (233 words) - 23:39, 18 November 2009
- dissemination of information in social systems. With the rapid development of information and communication technologies,4 KB (449 words) - 11:04, 26 November 2009
- * Application security * Blended Internet security methods5 KB (607 words) - 18:01, 3 December 2009
- ...d validation. E-business agents. Pervasive computing. Privacy, safety, and security. ...g. Case studies and reports on deployments. Computational infrastructures. Information retrieval. Web services and semantic web. E-learning sys-tems. E-institutio6 KB (733 words) - 18:19, 24 September 2020
- ...Programme, those nations that succeed in harnessing the potential of ICT (Information and Communication Technology) can look forward to greatly expand economic g ...in his/her own environment), there are important related concern, such as security and privacy, which need to be addressed also, since providing powerful (rem6 KB (889 words) - 13:48, 26 February 2010
- |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust4 KB (484 words) - 14:20, 14 December 2009
- 11. New Information Technology and Education Digital Campus Construction and Data Security Management2 KB (195 words) - 04:32, 7 January 2010
- |Title=7th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS |Field=Computer security and reliability7 KB (982 words) - 19:13, 3 January 2010
- |Title=3rd International Workshop on Wireless Multimedia Computing and Security Services ...ward for a deeper understanding in wireless multimedia computing (WMC) and security services.3 KB (497 words) - 03:43, 28 February 2010
- |Field=Information Security, Cryptography3 KB (373 words) - 13:50, 19 January 2010
- ...ometrics Technologies and Applications, Pattern Recognition and Biometrics Security, Bioinformatics and IT Applications in the above themes. Information retrieval and internet applications3 KB (382 words) - 18:27, 20 January 2010
- •Robots for Security There will be an exhibition site at the conference. Information for prospective exhibitors will be available on the web site.3 KB (413 words) - 05:21, 26 January 2010
- |Title=3rd International Conference on Security of Information and Networks |Field=Computer security10 KB (1,270 words) - 17:12, 20 April 2010
- |Title=The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems3 KB (338 words) - 16:53, 27 December 2015
- ...d software development. The conference tracks are "Software Engineering", "Information Systems and Data Management", "Programming Languages", "Distributed and Par - Enterprise Information Systems3 KB (392 words) - 13:50, 30 April 2020
- |Title=International Conference on Wireless Information Networks and Systems Conference name: International Conference on Wireless Information Networks and Systems (WINSYS)4 KB (379 words) - 15:35, 5 February 2010
- ...to representation, storage, authentication and communication of multimedia information. * › Multimedia Security3 KB (310 words) - 15:37, 5 February 2010
- |Title=International Conference on Security and Cryptography |Field=Computer security and reliability4 KB (409 words) - 15:40, 5 February 2010
- ..., signal processing and multimedia applications, and wireless networks and information systems. These are the main knowledge areas that define the six component c2 KB (180 words) - 15:49, 5 February 2010
- |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability4 KB (429 words) - 08:55, 1 August 2019
- |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability9 KB (1,092 words) - 09:35, 1 August 2019
- ...tion, strategic to augment marketing, business intelligence and to enhance information retrieval via social search engines. ...odels of users’ behaviour that can resists malicious attack, low quality information and preserve privacy.6 KB (765 words) - 14:01, 11 April 2010
- |Title=International Conference on Knowledge Management and Information Sharing 2010 ...tures. Although standardization is indeed an essential element for sharing information, IS effectiveness requires going beyond the syntactic nature of IT and delv3 KB (380 words) - 15:10, 1 October 2020
- ...to enable personalization, customer profiling and segmentation, to enhance information retrieval with social search engine. ...rom Recommender/Trust Systems as well as Data Mining, Multi-agent Systems, Information Retrieval, Machine learning and Human Computer Interaction.4 KB (600 words) - 19:11, 18 February 2010
- The 2010 International Conference of Information Engineering The 2010 International Conference of Information Security and Internet Engineering4 KB (559 words) - 08:31, 9 March 2010
- ...ng together researchers and practitioners interested in the application of information and communication technologies (ICT) to healthcare and medicine in general › Confidentiality and Data Security2 KB (238 words) - 13:37, 10 March 2010
- ...ected to continue as the powers of microprocessors continue to improve and information gets cheaper. ...chnology has the capacity to destroy African commodity markets. This poses security threats if plans are not developed to retrain those that will be displaced4 KB (631 words) - 06:05, 16 March 2010
- * Information and Service Economy * Cloud Security4 KB (405 words) - 20:45, 3 November 2010
- |Field=information systems, ebanking, ecommerce - Security for enabling eCommerce4 KB (601 words) - 00:22, 28 March 2010
- |Title=8th Australian Information Security Management Conference |Field=Information science2 KB (217 words) - 16:50, 19 November 2020
- |Superevent=2010 secau Security Congress '''INFORMING SECURITY'''2 KB (215 words) - 06:52, 13 April 2010
- |Title=3rd Australian Security and Intelligence Conference |Field=Computer security and reliability2 KB (181 words) - 07:03, 13 April 2010
- |Field=Computer security and reliability |Superevent=2010 secau Security Congress2 KB (200 words) - 16:55, 27 December 2015
- |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy4 KB (490 words) - 14:42, 6 November 2020
- * security, access control, and licensing issues of Linked Data ==Contact Information==4 KB (608 words) - 10:39, 29 May 2016
- ...here around the world are not connected between them as well as associated information systems are not integrated. This scenario can be summarized as too much dat ...tion are formally defined. Semantics should integrate web-centric standard information infrastructures improving the capabilities of collecting, retrieving, shari5 KB (639 words) - 16:17, 20 May 2010
- ...a larger and larger group of end-user applications (e.g., climate change, security, land use, weather). ...S or textual data. Thus, new specific techniques of Knowledge Bases, Image Information Mining, KDD and Visualization need to be integrated.4 KB (582 words) - 16:22, 20 May 2010
- ...s. The success of these technologies heavily relies on their users and the information produced and organized by them, reflecting aspects related to the user expe * Communication, collaboration, sharing, security, social norms and other aspects of sociability;4 KB (657 words) - 19:43, 12 June 2010
- 1. INFORMATION TECHNOLOGIES SUPPORTING LEARNING AREA 1: INFORMATION TECHNOLOGIES SUPPORTING LEARNING5 KB (532 words) - 12:25, 16 June 2010
- |Title=7th International Conference on Web Information Systems and Technologies (WEBIST) Conference name: 7th International Conference on Web Information Systems and Technologies (WEBIST)5 KB (627 words) - 12:33, 16 June 2010
- ...the most popular, dependable and low cost methods of sending out important information and documents over long distances. ...These fax services also far overpower the traditional providers in ways of security, ease of accessibility and functionality.4 KB (626 words) - 14:16, 29 July 2010
- ...nal Conference on the Theory and Application of Cryptology and Information Security208 bytes (27 words) - 18:56, 29 March 2020
- |Title=19th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN) ...signal and image processing, information and coding theory, databases and information management, distributed algorithms, networks and protocols, wireless commun3 KB (412 words) - 09:52, 27 February 2020
- |Title=13th International Conference on Enterprise Information Systems (ICEIS) Conference name: 13th International Conference on Enterprise Information Systems (ICEIS)19 KB (2,462 words) - 19:10, 26 August 2010
- ...happen to be new to these service providers and might be worried about the security of using these online services then, the following benefits are sure to get To get more information about this please [http://www.800vanitynumbers.org '''Visit this website'''3 KB (610 words) - 16:33, 27 August 2010
- The 2011 International Conference of Information Engineering The 2011 International Conference of Information Security and Internet Engineering3 KB (458 words) - 08:06, 31 August 2010
- |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium3 KB (343 words) - 16:31, 6 May 2020
- |Title=32nd International Conference on Advanced Information Systems Engineering |Field=Information Systems3 KB (395 words) - 15:14, 24 September 2020
- * Probabilistic and information-theoretic methods * Security applications5 KB (574 words) - 15:58, 6 March 2020
- * Security in distributed computing, cryptographic protocols affiliations, or email addresses. The contact information of the3 KB (344 words) - 11:30, 21 April 2020
- to mean: the recording and visualisation of information recorded from radiation - Image Security2 KB (298 words) - 18:24, 10 September 2010
- |Title=International Conference on Information Society ...d industry. The conference covers a wide spectrum of topics that relate to information society, which includes technical and non-technical research areas.6 KB (732 words) - 05:52, 5 December 2010
- ...nym=CALL FOR PAPER Journal: International Journal of Computer Science and Security (IJCSS) |Title=International Journal of Computer Science and Security (IJCSS)2 KB (298 words) - 16:47, 5 July 2020
- |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)5 KB (609 words) - 17:01, 5 July 2020
- To build its International reputation, we are disseminating the publication information through Google Books, Google Scholar, Directory of Open Access Journals (DO • Information Theory • Local Area Networks3 KB (318 words) - 16:46, 5 July 2020
- Clinical Informatics and Hospital Information Systems Security, Ethics and Privacy5 KB (693 words) - 10:44, 14 November 2010
- |Title=14th International Conference on Business Information Systems ...alleviate the business-IT gap; in information management, ways to organize information have been simplified; in semantic web automatic linking of data is a Holy G6 KB (806 words) - 14:48, 16 November 2010
- mechanics with electronics and information processing. This integration is between the components (hardware) and the information-driven12 KB (1,378 words) - 21:13, 28 November 2010
- Security in network, systems, and applications<br> Information technologies<br>4 KB (554 words) - 12:34, 14 October 2020
- Security in network, systems, and applications<br> Information technologies<br>4 KB (556 words) - 12:33, 14 October 2020
- Security in network, systems, and applications<br> Information technologies<br>4 KB (552 words) - 08:13, 10 December 2010
- Security in network, systems, and applications<br> Information technologies<br>4 KB (554 words) - 10:24, 6 July 2020
- Security in network, systems, and applications<br> Information technologies<br>4 KB (554 words) - 12:33, 14 October 2020
- |Title=4th Australian Security and Intelligence Conference |Field=Computer security and reliability2 KB (217 words) - 16:57, 27 December 2015
- ...and practical implementation for low-power/energy, high dependability and security, etc.. The SAAES special session addresses these important and challenging ...elf-aware and Adaptive Operations for Energy Efficiency, Dependability and Security4 KB (598 words) - 18:55, 23 December 2010
- ...ges and emails, using intelligent tools that can be used to extract useful information, using technologies from diverse knowledge areas such as machine learning, ...eb user profiling, recommender systems, email organization and processing, security, etc.3 KB (344 words) - 19:33, 23 December 2010
- ...and practical implementation for low-power/energy, high dependability and security, etc.. The SAAES special session addresses these important and challenging ...elf-aware and Adaptive Operations for Energy Efficiency, Dependability and Security4 KB (593 words) - 17:49, 7 January 2011
- ...ct and reliable software systems, and an emerging awareness of privacy and security. Even though curriculum committees recognize formal methods as an essential Registration Information3 KB (448 words) - 17:58, 7 January 2011
- ...n from the consequences of its actions. The algorithms can make use of the information gathered from the protocol in order to sense the environment, plan actions - Smart security protocols and algorithms6 KB (833 words) - 15:16, 24 September 2020
- |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability5 KB (597 words) - 10:45, 21 August 2020
- ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...cted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prev3 KB (462 words) - 11:51, 22 March 2020
- |Title=International Workshop on Visualization and Information Security Management |Field=Security Management3 KB (468 words) - 00:17, 2 March 2011
- Information Security For further information about the conference, (extended) abstract3 KB (467 words) - 11:43, 6 October 2011
- − Information Security and Applied Cryptography. − Intelligent Information Systems.3 KB (367 words) - 16:37, 27 December 2015
- ...on protocols, services, distributed platforms, middleware, controllers and security infrastructures. The ICTSS is the successor of previous (joint) conferences - kind of testing: functional, interoperability, performance, conformance, security, reliability, robustness, etc.;6 KB (822 words) - 14:44, 18 March 2011
- ...Computer Science (Cloud Computing, Informational Retrieval, Informational Security, Mobile Platforms and others); You can find all the details of registration, information about courses, terms of participation and payment on a website of AACIMP-202 KB (306 words) - 14:54, 12 November 2020
- ...ng together researchers and practitioners interested in the application of information and communication technologies (ICT) to healthcare and medicine in general * Confidentiality and Data Security2 KB (216 words) - 17:51, 29 June 2011
- |Title=International Conference on Knowledge Management and Information Sharing Conference name: KMIS- International Conference on Knowledge Management and Information Sharing2 KB (250 words) - 14:52, 1 October 2020
- ...re aspects related to node behaviour, node nature, node interactions, node security, node privacy, network lifecycle, network performance, network security, network privacy, etc.7 KB (1,019 words) - 18:29, 8 April 2011
- ...om his/her way, customs or duties, through the promise of money, honors or security. History shows that this phenomenon has generally been manifesting in diffe For more information and updates please visit www.ars.identitatis.org5 KB (676 words) - 16:03, 31 May 2011
- ...ng together researchers and practitioners interested in the application of information and communication technologies (ICT) to healthcare and medicine in general * Confidentiality and Data Security2 KB (260 words) - 17:46, 29 June 2011
- * Information Systems * Security3 KB (283 words) - 11:37, 1 July 2011
- |Title=International Conference on Information Visualization Theory and Applications (IVAPP) Conference name: International Conference on Information Visualization Theory and Applications (IVAPP)4 KB (461 words) - 11:48, 1 July 2011
- * Media Watermarking, Security, and Forensics Please check the website for further information (http://www.grapp.visigrapp.org/best_paper_awards.asp).4 KB (538 words) - 11:34, 21 February 2020
- Service and Systems Design and QoS Network Security Information and Service Economy5 KB (677 words) - 11:59, 1 July 2011
- 1. INFORMATION TECHNOLOGIES SUPPORTING LEARNING AREA 1: INFORMATION TECHNOLOGIES SUPPORTING LEARNING4 KB (517 words) - 12:03, 1 July 2011
- |Title=8th International Conference on Web Information Systems and Technologies (WEBIST) Conference name: 8th International Conference on Web Information Systems and Technologies (WEBIST)5 KB (612 words) - 12:07, 1 July 2011
- *Information Systems *Network Security13 KB (1,774 words) - 18:35, 31 August 2011
- ...lease contact us at whf_paper@unesco.or.kr. Abstracts will be reviewed and information regarding acceptance and schedules will be sent to authors by September 9th ...tion but potentially one tied to questions of greater human well-being and security. How do we begin to reevaluate the beautiful in terms of psychic well-being10 KB (1,552 words) - 17:04, 24 February 2016
- ...ause they allow for capturing architectural, functional and non-functional information about such complex systems in precise, domain-specific models. The techniqu ...ional aspects (such as performance, quality of service, real-time aspects, security, etc.)5 KB (598 words) - 17:05, 24 February 2016
- Security and emergency applications ...to register and present their demo at the conference. Please also provide information in the email message with the submission (not in the extended abstract itse6 KB (809 words) - 16:26, 28 September 2011
- The 2012 International Conference of Information Engineering The 2012 International Conference of Information Security and Internet Engineering7 KB (909 words) - 16:30, 10 September 2020
- |Field=Information and Communication Technology ...ss communication has fundamentally changed our daily communication and how information flows in commercial and private networks. New issues came up with this tren5 KB (669 words) - 14:40, 20 December 2011
- |Title=The 2012 International Conference of Information Engineering |Field=Information Engineering8 KB (1,085 words) - 16:28, 6 February 2012
- |Title=International Conference on Information Society ...d researchers to share existing and generate new knowledge in the field of information society.5 KB (595 words) - 05:03, 15 January 2012
- - Security, Privacy and Trust ...dered for possible publication in the International Journal of Cooperative Information Systems (IJCIS).6 KB (745 words) - 15:27, 1 November 2016
- Chair Professor in Department of Information Engineering and Computer Science, Feng Chia University, Taiwan Associate Professor, Department of Information Systems, Vilnius Gedinimas Technical University, Lithuania11 KB (1,490 words) - 11:59, 27 January 2012
- ...rge. The doctors and nurses of today will access the electronic record for information rather than consult a colleague, go to the web for images rather than to th ...ng together researchers and practitioners interested in the application of information and communication technologies (ICT) to healthcare and Biomedical Engineeri9 KB (1,186 words) - 17:44, 24 February 2012
- ...bringing together researchers and practitioners who are interested in both Information and Communication Technology and the ecological impact of computing on th ...ost scientists would attribute a key role to technology in achieving this. Information technology, in particular, can provide monitoring facilities, control syste10 KB (1,297 words) - 17:49, 24 February 2012
- ...venth International Workshop on Frontiers in Availability, Reliability and Security |Field=Computer security and reliability2 KB (221 words) - 16:12, 29 February 2012
- |Title=The Fourth International Workshop on Organizational Security Aspects |Field=Computer security and reliability3 KB (368 words) - 16:16, 29 February 2012
- ...ore.ieee.org/Xplorehelp/Help_Publishing_and_Indexing_Partners.htm for more information about indexing. - Middleware of SON: self-localization, security, data fusion, etc.5 KB (633 words) - 14:08, 2 March 2012
- ...ore.ieee.org/Xplorehelp/Help_Publishing_and_Indexing_Partners.htm for more information about indexing. ...s, the efficiency denotes the time cost of transmission processes, and the security denotes the protection of the transmitted media content. Recently, various5 KB (726 words) - 15:28, 2 March 2012
- DNS resolvers; Scheduling streamed information; Adaptive streaming; TCP-based streaming; Impatience in cellular networks; ...t; Communications networks security; Information security; IPR and network security;13 KB (1,580 words) - 19:35, 18 February 2021
- |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security4 KB (581 words) - 18:48, 24 February 2020
- |Title=29th ACM International Conference on Information and Knowledge Management |Field=Information and Knowledge Management5 KB (653 words) - 13:04, 3 August 2023
- ...erse fields including (but not limited to) art, anthropology, computer and information sciences, communication, criminology, economics, geography, health sciences ...rity & Trust: Safeguarding and governance of the Web and/or AI; anonymity, security and trust for Web access; false news; data for the public good; and crime o6 KB (910 words) - 12:04, 31 January 2020
- *Information extraction and summarization *Search and information retrieval4 KB (535 words) - 21:32, 11 February 2020
- *Search and information retrieval *Security, privacy, and trust4 KB (500 words) - 17:29, 6 January 2021