Search results

Jump to: navigation, search
  • |Title=The Fourth International Conference on Internet and Web Applications and Services he Fourth International Conference on Internet and Web Applications and Services) continues a series of co-located events
    18 KB (2,408 words) - 02:37, 16 December 2008
  • ...self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-x operations to the maximum extent possible without human in ...that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interact
    9 KB (1,216 words) - 17:32, 14 October 2008
  • Most of critical activities in the areas of communications (telephone, Internet), energy & fluids (electricity, gas, water), transportation (railways, airl ...ing. Considering system and feature dependability becomes crucial for data protection and recoverability when implementing mission critical applications and serv
    15 KB (2,175 words) - 21:03, 19 March 2013
  • ...r, PVR, Interconnects, Game Systems, Interactive and Directed Programming, Internet Integration, Next-Generation DVD, Displays Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability, Application Control, H
    3 KB (354 words) - 20:06, 14 October 2008
  • However, for reasons such as: password protection, FORM based interfaces published as special issue of International Journal on WWW/Internet
    7 KB (875 words) - 23:10, 14 October 2008
  • infrastructure protection and operation, emergency and crisis intervention, healthcare servic Internet to reduce cost of deployment and maintenance and to enhance reachability an
    5 KB (549 words) - 17:15, 5 July 2020
  • SIGNAL-IMAGE TECHNOLOGY & INTERNET- BASED SYSTEMS (SITIS'08) - Digital Rights Management and Intellectual Property Protection
    4 KB (587 words) - 23:30, 14 October 2008
  • ...e physical world in multiple ways, and at multiple scales, from the global Internet scale down to micro- and nano-devices. Many of these devices are highly mob ...e physical world in multiple ways, and at multiple scales, from the global Internet scale down to micro- and nano-devices. Many of these devices are highly mob
    5 KB (694 words) - 23:11, 14 October 2008
  • Internet Security & Applications Virus, worms, Trojon Protection
    5 KB (628 words) - 23:15, 14 October 2008
  • ...entation (rather than theory). A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security tec The proceedings are published by the Internet Society.
    5 KB (673 words) - 23:19, 14 October 2008
  • ...esearch can be used to enable innovation and defeat the "dark side" of the Internet. The theme of PST 2008 is �??PST - Enabling Innovation.�?? Like in the * Critical Infrastructure Protection
    6 KB (736 words) - 23:20, 14 October 2008
  • - Multimedia security and content protection - Multimedia analysis and social media on the Internet
    3 KB (425 words) - 23:20, 14 October 2008
  • Mobile learning became a fact, due to the technical accessibility and Internet communications. Many online classes, learning systems, university curricula ...dditionally, they require new monitoring and management paradigms, as self-protection, self-diagnosing, self-maintenance become core design features.
    6 KB (765 words) - 23:26, 14 October 2008
  • * Critical infrastructure protection. * Internet dependability and quality of service.
    4 KB (528 words) - 23:27, 14 October 2008
  • ...n, process automation, CAD/CAM/CAT/CIM and LANs, industrial application of internet technologies, multimedia, wireless communications, data privacy and securit ...and FACTS, Power market, Power distribution network and automation, Power protection, SCADA, EMS, WAMS and substation automation, Green power.
    4 KB (504 words) - 23:33, 14 October 2008
  • International Conference on Internet and Web Applications and Services, as web personalization and protection of users privacy in service
    8 KB (1,075 words) - 23:52, 14 October 2008
  • ...es and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software d Internet security; Security in wireless; Sensor/cellular network security; Ad hoc ne
    13 KB (1,617 words) - 19:03, 24 November 2008
  • o Internet broadcasting * Optical network protection and restoration (single layer and multilayer)
    14 KB (1,518 words) - 13:01, 18 January 2009
  • * Content protection and DRM for UCS * Journal of Internet Technology, MoE, Taiwan
    6 KB (793 words) - 15:12, 1 October 2020
  • - Denial of Service Protection - Internet and Router Security
    8 KB (967 words) - 17:07, 27 February 2009
  •  Web 2.0 Security, Mobile InternetInternet Security & Applications
    5 KB (578 words) - 10:21, 20 November 2020
  • Internet Security & Applications • Virus, worms, Trojon Protection
    3 KB (339 words) - 11:32, 2 August 2009
  •  Web 2.0 Security, Mobile InternetInternet Security & Applications
    5 KB (599 words) - 10:21, 20 November 2020
  • ...es and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software d Internet security; Security in wireless; Sensor/cellular network security; Ad hoc ne
    6 KB (746 words) - 11:35, 2 August 2009
  • |Title=The Fifth International Conference on Internet Monitoring and Protectio ICIMP 2010: The Fifth International Conference on Internet Monitoring and Protection
    14 KB (1,651 words) - 15:56, 15 February 2017
  • ...ate of available security technology. The proceedings are published by the Internet Society (ISOC). Symposium website: -Intellectual property protection: protocols, implementations, metering, watermarking, digital rights managem
    6 KB (766 words) - 10:54, 26 April 2010
  • - Web 2.0 Security, Mobile Internet - Internet Security & Applications
    5 KB (667 words) - 14:27, 13 September 2009
  • |Title=The 5th International Conference for Internet Technology and Secured Transactions, Technical Co-Sponsored by IEEE UK/RI C The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), Technical Co-Sponsored
    5 KB (607 words) - 18:01, 3 December 2009
  • - Enterprise management and consumer protection - Real-time Internet E-Services
    7 KB (982 words) - 19:13, 3 January 2010
  • ...e systems and services. The ongoing rapid growth of online data due to the Internet and the widespread use of large databases have created an important need fo › Privacy protection and ethics
    3 KB (451 words) - 19:25, 16 February 2010
  • * Software Protection * Internet Security
    2 KB (217 words) - 16:50, 19 November 2020
  • ...n tracks, covering different aspects of Web Information Systems, including Internet Technology, Web Interfaces and Applications, Society, e-Communities, e-Busi 1. INTERNET TECHNOLOGY
    5 KB (627 words) - 12:33, 16 June 2010
  • ...fax services] demonstrate that everyday more and more people are utilizing internet faxing services because the offer very effective, efficiency user friendlin The benefits of [http://www.faxfromcomputer.org/ internet fax] over traditional fax machine is a lot and it provides with flexible us
    4 KB (626 words) - 14:16, 29 July 2010
  • ...he advances of online services effectively [http://www.faxfromcomputer.org internet fax] has also gone wireless so now that it is accessible just about from an ...r cost effectiveness, ease of use and it is even safe for the environment. Internet faxing has in time become the next step in smart business and most of the l
    4 KB (623 words) - 14:06, 1 September 2010
  • ...with good safety, simplicity and reliability. With the changes of wireless internet services effectively electronic fax has also gone wireless making it access ...yday more and more people are switching to [http://www.faxfromcomputer.org internet fax service] because the offer cost effectiveness, ease of use and even eco
    3 KB (600 words) - 10:49, 8 September 2010
  • • Intellectual property protection • Intrusion detection • Network and Internet security • Network forensics
    5 KB (609 words) - 17:01, 5 July 2020
  • * Software Protection * Internet Security
    2 KB (217 words) - 16:57, 27 December 2015
  • - Security and Data Protection - Increasing Affordability and Access to the Internet
    6 KB (784 words) - 03:09, 22 November 2011
  • Computer occupational diseases and INTERNET harmful information filtering Applications in environment protection, healthcare, creature conservation, mobile, avionics, aerospace, control, e
    10 KB (1,297 words) - 17:49, 24 February 2012
  • ...Telecommunications in Smart Cities; IoT virtual networks; Device-to-device Internet; Mobile clouds; Smart and sustainable cities; Public data centers; Traffic ...ion; Signal separation and Interference rejection; Critical infrastructure protection
    13 KB (1,580 words) - 19:35, 18 February 2021
  • ...ssing of personal data in AI, which is increasingly a requirement for data protection regulation. They can be used to assess the value of datasets and the contri ...y being part of the Federated conferences Event "On the Move to Meaningful Internet Systems 2019 (OnTheMove'19)" that co-locates three conferences: ODBASE'19,
    6 KB (872 words) - 23:11, 24 February 2020
  • - Multilingualism and cultural diversity in the digital age: preservation and protection vs assimilation and absorption - Internet regulation
    5 KB (702 words) - 10:02, 5 March 2013
  • * Denial of Service Protection * Insider Threat protection
    2 KB (264 words) - 15:32, 7 January 2021
  • ...ssing of personal data in AI, which is increasingly a requirement for data protection regulation. They can be used to assess the value of datasets and the contri ...y being part of the Federated conferences Event "On the Move to Meaningful Internet Systems 2020 (OnTheMove'20)" that co-locates three conferences: ODBASE'20,
    6 KB (877 words) - 23:06, 24 February 2020
  • - Security and Data Protection - Increasing Affordability and Access to the Internet
    6 KB (790 words) - 13:45, 24 July 2016
  • - Security and Data Protection - Increasing Affordability and Access to the Internet
    6 KB (777 words) - 23:29, 29 July 2016
  • Schneier’s article “The Internet is a surveillance state” summarised the state of Internet privacy as “Welcome to an Internet without privacy,
    7 KB (901 words) - 11:13, 16 July 2017
  • * Multimedia analysis and Internet * Multimedia security and content protection
    3 KB (384 words) - 13:28, 28 July 2017
  • software is being developed for a variety of applications - web, Internet, * Software Security for Web and Internet Applications
    4 KB (562 words) - 12:05, 3 September 2017
  • * Internet Security & Applications * Virus, worms, Trojon Protection
    4 KB (628 words) - 13:34, 28 July 2017
  • Data Protection Internet and Network Forensics
    2 KB (308 words) - 11:50, 3 September 2017
  • Technologies, Smart Houses, Internet of Things (IoT) and similar environments  Access control, privacy protection, and secure communication in multimodal
    4 KB (592 words) - 13:34, 28 July 2017
  • |Field=internet of things protection
    4 KB (442 words) - 10:00, 21 August 2017
  • * Internet Scale System Design * Data Integrity, Security, Protection, Privacy
    5 KB (654 words) - 09:58, 21 August 2017
  • With the continuous proliferation of diverse Internet-based computing paradigms, further fueled up by the new development of IoT (Internet of Things)
    4 KB (532 words) - 13:24, 28 July 2017
  • |Title=IEEE IINTEC 2017 : International Conference on Internet of Things, Embedded Systems and Communications The International Conference on Internet of Things, Embedded Systems and
    6 KB (743 words) - 11:45, 8 August 2017
  • |Title=SCN-CyberIoT 2017 : Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal all provided with Internet connection, all potentially dealing with sensitive
    4 KB (547 words) - 09:58, 21 August 2017
  • |Title=WorldCIS 2017 : World Congress on Internet Security theory and practical implementation of security on the Internet and Computer
    5 KB (571 words) - 11:53, 3 September 2017
  • TECHNOLOGY & INTERNET BASED SYSTEMS the Web and the Internet of Things (IoT) technologies that connect unlimited
    6 KB (876 words) - 09:59, 21 August 2017
  • ...Cloud Computing (Cloud Services and Applications); Mobile Cloud Computing; Internet of Things (IoT); Machine to Machine Communications (M2M); Autonomic Network * Privacy and Personal Data Protection (PDP); Models of PDP, Registration and Regulation; Policy and Practices for
    3 KB (314 words) - 11:52, 27 March 2020
  • New computing paradigms, such as cloud computing, big data and the Internet of Things open new horizons to businesses by making possible the provision - Enterprise management and consumer protection
    5 KB (690 words) - 12:02, 26 March 2020
  • ...on; Future mobile networks: 4G, 5G, and LTE spectra; Mobile Cloud systems; Internet of Things (IOT); Sensing and sensor networks; Energy-aware networks; Conten ...ies; NGN device instrumentation; NGN policy-based control; Next Generation Internet
    14 KB (1,770 words) - 14:56, 19 April 2020
  • * security and privacy protection mechanisms for safety-related and safety-critical systems * safety-related applications of smart systems and IoT (Internet of Things, Smart Anything Everywhere)
    3 KB (419 words) - 10:51, 19 June 2020
  • * Security and privacy protection mechanisms for safety applications; * Safety-related applications of smart systems and IoT (Internet of Things, Smart Anything Everywhere);
    4 KB (475 words) - 10:23, 19 June 2020
  • ...G and mmWave; Cognitive femtocell networks; ID/locator split in the future Internet; Mobility an named data networking (NDN); Smart sensing networks; Wearable/ ...s; Replication in mobile environments; Middleware for mobile environments; Internet and mobility; Software architecture for mobile applications
    7 KB (918 words) - 13:51, 5 June 2020
  • |Title=The Fifteenth International Conference on Internet Monitoring and Protection |Field=internet monitoring, internet protection
    17 KB (2,088 words) - 12:49, 14 June 2020
  • * Security and privacy protection mechanisms for safety applications * Safety-related applications of smart systems and IoT (Internet of Things, Smart Anything Everywhere)
    4 KB (457 words) - 11:48, 17 June 2020
  • ...X (everything, things, people, etc.); Internet, Virtualization and Cloud; Internet and Big Data; Sensing and sensor networks; Energy-aware networks; Content-o Architectures and protocols for wired and wireless sensor networks; Internet of Things architectures and implementations; Design of sensor networks; Ins
    13 KB (1,636 words) - 11:51, 10 July 2020
  • |Acronym=INTERNET 2020 |Title=The Twelfth International Conference on Evolving Internet
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ...ty devices; Physical vibration virtual keyboard; Tactile and haptic mobile Internet; Commodity WiFi devices; Macro-Femto interference avoidance; Mobile apps an ...dvanced mobile Internet; Internet of X (everything, things, people, etc.); Internet, Virtualization and Cloud; Big Data and mobile networks; Sensing and sensor
    11 KB (1,335 words) - 02:28, 10 July 2020
  • |Field="Digital society trends","Internet and web technologies", "Mobility and multimedia systems","Networking and te ...Knowledge transfer; Organizational culture; Business process outsourcing; Internet of Things and research for information systems; Crowd wisdom in IS; Mining
    18 KB (2,036 words) - 02:36, 10 July 2020
  • Security in SDN, SDX, NFV; Security in 4G/5G networks; Security and Internet of X (everything, things, people, etc.); Security for Virtualization and Cl ...ems; Security in mobile applications, Web-based, Cloud-based services, and Internet of Things (IoT)-based systems; Designing secure and green-oriented industri
    15 KB (1,886 words) - 16:16, 25 August 2020
  • * Commercial Policy, Protection, Promotion, Trade Negotiations * E- Business and Internet Computing
    9 KB (896 words) - 16:31, 6 August 2020
  • communications; Intra-vehicle communications; Vehicle-to-Internet and embedded systems; Internet of Things (IoT) impact on embedded
    10 KB (1,210 words) - 20:17, 22 November 2020
  • Deep learning and Internet of Things; Deep learning and Big data; Data and cloud technologies; Big data and Internet of Things; High
    9 KB (1,239 words) - 14:37, 29 December 2020
  • ...on; Future mobile networks: 4G, 5G, and LTE spectra; Mobile Cloud systems; Internet of Things (IOT); Sensing and sensor networks; Energy-aware networks; Conten ...ies; NGN device instrumentation; NGN policy-based control; Next Generation Internet
    13 KB (1,574 words) - 12:11, 24 November 2020
  • |Title=The Sixteenth International Conference on Internet Monitoring and Protection ...MP 2021, The Sixteenth International Conference on Internet Monitoring and Protection
    17 KB (2,035 words) - 14:45, 18 February 2021
  • ...G and mmWave; Cognitive femtocell networks; ID/locator split in the future Internet; Mobility an named data networking (NDN); Smart sensing networks; Wearable/ ...s; Replication in mobile environments; Middleware for mobile environments; Internet and mobility; Software architecture for mobile applications
    7 KB (868 words) - 15:11, 18 February 2021
  • ...erization-driven scheduling; Data analytics and visualization; HPC in IoT (Internet of Things) systems; Observational data and simulations; Complex scientific ...ualization, and cloud networks; Delay/disruption tolerant networks; Future Internet broadband services; Software Defined Networks (SDN); Fast networks / Infini
    11 KB (1,325 words) - 15:01, 18 February 2021
  • (M2M) and Internet of Things (IoT); Mobile Cloud: WiFi signal-based vibration virtual keyboard; Tactile and haptic mobile Internet;
    12 KB (1,454 words) - 19:21, 30 November 2020
  • |Acronym=INTERNET 2021 |Title=The Thirteenth International Conference on Evolving Internet
    13 KB (1,607 words) - 19:32, 30 November 2020
  • ...ile environments; Adaptive mechanisms in Internet of Things (IoT) and IoD (Internet of Drones); Adaptation in data-centric control; Self-Society; Adaptation in ...ent; Self-configuration, self-healing, self-management; Self-defense, self-protection, self-diagnosis; Self-adaptation of overlay networks; Self-adaptation in ad
    8 KB (931 words) - 15:28, 29 December 2020
  • Interoperability in IoT; Software defined radio (SDR); Internet transmission signal processing; Audio transmission over Internet; Audio
    19 KB (2,346 words) - 10:51, 9 December 2020
  • Internet imaging and multimedia; Multimodal content analysis; Multimedia multimedia services; Internet telephony and hypermedia technologies and
    10 KB (1,212 words) - 14:36, 29 December 2020
  • ...nd parallel learning algorithms; Image and video coding; Deep learning and Internet of Things; Deep learning and Big data; Data preparation, feature selection, ...ta quality and provenance, Big data persistence and preservation; Big data protection, integrity, privacy, and pseudonymisation mechanisms; Big data software (li
    9 KB (1,229 words) - 03:37, 3 December 2021
  • ...on Security, Artificial Intelligence and Modeling for the next generation Internet of Things ...on Security, Artificial Intelligence and Modeling for the next generation Internet of Things (SAM IoT) 2020
    6 KB (804 words) - 11:42, 28 January 2021
  • ...on; Future mobile networks: 4G, 5G, and LTE spectra; Mobile Cloud systems; Internet of Things (IOT); Sensing and sensor networks; Energy-aware networks; Conten ...ies; NGN device instrumentation; NGN policy-based control; Next Generation Internet
    13 KB (1,653 words) - 14:44, 10 February 2021
  • * • Denial of Service Protection * • Data Protection
    2 KB (197 words) - 17:40, 11 February 2021
  • ...on; Future mobile networks: 4G, 5G, and LTE spectra; Mobile Cloud systems; Internet of Things (IOT); Sensing and sensor networks; Energy-aware networks; Conten ...ies; NGN device instrumentation; NGN policy-based control; Next Generation Internet
    14 KB (1,718 words) - 11:30, 3 March 2021
  • |Title=2nd International Conference on Internet and e-Business Consumer protection in eCommerce
    2 KB (302 words) - 08:59, 11 March 2021
  • * Cryptography and security for the Internet of Things (RFID, sensor networks, smart devices, smart meters, etc.) * Hardware IP protection and anti-counterfeiting
    3 KB (288 words) - 17:03, 7 April 2021
  • ...rastructures (e.g., Big Data infrastructures Cloud,Map-Reduce, MPI, Data protection, Design of experiments, Interpretable models, Large-scale optimization, Sca * Emerging Applications (e.g., AI in Education, Internet of Things, Cyber Security, Intelligent Transportation)
    37 KB (5,185 words) - 11:25, 3 August 2023
  • ...eless technologies; Interoperability in IoT; Software defined radio (SDR); Internet broadcasting; Mobile broadcasting and mobile TV; Cooperative communications ...ces; Digital audio transmission signal processing; Audio transmission over Internet; Audio Multiplexing Transmission Systems; Stereo audio transmission signal;
    19 KB (2,317 words) - 02:40, 26 November 2021
  • ...hicle-to-roadside communications; Intra-vehicle communications; Vehicle-to-Internet communications; Driver-less transportation; Safeness in transportation syst ...systems; Real-time embedded systems; Virtualization and embedded systems; Internet of Things (IoT) impact on embedded systems; Embedded systems and embedded c
    10 KB (1,228 words) - 02:46, 26 November 2021
  • ...; Multimedia extraction and annotation; Content search/browsing/retrieval; Internet imaging and multimedia; Multimodal content analysis; Multimedia abstraction ...transport; Multimedia service protocols; Mobility of multimedia services; Internet telephony and hypermedia technologies and systems; Media enabled eCommerce
    10 KB (1,221 words) - 03:35, 3 December 2021
  • Internet of Vehicles and Smart Communication Theory and Application of Internet of things
    3 KB (376 words) - 08:30, 15 November 2022
  • Internet of Vehicles and Smart Communication Theory and Application of Internet of things
    3 KB (350 words) - 12:45, 3 January 2023
  • Big Data Protection, Integrity and Privacy, Computational Intelligence in Internet of Everything,
    4 KB (526 words) - 09:06, 23 August 2023