Search results
Create the page "Network" on this wiki! See also the search results found.
Page title matches
- 55 bytes (5 words) - 06:20, 26 December 2011
- 55 bytes (5 words) - 05:20, 26 May 2009
- |Title=IJMNCT 2017 : International Journal of Mobile Network Communications & Telematics INTERNATIONAL JOURNAL OF MOBILE NETWORK COMMUNICATIONS & TELEMATICS (IJMNCT)6 KB (751 words) - 13:28, 28 July 2017
- |Title=IJNSA 2017 : International Journal of Network Security & Its Applications -- UGC, ERA Indexed INTERNATIONAL JOURNAL OF NETWORK SECURITY & ITS APPLICATIONS (IJNSA) -- ERA4 KB (628 words) - 13:34, 28 July 2017
- ...Ei 2017 : ACM--2017 the 7th International Conference on Communication and Network Security (ICCNS 2017)--SCOPUS, Ei Compendex |Field=network security2 KB (216 words) - 13:34, 28 July 2017
- |Title=ICINS 2017 : 2017 5th International Conference on Information and Network Security (ICINS 2017)--Ei Compendex and Scopus |Field=network security1 KB (130 words) - 13:34, 28 July 2017
- |Title=ICCNE 2017 : 2017 4th International Conference on Communications and Network Engineering (ICCNE 2017) 2017 4th International Conference on Communications and Network Engineering2 KB (223 words) - 13:34, 28 July 2017
- |Title=ICNCC - Ei 2017 : ACM--2017 VI International Conference on Network, Communication and Computing (ICNCC 2017)--EI & Scopus ACM--2017 VI International Conference on Network, Communication and Computing1 KB (183 words) - 13:19, 28 July 2017
- |Title=WiMoA 2017 : 9th International Conference on Wireless, Mobile Network & Applications 9th International Conference on Wireless, Mobile Network & Applications (WiMoA5 KB (616 words) - 13:19, 28 July 2017
- 23 bytes (2 words) - 11:50, 3 September 2017
- 24 bytes (2 words) - 12:36, 3 September 2017
Page text matches
- |Title=Network Storage Symposium199 bytes (22 words) - 17:21, 27 February 2020
- We invite practitioners and researchers to network and share their experiences. Teachers, and heads of learning areas as well2 KB (265 words) - 16:59, 6 November 2019
- * P. Mika, Yahoo! Inc., Barcelona, Spain, (Social Network)6 KB (887 words) - 18:02, 10 November 2011
- network". In all these approaches, however, the problem seems to be well defined a the answer of "what is a network" has been relaxed by the inclusion of users and6 KB (790 words) - 23:08, 13 August 2008
- ...tic Web. The xOperator concept is based on the idea of creating an overlay network of collaborative information agents on top of social IM networks. It can be1 KB (159 words) - 03:54, 16 August 2008
- ...mation of the various fields of science available {{SITENAME}} relies on a network of volunteer editors and associate editors. The tasks of an editor are to m6 KB (714 words) - 12:19, 11 December 2020
- | title = netWorker: the craft of network computing255 bytes (30 words) - 16:33, 18 August 2008
- |Title=7th International Conference on Network and Computing Technologies 7th International Conference on Network and Computing Technologies (ICNCT 2019), will be held in Nagoya Institute5 KB (571 words) - 09:22, 19 July 2019
- |Title=1st International Conference on Applied Cryptography and Network Security522 bytes (65 words) - 13:51, 6 November 2020
- |Title=2nd International Conference on Applied Cryptography and Network Security535 bytes (66 words) - 14:23, 6 November 2020
- |Title=3rd International Conference on Applied Cryptography and Network Security482 bytes (60 words) - 13:55, 6 November 2020
- |Title=4th International Conference on Applied Cryptography and Network Security470 bytes (56 words) - 13:57, 6 November 2020
- |Title=5th International Conference on Applied Cryptography and Network Security474 bytes (60 words) - 13:58, 6 November 2020
- |Title=International Conference on Applied Cryptography and Network Security322 bytes (46 words) - 08:58, 13 February 2021
- | Title= International Conference on Network Protocols 1996315 bytes (29 words) - 19:59, 21 August 2008
- | Title= International Conference on Network Protocols 1997315 bytes (29 words) - 19:59, 21 August 2008
- | Title= International Conference on Network Protocols 1998362 bytes (38 words) - 19:59, 21 August 2008
- | Title= International Conference on Network Protocols 1999344 bytes (34 words) - 19:59, 21 August 2008
- | Title= International Conference on Network Protocols 2000354 bytes (36 words) - 19:59, 21 August 2008
- | Title= International Conference on Network Protocols 2001342 bytes (34 words) - 19:59, 21 August 2008
- | Title= International Conference on Network Protocols 2002338 bytes (32 words) - 09:51, 29 May 2016
- | Title= International Conference on Network Protocols 2003341 bytes (32 words) - 19:59, 21 August 2008
- | Title= International Conference on Network Protocols 2004340 bytes (32 words) - 19:59, 21 August 2008
- | Title= International Conference on Network Protocols 2005341 bytes (32 words) - 19:59, 21 August 2008
- | Title= International Conference on Network Protocols 2006338 bytes (32 words) - 19:59, 21 August 2008
- | Title= International Conference on Network Protocols 2008338 bytes (32 words) - 19:59, 21 August 2008
- | Title= International Symposium on Integrated Network Management 1989324 bytes (30 words) - 20:09, 21 August 2008
- | Title= International Symposium on Integrated Network Management 1991325 bytes (30 words) - 20:09, 21 August 2008
- | Title= International Symposium on Integrated Network Management 1993328 bytes (30 words) - 20:09, 21 August 2008
- | Title= International Symposium on Integrated Network Management 1997325 bytes (30 words) - 20:09, 21 August 2008
- | Title= International Symposium on Integrated Network Management 1999328 bytes (30 words) - 20:09, 21 August 2008
- | Title= International Symposium on Integrated Network Management 2001356 bytes (35 words) - 20:09, 21 August 2008
- | Title= International Symposium on Integrated Network Management 2003356 bytes (35 words) - 20:09, 21 August 2008
- | Title= International Symposium on Integrated Network Management 2005348 bytes (33 words) - 20:09, 21 August 2008
- | Title= International Symposium on Integrated Network Management 2007348 bytes (33 words) - 10:07, 29 May 2016
- | Title = International Conference on Network Protocols123 bytes (13 words) - 00:22, 22 August 2008
- | Title = International Symposium on Integrated Network Management132 bytes (14 words) - 00:33, 22 August 2008
- EvoBIO started in 2002 as workshop organized by the EvoNet (European Network of Excellence in Evolutionary4 KB (493 words) - 18:48, 4 September 2008
- * Wireless Network and architecture designs5 KB (645 words) - 18:19, 15 September 2008
- * Operating system and network support for mobile devices5 KB (611 words) - 15:43, 16 September 2008
- ...t number of services, guarantee their QoS, and optimize the utilization of network resources. ...ocus on new models and methods as well as mechanisms, which can enable the network to perform adaptive13 KB (1,706 words) - 16:34, 27 December 2015
- ...cations for a unique user or multiple users requires special platforms and network capabilities.18 KB (2,408 words) - 02:37, 16 December 2008
- * [11] Social network analysis; communities identification; expertise and authority discovery; co9 KB (1,282 words) - 18:28, 13 October 2008
- ...g as the city's main sources of income. Milan's position at the heart of a network of canals, which provided the irrigation for the Lombard plains and the imp7 KB (959 words) - 14:51, 27 December 2015
- ...s to react to the changes in locations, context, contents and variation in network bandwidth while accessing Web contents. * Creation and consumption of social network contents5 KB (746 words) - 18:19, 13 October 2008
- * High-speed Communication and Network * Wireless Communication and Network34 KB (4,565 words) - 22:20, 10 January 2018
- * High-speed Communication and Network * Wireless Communication and Network8 KB (1,037 words) - 22:20, 10 January 2018
- * High-speed Communication and Network * Wireless Communication and Network9 KB (1,189 words) - 22:20, 10 January 2018
- * High-speed Communication and Network * Wireless Communication and Network26 KB (3,456 words) - 22:20, 10 January 2018
- |Field=Network and Computing |Title=4th International Conference on Network and Computing Technology270 bytes (35 words) - 18:50, 10 January 2018
- * Network-based Computing Systems * Network-based Computer Graphics System10 KB (1,263 words) - 22:20, 10 January 2018
- |Field=Network and Computing |Title=1st International Conference on Network and Computing Technology273 bytes (35 words) - 18:50, 10 January 2018
- * Network-based Computing Systems * Network-based Computer Graphics System12 KB (1,537 words) - 22:19, 10 January 2018
- |Field=Network and Computing |Title=2nd International Conference on Network and Computing Technology271 bytes (35 words) - 18:50, 10 January 2018
- * Network-based Computer Graphics System * Network-based Computing Systems8 KB (1,040 words) - 22:20, 10 January 2018
- - Network management and troubleshooting4 KB (495 words) - 09:22, 22 August 2023
- S-CUBE - the First Conference on wireless Sensor network (WSN) Systems and Software - provides an ideal venue to address the researc ...e potential to radically simplify software development for wireless sensor network based applications. The aim of these new architectures is to support flexib4 KB (519 words) - 16:13, 14 October 2008
- * Renew friendships and network with industry gurus2 KB (251 words) - 17:47, 14 October 2008
- understanding of complex network dynamics and leads to better design of * Distributed network resource allocation6 KB (722 words) - 17:32, 14 October 2008
- ...es, digital and video libraries, compression and coding, security over the network. ...heritage, OCR and document analysis, mobile robots and visual navigation, network security, remote sensing and environment control, video surveillance and in2 KB (268 words) - 17:47, 14 October 2008
- o Applications of network coding in cross-layer design3 KB (424 words) - 17:47, 14 October 2008
- Wireless mobile ad hoc and sensor network nodes have limited battery without degrading the performance of the network. Nonetheless, nowadays,3 KB (391 words) - 10:43, 5 November 2020
- number of options regarding network and service providers, as well * Long distance and low power wireless network deployments6 KB (899 words) - 09:22, 28 June 2012
- • Network estimation and processing techniques • Wireless network security and privacy6 KB (731 words) - 10:33, 14 August 2023
- * Wireless network architecture and technologies systems3 KB (456 words) - 18:10, 14 October 2008
- ...ity, the current series of events starting with INTERNET 2009 is targeting network calculi and supporting mechanisms for these challenging issues. ...ents using microeconomics, topological routing vs. table-based routing vs. network coding, power-efficient routing11 KB (1,385 words) - 17:48, 14 October 2008
- ...ative and discriminative statistical models, relational models, and social network models place, discourse understanding, social network analysis, and others,2 KB (204 words) - 12:45, 27 December 2015
- .Network Protocol and Security3 KB (375 words) - 17:48, 14 October 2008
- Network protocols, routing, algorithms ===Network protocols, routing, algorithms===19 KB (2,503 words) - 13:25, 28 October 2020
- * In-network processing and aggregation * Network and QoS management for vehicular networks3 KB (378 words) - 14:22, 24 August 2016
- ...lligence, Data Science, Human-Centric Computing, Knowledge Management, and Network Science. It is committed to addressing research that both deepen the unders1 KB (168 words) - 09:31, 26 February 2020
- ...Power Generation and Supply (SUPERGEN), which is organized by the UK-China Network of Clean Energy Research. The conference will be jointly hosted by the Univ (PI of the UK-China Network of Clean Energy Research, Queen’s University of Belfast, UK)2 KB (227 words) - 20:05, 14 October 2008
- - Peer-to-Peer and overlay network support in SPSs3 KB (490 words) - 20:05, 14 October 2008
- rent out network presence, computation power, and data storage space7 KB (907 words) - 21:51, 14 October 2008
- • MAC, Network, Transport, Application Protocols and Cross-Layer Design • Network Coding, MIMO, Cooperative Communications and Other Novel Techniques2 KB (244 words) - 20:05, 14 October 2008
- * Analysis and design of network architectures and algorithms * Experimental results from operational networks or network applications3 KB (353 words) - 20:31, 14 October 2008
- * › Mobile Network Protocols and Packet Services * › Adaptive Wireless Network Protocols9 KB (1,219 words) - 20:05, 14 October 2008
- ...accessing and processing information in machine-understandable form. This network of knowledge systems will ultimately lead to truly intelligent systems, whi15 KB (2,170 words) - 11:39, 28 May 2016
- * Network Analysis2 KB (216 words) - 20:05, 14 October 2008
- • Mobile Network Architecture • Network and Operating System Support for Multimedia5 KB (530 words) - 10:27, 24 June 2011
- Computer and Network Security3 KB (332 words) - 20:06, 14 October 2008
- ...arch, future developments, including state-of-the-art applications, and to network with the professionals from academia, industry, and government who are inte3 KB (449 words) - 20:06, 14 October 2008
- ...-inspired computing, CNT, SET, RTD, QCA, VLSI aspects of sensor and sensor network, and CAD tools for emerging technology devices and circuits.4 KB (459 words) - 21:03, 14 October 2008
- o Network and Internet Support for Distributed Applications2 KB (303 words) - 20:06, 14 October 2008
- ...nd or to gain important insights into key design trade-offs in computer or network systems.3 KB (361 words) - 21:16, 14 October 2008
- * Network Architecture and Design4 KB (505 words) - 22:15, 14 October 2008
- | Title = Sixth International Conference on Wireless On-demand Network Systems and Services On-demand Network Systems and Services6 KB (686 words) - 20:06, 14 October 2008
- * Workflow technology and workflow management for collaborative network management6 KB (674 words) - 22:45, 14 October 2008
- The development of information network systems enables us to communicate6 KB (777 words) - 22:53, 14 October 2008
- Advanced Applications of Neural Network Network Implementation Choices9 KB (1,240 words) - 22:56, 14 October 2008
- ...ources is organised under the joint auspices of the Asian Languae Resource Network (ALRN) project funded by Japanese Ministry of Education, Culture, Science,4 KB (524 words) - 23:02, 14 October 2008
- ...cfp?eventid=3675&copyownerid=1513 WikiCFP][[Category:Artificial neural network]]2 KB (314 words) - 23:03, 14 October 2008
- -Intelligent Sensor Network and Systems2 KB (231 words) - 23:03, 14 October 2008
- [[Category:Artificial neural network]]1 KB (143 words) - 22:26, 4 February 2009
- ...ll under the following areas are encouraged: networked game architectures, network protocol design for games, latency issues, lag compensation, and synchroniz9 KB (1,275 words) - 14:46, 27 December 2015
- [[Category:Artificial neural network]]2 KB (199 words) - 18:55, 7 March 2020
- ...ntists, engineers, and educators to present the state of the art of neural network research and applications in related fields. The symposium will feature ple [[Category:Artificial neural network]]3 KB (392 words) - 23:07, 14 October 2008
- [[Category:Artificial neural network]]4 KB (469 words) - 23:05, 14 October 2008
- T-6 Computer-Aided Network Design1 KB (132 words) - 23:04, 14 October 2008
- ...howcfp?eventid=2389&copyownerid=2 WikiCFP][[Category:Artificial neural network]]592 bytes (65 words) - 23:04, 14 October 2008
- * Social Network Analysis5 KB (696 words) - 18:29, 8 November 2008
- ...nning, knowledge discovery and data mining, intelligent agents, and social network intelligence) and advanced Information Technology (IT) (e.g., wireless netw7 KB (971 words) - 23:04, 14 October 2008
- ** Context, user, network and semantics-aware media engineering ** Network analysis and social structures detection in Web 2.04 KB (490 words) - 16:48, 15 October 2008
- - Social network analysis6 KB (827 words) - 23:04, 14 October 2008
- * Network protocols and middleware for embedded systems2 KB (316 words) - 23:05, 14 October 2008
- ...mputational Intelligence Society, co-sponsored by the International Neural Network Society, Evolutionary Programming Society and the Institution of Engineerin2 KB (304 words) - 17:44, 6 May 2021
- * Cryptography and Network Security2 KB (167 words) - 23:05, 14 October 2008
- ...international researchers and practitioners working in all areas of neural network based pattern recognition to present and discuss the latest researches, res4 KB (572 words) - 23:05, 14 October 2008
- (Computability in Europe), a European network of mathematicians,5 KB (619 words) - 18:06, 10 February 2021
- Network robotics5 KB (634 words) - 23:05, 14 October 2008
- | Title = 2nd Bio-Inspired Models of Network, Information and Computing Systems637 bytes (69 words) - 23:05, 14 October 2008
- * Olivier Bodenreider (National Network of Libraries of Medicine, USA)6 KB (749 words) - 23:06, 14 October 2008
- - Social Network Analysis4 KB (608 words) - 17:00, 27 December 2015
- ..."Leveraging Complex Prior Knowledge for Learning" of the PASCAL-2 European Network of Excellence starting in March 2008.5 KB (758 words) - 23:07, 14 October 2008
- ...ritization, summarization, topic tracking, sorting, leak detection, social network analysis, and enhanced intelligent interfaces. The Workshop on Enhanced Mes * Social Networks: relationship modeling, network analysis, group and role discovery, online communities,5 KB (668 words) - 17:01, 24 February 2016
- - Web. Community mining, social network analysis, structured retrieval4 KB (468 words) - 23:07, 14 October 2008
- * Semantic Web Mining and Semantic Network Analysis7 KB (920 words) - 23:07, 14 October 2008
- grams, services and, even, network behavior. This connection be-4 KB (570 words) - 11:08, 26 July 2016
- bioinformatics; Network computing; Neural computing;5 KB (698 words) - 23:08, 14 October 2008
- This track is dedicated to communication and network technologies that are of specific relevance to developing countries. The tr * Innovations in femtocells, picocells and relay network technologies9 KB (1,127 words) - 17:19, 26 April 2011
- * Data Portability and Social Network Portability * Christoph G�rn, #B4mad.Net Network, Germany5 KB (709 words) - 23:08, 14 October 2008
- * Telecommunications, network and systems management5 KB (634 words) - 15:36, 14 December 2008
- - Mobile, Ad Hoc and Sensor Network Security4 KB (595 words) - 23:09, 14 October 2008
- * sensor network databases7 KB (875 words) - 23:09, 14 October 2008
- ...stems and networks designed using database principles (and vice versa), to network monitoring systems that depend on advanced data management and analysis cap * Network algorithms and theory applied to database systems3 KB (332 words) - 23:10, 14 October 2008
- ...systems. However, such systems constrained resources in terms of autonomy, network bandwidth or storage capacity, mobile devices (mobile phones, PDA�?�) h2 KB (324 words) - 16:49, 16 December 2020
- ...he Natural Sciences and Engineering Research Council of Canada. The LORNET Network is hosting its 4th annual e-learning conference on Intelligent Interactive4 KB (503 words) - 23:11, 14 October 2008
- ENCOT: Emerging Network Communications and Technologies COMAN: Network Control and Management3 KB (313 words) - 23:11, 14 October 2008
- and network management5 KB (549 words) - 17:15, 5 July 2020
- Wireless Sensor/Actuator Network, Sensor Web, Sensor Network, Sensor Design, Cyber-Physical System, Smart Space, Pervasive Computing.4 KB (600 words) - 16:30, 5 July 2020
- ...special issue is to explore the development of vehicular ad hoc and sensor network technologies about communication, networking, and applications. Network management3 KB (364 words) - 23:11, 14 October 2008
- * Network Measurements * Network Optimization and Resource Provisioning2 KB (212 words) - 23:11, 14 October 2008
- * Network Data Mining * Network Management3 KB (339 words) - 23:11, 14 October 2008
- ...ocols, web architectures and protocols, network measurements and testbeds, network management systems, content distribution, peer to peer and overlay networks ...e, multilayer design and optimisation, MPLS and GMPLS, RFID, multicasting, network modelling and simulation, real-time voice/video over IP networks, resource7 KB (981 words) - 03:18, 6 January 2009
- 1. NGN(Next Generation Network), NGI(Next Generation Internet) and Future Internet Technologies 5. RFID/USN(Ubiquitous Sensor Network) Technologies2 KB (200 words) - 23:11, 14 October 2008
- * Network-based applications * Network Security4 KB (465 words) - 23:11, 14 October 2008
- * Wireless Mesh & Sensor Network Applications * Network Security & Reliability4 KB (559 words) - 23:11, 14 October 2008
- ...ocus on new models and methods as well as mechanisms, which can enable the network to perform adaptive behaviors. High-speed Network Protocols7 KB (990 words) - 23:11, 14 October 2008
- - Computer and Communications Network Security3 KB (375 words) - 23:37, 14 October 2008
- Network operations and management4 KB (462 words) - 12:53, 27 December 2015
- - Intelligence support for sensor network management3 KB (442 words) - 23:11, 14 October 2008
- | Title = Third International Conference on Bio-Inspired Models of Network, Information and Computing Systems 3rd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems5 KB (694 words) - 23:11, 14 October 2008
- combination of increasing network bandwidth and expanding designers. New technology elements, including network processors,6 KB (722 words) - 17:00, 27 December 2015
- ...es, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for2 KB (209 words) - 23:12, 14 October 2008
- -Wireless multimedia network management3 KB (393 words) - 23:12, 14 October 2008
- 6. Intelligent Communication Systems and Network Protocols4 KB (496 words) - 23:12, 14 October 2008
- ...sion of new techniques in modeling, design, simulation, and fabrication of network and communication systems at the nano-scale. ...g/addressing issues in nano-networks, Nano-coding, Applications of complex network theory, Self-organization in nano-scale systems, Modeling of Nano/Bio Commu6 KB (756 words) - 23:12, 14 October 2008
- Papers related to wireless and mobile network Modeling, Analysis, - Wireless network algorithms and protocols4 KB (596 words) - 23:12, 14 October 2008
- Wireless network architectures2 KB (244 words) - 23:12, 14 October 2008
- | Title = 11th Asia-Pacific Network Operations and Management Symposium574 bytes (62 words) - 17:05, 27 December 2015
- · Network Modelling and Simulation X. Perez Costa �?? NEC Network Laboratories, Germany, Germany11 KB (1,493 words) - 17:05, 24 February 2016
- 1 .5 Network Management 1 .6 Network Planning and Optimization2 KB (250 words) - 23:12, 14 October 2008
- | Title = Innovations in NGN - Future Network and Services, An IT U-T Kaleidoscope Conference597 bytes (69 words) - 23:12, 14 October 2008
- ...and operation of Next Generation Internet networks. It is organized by the Network of Excellence (NoE) Euro-FGI (http://www.eurongi.org) that was initiated by * Network co-operation3 KB (382 words) - 23:12, 14 October 2008
- | Title = 13th International Telecommunications Network Strategy and Planning Symposium564 bytes (60 words) - 23:12, 14 October 2008
- Network scaling Network management3 KB (359 words) - 23:12, 14 October 2008
- ...ield of computer and data communication networks. We invite submissions on network architecture, design, implementation, operations, analysis, measurement, pe * Analysis and design of network architectures and algorithms3 KB (352 words) - 23:12, 14 October 2008
- | Title = IEEE Network Operations and Management Symposium549 bytes (60 words) - 23:12, 14 October 2008
- - Network Security - Network Information Theory3 KB (465 words) - 23:13, 14 October 2008
- | Title = International Conference On Optical Network Design And Modeling590 bytes (69 words) - 23:13, 14 October 2008
- * Network Reliability and QoS2 KB (283 words) - 23:13, 14 October 2008
- - Wireless network architectures and techniques for multimedia traffic - Mesh network systems and technologies3 KB (414 words) - 23:13, 14 October 2008
- | Title = Fifth Annual Conference on Wireless On demand Network Systems and Services effort as well as with little dependency on existing network infrastructures.3 KB (413 words) - 23:13, 14 October 2008
- architectural boundaries of large-scale network services. We solicit * Network measurements, workload, and topology characterization4 KB (528 words) - 23:13, 14 October 2008
- sub-areas of research: adaptation of system operations to the network the 90's that had an inward focus on network signaling & control today's5 KB (651 words) - 23:13, 14 October 2008
- - Wireless network security and privacy - Application oriented network management3 KB (343 words) - 10:31, 14 August 2023
- *Discovery-driven Web and social network mining2 KB (237 words) - 12:23, 11 September 2020
- ...ers and information on their characteristics can be a powerful aid for any network operation. Online services that assist social networks (facebook, linkedin,4 KB (457 words) - 23:13, 14 October 2008
- - Social network analysis - Nikos Manouselis. Greek Research & Technology Network, Greece7 KB (989 words) - 23:13, 14 October 2008
- Home Network3 KB (494 words) - 23:16, 14 October 2008
- ...work, and to come and find out what others are doing. This is an emerging network of people exploring the intersection of established intellectual traditions * Mike Gurstein, Community Informatics Research Network, Canada9 KB (1,139 words) - 23:14, 14 October 2008
- * Social network analysis * Applications of social network analysis3 KB (453 words) - 23:14, 14 October 2008
- opportunity to gather and build a strong network of researchers with - Social Network Analysis on the social web7 KB (950 words) - 23:14, 14 October 2008
- the Network Society" - "RFID can create Ubiquitous Network Society?"7 KB (813 words) - 23:14, 14 October 2008
- * Social network analysis * Associations mining from social network7 KB (860 words) - 11:55, 7 January 2009
- [10] Social network analysis; communities identification; expertise discovery; collaborative fi4 KB (475 words) - 23:14, 14 October 2008
- * Networking and network services * System and network management and troubleshooting6 KB (869 words) - 23:14, 14 October 2008
- * Network architecture infrastructure integration of WiMAX in NGN * Network/radio planning, spectrum, regulations of WiMAX in NGN1 KB (181 words) - 23:14, 14 October 2008
- Automonic Communications and Self-managing Network Testbeds Next Generation Wireless Network Testbeds2 KB (316 words) - 23:15, 14 October 2008
- ...ant research dialog, or pushes the architectural boundaries of large-scale network services. We solicit papers describing original and previously unpublished * Network measurements, workload, and topology characterization8 KB (1,093 words) - 23:15, 14 October 2008
- * Cognitive network architectures for future Internet * Cognitive network controller design7 KB (939 words) - 23:15, 14 October 2008
- ...itionally offered predominantly passive experiences, continual advances in network and computer technologies are providing tools for implementing greater inte8 KB (1,011 words) - 23:15, 14 October 2008
- | Title = IEEE 3rd International Workshop on Distributed Autonomous Network Management Systems 3rd International Workshop on Distributed Autonomous Network6 KB (663 words) - 23:15, 14 October 2008
- * Workflow management for collaborative network/system8 KB (1,093 words) - 23:15, 14 October 2008
- | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)5 KB (628 words) - 23:15, 14 October 2008
- 3-08 Network routing and communication algorithms5 KB (623 words) - 23:15, 14 October 2008
- The third generation of social networking technologies has hit the Web. This network serve increasingly ?Mobile and network security and privacy8 KB (1,003 words) - 23:15, 14 October 2008
- | Title = 4th IEEE Workshop on Secure Network Protocols 4th workshop on Secure Network Protocols (NPSec 2008)4 KB (493 words) - 23:15, 14 October 2008
- Network information management is a growing area of research at the attention by the recent emergence of information systems distributed across the network,4 KB (563 words) - 23:15, 14 October 2008
- * Measurement-based network management such as traffic engineering * Network applications such as WWW, multimedia streaming, and gaming3 KB (313 words) - 23:15, 14 October 2008
- ...lumes, mainly because of converged type of traffic resulted from converged network operation under converged services and applications. Moreover, wireless acc * New Teletraffic and Network Traffic Challenges and Paradigms5 KB (598 words) - 10:18, 29 May 2016
- ...act may both be mobile. Their implementation requires advances in wireless network technologies and devices, development of infrastructures supporting cogniti * Ad hoc and sensor network support for ubiquitous computing5 KB (599 words) - 23:15, 14 October 2008
- | Title = 18th International workshop on Network and Operating Systems Support for Digital Audio and Video In-network stream processing3 KB (322 words) - 23:15, 14 October 2008
- | Title = 7th IEEE International Symposium on Network Computing and Applications577 bytes (65 words) - 23:15, 14 October 2008
- |Title=6th International Conference on Applied Cryptography and Network Security509 bytes (65 words) - 14:00, 6 November 2020
- |Title=7th International Conference on Applied Cryptography and Network Security509 bytes (62 words) - 14:01, 6 November 2020
- |Title=9th International Conference on Applied Cryptography and Network Security496 bytes (63 words) - 14:05, 6 November 2020
- |Title=15th International Conference on Applied Cryptography and Network Security506 bytes (61 words) - 14:16, 6 November 2020
- |Title=8th International Conference on Applied Cryptography and Network Security475 bytes (60 words) - 14:03, 6 November 2020
- |Title=14th International Conference on Applied Cryptography and Network Security485 bytes (60 words) - 14:15, 6 November 2020
- |Title=12th International Conference on Applied Cryptography and Network Security497 bytes (60 words) - 14:11, 6 November 2020
- |Title=13th International Conference on Applied Cryptography and Network Security516 bytes (64 words) - 14:12, 6 November 2020
- |Title=10th International Conference on Applied Cryptography and Network Security491 bytes (60 words) - 14:07, 6 November 2020
- |Title=11th International Conference on Applied Cryptography and Network Security507 bytes (62 words) - 14:09, 6 November 2020
- ...ed to promote energy conservation without degrading the performance of the network. Nonetheless, nowadays, many real-time applications have been proposed and2 KB (304 words) - 12:46, 27 December 2015
- | Title = First ACM Conference on Wireless Network Security ...s, their security is gaining in importance. The ACM Conference on Wireless Network Security (WiSec) aims at exploring attacks on wireless networks as well as2 KB (197 words) - 23:15, 14 October 2008
- | Title = 3rd Conference on Emerging Network Experiment and Technology549 bytes (62 words) - 23:15, 14 October 2008
- * User tasks for social network analysis2 KB (315 words) - 23:22, 14 October 2008
- * Social Network Analysis4 KB (557 words) - 23:16, 14 October 2008
- - Sensor network2 KB (253 words) - 23:16, 14 October 2008
- Network Robotics8 KB (982 words) - 23:17, 14 October 2008
- Hyper Network Communication Network Security and Information Assurance4 KB (438 words) - 23:17, 14 October 2008
- ...ted areas of study. This conference will build on our past experiences and network to provide a valuable forum for exchanges of significant ideas and publicat1 KB (167 words) - 23:17, 14 October 2008
- * High-throughput hardware and software approaches to genome-scale network modeling3 KB (443 words) - 23:17, 14 October 2008
- ...industry, and government to present and discuss recent advances in sensor network research and applications. The conference covers both theoretical and exper Network health monitoring4 KB (570 words) - 23:17, 14 October 2008
- ...rch domains that increasingly play a key role in connecting systems across network centric environments to allow distributed computing and information sharing5 KB (697 words) - 23:18, 14 October 2008
- * ReSIST - Resilience for Survivability in IST. A European Network of Excellence (http://www.resist-noe.org)9 KB (1,264 words) - 18:14, 8 November 2008
- ...nced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social The international conference on Advances in Social Network Analysis and Mining (ASONAM 2009) will primarily provide an interdisciplina3 KB (404 words) - 23:18, 14 October 2008
- * Network Analysis and Intrusion Detection3 KB (443 words) - 18:35, 1 March 2012
- o Impact of recommendation models on the evolution of the social network.5 KB (592 words) - 23:18, 14 October 2008
- Sensor Network Applications Social Network Analysis4 KB (520 words) - 20:02, 26 February 2020
- ...nowledge Networks: Discovering network structure and patterns using Social Network Analysis ...ledge networks. These studies rely heavily on theory and tools from social network analysis that has already a longstanding tradition in the sociology domain.6 KB (886 words) - 23:19, 14 October 2008
- intelligence, domain constraints and network intelligence in data mining, and social network mining.4 KB (510 words) - 23:19, 14 October 2008
- * Mining techniques for network management5 KB (613 words) - 23:19, 14 October 2008
- * network analysis of social resources sharing systems * analysis of network dynamics5 KB (646 words) - 23:19, 14 October 2008
- EvoBIO started in 2002 as workshop organized by the EvoNet (European Network of Excellence in Evolutionary Computation) working group on bioinformatics,2 KB (308 words) - 23:19, 14 October 2008
- -Network and Organizational Vulnerability Analysis -Network Security4 KB (487 words) - 10:42, 21 August 2020
- | Title = Second ACM Conference on Wireless Network Security ...uitous, their security gains in importance. The ACM Conference on Wireless Network Security (WiSec) aims at exploring attacks on wireless networks as well as2 KB (291 words) - 23:19, 14 October 2008
- | Title = 16th Annual Network and Distributed System Security Symposium 16th Annual Network & Distributed System Security Symposium5 KB (673 words) - 23:19, 14 October 2008
- - Home-network applications - Ubiquitous Sensor Network(USN) / RFID - Issue6 KB (697 words) - 23:19, 14 October 2008
- Network security5 KB (619 words) - 23:19, 14 October 2008
- * Network and Wireless Security6 KB (736 words) - 23:20, 14 October 2008
- Communications / network security4 KB (465 words) - 23:20, 14 October 2008
- * Network security (anti-virus, anti-DoS-tools, firewalls etc.)4 KB (565 words) - 23:20, 14 October 2008
- Network security2 KB (262 words) - 23:20, 14 October 2008
- * Network Security6 KB (689 words) - 10:39, 21 August 2020
- Cross-layer network design and optimization Network security, vulnerability, authentication and access control4 KB (502 words) - 23:20, 14 October 2008
- - Mobile Network Traffic Engineering, Performance & Optimization - Wireless & Mobile Network Management and Service Infrastructure10 KB (1,262 words) - 23:20, 14 October 2008
- ...lopment of efficient embedded vision-based techniques. Design of scalable, network-based applications based on high-bandwidth data such as images requires a c4 KB (488 words) - 17:04, 27 February 2009
- | Title = 6th International Conference on Multimedia & Network Information Systems677 bytes (81 words) - 23:21, 14 October 2008
- |Field=Artificial neural network Network Society in co-operation with the International Neural Network2 KB (276 words) - 11:30, 22 March 2020
- | Field = Artificial neural network611 bytes (68 words) - 23:21, 14 October 2008
- ...ers, hands-on engineers, and other semiconductor industry professionals to network, learn, and share knowledge on new and best-method semiconductor manufactur4 KB (554 words) - 23:21, 14 October 2008
- * High-level sensor network management7 KB (893 words) - 23:23, 14 October 2008
- * Network and Telemedicine Systems4 KB (543 words) - 16:46, 27 December 2015
- Service Network Economic Structures and Effects18 KB (2,352 words) - 23:23, 14 October 2008
- * Ubiquitous and Sensor Network3 KB (415 words) - 23:23, 14 October 2008
- Communication and Network Systems, Technologies and Applications2 KB (250 words) - 09:11, 5 March 2012
- Network Optimization3 KB (422 words) - 23:24, 14 October 2008
- * network and system on-a-chip and applications9 KB (1,181 words) - 00:37, 15 October 2008
- | Title = 9th Symposium on Neural Network Applications in Electrical Engineering ...howcfp?eventid=2933&copyownerid=2 WikiCFP][[Category:Artificial neural network]]987 bytes (125 words) - 23:24, 14 October 2008
- Application-specific systems: network computing, special-purpose systems,2 KB (287 words) - 23:24, 14 October 2008
- * Network-on-Chip Platforms2 KB (275 words) - 23:24, 14 October 2008
- Computer-Aided Network Design Digital Signal Processing3 KB (405 words) - 23:24, 14 October 2008
- * 1.12 Gabor Wavelet network.4 KB (475 words) - 23:25, 14 October 2008
- ...Discrete event systems; Hybrid systems; Networked control systems; Sensor network systems; Delay systems; Neural networks; Fuzzy systems; Control of biologic ...Factory modeling and simulation; Home, laboratory and service automation; Network-based systems; Planning, scheduling and coordination; Nano-scale automation4 KB (459 words) - 23:25, 14 October 2008
- o Network evolution, formation and restructuring o Network traffic dynamics and network routing3 KB (378 words) - 23:26, 14 October 2008
- ...nted significant challenges on the desktop and efficient virtualization of network interfaces has limited server consolidation in the data center.3 KB (462 words) - 23:26, 14 October 2008
- ...des research at all design levels: circuit, architecture, compiler, OS and network. This workshop aims to become a forum for academia and industry to discuss5 KB (598 words) - 01:12, 31 May 2012
- RAID, and network-storage system designs). ...s increasingly important as boundaries between hardware/software and local/network3 KB (406 words) - 17:39, 30 September 2016
- ...SETI@Home?s "BOINC" computational Grid; BitTorrent?s Content Distribution Network; and ppLive, and ppStream in China, as well as Zattoo in Europe, all of thr6 KB (761 words) - 03:28, 6 January 2009
- resources such as processing, network bandwidth and storage capacity5 KB (577 words) - 23:27, 14 October 2008
- Garth Goodson (Network Appliance)4 KB (505 words) - 23:27, 14 October 2008
- such as network, automotive, cellular and others, present interesting1 KB (180 words) - 17:02, 29 May 2016
- * Network processor and router architectures2 KB (259 words) - 10:14, 29 May 2016
- ...well as in the emerging ultra low-power markets such as medical and sensor network applications. Most recently, reliability and fault tolerance has been raise4 KB (584 words) - 23:27, 14 October 2008
- ...d their own properties with respect to traffic load, congestion situation, network topology, and wireless channel propagation etc. However, cognitive radio wi ...s that report the latest research advances in this field from physical and network layers to practical applications.3 KB (409 words) - 23:27, 14 October 2008
- to existing network infrastructure, as well as effective information6 KB (861 words) - 17:02, 27 December 2015
- ...simple agents fits closely to the typical environment created by an ad hoc network.3 KB (363 words) - 23:28, 14 October 2008
- ...a broad forum an outstanding opportunity for researchers, academicians and network engineers to discuss new and emerging technologies in the field of computer - Network management and performance3 KB (413 words) - 23:28, 14 October 2008
- Network control6 KB (778 words) - 23:28, 14 October 2008
- ...c systems; ?Distributed control systems; Networked control systems; Sensor network systems; Fault diagnosis and fault-tolerant control; Delay systems; Neural ...Factory modeling and simulation; Home, laboratory and service automation; Network-based systems; Planning, scheduling?and coordination; Nano-scale automation6 KB (814 words) - 23:28, 14 October 2008
- Computational Intelligence: Artificial neural network, Fuzzy systems, Genetic algorithm, Evolutionary computing, Machine learning ...e and green energy, Waste management, Waste treatment and recycling, Water network and security, Sensor technologies, Intelligent Micro-grids4 KB (561 words) - 23:29, 14 October 2008
- Network-based Robotics2 KB (253 words) - 23:29, 14 October 2008
- * Network-based Control3 KB (397 words) - 23:29, 14 October 2008
- - COMPOSITIONAL DISTRIBUTED SYSTEMS: composition of network protocol6 KB (707 words) - 23:29, 14 October 2008
- |Field=Computer Science, Embedded systems, Embedded Network Sensor Systems, Sensor Systems Sensor network architecture and protocols Sensor network algorithms such as localization, routing, time synchronization, clustering,6 KB (771 words) - 16:09, 16 September 2019
- (e.g., operating system, middleware, network protocols, and7 KB (851 words) - 23:30, 14 October 2008
- interconnected as a network by communication components such as field buses. The individual nodes of such a network usually consist of a5 KB (655 words) - 23:30, 14 October 2008
- * Social network analysis and mining4 KB (511 words) - 23:31, 14 October 2008
- * Middleware support for reunification of network segments and reconciliation of divergent replicas. Consideration of alterna * Group communication and group membership services in failure scenarios with network partitions.8 KB (952 words) - 23:31, 14 October 2008
- Network-based Computing5 KB (702 words) - 23:31, 14 October 2008
- ...om the Alps and the Mediterranean sea with its fast land-based connections network. Lyon is so famous for its architectural treasures, its medical, scientific2 KB (210 words) - 23:31, 14 October 2008
- * Bayes network and hidden markov models * Regulatory network and pathway analysis2 KB (276 words) - 23:31, 14 October 2008
- ...ecture and/or compiler optimizations for embedded processors, DSPs, ASIPs (network processors, multimedia, wireless, etc.)5 KB (580 words) - 10:32, 12 May 2020
- ...ht into a wealth of must-know topics, including virtualization, system and network management and troubleshooting, cloud and edge computing, security, privacy4 KB (577 words) - 09:28, 12 May 2020
- |Title=International Conference on Network and Computing Technologies226 bytes (27 words) - 22:23, 25 February 2020
- *Big Data platforms with applications to network management, security, measurements *Design, analysis, and evaluation of network architectures4 KB (514 words) - 12:03, 6 April 2020
- ...tem analysis and control, HVDC and FACTS, Power market, Power distribution network and automation, Power protection, SCADA, EMS, WAMS and substation automatio4 KB (504 words) - 23:33, 14 October 2008
- ...ompetition and ICT based catalyst effect in a number of domains to produce network enriched communities.4 KB (475 words) - 23:33, 14 October 2008
- ...rence of Institution of Engineering and Technology (IET) Brunei Darussalam Network703 bytes (81 words) - 23:34, 14 October 2008
- ...online social applications. Of particular interest are problems related to network and system architecture design that can best support emerging and future so * Implications of social networking on network and distributed systems design4 KB (493 words) - 23:34, 14 October 2008
- - Ontology (Distributed Processing, Emergent Properties, Formal Ontology, Network Structures, etc)4 KB (616 words) - 23:35, 14 October 2008
- ?Semantic Web ?Semantic Search and Query ?Semantic Link Network ?Semantic Normalization ?Semantic Interoperability ?Semantic Visualization ...lf-Organized Intelligence ?Service-oriented Computing ?Mobile Grid ?Social Network ?Community Discovery3 KB (367 words) - 23:35, 14 October 2008
- | Title = SANS Network Security 2007492 bytes (57 words) - 23:36, 14 October 2008
- * Network resilience4 KB (451 words) - 23:37, 14 October 2008
- * Gene regulation, expression, identification and network3 KB (332 words) - 23:37, 14 October 2008
- * game theoretic aspects of networks and network formation6 KB (682 words) - 10:18, 14 April 2020
- of billions of sensing devices. While a single sensor network typically - Sensor network protocols4 KB (483 words) - 23:37, 14 October 2008
- ...eeing reliable and enduring pathway communications. Automating the sensor network activities is also an urgent and challenging issue especially that commonl Sensor network control5 KB (658 words) - 12:46, 27 December 2015
- �?� Network architectures for sensor networks �?� Modeling and validation of sensor network architectures11 KB (1,533 words) - 23:38, 14 October 2008
- | Title = International Journal of Social Network Mining551 bytes (69 words) - 23:38, 14 October 2008
- ...ield of computer and data communication networks. We invite submissions on network architecture, design, implementation, operations, analysis, measurement, pe * Network applications & services3 KB (380 words) - 19:34, 17 November 2008
- ...obile. The implementation of such a paradigm requires advances in wireless network technologies and devices, development of infrastructures supporting cogniti3 KB (386 words) - 23:39, 14 October 2008
- ...nd security, systems health management, and related areas. Collaborate and network with scientists, engineers, developers and customers, in a balance of forma1 KB (164 words) - 23:39, 14 October 2008
- ...tures and compilers for graphics/gaming, embedded processors, DSPs, ASIPs (network, multimedia, wireless, etc.)3 KB (326 words) - 17:43, 8 November 2008
- F3. Ubiquitous Network Systems4 KB (564 words) - 23:41, 14 October 2008
- ...92) introduced an historical focus by examining the implications of social network analysis for theories of language change. Social Network Analysis and English Sociohistorical Linguistics4 KB (622 words) - 23:41, 14 October 2008
- ...cast network, home network, mobile multimedia QoS, mobile security, ad hoc network ...and operating system, application-specific processors and devices, system/network-on-a-chip2 KB (303 words) - 23:42, 14 October 2008
- ...t security; Security in wireless; Sensor/cellular network security; Ad hoc network security; Security in peer-to-peer networks; Security in wireless multimedi ...s-, and Linux anti-forensics techniques; Open source anti-forensics tools; Network anti-forensics tools13 KB (1,617 words) - 19:03, 24 November 2008
- ...management /locator-location paradigm/; Recovering and fault-tolerance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Cont ...Scalability; User and service mobility; Wireless QoS; Traffic engineering; Network planning; Intermittent services; Virtualization; Self-management and contr7 KB (883 words) - 17:35, 7 January 2021
- ...raw observations that are used in our experiments. Examples might include network measurement or capturing data such as seismic measurements. Middleware is r4 KB (642 words) - 21:17, 9 December 2008
- ** Social Network Analysis2 KB (256 words) - 01:51, 16 December 2008
- |Title=1st International STI Germany PhD-Network Workshop384 bytes (42 words) - 02:31, 9 January 2009
- * How to engineer product lines in a complex organizatinal network of OEMs and suppliers including COTS or open source components?6 KB (892 words) - 11:21, 14 January 2009
- - Co-scheduling of computation, data storage, and network resources - Network support for data-intensive computing6 KB (790 words) - 12:57, 18 January 2009
- * Network Architectures and Routing * Network Optimization5 KB (526 words) - 01:02, 2 February 2009
- | Title = 3rd International Conference on Network and System Security 3rd International Conference on Network and System Security (NSS 2009)12 KB (1,669 words) - 12:58, 18 January 2009
- o Network architecture o Network protocols and security5 KB (567 words) - 12:58, 18 January 2009
- - Social network analysis and entity resolution NE extraction - Social network analysis and entity resolution10 KB (1,242 words) - 12:58, 18 January 2009
- o Game-theoretic aspects of network formation on the Internet9 KB (1,221 words) - 12:58, 18 January 2009
- ...ations, embedded systems, special purpose systems, reconfigurable systems, network systems etc. Please include the following information in the proposal and s2 KB (337 words) - 12:58, 18 January 2009
- * Network security and protocols * Network processors16 KB (2,178 words) - 12:59, 18 January 2009
- System-on-Chip and Network-on-Chip Design & Testing: Design of Application- Specific Instruction-Set P3 KB (337 words) - 12:59, 18 January 2009
- * Neural Network Circuits and Systems * Computer Aided Network Design1 KB (148 words) - 13:00, 18 January 2009
- find out what others are doing. This is an emerging network of people9 KB (1,148 words) - 13:00, 18 January 2009
- ...ular research area not only for data mining and web mining but also social network analysis. or devoting to improve traditional mining techniques for social network analysis.4 KB (580 words) - 13:00, 18 January 2009
- using information and intelligence that is hidden in the network connecting these devices and in6 KB (687 words) - 13:00, 18 January 2009
- ...building federated digital technologies that will enable the formation of network of digital technologies. Data and Network mining4 KB (529 words) - 13:00, 18 January 2009
- - Mining social network data7 KB (1,006 words) - 13:00, 18 January 2009
- * Multimedia network protection, privacy and security.3 KB (303 words) - 17:06, 24 February 2016
- o Network management, QoS management o System architecture and protocol (e.g., MAC, network, transport)14 KB (1,518 words) - 13:01, 18 January 2009
- + Social Network3 KB (410 words) - 13:01, 18 January 2009
- Network measurement and Management3 KB (320 words) - 16:40, 27 December 2015
- ...their research results and address open issues in Wireless Communications, Network Technologies, Services and Application. Network Technologies2 KB (210 words) - 13:01, 18 January 2009
- * Network applications and services * Network architectures and management10 KB (1,206 words) - 13:01, 18 January 2009
- ...pose architectures and accelerators; Architecture of the memory hierarchy; Network and interconnect architectures; Parallel I/O and storage systems; Power-eff ...algorithms; Optimizations of communication and synchronization protocols; Network algorithms, Scheduling and load balancing; Scientific applications; Applica4 KB (490 words) - 17:05, 27 December 2015
- - Computer and Network Architecture 16) Sensor Network and its Applications - SNA 0910 KB (1,321 words) - 13:01, 18 January 2009
- ...practical aspects of health informatics and bioinformatics and a chance to network with others working and researching in this area.4 KB (528 words) - 13:01, 18 January 2009
- |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)6 KB (793 words) - 15:12, 1 October 2020
- Nowadays, computing and network systems, such as peer-to-peer, wireless ad hoc, sensor networks, and genera ...this direction, biology, psychology, economics (e.g., game theory), social network, and many other research fields can provide many helpful hints for autonomo6 KB (767 words) - 13:01, 18 January 2009
- - Network robotics5 KB (661 words) - 13:02, 18 January 2009
- - Innovative applications of social network analysis - Scalable, customizable social network infrastructure construction3 KB (446 words) - 13:02, 18 January 2009
- Network and system models11 KB (1,539 words) - 13:02, 18 January 2009
- - Ad hoc and sensor network security6 KB (852 words) - 13:02, 18 January 2009
- A wireless sensor network (WSN) is an emerging research field with several interesting application do3 KB (450 words) - 13:02, 18 January 2009
- ...rly recognition of emerging risks and/or performance issues can expose the network infrastructure to stability, performance, and security problems. ...le optimizations. Also, it can be the basis for prevention and response in network security, as typically the detection of attacks and intrusions requires the5 KB (431 words) - 13:03, 18 January 2009
- * Semantic Web Mining and Social Network Analysis5 KB (762 words) - 00:44, 15 February 2009
- ...networks necessitate an energy-aware design to ensure the longevity of the network. While most wireless sensor networks use battery-operated computing and sen4 KB (534 words) - 11:03, 1 April 2009
- [[Category:Artificial neural network]]2 KB (290 words) - 22:01, 27 February 2009
- ...ess body area network, wireless sensor network, and wireless personal area network. Body-centric wireless communications find rich applications in personal he5 KB (664 words) - 17:20, 5 July 2020
- ...ergy and brainpower. As a speaker, you will have the unique opportunity to network and share knowledge with hundreds of other IT leaders, executives and busin2 KB (299 words) - 16:33, 27 February 2009
- * Communication and network systemas, Wireless communications, Technologies and applications, Informati Communication and network systemas, Wireless communications, Technologies and applications, Informati8 KB (977 words) - 16:33, 27 February 2009
- ...number of devices connected to the networks has changed the Internet to a "network of things and computers". These trends, plus the rise of collaborative tech * Frameworks and Overarching Issues of Network Governance4 KB (557 words) - 16:33, 27 February 2009
- We're planning several stimulating keynotes and plenty of opportunities to network with colleagues and peers, including a conference reception at the nearby A3 KB (374 words) - 22:19, 27 February 2009
- * Network and Communication Security2 KB (229 words) - 16:33, 27 February 2009
- ...tive cyber security and network experimentation is challenging for today's network testbeds for a number of reasons. Among these are: ...tecture, construction, operation, and use of cyber security experiments in network testbeds and infrastructures. While we are particularly interested in works7 KB (897 words) - 17:05, 27 February 2009
- • Network management • Network performance evaluation5 KB (654 words) - 17:06, 27 February 2009
- - Network calculus5 KB (684 words) - 17:06, 27 February 2009
- Network System Engineering - Network applications and services6 KB (654 words) - 17:06, 27 February 2009
- ...cience, art, and culture to learn new skills, explore innovative ideas and network with new friends as well as expanding our community by bringing knowledge t4 KB (456 words) - 17:06, 27 February 2009
- * network design4 KB (547 words) - 17:06, 27 February 2009
- .... structural graph theory, sequential, parallel, and distributed graph and network algorithms and their complexity, graph grammars and graph rewriting systems3 KB (426 words) - 17:06, 27 February 2009
- · Network routing and communication algorithms Network and pervasive computing8 KB (1,050 words) - 18:04, 5 January 2017
- * Network applications & services * Network architectures4 KB (559 words) - 17:06, 27 February 2009
- * Network support for P2P systems5 KB (623 words) - 17:06, 27 February 2009
- establish contacts between computer network researchers, practitioners * User centric network design3 KB (456 words) - 17:06, 27 February 2009
- | Title = The 8th International Conference on Cryptology and Network Security CRYPTOLOGY AND NETWORK SECURITY (CANS 2009)8 KB (967 words) - 17:07, 27 February 2009
- Data streams occur in a variety of modern applications, such as network monitoring, traffic engineering, sensor networks, RFID tags applications, t5 KB (644 words) - 22:00, 27 February 2009
- communicate through a Wireless Network. The building of software6 KB (861 words) - 17:07, 27 February 2009
- * Network security.4 KB (506 words) - 17:07, 27 February 2009
- | Title = Workshop on Trust, Risk and Security Assessments for Network Dependability in Digital Ecosystems (TRSDE) Workshop on Trust, Risk and Security Assessments for Network Dependability in Digital Ecosystems (TRSDE) to be held in conjunction with4 KB (600 words) - 17:07, 27 February 2009
- ...ompetition and ICT based catalyst effect in a number of domains to produce network enriched communities. For further information please visit http://dest2009.7 KB (941 words) - 17:07, 27 February 2009
- ...ks. Features including the extremely large number of sensor devices in the network, the severe power, computing and memory limitations, their dense, random de6 KB (750 words) - 16:50, 27 December 2015
- ...ng research objective. The interoperability of applications, transport and network protocols, as well as, the demand for improved Quality of Service (QoS) and ...r challenge is the ever growing complexity of communication management and network maintenance. Hence, solutions are required in which services, management an11 KB (1,463 words) - 17:07, 27 February 2009
- • Network Dimensioning • Network Performance3 KB (319 words) - 17:07, 27 February 2009
- European Chemistry Thematic Network2 KB (283 words) - 15:21, 25 February 2021
- ...l Applications, Practice, Extensions, XML, Open Source, Model Development, Network Modeling, Distributed Simulation and Industry, Modeling Very Large Scale Sy ...ng on line, Computational resources are becoming cheaper, while ubiquitous network access has started to appear.38 KB (4,832 words) - 17:07, 27 February 2009
- | Title = Second IEEE International Workshop on Wireless Network Coding Second IEEE International Workshop on Wireless Network Coding (WiNC 2009)3 KB (296 words) - 17:08, 27 February 2009
- ...rticular, how to allocate resources to individual nodes and sources when a network involves multiple nodes and sources of multimedia. * Content/Network-aware cross-layer design and optimization4 KB (505 words) - 17:08, 27 February 2009
- | Title = The 12th International Conference on Network-Based Information Systems The 12th International Conference on Network-Based Information Systems11 KB (1,440 words) - 17:08, 27 February 2009
- - employee privacy and network administration - analysis of network and security protocols12 KB (1,690 words) - 17:08, 27 February 2009
- With the need for evolution, if not revolution, of current network architectures and the Internet, autonomous and spontaneous management will * Security of Next Generation Network3 KB (480 words) - 17:08, 27 February 2009
- - network security6 KB (828 words) - 17:08, 27 February 2009
- * Web. Community mining, social network analysis, structured retrieval from XML documents3 KB (400 words) - 21:02, 27 February 2009
- * Measurement-based network management such as traffic engineering * Network applications such as multimedia streaming, gaming and on-line social networ6 KB (774 words) - 17:08, 27 February 2009
- network analysis and data mining tools for adaptation are not5 KB (644 words) - 15:16, 16 December 2020
- * Social network analysis4 KB (571 words) - 12:58, 9 March 2020
- Original papers are invited in the area of computer and network security. Topics of interest include but are not limited to the following: Wireless Network Architecture and Technologies Systems5 KB (578 words) - 10:21, 20 November 2020
- * Network Simulation ([[NS3]])627 bytes (80 words) - 20:13, 23 July 2009
- * Network management and planning * Network topology1 KB (148 words) - 10:22, 29 May 2016
- |Name=Network Simulator 3 (NS3) |Type=Network Simulation921 bytes (118 words) - 18:27, 14 May 2009
- - Network systems, proxies and servers3 KB (440 words) - 15:25, 9 December 2009
- |Title=5th European Conference on Computer Network Defence The 5th European Conference on Computer Network Defence4 KB (530 words) - 15:02, 27 December 2015
- - Network security issues and protocols in WMC - Network forensics and fraud detection for WMS3 KB (477 words) - 16:54, 8 August 2009
- |Field=Network Virtual Environment -Network support for P2P systems5 KB (738 words) - 16:48, 10 August 2009
- ...ommon sense if you only have a few people accessing this database but your network traffic is high, something is up.2 KB (358 words) - 23:16, 25 June 2012
- * Network architectures and protocols * Network security and intrusion detection5 KB (630 words) - 11:13, 1 November 2009
- * Coordination and deployment of multi-robots system or wireless sensors network on site,6 KB (783 words) - 17:04, 27 December 2015
- - network coding3 KB (384 words) - 11:32, 2 August 2009
- | Title = International journal of Network Security & Its Applications (IJNSA) International journal of Network Security & Its Applications (IJNSA)3 KB (339 words) - 11:32, 2 August 2009
- ...their research results and address open issues in Wireless Communications, Network Technologies, Services and Application. Network Technologies2 KB (230 words) - 11:32, 2 August 2009
- 8. Soft Computing Technology, Network Technology and Communication Technology in Motion Control2 KB (289 words) - 11:33, 2 August 2009
- * Network-based applications * Network Security7 KB (1,054 words) - 16:43, 27 December 2015
- * Social Network Analysis4 KB (553 words) - 11:33, 2 August 2009
- ...it does exclude those who wish to be part of OSPG yet don't use the social network of Facebook. I think this current format is more professional, although ha598 bytes (100 words) - 12:32, 8 October 2012
- * Wireless Body Sensor Network3 KB (328 words) - 11:33, 2 August 2009
- IT and network security Computer network planning and design2 KB (258 words) - 11:33, 2 August 2009
- ...ations ,Speech Processing,Image & video Signal Processing,Computer‐Aided Network Design ,Intelligent Robot,Intelligent Circuits and Systems,Industry Applica ...cfp?eventid=6209&copyownerid=5186 WikiCFP][[Category:Artificial neural network]]2 KB (269 words) - 15:56, 15 February 2017
- ...have a weirless Internet access point nearby, you just need configure the network to your console. If you do not, then buy a Nintendo WI-fi USB adapter and240 bytes (43 words) - 09:30, 28 June 2012
- international researchers and practitioners working in all areas of neural network based pattern recognition to present and discuss the latest research,4 KB (473 words) - 11:34, 2 August 2009
- - Social network analysis and mining4 KB (525 words) - 11:34, 2 August 2009
- Network management & operation Photonic network9 KB (1,233 words) - 11:34, 2 August 2009
- Network systems, proxies and servers4 KB (564 words) - 12:01, 6 November 2020
- | Title = 2009 IEEE International Symposium on Network Evolution and Routing Innovation ...itive Radio Networks, DTN (Delay-and-disruption Tolerant Network), Optical Network, P2P and WEB Searching, Social Networks, etc. The topics include but are no2 KB (245 words) - 11:34, 2 August 2009
- Original papers are invited in the area of computer and network security. Topics of interest include but are not limited to the following: Wireless Network Architecture and Technologies Systems5 KB (599 words) - 10:21, 20 November 2020
- * Self-aware and self- adaptive network design and evaluation * Network self-healing, security and self-defence4 KB (479 words) - 11:35, 2 August 2009
- to refer specifically to network performance and reliability components at different levels of granularity (e.g. network, server,8 KB (1,033 words) - 11:35, 2 August 2009
- ...t security; Security in wireless; Sensor/cellular network security; Ad hoc network security; Security in peer-to-peer networks; Security in wireless multimedi ...tection and digital rights management for SHS; Intelligent devices, sensor network/RFID for SHS; Intrusion detection and computer forensics for SHS; SHS and H6 KB (746 words) - 11:35, 2 August 2009
- ...so on. Novel mechanisms and designs are required which integrate QoI with network and computational QoS that take into account the aforementioned challenges - Network services (time sync, QoS) for target/event detection, localization, trackin5 KB (734 words) - 11:35, 2 August 2009
- • Network Planning and Design • Network Measurement and Testing3 KB (417 words) - 10:54, 1 November 2009
- ...ess ad hoc and sensor networks raise many challenging issues, e.g., mobile network self-organisation, limited resource intelligent allocation, cross-layer opt ...ss layer optimised sensor node sleeping scheduling scheme to guarantee the network connectivity for packet delivery7 KB (950 words) - 11:35, 2 August 2009
- ...o enable seamless, smooth, and reliable multimedia streaming over wireless network.5 KB (674 words) - 11:35, 2 August 2009
- ...pers, IPSN is very interested in showcasing demonstrations of novel sensor network technology, applications, and hardware as well as posters showing exiting e ...Sensor Networks (IPSN) is a leading, single-track, annual forum on sensor network research. IPSN brings together researchers from academia, industry, and gov8 KB (1,119 words) - 09:57, 27 February 2020
- GAMES is an European Network pursuing research and3 KB (443 words) - 14:53, 27 December 2015
- ? Network design and planning ? Wireless & Mobile network Security5 KB (571 words) - 11:35, 2 August 2009
- ...ding bioinformatics, computational biology, data mining, graph algorithms, network analysis, ontology and high-performance computing, and provide a forum for * Analysis of network topologies (e.g., centrality and network motif analysis)4 KB (584 words) - 11:36, 2 August 2009
- Global Production Network4 KB (462 words) - 11:36, 2 August 2009
- ...ices into every day’s life processes. This leads to a highly distributed network of devices communicating with human beings as well as other devices. With t9 KB (1,206 words) - 11:40, 2 August 2009
- Graph and Network Visualization7 KB (882 words) - 11:36, 2 August 2009
- • Network on Chip5 KB (605 words) - 15:11, 27 December 2015
- ...neural network, support vector machines, programming model, graph theory, network analysis, agent system, differential equation, difference equation, hierarc2 KB (203 words) - 11:36, 2 August 2009
- Wireless sensor network architectures Energy-aware network protocols and power management3 KB (339 words) - 11:36, 2 August 2009
- - Neural Network Theory and Architectures3 KB (404 words) - 11:36, 2 August 2009
- ...st models and business impact; Cultural and legal aspects; Future advanced network development and evolution; Standards and guidelines; Lawful interception an ..., filtering and blocking software; Monitoring Internet traffic to optimize network bandwidth; Remote monitoring14 KB (1,651 words) - 15:56, 15 February 2017
- Network and Organizational Vulnerability Analysis, Network Security,3 KB (352 words) - 12:39, 11 August 2009
- * Advanced Applications of Neural Network * Network Implementation Choices5 KB (552 words) - 17:06, 12 August 2009
- * Network robotics4 KB (475 words) - 13:42, 26 February 2010
- |Title=17th Annual Network and Distributed System Security Symposium ...ces. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and i6 KB (766 words) - 10:54, 26 April 2010
- ...cial Media Search (e.g., link analysis, query logs, social tagging, social network analysis, advertising and search, blog search, forum search, CQA, adversari3 KB (449 words) - 00:45, 11 December 2009
- - Wireless Network Architecture and Technologies Systems - Wireless Network Algorithms, Protocols, Performance Evaluation5 KB (667 words) - 14:27, 13 September 2009
- Hyper Network Communication8 KB (1,033 words) - 07:05, 24 September 2009
- This congress series was initiated by the European Network of Excellence Metamorphose and is organized by the Virtual Institute for Ar4 KB (405 words) - 16:50, 1 October 2009
- * Network security issues, protocols, data security in Ubi-com * Mobile, Ad Hoc and Sensor Network Security5 KB (607 words) - 18:01, 3 December 2009
- * Network and Wireless Security * Network Enabled Operations4 KB (484 words) - 14:20, 14 December 2009
- Self-Organizing Networks and Advances in Network Theory6 KB (758 words) - 18:02, 6 January 2010
- - Network security issues and protocols in WMC - Network forensics and fraud detection for WMS3 KB (497 words) - 03:43, 28 February 2010
- ...tional Intelligence, Artificial Intelligence, Networking, Neural networks, Network security, Biometrics Technologies and Applications, Pattern Recognition and Fuzzy and neural network systems3 KB (382 words) - 18:27, 20 January 2010
- * Network security and protocols10 KB (1,270 words) - 17:12, 20 April 2010
- |Title=The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems3 KB (338 words) - 16:53, 27 December 2015
- ...s on all subjects relevant to electronics, computer science, communication network and information systems. The journal is the leading refereed quarterly devo ...earch papers in all fields of electronics, computer science, communication network and information system. It aims to provide an international forum for the e2 KB (230 words) - 13:09, 2 February 2010
- * › Mobile Network Protocols and Packet Services * › Adaptive Wireless Network Protocols4 KB (379 words) - 15:35, 5 February 2010
- * › Network Security and Protocols Area 2: Network Security and Protocols4 KB (409 words) - 15:40, 5 February 2010
- › Optical Network Test Beds2 KB (259 words) - 15:42, 5 February 2010
- › Network Architectures › Network Protocols2 KB (230 words) - 17:25, 22 January 2021
- • Security-related social network analysis (radicalization, recruitment, conducting operations)<br>4 KB (429 words) - 08:55, 1 August 2019
- *Security-related social network analysis (radicalization, fund-raising, recruitment, conducting operations)9 KB (1,092 words) - 09:35, 1 August 2019
- |Title=Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments - Network security issues and protocols in UCS3 KB (498 words) - 02:52, 22 December 2012
- - Simulation issues of large-scale VCS and integration of traffic-network simulators5 KB (624 words) - 21:14, 4 March 2010
- ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc4 KB (405 words) - 20:45, 3 November 2010
- * Middleware and network support3 KB (361 words) - 10:37, 26 March 2010
- - Social Network & eCommunities4 KB (601 words) - 00:22, 28 March 2010
- * Network Security2 KB (217 words) - 16:50, 19 November 2020
- * Network forensics2 KB (215 words) - 06:52, 13 April 2010
- * Network and systems security4 KB (490 words) - 14:42, 6 November 2020
- - Network-based Applications (VoIP, streaming) - Network Management and Traffic Engineering5 KB (667 words) - 12:08, 19 May 2010
- › Sensor/Sensor Network Ontology Engineering5 KB (639 words) - 16:17, 20 May 2010
- * › Network systems, proxies and servers5 KB (627 words) - 12:33, 16 June 2010
- |Title=International Conference on Network and Service Management (amalgamation of DSOM and related workshops from 201173 bytes (23 words) - 00:47, 18 March 2020
- |Title=IEEE Intell Network Workshop86 bytes (13 words) - 00:49, 18 March 2020
- |Field=Network Virtual Environment - Network support for P2P systems6 KB (858 words) - 09:18, 19 August 2010
- |Title=The Third International Workshop on Systems and Network Telemetry and Analytics (SNTA2020) |Field=systems and network telemetry, Machine learning, data science, High-performance computing, Dist4 KB (584 words) - 17:42, 13 March 2020
- |Title=International Conference on Network Protocols204 bytes (25 words) - 22:28, 25 February 2020
- |Title=International Symposium on Integrated Network Management220 bytes (25 words) - 22:40, 25 February 2020
- |Title=Network and OS Support for Digital A/V101 bytes (17 words) - 21:48, 26 February 2020
- |Title=IEEE Conference on Open Architecture and Network Programming124 bytes (17 words) - 22:31, 26 February 2020
- |Title=Network Storage Symposium89 bytes (12 words) - 22:38, 26 February 2020
- |Title=IEEE International Symposium on Network Computing and Applications125 bytes (17 words) - 22:44, 26 February 2020
- |Title=Usenix Network and Distributed System Security Symposium147 bytes (20 words) - 00:56, 28 February 2020
- *Network and system architectures and protocols3 KB (412 words) - 09:52, 27 February 2020
- |Title=Usenix Network and Distributed System Security Symposium684 bytes (84 words) - 11:33, 10 March 2020
- * › Advanced Applications of Neural Network * › Network Implementation Choices19 KB (2,462 words) - 19:10, 26 August 2010
- * Foundations of Privacy, Trust and Reputation in Network * Network Models for Distributed Computing4 KB (602 words) - 06:44, 26 August 2020
- |Title=IEEE International Symposium on Network Computing and Applications282 bytes (33 words) - 16:47, 27 February 2020
- * Network security * Network infrastructure security3 KB (343 words) - 16:31, 6 May 2020
- |Title=Network and OS Support for Digital A/V202 bytes (26 words) - 16:55, 27 February 2020
- NEURAL NETWORK MODELS * Neural network approaches to optimization5 KB (574 words) - 15:58, 6 March 2020
- * System-on-chip and network-on-chip architectures3 KB (344 words) - 11:30, 21 April 2020
- |Title=WORKSHOP ON MULTIHOP WIRELESS NETWORK TESTBEDS AND EXPERIMENTS4 KB (518 words) - 20:52, 10 September 2010
- • Network algorithms • Network architectures4 KB (579 words) - 15:24, 13 October 2010
- ...ature. We welcome interested professionals to contribute into IJE research network by joining as an author of a peer-reviewed journal. Journal use an online,3 KB (322 words) - 16:47, 5 July 2020
- • Materials for electro-photography • Network architecture for real-time video transport • New visual services over ATM/packet network • Non-impact printing technologies3 KB (395 words) - 16:47, 5 July 2020
- • Network and Internet security • Network forensics • Network security performance evaluation • Non-repudiation5 KB (609 words) - 17:01, 5 July 2020
- ...s a publication vehicle for complete coverage of all topics of interest to network professionals and brings to its readers the latest and most important findi • Network Architectures and Protocols • Network Coding3 KB (318 words) - 16:46, 5 July 2020
- ...practical aspects of health informatics and bioinformatics and a chance to network with others working and researching in this or related areas.5 KB (693 words) - 10:44, 14 November 2010
- |Field=Artificial Intelligence and Applications, Computer Science & Systems,Network Systems and Applications, Information Systems and Technology,Software and S *Network Systems and Applications4 KB (550 words) - 12:11, 13 September 2019
- ...rages showcasing the scholarly record, research discovery, expert finding, network analysis, and assessment of research impact. VIVO is a network in which more than 140 institutions and agencies in more than 25 countries3 KB (325 words) - 11:09, 3 December 2020
- * Scale-free network structure of Cyber Physical Systems * System-on-Chip and Network-on-Chip Design12 KB (1,378 words) - 21:13, 28 November 2010
- Security in network, systems, and applications<br> Security in network, systems, and applications<br>4 KB (554 words) - 12:34, 14 October 2020
- Security in network, systems, and applications<br> Security in network, systems, and applications<br>4 KB (556 words) - 12:33, 14 October 2020