Search results

Jump to: navigation, search

Page title matches

Page text matches

  • |Title=Network Storage Symposium
    199 bytes (22 words) - 17:21, 27 February 2020
  • We invite practitioners and researchers to network and share their experiences. Teachers, and heads of learning areas as well
    2 KB (265 words) - 16:59, 6 November 2019
  • * P. Mika, Yahoo! Inc., Barcelona, Spain, (Social Network)
    6 KB (887 words) - 18:02, 10 November 2011
  • network". In all these approaches, however, the problem seems to be well defined a the answer of "what is a network" has been relaxed by the inclusion of users and
    6 KB (790 words) - 23:08, 13 August 2008
  • ...tic Web. The xOperator concept is based on the idea of creating an overlay network of collaborative information agents on top of social IM networks. It can be
    1 KB (159 words) - 03:54, 16 August 2008
  • ...mation of the various fields of science available {{SITENAME}} relies on a network of volunteer editors and associate editors. The tasks of an editor are to m
    6 KB (714 words) - 12:19, 11 December 2020
  • | title = netWorker: the craft of network computing
    255 bytes (30 words) - 16:33, 18 August 2008
  • |Title=7th International Conference on Network and Computing Technologies 7th International Conference on Network and Computing Technologies (ICNCT 2019), will be held in Nagoya Institute
    5 KB (571 words) - 09:22, 19 July 2019
  • |Title=1st International Conference on Applied Cryptography and Network Security
    522 bytes (65 words) - 13:51, 6 November 2020
  • |Title=2nd International Conference on Applied Cryptography and Network Security
    535 bytes (66 words) - 14:23, 6 November 2020
  • |Title=3rd International Conference on Applied Cryptography and Network Security
    482 bytes (60 words) - 13:55, 6 November 2020
  • |Title=4th International Conference on Applied Cryptography and Network Security
    470 bytes (56 words) - 13:57, 6 November 2020
  • |Title=5th International Conference on Applied Cryptography and Network Security
    474 bytes (60 words) - 13:58, 6 November 2020
  • |Title=International Conference on Applied Cryptography and Network Security
    322 bytes (46 words) - 08:58, 13 February 2021
  • | Title= International Conference on Network Protocols 1996
    315 bytes (29 words) - 19:59, 21 August 2008
  • | Title= International Conference on Network Protocols 1997
    315 bytes (29 words) - 19:59, 21 August 2008
  • | Title= International Conference on Network Protocols 1998
    362 bytes (38 words) - 19:59, 21 August 2008
  • | Title= International Conference on Network Protocols 1999
    344 bytes (34 words) - 19:59, 21 August 2008
  • | Title= International Conference on Network Protocols 2000
    354 bytes (36 words) - 19:59, 21 August 2008
  • | Title= International Conference on Network Protocols 2001
    342 bytes (34 words) - 19:59, 21 August 2008
  • | Title= International Conference on Network Protocols 2002
    338 bytes (32 words) - 09:51, 29 May 2016
  • | Title= International Conference on Network Protocols 2003
    341 bytes (32 words) - 19:59, 21 August 2008
  • | Title= International Conference on Network Protocols 2004
    340 bytes (32 words) - 19:59, 21 August 2008
  • | Title= International Conference on Network Protocols 2005
    341 bytes (32 words) - 19:59, 21 August 2008
  • | Title= International Conference on Network Protocols 2006
    338 bytes (32 words) - 19:59, 21 August 2008
  • | Title= International Conference on Network Protocols 2008
    338 bytes (32 words) - 19:59, 21 August 2008
  • | Title= International Symposium on Integrated Network Management 1989
    324 bytes (30 words) - 20:09, 21 August 2008
  • | Title= International Symposium on Integrated Network Management 1991
    325 bytes (30 words) - 20:09, 21 August 2008
  • | Title= International Symposium on Integrated Network Management 1993
    328 bytes (30 words) - 20:09, 21 August 2008
  • | Title= International Symposium on Integrated Network Management 1997
    325 bytes (30 words) - 20:09, 21 August 2008
  • | Title= International Symposium on Integrated Network Management 1999
    328 bytes (30 words) - 20:09, 21 August 2008
  • | Title= International Symposium on Integrated Network Management 2001
    356 bytes (35 words) - 20:09, 21 August 2008
  • | Title= International Symposium on Integrated Network Management 2003
    356 bytes (35 words) - 20:09, 21 August 2008
  • | Title= International Symposium on Integrated Network Management 2005
    348 bytes (33 words) - 20:09, 21 August 2008
  • | Title= International Symposium on Integrated Network Management 2007
    348 bytes (33 words) - 10:07, 29 May 2016
  • | Title = International Conference on Network Protocols
    123 bytes (13 words) - 00:22, 22 August 2008
  • | Title = International Symposium on Integrated Network Management
    132 bytes (14 words) - 00:33, 22 August 2008
  • EvoBIO started in 2002 as workshop organized by the EvoNet (European Network of Excellence in Evolutionary
    4 KB (493 words) - 18:48, 4 September 2008
  • * Wireless Network and architecture designs
    5 KB (645 words) - 18:19, 15 September 2008
  • * Operating system and network support for mobile devices
    5 KB (611 words) - 15:43, 16 September 2008
  • ...t number of services, guarantee their QoS, and optimize the utilization of network resources. ...ocus on new models and methods as well as mechanisms, which can enable the network to perform adaptive
    13 KB (1,706 words) - 16:34, 27 December 2015
  • ...cations for a unique user or multiple users requires special platforms and network capabilities.
    18 KB (2,408 words) - 02:37, 16 December 2008
  • * [11] Social network analysis; communities identification; expertise and authority discovery; co
    9 KB (1,282 words) - 18:28, 13 October 2008
  • ...g as the city's main sources of income. Milan's position at the heart of a network of canals, which provided the irrigation for the Lombard plains and the imp
    7 KB (959 words) - 14:51, 27 December 2015
  • ...s to react to the changes in locations, context, contents and variation in network bandwidth while accessing Web contents. * Creation and consumption of social network contents
    5 KB (746 words) - 18:19, 13 October 2008
  • * High-speed Communication and Network * Wireless Communication and Network
    34 KB (4,565 words) - 22:20, 10 January 2018
  • * High-speed Communication and Network * Wireless Communication and Network
    8 KB (1,037 words) - 22:20, 10 January 2018
  • * High-speed Communication and Network * Wireless Communication and Network
    9 KB (1,189 words) - 22:20, 10 January 2018
  • * High-speed Communication and Network * Wireless Communication and Network
    26 KB (3,456 words) - 22:20, 10 January 2018
  • |Field=Network and Computing |Title=4th International Conference on Network and Computing Technology
    270 bytes (35 words) - 18:50, 10 January 2018
  • * Network-based Computing Systems * Network-based Computer Graphics System
    10 KB (1,263 words) - 22:20, 10 January 2018
  • |Field=Network and Computing |Title=1st International Conference on Network and Computing Technology
    273 bytes (35 words) - 18:50, 10 January 2018
  • * Network-based Computing Systems * Network-based Computer Graphics System
    12 KB (1,537 words) - 22:19, 10 January 2018
  • |Field=Network and Computing |Title=2nd International Conference on Network and Computing Technology
    271 bytes (35 words) - 18:50, 10 January 2018
  • * Network-based Computer Graphics System * Network-based Computing Systems
    8 KB (1,040 words) - 22:20, 10 January 2018
  • - Network management and troubleshooting
    4 KB (495 words) - 09:22, 22 August 2023
  • S-CUBE - the First Conference on wireless Sensor network (WSN) Systems and Software - provides an ideal venue to address the researc ...e potential to radically simplify software development for wireless sensor network based applications. The aim of these new architectures is to support flexib
    4 KB (519 words) - 16:13, 14 October 2008
  • * Renew friendships and network with industry gurus
    2 KB (251 words) - 17:47, 14 October 2008
  • understanding of complex network dynamics and leads to better design of * Distributed network resource allocation
    6 KB (722 words) - 17:32, 14 October 2008
  • ...es, digital and video libraries, compression and coding, security over the network. ...heritage, OCR and document analysis, mobile robots and visual navigation, network security, remote sensing and environment control, video surveillance and in
    2 KB (268 words) - 17:47, 14 October 2008
  • o Applications of network coding in cross-layer design
    3 KB (424 words) - 17:47, 14 October 2008
  • Wireless mobile ad hoc and sensor network nodes have limited battery without degrading the performance of the network. Nonetheless, nowadays,
    3 KB (391 words) - 10:43, 5 November 2020
  • number of options regarding network and service providers, as well * Long distance and low power wireless network deployments
    6 KB (899 words) - 09:22, 28 June 2012
  • Network estimation and processing techniques • Wireless network security and privacy
    6 KB (731 words) - 10:33, 14 August 2023
  • * Wireless network architecture and technologies systems
    3 KB (456 words) - 18:10, 14 October 2008
  • ...ity, the current series of events starting with INTERNET 2009 is targeting network calculi and supporting mechanisms for these challenging issues. ...ents using microeconomics, topological routing vs. table-based routing vs. network coding, power-efficient routing
    11 KB (1,385 words) - 17:48, 14 October 2008
  • ...ative and discriminative statistical models, relational models, and social network models place, discourse understanding, social network analysis, and others,
    2 KB (204 words) - 12:45, 27 December 2015
  • .Network Protocol and Security
    3 KB (375 words) - 17:48, 14 October 2008
  • Network protocols, routing, algorithms ===Network protocols, routing, algorithms===
    19 KB (2,503 words) - 13:25, 28 October 2020
  • * In-network processing and aggregation * Network and QoS management for vehicular networks
    3 KB (378 words) - 14:22, 24 August 2016
  • ...lligence, Data Science, Human-Centric Computing, Knowledge Management, and Network Science. It is committed to addressing research that both deepen the unders
    1 KB (168 words) - 09:31, 26 February 2020
  • ...Power Generation and Supply (SUPERGEN), which is organized by the UK-China Network of Clean Energy Research. The conference will be jointly hosted by the Univ (PI of the UK-China Network of Clean Energy Research, Queen’s University of Belfast, UK)
    2 KB (227 words) - 20:05, 14 October 2008
  • - Peer-to-Peer and overlay network support in SPSs
    3 KB (490 words) - 20:05, 14 October 2008
  • rent out network presence, computation power, and data storage space
    7 KB (907 words) - 21:51, 14 October 2008
  • • MAC, Network, Transport, Application Protocols and Cross-Layer Design • Network Coding, MIMO, Cooperative Communications and Other Novel Techniques
    2 KB (244 words) - 20:05, 14 October 2008
  • * Analysis and design of network architectures and algorithms * Experimental results from operational networks or network applications
    3 KB (353 words) - 20:31, 14 October 2008
  • * › Mobile Network Protocols and Packet Services * › Adaptive Wireless Network Protocols
    9 KB (1,219 words) - 20:05, 14 October 2008
  • ...accessing and processing information in machine-understandable form. This network of knowledge systems will ultimately lead to truly intelligent systems, whi
    15 KB (2,170 words) - 11:39, 28 May 2016
  • * Network Analysis
    2 KB (216 words) - 20:05, 14 October 2008
  • • Mobile Network Architecture • Network and Operating System Support for Multimedia
    5 KB (530 words) - 10:27, 24 June 2011
  • Computer and Network Security
    3 KB (332 words) - 20:06, 14 October 2008
  • ...arch, future developments, including state-of-the-art applications, and to network with the professionals from academia, industry, and government who are inte
    3 KB (449 words) - 20:06, 14 October 2008
  • ...-inspired computing, CNT, SET, RTD, QCA, VLSI aspects of sensor and sensor network, and CAD tools for emerging technology devices and circuits.
    4 KB (459 words) - 21:03, 14 October 2008
  • o Network and Internet Support for Distributed Applications
    2 KB (303 words) - 20:06, 14 October 2008
  • ...nd or to gain important insights into key design trade-offs in computer or network systems.
    3 KB (361 words) - 21:16, 14 October 2008
  • * Network Architecture and Design
    4 KB (505 words) - 22:15, 14 October 2008
  • | Title = Sixth International Conference on Wireless On-demand Network Systems and Services On-demand Network Systems and Services
    6 KB (686 words) - 20:06, 14 October 2008
  • * Workflow technology and workflow management for collaborative network management
    6 KB (674 words) - 22:45, 14 October 2008
  • The development of information network systems enables us to communicate
    6 KB (777 words) - 22:53, 14 October 2008
  • Advanced Applications of Neural Network Network Implementation Choices
    9 KB (1,240 words) - 22:56, 14 October 2008
  • ...ources is organised under the joint auspices of the Asian Languae Resource Network (ALRN) project funded by Japanese Ministry of Education, Culture, Science,
    4 KB (524 words) - 23:02, 14 October 2008
  • ...cfp?eventid=3675&copyownerid=1513 WikiCFP][[Category:Artificial neural network]]
    2 KB (314 words) - 23:03, 14 October 2008
  • -Intelligent Sensor Network and Systems
    2 KB (231 words) - 23:03, 14 October 2008
  • [[Category:Artificial neural network]]
    1 KB (143 words) - 22:26, 4 February 2009
  • ...ll under the following areas are encouraged: networked game architectures, network protocol design for games, latency issues, lag compensation, and synchroniz
    9 KB (1,275 words) - 14:46, 27 December 2015
  • [[Category:Artificial neural network]]
    2 KB (199 words) - 18:55, 7 March 2020
  • ...ntists, engineers, and educators to present the state of the art of neural network research and applications in related fields. The symposium will feature ple [[Category:Artificial neural network]]
    3 KB (392 words) - 23:07, 14 October 2008
  • [[Category:Artificial neural network]]
    4 KB (469 words) - 23:05, 14 October 2008
  • T-6 Computer-Aided Network Design
    1 KB (132 words) - 23:04, 14 October 2008
  • ...howcfp?eventid=2389&copyownerid=2 WikiCFP][[Category:Artificial neural network]]
    592 bytes (65 words) - 23:04, 14 October 2008
  • * Social Network Analysis
    5 KB (696 words) - 18:29, 8 November 2008
  • ...nning, knowledge discovery and data mining, intelligent agents, and social network intelligence) and advanced Information Technology (IT) (e.g., wireless netw
    7 KB (971 words) - 23:04, 14 October 2008
  • ** Context, user, network and semantics-aware media engineering ** Network analysis and social structures detection in Web 2.0
    4 KB (490 words) - 16:48, 15 October 2008
  • - Social network analysis
    6 KB (827 words) - 23:04, 14 October 2008
  • * Network protocols and middleware for embedded systems
    2 KB (316 words) - 23:05, 14 October 2008
  • ...mputational Intelligence Society, co-sponsored by the International Neural Network Society, Evolutionary Programming Society and the Institution of Engineerin
    2 KB (304 words) - 17:44, 6 May 2021
  • * Cryptography and Network Security
    2 KB (167 words) - 23:05, 14 October 2008
  • ...international researchers and practitioners working in all areas of neural network based pattern recognition to present and discuss the latest researches, res
    4 KB (572 words) - 23:05, 14 October 2008
  • (Computability in Europe), a European network of mathematicians,
    5 KB (619 words) - 18:06, 10 February 2021
  • Network robotics
    5 KB (634 words) - 23:05, 14 October 2008
  • | Title = 2nd Bio-Inspired Models of Network, Information and Computing Systems
    637 bytes (69 words) - 23:05, 14 October 2008
  • * Olivier Bodenreider (National Network of Libraries of Medicine, USA)
    6 KB (749 words) - 23:06, 14 October 2008
  • - Social Network Analysis
    4 KB (608 words) - 17:00, 27 December 2015
  • ..."Leveraging Complex Prior Knowledge for Learning" of the PASCAL-2 European Network of Excellence starting in March 2008.
    5 KB (758 words) - 23:07, 14 October 2008
  • ...ritization, summarization, topic tracking, sorting, leak detection, social network analysis, and enhanced intelligent interfaces. The Workshop on Enhanced Mes * Social Networks: relationship modeling, network analysis, group and role discovery, online communities,
    5 KB (668 words) - 17:01, 24 February 2016
  • - Web. Community mining, social network analysis, structured retrieval
    4 KB (468 words) - 23:07, 14 October 2008
  • * Semantic Web Mining and Semantic Network Analysis
    7 KB (920 words) - 23:07, 14 October 2008
  • grams, services and, even, network behavior. This connection be-
    4 KB (570 words) - 11:08, 26 July 2016
  • bioinformatics; Network computing; Neural computing;
    5 KB (698 words) - 23:08, 14 October 2008
  • This track is dedicated to communication and network technologies that are of specific relevance to developing countries. The tr * Innovations in femtocells, picocells and relay network technologies
    9 KB (1,127 words) - 17:19, 26 April 2011
  • * Data Portability and Social Network Portability * Christoph G�rn, #B4mad.Net Network, Germany
    5 KB (709 words) - 23:08, 14 October 2008
  • * Telecommunications, network and systems management
    5 KB (634 words) - 15:36, 14 December 2008
  • - Mobile, Ad Hoc and Sensor Network Security
    4 KB (595 words) - 23:09, 14 October 2008
  • * sensor network databases
    7 KB (875 words) - 23:09, 14 October 2008
  • ...stems and networks designed using database principles (and vice versa), to network monitoring systems that depend on advanced data management and analysis cap * Network algorithms and theory applied to database systems
    3 KB (332 words) - 23:10, 14 October 2008
  • ...systems. However, such systems constrained resources in terms of autonomy, network bandwidth or storage capacity, mobile devices (mobile phones, PDA�?�) h
    2 KB (324 words) - 16:49, 16 December 2020
  • ...he Natural Sciences and Engineering Research Council of Canada. The LORNET Network is hosting its 4th annual e-learning conference on Intelligent Interactive
    4 KB (503 words) - 23:11, 14 October 2008
  • ENCOT: Emerging Network Communications and Technologies COMAN: Network Control and Management
    3 KB (313 words) - 23:11, 14 October 2008
  • and network management
    5 KB (549 words) - 17:15, 5 July 2020
  • Wireless Sensor/Actuator Network, Sensor Web, Sensor Network, Sensor Design, Cyber-Physical System, Smart Space, Pervasive Computing.
    4 KB (600 words) - 16:30, 5 July 2020
  • ...special issue is to explore the development of vehicular ad hoc and sensor network technologies about communication, networking, and applications. Network management
    3 KB (364 words) - 23:11, 14 October 2008
  • * Network Measurements * Network Optimization and Resource Provisioning
    2 KB (212 words) - 23:11, 14 October 2008
  • * Network Data Mining * Network Management
    3 KB (339 words) - 23:11, 14 October 2008
  • ...ocols, web architectures and protocols, network measurements and testbeds, network management systems, content distribution, peer to peer and overlay networks ...e, multilayer design and optimisation, MPLS and GMPLS, RFID, multicasting, network modelling and simulation, real-time voice/video over IP networks, resource
    7 KB (981 words) - 03:18, 6 January 2009
  • 1. NGN(Next Generation Network), NGI(Next Generation Internet) and Future Internet Technologies 5. RFID/USN(Ubiquitous Sensor Network) Technologies
    2 KB (200 words) - 23:11, 14 October 2008
  • * Network-based applications * Network Security
    4 KB (465 words) - 23:11, 14 October 2008
  • * Wireless Mesh & Sensor Network Applications * Network Security & Reliability
    4 KB (559 words) - 23:11, 14 October 2008
  • ...ocus on new models and methods as well as mechanisms, which can enable the network to perform adaptive behaviors. High-speed Network Protocols
    7 KB (990 words) - 23:11, 14 October 2008
  • - Computer and Communications Network Security
    3 KB (375 words) - 23:37, 14 October 2008
  • Network operations and management
    4 KB (462 words) - 12:53, 27 December 2015
  • - Intelligence support for sensor network management
    3 KB (442 words) - 23:11, 14 October 2008
  • | Title = Third International Conference on Bio-Inspired Models of Network, Information and Computing Systems 3rd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems
    5 KB (694 words) - 23:11, 14 October 2008
  • combination of increasing network bandwidth and expanding designers. New technology elements, including network processors,
    6 KB (722 words) - 17:00, 27 December 2015
  • ...es, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for
    2 KB (209 words) - 23:12, 14 October 2008
  • -Wireless multimedia network management
    3 KB (393 words) - 23:12, 14 October 2008
  • 6. Intelligent Communication Systems and Network Protocols
    4 KB (496 words) - 23:12, 14 October 2008
  • ...sion of new techniques in modeling, design, simulation, and fabrication of network and communication systems at the nano-scale. ...g/addressing issues in nano-networks, Nano-coding, Applications of complex network theory, Self-organization in nano-scale systems, Modeling of Nano/Bio Commu
    6 KB (756 words) - 23:12, 14 October 2008
  • Papers related to wireless and mobile network Modeling, Analysis, - Wireless network algorithms and protocols
    4 KB (596 words) - 23:12, 14 October 2008
  • Wireless network architectures
    2 KB (244 words) - 23:12, 14 October 2008
  • | Title = 11th Asia-Pacific Network Operations and Management Symposium
    574 bytes (62 words) - 17:05, 27 December 2015
  • · Network Modelling and Simulation X. Perez Costa �?? NEC Network Laboratories, Germany, Germany
    11 KB (1,493 words) - 17:05, 24 February 2016
  • 1 .5 Network Management 1 .6 Network Planning and Optimization
    2 KB (250 words) - 23:12, 14 October 2008
  • | Title = Innovations in NGN - Future Network and Services, An IT U-T Kaleidoscope Conference
    597 bytes (69 words) - 23:12, 14 October 2008
  • ...and operation of Next Generation Internet networks. It is organized by the Network of Excellence (NoE) Euro-FGI (http://www.eurongi.org) that was initiated by * Network co-operation
    3 KB (382 words) - 23:12, 14 October 2008
  • | Title = 13th International Telecommunications Network Strategy and Planning Symposium
    564 bytes (60 words) - 23:12, 14 October 2008
  • Network scaling Network management
    3 KB (359 words) - 23:12, 14 October 2008
  • ...ield of computer and data communication networks. We invite submissions on network architecture, design, implementation, operations, analysis, measurement, pe * Analysis and design of network architectures and algorithms
    3 KB (352 words) - 23:12, 14 October 2008
  • | Title = IEEE Network Operations and Management Symposium
    549 bytes (60 words) - 23:12, 14 October 2008
  • - Network Security - Network Information Theory
    3 KB (465 words) - 23:13, 14 October 2008
  • | Title = International Conference On Optical Network Design And Modeling
    590 bytes (69 words) - 23:13, 14 October 2008
  • * Network Reliability and QoS
    2 KB (283 words) - 23:13, 14 October 2008
  • - Wireless network architectures and techniques for multimedia traffic - Mesh network systems and technologies
    3 KB (414 words) - 23:13, 14 October 2008
  • | Title = Fifth Annual Conference on Wireless On demand Network Systems and Services effort as well as with little dependency on existing network infrastructures.
    3 KB (413 words) - 23:13, 14 October 2008
  • architectural boundaries of large-scale network services. We solicit * Network measurements, workload, and topology characterization
    4 KB (528 words) - 23:13, 14 October 2008
  • sub-areas of research: adaptation of system operations to the network the 90's that had an inward focus on network signaling & control today's
    5 KB (651 words) - 23:13, 14 October 2008
  • - Wireless network security and privacy - Application oriented network management
    3 KB (343 words) - 10:31, 14 August 2023
  • *Discovery-driven Web and social network mining
    2 KB (237 words) - 12:23, 11 September 2020
  • ...ers and information on their characteristics can be a powerful aid for any network operation. Online services that assist social networks (facebook, linkedin,
    4 KB (457 words) - 23:13, 14 October 2008
  • - Social network analysis - Nikos Manouselis. Greek Research & Technology Network, Greece
    7 KB (989 words) - 23:13, 14 October 2008
  • Home Network
    3 KB (494 words) - 23:16, 14 October 2008
  • ...work, and to come and find out what others are doing. This is an emerging network of people exploring the intersection of established intellectual traditions * Mike Gurstein, Community Informatics Research Network, Canada
    9 KB (1,139 words) - 23:14, 14 October 2008
  • * Social network analysis * Applications of social network analysis
    3 KB (453 words) - 23:14, 14 October 2008
  • opportunity to gather and build a strong network of researchers with - Social Network Analysis on the social web
    7 KB (950 words) - 23:14, 14 October 2008
  • the Network Society" - "RFID can create Ubiquitous Network Society?"
    7 KB (813 words) - 23:14, 14 October 2008
  • * Social network analysis * Associations mining from social network
    7 KB (860 words) - 11:55, 7 January 2009
  • [10] Social network analysis; communities identification; expertise discovery; collaborative fi
    4 KB (475 words) - 23:14, 14 October 2008
  • * Networking and network services * System and network management and troubleshooting
    6 KB (869 words) - 23:14, 14 October 2008
  • * Network architecture infrastructure integration of WiMAX in NGN * Network/radio planning, spectrum, regulations of WiMAX in NGN
    1 KB (181 words) - 23:14, 14 October 2008
  • Automonic Communications and Self-managing Network Testbeds Next Generation Wireless Network Testbeds
    2 KB (316 words) - 23:15, 14 October 2008
  • ...ant research dialog, or pushes the architectural boundaries of large-scale network services. We solicit papers describing original and previously unpublished * Network measurements, workload, and topology characterization
    8 KB (1,093 words) - 23:15, 14 October 2008
  • * Cognitive network architectures for future Internet * Cognitive network controller design
    7 KB (939 words) - 23:15, 14 October 2008
  • ...itionally offered predominantly passive experiences, continual advances in network and computer technologies are providing tools for implementing greater inte
    8 KB (1,011 words) - 23:15, 14 October 2008
  • | Title = IEEE 3rd International Workshop on Distributed Autonomous Network Management Systems 3rd International Workshop on Distributed Autonomous Network
    6 KB (663 words) - 23:15, 14 October 2008
  • * Workflow management for collaborative network/system
    8 KB (1,093 words) - 23:15, 14 October 2008
  • | Title = The First International Workshop on Network Security & Applications The First International Workshop on Network Security & Applications (WNSA-2008)
    5 KB (628 words) - 23:15, 14 October 2008
  • 3-08 Network routing and communication algorithms
    5 KB (623 words) - 23:15, 14 October 2008
  • The third generation of social networking technologies has hit the Web. This network serve increasingly ?Mobile and network security and privacy
    8 KB (1,003 words) - 23:15, 14 October 2008
  • | Title = 4th IEEE Workshop on Secure Network Protocols 4th workshop on Secure Network Protocols (NPSec 2008)
    4 KB (493 words) - 23:15, 14 October 2008
  • Network information management is a growing area of research at the attention by the recent emergence of information systems distributed across the network,
    4 KB (563 words) - 23:15, 14 October 2008
  • * Measurement-based network management such as traffic engineering * Network applications such as WWW, multimedia streaming, and gaming
    3 KB (313 words) - 23:15, 14 October 2008
  • ...lumes, mainly because of converged type of traffic resulted from converged network operation under converged services and applications. Moreover, wireless acc * New Teletraffic and Network Traffic Challenges and Paradigms
    5 KB (598 words) - 10:18, 29 May 2016
  • ...act may both be mobile. Their implementation requires advances in wireless network technologies and devices, development of infrastructures supporting cogniti * Ad hoc and sensor network support for ubiquitous computing
    5 KB (599 words) - 23:15, 14 October 2008
  • | Title = 18th International workshop on Network and Operating Systems Support for Digital Audio and Video In-network stream processing
    3 KB (322 words) - 23:15, 14 October 2008
  • | Title = 7th IEEE International Symposium on Network Computing and Applications
    577 bytes (65 words) - 23:15, 14 October 2008
  • |Title=6th International Conference on Applied Cryptography and Network Security
    509 bytes (65 words) - 14:00, 6 November 2020
  • |Title=7th International Conference on Applied Cryptography and Network Security
    509 bytes (62 words) - 14:01, 6 November 2020
  • |Title=9th International Conference on Applied Cryptography and Network Security
    496 bytes (63 words) - 14:05, 6 November 2020
  • |Title=15th International Conference on Applied Cryptography and Network Security
    506 bytes (61 words) - 14:16, 6 November 2020
  • |Title=8th International Conference on Applied Cryptography and Network Security
    475 bytes (60 words) - 14:03, 6 November 2020
  • |Title=14th International Conference on Applied Cryptography and Network Security
    485 bytes (60 words) - 14:15, 6 November 2020
  • |Title=12th International Conference on Applied Cryptography and Network Security
    497 bytes (60 words) - 14:11, 6 November 2020
  • |Title=13th International Conference on Applied Cryptography and Network Security
    516 bytes (64 words) - 14:12, 6 November 2020
  • |Title=10th International Conference on Applied Cryptography and Network Security
    491 bytes (60 words) - 14:07, 6 November 2020
  • |Title=11th International Conference on Applied Cryptography and Network Security
    507 bytes (62 words) - 14:09, 6 November 2020
  • ...ed to promote energy conservation without degrading the performance of the network. Nonetheless, nowadays, many real-time applications have been proposed and
    2 KB (304 words) - 12:46, 27 December 2015
  • | Title = First ACM Conference on Wireless Network Security ...s, their security is gaining in importance. The ACM Conference on Wireless Network Security (WiSec) aims at exploring attacks on wireless networks as well as
    2 KB (197 words) - 23:15, 14 October 2008
  • | Title = 3rd Conference on Emerging Network Experiment and Technology
    549 bytes (62 words) - 23:15, 14 October 2008
  • * User tasks for social network analysis
    2 KB (315 words) - 23:22, 14 October 2008
  • * Social Network Analysis
    4 KB (557 words) - 23:16, 14 October 2008
  • - Sensor network
    2 KB (253 words) - 23:16, 14 October 2008
  • Network Robotics
    8 KB (982 words) - 23:17, 14 October 2008
  • Hyper Network Communication Network Security and Information Assurance
    4 KB (438 words) - 23:17, 14 October 2008
  • ...ted areas of study. This conference will build on our past experiences and network to provide a valuable forum for exchanges of significant ideas and publicat
    1 KB (167 words) - 23:17, 14 October 2008
  • * High-throughput hardware and software approaches to genome-scale network modeling
    3 KB (443 words) - 23:17, 14 October 2008
  • ...industry, and government to present and discuss recent advances in sensor network research and applications. The conference covers both theoretical and exper Network health monitoring
    4 KB (570 words) - 23:17, 14 October 2008
  • ...rch domains that increasingly play a key role in connecting systems across network centric environments to allow distributed computing and information sharing
    5 KB (697 words) - 23:18, 14 October 2008
  • * ReSIST - Resilience for Survivability in IST. A European Network of Excellence (http://www.resist-noe.org)
    9 KB (1,264 words) - 18:14, 8 November 2008
  • ...nced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social The international conference on Advances in Social Network Analysis and Mining (ASONAM 2009) will primarily provide an interdisciplina
    3 KB (404 words) - 23:18, 14 October 2008
  • * Network Analysis and Intrusion Detection
    3 KB (443 words) - 18:35, 1 March 2012
  • o Impact of recommendation models on the evolution of the social network.
    5 KB (592 words) - 23:18, 14 October 2008
  • Sensor Network Applications Social Network Analysis
    4 KB (520 words) - 20:02, 26 February 2020
  • ...nowledge Networks: Discovering network structure and patterns using Social Network Analysis ...ledge networks. These studies rely heavily on theory and tools from social network analysis that has already a longstanding tradition in the sociology domain.
    6 KB (886 words) - 23:19, 14 October 2008
  • intelligence, domain constraints and network intelligence in data mining, and social network mining.
    4 KB (510 words) - 23:19, 14 October 2008
  • * Mining techniques for network management
    5 KB (613 words) - 23:19, 14 October 2008
  • * network analysis of social resources sharing systems * analysis of network dynamics
    5 KB (646 words) - 23:19, 14 October 2008
  • EvoBIO started in 2002 as workshop organized by the EvoNet (European Network of Excellence in Evolutionary Computation) working group on bioinformatics,
    2 KB (308 words) - 23:19, 14 October 2008
  • -Network and Organizational Vulnerability Analysis -Network Security
    4 KB (487 words) - 10:42, 21 August 2020
  • | Title = Second ACM Conference on Wireless Network Security ...uitous, their security gains in importance. The ACM Conference on Wireless Network Security (WiSec) aims at exploring attacks on wireless networks as well as
    2 KB (291 words) - 23:19, 14 October 2008
  • | Title = 16th Annual Network and Distributed System Security Symposium 16th Annual Network & Distributed System Security Symposium
    5 KB (673 words) - 23:19, 14 October 2008
  • - Home-network applications - Ubiquitous Sensor Network(USN) / RFID - Issue
    6 KB (697 words) - 23:19, 14 October 2008
  • Network security
    5 KB (619 words) - 23:19, 14 October 2008
  • * Network and Wireless Security
    6 KB (736 words) - 23:20, 14 October 2008
  • Communications / network security
    4 KB (465 words) - 23:20, 14 October 2008
  • * Network security (anti-virus, anti-DoS-tools, firewalls etc.)
    4 KB (565 words) - 23:20, 14 October 2008
  • Network security
    2 KB (262 words) - 23:20, 14 October 2008
  • * Network Security
    6 KB (689 words) - 10:39, 21 August 2020
  • Cross-layer network design and optimization Network security, vulnerability, authentication and access control
    4 KB (502 words) - 23:20, 14 October 2008
  • - Mobile Network Traffic Engineering, Performance & Optimization - Wireless & Mobile Network Management and Service Infrastructure
    10 KB (1,262 words) - 23:20, 14 October 2008
  • ...lopment of efficient embedded vision-based techniques. Design of scalable, network-based applications based on high-bandwidth data such as images requires a c
    4 KB (488 words) - 17:04, 27 February 2009
  • | Title = 6th International Conference on Multimedia & Network Information Systems
    677 bytes (81 words) - 23:21, 14 October 2008
  • |Field=Artificial neural network Network Society in co-operation with the International Neural Network
    2 KB (276 words) - 11:30, 22 March 2020
  • | Field = Artificial neural network
    611 bytes (68 words) - 23:21, 14 October 2008
  • ...ers, hands-on engineers, and other semiconductor industry professionals to network, learn, and share knowledge on new and best-method semiconductor manufactur
    4 KB (554 words) - 23:21, 14 October 2008
  • * High-level sensor network management
    7 KB (893 words) - 23:23, 14 October 2008
  • * Network and Telemedicine Systems
    4 KB (543 words) - 16:46, 27 December 2015
  • Service Network Economic Structures and Effects
    18 KB (2,352 words) - 23:23, 14 October 2008
  • * Ubiquitous and Sensor Network
    3 KB (415 words) - 23:23, 14 October 2008
  • Communication and Network Systems, Technologies and Applications
    2 KB (250 words) - 09:11, 5 March 2012
  • Network Optimization
    3 KB (422 words) - 23:24, 14 October 2008
  • * network and system on-a-chip and applications
    9 KB (1,181 words) - 00:37, 15 October 2008
  • | Title = 9th Symposium on Neural Network Applications in Electrical Engineering ...howcfp?eventid=2933&copyownerid=2 WikiCFP][[Category:Artificial neural network]]
    987 bytes (125 words) - 23:24, 14 October 2008
  • Application-specific systems: network computing, special-purpose systems,
    2 KB (287 words) - 23:24, 14 October 2008
  • * Network-on-Chip Platforms
    2 KB (275 words) - 23:24, 14 October 2008
  • Computer-Aided Network Design Digital Signal Processing
    3 KB (405 words) - 23:24, 14 October 2008
  • * 1.12 Gabor Wavelet network.
    4 KB (475 words) - 23:25, 14 October 2008
  • ...Discrete event systems; Hybrid systems; Networked control systems; Sensor network systems; Delay systems; Neural networks; Fuzzy systems; Control of biologic ...Factory modeling and simulation; Home, laboratory and service automation; Network-based systems; Planning, scheduling and coordination; Nano-scale automation
    4 KB (459 words) - 23:25, 14 October 2008
  • o Network evolution, formation and restructuring o Network traffic dynamics and network routing
    3 KB (378 words) - 23:26, 14 October 2008
  • ...nted significant challenges on the desktop and efficient virtualization of network interfaces has limited server consolidation in the data center.
    3 KB (462 words) - 23:26, 14 October 2008
  • ...des research at all design levels: circuit, architecture, compiler, OS and network. This workshop aims to become a forum for academia and industry to discuss
    5 KB (598 words) - 01:12, 31 May 2012
  • RAID, and network-storage system designs). ...s increasingly important as boundaries between hardware/software and local/network
    3 KB (406 words) - 17:39, 30 September 2016
  • ...SETI@Home?s "BOINC" computational Grid; BitTorrent?s Content Distribution Network; and ppLive, and ppStream in China, as well as Zattoo in Europe, all of thr
    6 KB (761 words) - 03:28, 6 January 2009
  • resources such as processing, network bandwidth and storage capacity
    5 KB (577 words) - 23:27, 14 October 2008
  • Garth Goodson (Network Appliance)
    4 KB (505 words) - 23:27, 14 October 2008
  • such as network, automotive, cellular and others, present interesting
    1 KB (180 words) - 17:02, 29 May 2016
  • * Network processor and router architectures
    2 KB (259 words) - 10:14, 29 May 2016
  • ...well as in the emerging ultra low-power markets such as medical and sensor network applications. Most recently, reliability and fault tolerance has been raise
    4 KB (584 words) - 23:27, 14 October 2008
  • ...d their own properties with respect to traffic load, congestion situation, network topology, and wireless channel propagation etc. However, cognitive radio wi ...s that report the latest research advances in this field from physical and network layers to practical applications.
    3 KB (409 words) - 23:27, 14 October 2008
  • to existing network infrastructure, as well as effective information
    6 KB (861 words) - 17:02, 27 December 2015
  • ...simple agents fits closely to the typical environment created by an ad hoc network.
    3 KB (363 words) - 23:28, 14 October 2008
  • ...a broad forum an outstanding opportunity for researchers, academicians and network engineers to discuss new and emerging technologies in the field of computer - Network management and performance
    3 KB (413 words) - 23:28, 14 October 2008
  • Network control
    6 KB (778 words) - 23:28, 14 October 2008
  • ...c systems; ?Distributed control systems; Networked control systems; Sensor network systems; Fault diagnosis and fault-tolerant control; Delay systems; Neural ...Factory modeling and simulation; Home, laboratory and service automation; Network-based systems; Planning, scheduling?and coordination; Nano-scale automation
    6 KB (814 words) - 23:28, 14 October 2008
  • Computational Intelligence: Artificial neural network, Fuzzy systems, Genetic algorithm, Evolutionary computing, Machine learning ...e and green energy, Waste management, Waste treatment and recycling, Water network and security, Sensor technologies, Intelligent Micro-grids
    4 KB (561 words) - 23:29, 14 October 2008
  • Network-based Robotics
    2 KB (253 words) - 23:29, 14 October 2008
  • * Network-based Control
    3 KB (397 words) - 23:29, 14 October 2008
  • - COMPOSITIONAL DISTRIBUTED SYSTEMS: composition of network protocol
    6 KB (707 words) - 23:29, 14 October 2008
  • |Field=Computer Science, Embedded systems, Embedded Network Sensor Systems, Sensor Systems Sensor network architecture and protocols Sensor network algorithms such as localization, routing, time synchronization, clustering,
    6 KB (771 words) - 16:09, 16 September 2019
  • (e.g., operating system, middleware, network protocols, and
    7 KB (851 words) - 23:30, 14 October 2008
  • interconnected as a network by communication components such as field buses. The individual nodes of such a network usually consist of a
    5 KB (655 words) - 23:30, 14 October 2008
  • * Social network analysis and mining
    4 KB (511 words) - 23:31, 14 October 2008
  • * Middleware support for reunification of network segments and reconciliation of divergent replicas. Consideration of alterna * Group communication and group membership services in failure scenarios with network partitions.
    8 KB (952 words) - 23:31, 14 October 2008
  • Network-based Computing
    5 KB (702 words) - 23:31, 14 October 2008
  • ...om the Alps and the Mediterranean sea with its fast land-based connections network. Lyon is so famous for its architectural treasures, its medical, scientific
    2 KB (210 words) - 23:31, 14 October 2008
  • * Bayes network and hidden markov models * Regulatory network and pathway analysis
    2 KB (276 words) - 23:31, 14 October 2008
  • ...ecture and/or compiler optimizations for embedded processors, DSPs, ASIPs (network processors, multimedia, wireless, etc.)
    5 KB (580 words) - 10:32, 12 May 2020
  • ...ht into a wealth of must-know topics, including virtualization, system and network management and troubleshooting, cloud and edge computing, security, privacy
    4 KB (577 words) - 09:28, 12 May 2020
  • |Title=International Conference on Network and Computing Technologies
    226 bytes (27 words) - 22:23, 25 February 2020
  • *Big Data platforms with applications to network management, security, measurements *Design, analysis, and evaluation of network architectures
    4 KB (514 words) - 12:03, 6 April 2020
  • ...tem analysis and control, HVDC and FACTS, Power market, Power distribution network and automation, Power protection, SCADA, EMS, WAMS and substation automatio
    4 KB (504 words) - 23:33, 14 October 2008
  • ...ompetition and ICT based catalyst effect in a number of domains to produce network enriched communities.
    4 KB (475 words) - 23:33, 14 October 2008
  • ...rence of Institution of Engineering and Technology (IET) Brunei Darussalam Network
    703 bytes (81 words) - 23:34, 14 October 2008
  • ...online social applications. Of particular interest are problems related to network and system architecture design that can best support emerging and future so * Implications of social networking on network and distributed systems design
    4 KB (493 words) - 23:34, 14 October 2008
  • - Ontology (Distributed Processing, Emergent Properties, Formal Ontology, Network Structures, etc)
    4 KB (616 words) - 23:35, 14 October 2008
  • ?Semantic Web ?Semantic Search and Query ?Semantic Link Network ?Semantic Normalization ?Semantic Interoperability ?Semantic Visualization ...lf-Organized Intelligence ?Service-oriented Computing ?Mobile Grid ?Social Network ?Community Discovery
    3 KB (367 words) - 23:35, 14 October 2008
  • | Title = SANS Network Security 2007
    492 bytes (57 words) - 23:36, 14 October 2008
  • * Network resilience
    4 KB (451 words) - 23:37, 14 October 2008
  • * Gene regulation, expression, identification and network
    3 KB (332 words) - 23:37, 14 October 2008
  • * game theoretic aspects of networks and network formation
    6 KB (682 words) - 10:18, 14 April 2020
  • of billions of sensing devices. While a single sensor network typically - Sensor network protocols
    4 KB (483 words) - 23:37, 14 October 2008
  • ...eeing reliable and enduring pathway communications. Automating the sensor network activities is also an urgent and challenging issue especially that commonl Sensor network control
    5 KB (658 words) - 12:46, 27 December 2015
  • �?� Network architectures for sensor networks �?� Modeling and validation of sensor network architectures
    11 KB (1,533 words) - 23:38, 14 October 2008
  • | Title = International Journal of Social Network Mining
    551 bytes (69 words) - 23:38, 14 October 2008
  • ...ield of computer and data communication networks. We invite submissions on network architecture, design, implementation, operations, analysis, measurement, pe * Network applications & services
    3 KB (380 words) - 19:34, 17 November 2008
  • ...obile. The implementation of such a paradigm requires advances in wireless network technologies and devices, development of infrastructures supporting cogniti
    3 KB (386 words) - 23:39, 14 October 2008
  • ...nd security, systems health management, and related areas. Collaborate and network with scientists, engineers, developers and customers, in a balance of forma
    1 KB (164 words) - 23:39, 14 October 2008
  • ...tures and compilers for graphics/gaming, embedded processors, DSPs, ASIPs (network, multimedia, wireless, etc.)
    3 KB (326 words) - 17:43, 8 November 2008
  • F3. Ubiquitous Network Systems
    4 KB (564 words) - 23:41, 14 October 2008
  • ...92) introduced an historical focus by examining the implications of social network analysis for theories of language change. Social Network Analysis and English Sociohistorical Linguistics
    4 KB (622 words) - 23:41, 14 October 2008
  • ...cast network, home network, mobile multimedia QoS, mobile security, ad hoc network ...and operating system, application-specific processors and devices, system/network-on-a-chip
    2 KB (303 words) - 23:42, 14 October 2008
  • ...t security; Security in wireless; Sensor/cellular network security; Ad hoc network security; Security in peer-to-peer networks; Security in wireless multimedi ...s-, and Linux anti-forensics techniques; Open source anti-forensics tools; Network anti-forensics tools
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...management /locator-location paradigm/; Recovering and fault-tolerance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Cont ...Scalability; User and service mobility; Wireless QoS; Traffic engineering; Network planning; Intermittent services; Virtualization; Self-management and contr
    7 KB (883 words) - 17:35, 7 January 2021
  • ...raw observations that are used in our experiments. Examples might include network measurement or capturing data such as seismic measurements. Middleware is r
    4 KB (642 words) - 21:17, 9 December 2008
  • ** Social Network Analysis
    2 KB (256 words) - 01:51, 16 December 2008
  • |Title=1st International STI Germany PhD-Network Workshop
    384 bytes (42 words) - 02:31, 9 January 2009
  • * How to engineer product lines in a complex organizatinal network of OEMs and suppliers including COTS or open source components?
    6 KB (892 words) - 11:21, 14 January 2009
  • - Co-scheduling of computation, data storage, and network resources - Network support for data-intensive computing
    6 KB (790 words) - 12:57, 18 January 2009
  • * Network Architectures and Routing * Network Optimization
    5 KB (526 words) - 01:02, 2 February 2009
  • | Title = 3rd International Conference on Network and System Security 3rd International Conference on Network and System Security (NSS 2009)
    12 KB (1,669 words) - 12:58, 18 January 2009
  • o Network architecture o Network protocols and security
    5 KB (567 words) - 12:58, 18 January 2009
  • - Social network analysis and entity resolution NE extraction - Social network analysis and entity resolution
    10 KB (1,242 words) - 12:58, 18 January 2009
  • o Game-theoretic aspects of network formation on the Internet
    9 KB (1,221 words) - 12:58, 18 January 2009
  • ...ations, embedded systems, special purpose systems, reconfigurable systems, network systems etc. Please include the following information in the proposal and s
    2 KB (337 words) - 12:58, 18 January 2009
  • * Network security and protocols * Network processors
    16 KB (2,178 words) - 12:59, 18 January 2009
  • System-on-Chip and Network-on-Chip Design & Testing: Design of Application- Specific Instruction-Set P
    3 KB (337 words) - 12:59, 18 January 2009
  • * Neural Network Circuits and Systems * Computer Aided Network Design
    1 KB (148 words) - 13:00, 18 January 2009
  • find out what others are doing. This is an emerging network of people
    9 KB (1,148 words) - 13:00, 18 January 2009
  • ...ular research area not only for data mining and web mining but also social network analysis. or devoting to improve traditional mining techniques for social network analysis.
    4 KB (580 words) - 13:00, 18 January 2009
  • using information and intelligence that is hidden in the network connecting these devices and in
    6 KB (687 words) - 13:00, 18 January 2009
  • ...building federated digital technologies that will enable the formation of network of digital technologies. Data and Network mining
    4 KB (529 words) - 13:00, 18 January 2009
  • - Mining social network data
    7 KB (1,006 words) - 13:00, 18 January 2009
  • * Multimedia network protection, privacy and security.
    3 KB (303 words) - 17:06, 24 February 2016
  • o Network management, QoS management o System architecture and protocol (e.g., MAC, network, transport)
    14 KB (1,518 words) - 13:01, 18 January 2009
  • + Social Network
    3 KB (410 words) - 13:01, 18 January 2009
  • Network measurement and Management
    3 KB (320 words) - 16:40, 27 December 2015
  • ...their research results and address open issues in Wireless Communications, Network Technologies, Services and Application. Network Technologies
    2 KB (210 words) - 13:01, 18 January 2009
  • * Network applications and services * Network architectures and management
    10 KB (1,206 words) - 13:01, 18 January 2009
  • ...pose architectures and accelerators; Architecture of the memory hierarchy; Network and interconnect architectures; Parallel I/O and storage systems; Power-eff ...algorithms; Optimizations of communication and synchronization protocols; Network algorithms, Scheduling and load balancing; Scientific applications; Applica
    4 KB (490 words) - 17:05, 27 December 2015
  • - Computer and Network Architecture 16) Sensor Network and its Applications - SNA 09
    10 KB (1,321 words) - 13:01, 18 January 2009
  • ...practical aspects of health informatics and bioinformatics and a chance to network with others working and researching in this area.
    4 KB (528 words) - 13:01, 18 January 2009
  • |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)
    6 KB (793 words) - 15:12, 1 October 2020
  • Nowadays, computing and network systems, such as peer-to-peer, wireless ad hoc, sensor networks, and genera ...this direction, biology, psychology, economics (e.g., game theory), social network, and many other research fields can provide many helpful hints for autonomo
    6 KB (767 words) - 13:01, 18 January 2009
  • - Network robotics
    5 KB (661 words) - 13:02, 18 January 2009
  • - Innovative applications of social network analysis - Scalable, customizable social network infrastructure construction
    3 KB (446 words) - 13:02, 18 January 2009
  • Network and system models
    11 KB (1,539 words) - 13:02, 18 January 2009
  • - Ad hoc and sensor network security
    6 KB (852 words) - 13:02, 18 January 2009
  • A wireless sensor network (WSN) is an emerging research field with several interesting application do
    3 KB (450 words) - 13:02, 18 January 2009
  • ...rly recognition of emerging risks and/or performance issues can expose the network infrastructure to stability, performance, and security problems. ...le optimizations. Also, it can be the basis for prevention and response in network security, as typically the detection of attacks and intrusions requires the
    5 KB (431 words) - 13:03, 18 January 2009
  • * Semantic Web Mining and Social Network Analysis
    5 KB (762 words) - 00:44, 15 February 2009
  • ...networks necessitate an energy-aware design to ensure the longevity of the network. While most wireless sensor networks use battery-operated computing and sen
    4 KB (534 words) - 11:03, 1 April 2009
  • [[Category:Artificial neural network]]
    2 KB (290 words) - 22:01, 27 February 2009
  • ...ess body area network, wireless sensor network, and wireless personal area network. Body-centric wireless communications find rich applications in personal he
    5 KB (664 words) - 17:20, 5 July 2020
  • ...ergy and brainpower. As a speaker, you will have the unique opportunity to network and share knowledge with hundreds of other IT leaders, executives and busin
    2 KB (299 words) - 16:33, 27 February 2009
  • * Communication and network systemas, Wireless communications, Technologies and applications, Informati Communication and network systemas, Wireless communications, Technologies and applications, Informati
    8 KB (977 words) - 16:33, 27 February 2009
  • ...number of devices connected to the networks has changed the Internet to a "network of things and computers". These trends, plus the rise of collaborative tech * Frameworks and Overarching Issues of Network Governance
    4 KB (557 words) - 16:33, 27 February 2009
  • We're planning several stimulating keynotes and plenty of opportunities to network with colleagues and peers, including a conference reception at the nearby A
    3 KB (374 words) - 22:19, 27 February 2009
  • * Network and Communication Security
    2 KB (229 words) - 16:33, 27 February 2009
  • ...tive cyber security and network experimentation is challenging for today's network testbeds for a number of reasons. Among these are: ...tecture, construction, operation, and use of cyber security experiments in network testbeds and infrastructures. While we are particularly interested in works
    7 KB (897 words) - 17:05, 27 February 2009
  • Network management • Network performance evaluation
    5 KB (654 words) - 17:06, 27 February 2009
  • - Network calculus
    5 KB (684 words) - 17:06, 27 February 2009
  • Network System Engineering - Network applications and services
    6 KB (654 words) - 17:06, 27 February 2009
  • ...cience, art, and culture to learn new skills, explore innovative ideas and network with new friends as well as expanding our community by bringing knowledge t
    4 KB (456 words) - 17:06, 27 February 2009
  • * network design
    4 KB (547 words) - 17:06, 27 February 2009
  • .... structural graph theory, sequential, parallel, and distributed graph and network algorithms and their complexity, graph grammars and graph rewriting systems
    3 KB (426 words) - 17:06, 27 February 2009
  • · Network routing and communication algorithms Network and pervasive computing
    8 KB (1,050 words) - 18:04, 5 January 2017
  • * Network applications & services * Network architectures
    4 KB (559 words) - 17:06, 27 February 2009
  • * Network support for P2P systems
    5 KB (623 words) - 17:06, 27 February 2009
  • establish contacts between computer network researchers, practitioners * User centric network design
    3 KB (456 words) - 17:06, 27 February 2009
  • | Title = The 8th International Conference on Cryptology and Network Security CRYPTOLOGY AND NETWORK SECURITY (CANS 2009)
    8 KB (967 words) - 17:07, 27 February 2009
  • Data streams occur in a variety of modern applications, such as network monitoring, traffic engineering, sensor networks, RFID tags applications, t
    5 KB (644 words) - 22:00, 27 February 2009
  • communicate through a Wireless Network. The building of software
    6 KB (861 words) - 17:07, 27 February 2009
  • * Network security.
    4 KB (506 words) - 17:07, 27 February 2009
  • | Title = Workshop on Trust, Risk and Security Assessments for Network Dependability in Digital Ecosystems (TRSDE) Workshop on Trust, Risk and Security Assessments for Network Dependability in Digital Ecosystems (TRSDE) to be held in conjunction with
    4 KB (600 words) - 17:07, 27 February 2009
  • ...ompetition and ICT based catalyst effect in a number of domains to produce network enriched communities. For further information please visit http://dest2009.
    7 KB (941 words) - 17:07, 27 February 2009
  • ...ks. Features including the extremely large number of sensor devices in the network, the severe power, computing and memory limitations, their dense, random de
    6 KB (750 words) - 16:50, 27 December 2015
  • ...ng research objective. The interoperability of applications, transport and network protocols, as well as, the demand for improved Quality of Service (QoS) and ...r challenge is the ever growing complexity of communication management and network maintenance. Hence, solutions are required in which services, management an
    11 KB (1,463 words) - 17:07, 27 February 2009
  • Network Dimensioning • Network Performance
    3 KB (319 words) - 17:07, 27 February 2009
  • European Chemistry Thematic Network
    2 KB (283 words) - 15:21, 25 February 2021
  • ...l Applications, Practice, Extensions, XML, Open Source, Model Development, Network Modeling, Distributed Simulation and Industry, Modeling Very Large Scale Sy ...ng on line, Computational resources are becoming cheaper, while ubiquitous network access has started to appear.
    38 KB (4,832 words) - 17:07, 27 February 2009
  • | Title = Second IEEE International Workshop on Wireless Network Coding Second IEEE International Workshop on Wireless Network Coding (WiNC 2009)
    3 KB (296 words) - 17:08, 27 February 2009
  • ...rticular, how to allocate resources to individual nodes and sources when a network involves multiple nodes and sources of multimedia. * Content/Network-aware cross-layer design and optimization
    4 KB (505 words) - 17:08, 27 February 2009
  • | Title = The 12th International Conference on Network-Based Information Systems The 12th International Conference on Network-Based Information Systems
    11 KB (1,440 words) - 17:08, 27 February 2009
  • - employee privacy and network administration - analysis of network and security protocols
    12 KB (1,690 words) - 17:08, 27 February 2009
  • With the need for evolution, if not revolution, of current network architectures and the Internet, autonomous and spontaneous management will * Security of Next Generation Network
    3 KB (480 words) - 17:08, 27 February 2009
  • - network security
    6 KB (828 words) - 17:08, 27 February 2009
  • * Web. Community mining, social network analysis, structured retrieval from XML documents
    3 KB (400 words) - 21:02, 27 February 2009
  • * Measurement-based network management such as traffic engineering * Network applications such as multimedia streaming, gaming and on-line social networ
    6 KB (774 words) - 17:08, 27 February 2009
  • network analysis and data mining tools for adaptation are not
    5 KB (644 words) - 15:16, 16 December 2020
  • * Social network analysis
    4 KB (571 words) - 12:58, 9 March 2020
  • Original papers are invited in the area of computer and network security. Topics of interest include but are not limited to the following:  Wireless Network Architecture and Technologies Systems
    5 KB (578 words) - 10:21, 20 November 2020
  • * Network Simulation ([[NS3]])
    627 bytes (80 words) - 20:13, 23 July 2009
  • * Network management and planning * Network topology
    1 KB (148 words) - 10:22, 29 May 2016
  • |Name=Network Simulator 3 (NS3) |Type=Network Simulation
    921 bytes (118 words) - 18:27, 14 May 2009
  • - Network systems, proxies and servers
    3 KB (440 words) - 15:25, 9 December 2009
  • |Title=5th European Conference on Computer Network Defence The 5th European Conference on Computer Network Defence
    4 KB (530 words) - 15:02, 27 December 2015
  • - Network security issues and protocols in WMC - Network forensics and fraud detection for WMS
    3 KB (477 words) - 16:54, 8 August 2009
  • |Field=Network Virtual Environment -Network support for P2P systems
    5 KB (738 words) - 16:48, 10 August 2009
  • ...ommon sense if you only have a few people accessing this database but your network traffic is high, something is up.
    2 KB (358 words) - 23:16, 25 June 2012
  • * Network architectures and protocols * Network security and intrusion detection
    5 KB (630 words) - 11:13, 1 November 2009
  • * Coordination and deployment of multi-robots system or wireless sensors network on site,
    6 KB (783 words) - 17:04, 27 December 2015
  • - network coding
    3 KB (384 words) - 11:32, 2 August 2009
  • | Title = International journal of Network Security & Its Applications (IJNSA) International journal of Network Security & Its Applications (IJNSA)
    3 KB (339 words) - 11:32, 2 August 2009
  • ...their research results and address open issues in Wireless Communications, Network Technologies, Services and Application. Network Technologies
    2 KB (230 words) - 11:32, 2 August 2009
  • 8. Soft Computing Technology, Network Technology and Communication Technology in Motion Control
    2 KB (289 words) - 11:33, 2 August 2009
  • * Network-based applications * Network Security
    7 KB (1,054 words) - 16:43, 27 December 2015
  • * Social Network Analysis
    4 KB (553 words) - 11:33, 2 August 2009
  • ...it does exclude those who wish to be part of OSPG yet don't use the social network of Facebook. I think this current format is more professional, although ha
    598 bytes (100 words) - 12:32, 8 October 2012
  • * Wireless Body Sensor Network
    3 KB (328 words) - 11:33, 2 August 2009
  • IT and network security Computer network planning and design
    2 KB (258 words) - 11:33, 2 August 2009
  • ...ations ,Speech Processing,Image & video Signal Processing,Computer‐Aided Network Design ,Intelligent Robot,Intelligent Circuits and Systems,Industry Applica ...cfp?eventid=6209&copyownerid=5186 WikiCFP][[Category:Artificial neural network]]
    2 KB (269 words) - 15:56, 15 February 2017
  • ...have a weirless Internet access point nearby, you just need configure the network to your console. If you do not, then buy a Nintendo WI-fi USB adapter and
    240 bytes (43 words) - 09:30, 28 June 2012
  • international researchers and practitioners working in all areas of neural network based pattern recognition to present and discuss the latest research,
    4 KB (473 words) - 11:34, 2 August 2009
  • - Social network analysis and mining
    4 KB (525 words) - 11:34, 2 August 2009
  • Network management & operation  Photonic network
    9 KB (1,233 words) - 11:34, 2 August 2009
  • Network systems, proxies and servers
    4 KB (564 words) - 12:01, 6 November 2020
  • | Title = 2009 IEEE International Symposium on Network Evolution and Routing Innovation ...itive Radio Networks, DTN (Delay-and-disruption Tolerant Network), Optical Network, P2P and WEB Searching, Social Networks, etc. The topics include but are no
    2 KB (245 words) - 11:34, 2 August 2009
  • Original papers are invited in the area of computer and network security. Topics of interest include but are not limited to the following:  Wireless Network Architecture and Technologies Systems
    5 KB (599 words) - 10:21, 20 November 2020
  • * Self-aware and self- adaptive network design and evaluation * Network self-healing, security and self-defence
    4 KB (479 words) - 11:35, 2 August 2009
  • to refer specifically to network performance and reliability components at different levels of granularity (e.g. network, server,
    8 KB (1,033 words) - 11:35, 2 August 2009
  • ...t security; Security in wireless; Sensor/cellular network security; Ad hoc network security; Security in peer-to-peer networks; Security in wireless multimedi ...tection and digital rights management for SHS; Intelligent devices, sensor network/RFID for SHS; Intrusion detection and computer forensics for SHS; SHS and H
    6 KB (746 words) - 11:35, 2 August 2009
  • ...so on. Novel mechanisms and designs are required which integrate QoI with network and computational QoS that take into account the aforementioned challenges - Network services (time sync, QoS) for target/event detection, localization, trackin
    5 KB (734 words) - 11:35, 2 August 2009
  • Network Planning and Design • Network Measurement and Testing
    3 KB (417 words) - 10:54, 1 November 2009
  • ...ess ad hoc and sensor networks raise many challenging issues, e.g., mobile network self-organisation, limited resource intelligent allocation, cross-layer opt ...ss layer optimised sensor node sleeping scheduling scheme to guarantee the network connectivity for packet delivery
    7 KB (950 words) - 11:35, 2 August 2009
  • ...o enable seamless, smooth, and reliable multimedia streaming over wireless network.
    5 KB (674 words) - 11:35, 2 August 2009
  • ...pers, IPSN is very interested in showcasing demonstrations of novel sensor network technology, applications, and hardware as well as posters showing exiting e ...Sensor Networks (IPSN) is a leading, single-track, annual forum on sensor network research. IPSN brings together researchers from academia, industry, and gov
    8 KB (1,119 words) - 09:57, 27 February 2020
  • GAMES is an European Network pursuing research and
    3 KB (443 words) - 14:53, 27 December 2015
  • ? Network design and planning ? Wireless & Mobile network Security
    5 KB (571 words) - 11:35, 2 August 2009
  • ...ding bioinformatics, computational biology, data mining, graph algorithms, network analysis, ontology and high-performance computing, and provide a forum for * Analysis of network topologies (e.g., centrality and network motif analysis)
    4 KB (584 words) - 11:36, 2 August 2009
  • Global Production Network
    4 KB (462 words) - 11:36, 2 August 2009
  • ...ices into every day’s life processes. This leads to a highly distributed network of devices communicating with human beings as well as other devices. With t
    9 KB (1,206 words) - 11:40, 2 August 2009
  • Graph and Network Visualization
    7 KB (882 words) - 11:36, 2 August 2009
  • Network on Chip
    5 KB (605 words) - 15:11, 27 December 2015
  • ...neural network, support vector machines, programming model, graph theory, network analysis, agent system, differential equation, difference equation, hierarc
    2 KB (203 words) - 11:36, 2 August 2009
  • Wireless sensor network architectures Energy-aware network protocols and power management
    3 KB (339 words) - 11:36, 2 August 2009
  • - Neural Network Theory and Architectures
    3 KB (404 words) - 11:36, 2 August 2009
  • ...st models and business impact; Cultural and legal aspects; Future advanced network development and evolution; Standards and guidelines; Lawful interception an ..., filtering and blocking software; Monitoring Internet traffic to optimize network bandwidth; Remote monitoring
    14 KB (1,651 words) - 15:56, 15 February 2017
  • Network and Organizational Vulnerability Analysis, Network Security,
    3 KB (352 words) - 12:39, 11 August 2009
  • * Advanced Applications of Neural Network * Network Implementation Choices
    5 KB (552 words) - 17:06, 12 August 2009
  • * Network robotics
    4 KB (475 words) - 13:42, 26 February 2010
  • |Title=17th Annual Network and Distributed System Security Symposium ...ces. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and i
    6 KB (766 words) - 10:54, 26 April 2010
  • ...cial Media Search (e.g., link analysis, query logs, social tagging, social network analysis, advertising and search, blog search, forum search, CQA, adversari
    3 KB (449 words) - 00:45, 11 December 2009
  • - Wireless Network Architecture and Technologies Systems - Wireless Network Algorithms, Protocols, Performance Evaluation
    5 KB (667 words) - 14:27, 13 September 2009
  • Hyper Network Communication
    8 KB (1,033 words) - 07:05, 24 September 2009
  • This congress series was initiated by the European Network of Excellence Metamorphose and is organized by the Virtual Institute for Ar
    4 KB (405 words) - 16:50, 1 October 2009
  • * Network security issues, protocols, data security in Ubi-com * Mobile, Ad Hoc and Sensor Network Security
    5 KB (607 words) - 18:01, 3 December 2009
  • * Network and Wireless Security * Network Enabled Operations
    4 KB (484 words) - 14:20, 14 December 2009
  • Self-Organizing Networks and Advances in Network Theory
    6 KB (758 words) - 18:02, 6 January 2010
  • - Network security issues and protocols in WMC - Network forensics and fraud detection for WMS
    3 KB (497 words) - 03:43, 28 February 2010
  • ...tional Intelligence, Artificial Intelligence, Networking, Neural networks, Network security, Biometrics Technologies and Applications, Pattern Recognition and Fuzzy and neural network systems
    3 KB (382 words) - 18:27, 20 January 2010
  • * Network security and protocols
    10 KB (1,270 words) - 17:12, 20 April 2010
  • |Title=The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems
    3 KB (338 words) - 16:53, 27 December 2015
  • ...s on all subjects relevant to electronics, computer science, communication network and information systems. The journal is the leading refereed quarterly devo ...earch papers in all fields of electronics, computer science, communication network and information system. It aims to provide an international forum for the e
    2 KB (230 words) - 13:09, 2 February 2010
  • * › Mobile Network Protocols and Packet Services * › Adaptive Wireless Network Protocols
    4 KB (379 words) - 15:35, 5 February 2010
  • * › Network Security and Protocols Area 2: Network Security and Protocols
    4 KB (409 words) - 15:40, 5 February 2010
  • › Optical Network Test Beds
    2 KB (259 words) - 15:42, 5 February 2010
  • Network Architectures › Network Protocols
    2 KB (230 words) - 17:25, 22 January 2021
  • • Security-related social network analysis (radicalization, recruitment, conducting operations)<br>
    4 KB (429 words) - 08:55, 1 August 2019
  • *Security-related social network analysis (radicalization, fund-raising, recruitment, conducting operations)
    9 KB (1,092 words) - 09:35, 1 August 2019
  • |Title=Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments - Network security issues and protocols in UCS
    3 KB (498 words) - 02:52, 22 December 2012
  • - Simulation issues of large-scale VCS and integration of traffic-network simulators
    5 KB (624 words) - 21:14, 4 March 2010
  • ...the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Scienc
    4 KB (405 words) - 20:45, 3 November 2010
  • * Middleware and network support
    3 KB (361 words) - 10:37, 26 March 2010
  • - Social Network & eCommunities
    4 KB (601 words) - 00:22, 28 March 2010
  • * Network Security
    2 KB (217 words) - 16:50, 19 November 2020
  • * Network forensics
    2 KB (215 words) - 06:52, 13 April 2010
  • * Network and systems security
    4 KB (490 words) - 14:42, 6 November 2020
  • - Network-based Applications (VoIP, streaming) - Network Management and Traffic Engineering
    5 KB (667 words) - 12:08, 19 May 2010
  • › Sensor/Sensor Network Ontology Engineering
    5 KB (639 words) - 16:17, 20 May 2010
  • * › Network systems, proxies and servers
    5 KB (627 words) - 12:33, 16 June 2010
  • |Title=International Conference on Network and Service Management (amalgamation of DSOM and related workshops from 201
    173 bytes (23 words) - 00:47, 18 March 2020
  • |Title=IEEE Intell Network Workshop
    86 bytes (13 words) - 00:49, 18 March 2020
  • |Field=Network Virtual Environment - Network support for P2P systems
    6 KB (858 words) - 09:18, 19 August 2010
  • |Title=The Third International Workshop on Systems and Network Telemetry and Analytics (SNTA2020) |Field=systems and network telemetry, Machine learning, data science, High-performance computing, Dist
    4 KB (584 words) - 17:42, 13 March 2020
  • |Title=International Conference on Network Protocols
    204 bytes (25 words) - 22:28, 25 February 2020
  • |Title=International Symposium on Integrated Network Management
    220 bytes (25 words) - 22:40, 25 February 2020
  • |Title=Network and OS Support for Digital A/V
    101 bytes (17 words) - 21:48, 26 February 2020
  • |Title=IEEE Conference on Open Architecture and Network Programming
    124 bytes (17 words) - 22:31, 26 February 2020
  • |Title=Network Storage Symposium
    89 bytes (12 words) - 22:38, 26 February 2020
  • |Title=IEEE International Symposium on Network Computing and Applications
    125 bytes (17 words) - 22:44, 26 February 2020
  • |Title=Usenix Network and Distributed System Security Symposium
    147 bytes (20 words) - 00:56, 28 February 2020
  • *Network and system architectures and protocols
    3 KB (412 words) - 09:52, 27 February 2020
  • |Title=Usenix Network and Distributed System Security Symposium
    684 bytes (84 words) - 11:33, 10 March 2020
  • * › Advanced Applications of Neural Network * › Network Implementation Choices
    19 KB (2,462 words) - 19:10, 26 August 2010
  • * Foundations of Privacy, Trust and Reputation in Network * Network Models for Distributed Computing
    4 KB (602 words) - 06:44, 26 August 2020
  • |Title=IEEE International Symposium on Network Computing and Applications
    282 bytes (33 words) - 16:47, 27 February 2020
  • * Network security * Network infrastructure security
    3 KB (343 words) - 16:31, 6 May 2020
  • |Title=Network and OS Support for Digital A/V
    202 bytes (26 words) - 16:55, 27 February 2020
  • NEURAL NETWORK MODELS * Neural network approaches to optimization
    5 KB (574 words) - 15:58, 6 March 2020
  • * System-on-chip and network-on-chip architectures
    3 KB (344 words) - 11:30, 21 April 2020
  • |Title=WORKSHOP ON MULTIHOP WIRELESS NETWORK TESTBEDS AND EXPERIMENTS
    4 KB (518 words) - 20:52, 10 September 2010
  • Network algorithms • Network architectures
    4 KB (579 words) - 15:24, 13 October 2010
  • ...ature. We welcome interested professionals to contribute into IJE research network by joining as an author of a peer-reviewed journal. Journal use an online,
    3 KB (322 words) - 16:47, 5 July 2020
  • • Materials for electro-photography • Network architecture for real-time video transport • New visual services over ATM/packet network • Non-impact printing technologies
    3 KB (395 words) - 16:47, 5 July 2020
  • Network and Internet security • Network forensics • Network security performance evaluation • Non-repudiation
    5 KB (609 words) - 17:01, 5 July 2020
  • ...s a publication vehicle for complete coverage of all topics of interest to network professionals and brings to its readers the latest and most important findi • Network Architectures and Protocols • Network Coding
    3 KB (318 words) - 16:46, 5 July 2020
  • ...practical aspects of health informatics and bioinformatics and a chance to network with others working and researching in this or related areas.
    5 KB (693 words) - 10:44, 14 November 2010
  • |Field=Artificial Intelligence and Applications, Computer Science & Systems,Network Systems and Applications, Information Systems and Technology,Software and S *Network Systems and Applications
    4 KB (550 words) - 12:11, 13 September 2019
  • ...rages showcasing the scholarly record, research discovery, expert finding, network analysis, and assessment of research impact. VIVO is a network in which more than 140 institutions and agencies in more than 25 countries
    3 KB (325 words) - 11:09, 3 December 2020
  • * Scale-free network structure of Cyber Physical Systems * System-on-Chip and Network-on-Chip Design
    12 KB (1,378 words) - 21:13, 28 November 2010
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 12:34, 14 October 2020
  • Security in network, systems, and applications<br> Security in network, systems, and applications<br>
    4 KB (556 words) - 12:33, 14 October 2020

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)