Search results
Create the page "Security systems" on this wiki! See also the search results found.
Page title matches
- * Privacy concerns in Ubiquitous Computing Systems * Trust concerns in Ubiquitous Computing Systems2 KB (205 words) - 05:10, 23 September 2009
- 26 bytes (2 words) - 11:46, 8 August 2017
- 25 bytes (2 words) - 12:30, 3 September 2017
- 24 bytes (2 words) - 11:59, 3 September 2017
- 25 bytes (2 words) - 10:51, 3 September 2017
- 26 bytes (3 words) - 21:04, 29 October 2020
Page text matches
- Service Oriented Systems were born with the aim of building large adaptive applications as compositi ...ting with classic Web Services. Finally, features like Quality of Service, security and dependability need to be taken seriously into account, and this investi7 KB (957 words) - 15:15, 11 August 2008
- |Title=The 10th International Conference on Mobile Data Mangement (MDM'09): Systems, Services and Middleware scope to cover research issues in mobile systems, services and middleware.13 KB (1,468 words) - 01:23, 22 August 2008
- | Title=The 3rd KES International Symposium on Agents and Multi-agent Systems - Technologies and applications (KES-AMSTA-09) ...fic research in the technologies and applications of agent and multi-agent systems.6 KB (777 words) - 22:54, 14 August 2008
- ====Computer security and reliability==== ==== Information systems (Business informatics) ====6 KB (714 words) - 12:19, 11 December 2020
- *Network Security *Communication Systems and Networks5 KB (571 words) - 09:22, 19 July 2019
- * Mobile/Wireless computing systems and services in pervasive computing * Programming paradigms for pervasive systems12 KB (1,560 words) - 15:03, 27 August 2008
- ...011 International Conference of Computational Intelligence and Intelligent Systems The 2011 International Conference of Information Security and Internet Engineering3 KB (454 words) - 12:34, 8 October 2020
- systems, biomedical informatics, virtual digital libraries, and * Data Streams and Publish-Subscribe Systems9 KB (1,189 words) - 14:53, 28 August 2008
- ...m for the communication of research advances on the principles of database systems. This year, for the first time, ICDT will be held jointly with [[EDBT 2009] ...uctive databases and knowledge bases; Distributed databases; Integrity and security; Logic and databases; Multimedia databases; Query optimization; Query proce5 KB (753 words) - 18:59, 25 June 2012
- system of systems, etc. inter-operability, security, trusted and dependable systems, fault5 KB (715 words) - 17:43, 11 September 2008
- |Title=International Conference on Autonomous Agents and Multi-Agent Systems |Field=Multi-Agent Systems10 KB (1,371 words) - 16:14, 12 November 2020
- Software Systems The Verisoft Approach to Systems Verification5 KB (686 words) - 12:27, 12 September 2008
- ...cial issues of a high quality international journal and also in Journal of Security and Communication Networks published by John Wiley & Sons. * Security in Wireless and Pervasive systems5 KB (645 words) - 18:19, 15 September 2008
- ...d applications, and interactions of these applications with other types of systems. Management aspects related to these applications and challenges on special ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d18 KB (2,408 words) - 02:37, 16 December 2008
- |Title=8th International Conference on Information Systems Technology |Field=Information systems7 KB (763 words) - 12:25, 6 October 2011
- ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...Spatial databases; Time-series databases; RDF stores; Hybrid DB management systems11 KB (1,371 words) - 12:28, 18 May 2020
- ...emedicine, bioinformatics, finance and marketing, geographical positioning systems put pressure on database communities to push the ‘de facto’ methods to ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.)11 KB (1,446 words) - 18:26, 13 October 2008
- |Title=The 5th International Conference on Open Source Systems (F/OSS 2009) ** Testing, assuring and certifying F/OSS quality and security10 KB (1,349 words) - 16:42, 24 September 2008
- Software Security Agent-Based Software Systems2 KB (293 words) - 10:35, 24 June 2011
- ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust34 KB (4,565 words) - 22:20, 10 January 2018
- ...eory,design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust8 KB (1,037 words) - 22:20, 10 January 2018
- ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust9 KB (1,189 words) - 22:20, 10 January 2018
- systems. Aside from the regular presentations, the conference will include * Security, Privacy and Trust26 KB (3,456 words) - 22:20, 10 January 2018
- ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Fault-tolerant Distributed Systems10 KB (1,263 words) - 22:20, 10 January 2018
- ...ory, design and application of computer networks and distributed computing systems. Aside the regular presentation, the AINA meeting will include keynote addr * Fault-tolerant Distributed Systems12 KB (1,537 words) - 22:19, 10 January 2018
- ...design and application of communication networks and distributed computing systems. Aside from the regular presentation, the AINA meeting will include keynote * Security and Privacy8 KB (1,040 words) - 22:20, 10 January 2018
- | Title = Israeli Experimental Systems Conference | Field = Operating systems5 KB (777 words) - 05:50, 14 October 2008
- - Networking services for pervasive systems - Third and fourth generation systems4 KB (495 words) - 09:22, 22 August 2023
- • Cluster Architecture and Hardware Systems ◦ Parallel File Systems and I/O Libraries4 KB (452 words) - 17:47, 7 April 2021
- | Field = Embedded systems The first international conference on Sensor Systems and Software4 KB (519 words) - 16:13, 14 October 2008
- - Bring Safe, Self-x and Organic Computing Systems into Reality - ...omic Computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-he9 KB (1,216 words) - 17:32, 14 October 2008
- ...multimedia databases, digital and video libraries, compression and coding, security over the network. ...sing and environment control, video surveillance and intelligent transport systems, visual inspection and quality control, underwater robots.2 KB (268 words) - 17:47, 14 October 2008
- IEEE Symposium on Computational Intelligence in Cyber Security (CICS 2009) IEEE Workshop on Computational Intelligence in Vehicles and Vehicular Systems (CIVVS 2009)3 KB (376 words) - 17:47, 14 October 2008
- ...he way to innovative solutions for next generation wireless communications systems. o Security aspects in cross-layer designs3 KB (424 words) - 17:47, 14 October 2008
- ...e just entering the era of persuasive technology, of interactive computing systems designed to change people's attitudes and behaviors. Persuasive 2009 builds * Security and privacy8 KB (989 words) - 20:13, 22 February 2009
- | Title = The seventh ACS/IEEE International Conference on Computer Systems and Applications The seventh ACS/IEEE International Conference on Computer Systems4 KB (503 words) - 11:36, 18 October 2008
- | Field = Operating systems The WIOSC focuses on new and innovative concepts in the field of operating systems. The workshop welcomes contributions on general approaches and concepts, ne4 KB (508 words) - 21:48, 14 October 2008
- ...chnologies and radically new solutions relevant to development of computer systems and aims to foster communication among scientists and engineers to achieve ...eory, methodologies, technologies, and implementation of advanced computer systems and focusing on computing paradigms, computational models, application para4 KB (591 words) - 17:48, 14 October 2008
- ...of RFID technologies, their supporting large-scale distributed information systems and their applications. ...ed to the theory and practice of RF-based identification and communication systems. All submissions must describe original work not previously published or cu3 KB (431 words) - 17:48, 14 October 2008
- ...and academics interested in the latest development and design of wireless systems and networks. Sponsored by the IEEE Communications Society, IEEE WCNC has a • Machine learning for communication systems6 KB (731 words) - 10:33, 14 August 2023
- | Title = The Sixth IEEE International Symposium on Wireless Communication Systems 2009 ...sixth symposium, intends to bring together various wireless communication systems developers to discuss the current status, technical challenges, standards,3 KB (456 words) - 18:10, 14 October 2008
- ...ence series serves as the premier international forum addressing networks, systems, algorithms, and * Design, implementation, and evaluation of mobile systems and applications7 KB (974 words) - 12:28, 3 August 2023
- * Trust, reputation, security, and privacy in MBC Dickson K.W. Chiu, Dickson Computer Systems, HK, China5 KB (647 words) - 22:05, 14 October 2008
- ...e plays an important role in the scientific study at large and a number of systems have already furnished limited related functionalities, provenance has only ...ware engineering, workflow system, information retrieval, web service, and security research. At the same time, it also requires understanding of problems from3 KB (416 words) - 17:48, 14 October 2008
- * formal models of norms, normative systems, norm-governed societies * Intelligent legal tutoring systems7 KB (998 words) - 17:48, 14 October 2008
- | Title = The 6th IEEE International Conference on Embedded Software and Systems | Field = Embedded systems3 KB (375 words) - 17:48, 14 October 2008
- ...deployment of large-scale and high-performance FPGA-based applications and systems - e.g. DSP, networking or embedded system tools and methodologies. ...mpiled accelerators, reconfigurable computing, adaptive computing devices, systems and software, rapid-prototyping.4 KB (561 words) - 17:48, 14 October 2008
- ...Workshop on Dependability and Security in Complex and Critical Information Systems | Field = Computer security and reliability7 KB (960 words) - 17:48, 14 October 2008
- International Conference on Hybrid Systems: ...heory, as well as two additional areas of special emphasis: cyber-physical systems and embedded applications, benchmarks and tools.8 KB (939 words) - 17:48, 14 October 2008
- ...decade has witnessed a proliferation of powerful parallel and distributed systems and an ever increasing demand for practice of high performance computing an * Embedded systems19 KB (2,503 words) - 13:25, 28 October 2020
- * Security and privacy in vehicular networks * Experimental systems for vehicular networks3 KB (378 words) - 14:22, 24 August 2016
- landscape because it will enable new breeds of applications and systems to systems.7 KB (942 words) - 20:05, 14 October 2008
- * Testing of object-oriented systems * Distributed and concurrent object systems3 KB (328 words) - 20:05, 14 October 2008
- | Title = The 3rd International Symposium on Security and Multimodality in Pervasive Environments ...er hand, while enlarging and easing the ways to access to the environment, security threads arise and the environment must be properly equipped in order to pro3 KB (393 words) - 21:18, 14 October 2008
- | Field = Computer security and reliability ...nd test and stress equipment are on hand to demonstrate their products and systems to individuals and small groups. Attendees are encouraged to bring samples3 KB (467 words) - 21:39, 16 October 2008
- | Title = 3rd International Workshop on Scalable Stream Processing Systems 3rd International Workshop on Scalable Stream Processing Systems (SSPS 2009)3 KB (490 words) - 20:05, 14 October 2008
- + Security and information assurance Abstract: Database Management Systems form the core of the information7 KB (907 words) - 21:51, 14 October 2008
- # Semantics in P2P systems and grids # Semantic Web Trust, Privacy, Security and Intellectual Property Rights4 KB (450 words) - 20:05, 14 October 2008
- • Security, Survivability and Fault Tolerance ...rs and practitioners in the field of sensor, mesh, and ad hoc networks and systems. IEEE SECON grew out of the2 KB (244 words) - 20:05, 14 October 2008
- WINSYS is organized by INSTICC – Institute for Systems and Technologies of Information, Control and Communication ...ogether researchers, engineers and practitioners interested on information systems and applications in the context of wireless networks and mobile technologie9 KB (1,219 words) - 20:05, 14 October 2008
- ...urity and privacy challenges faced by the current and future collaborative systems and infrastructures. ...ns/experiences related to security and privacy solutions for collaborative systems. Topics of interest include, but are not limited to:4 KB (520 words) - 20:05, 14 October 2008
- | Title = 9th International Conference on New Technologies of Distributed Systems ...cits submissions on all topics related to New technologies and distributed systems, including but not limited to the following :2 KB (208 words) - 20:05, 14 October 2008
- • Ad-Hoc Wireless Networks, Adaptive Antenna Systems • Communciations Systems Software5 KB (530 words) - 10:27, 24 June 2011
- Expert Systems Information Systems3 KB (332 words) - 20:06, 14 October 2008
- |Field=Computer security and reliability ...communication and information systems. Moreover, there are other dedicated systems for data mining, recommenders, sensing, conflict detection, intrusion detec15 KB (2,175 words) - 21:03, 19 March 2013
- Home Gateway, DTV, Home Theater, PVR, Interconnects, Game Systems, Interactive and Directed Programming, Internet Integration, Next-Generatio Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability3 KB (354 words) - 20:06, 14 October 2008
- ...ital Services in eESociety, eGovernment /eGovernance, eHealth, Information Systems, and Information Management. These broad areas are divided into more detai - Delivery Systems and Environments6 KB (780 words) - 20:06, 14 October 2008
- ...= Fourth International Conference on Intelligent Computing and Information Systems ...tificial and computational intelligence as well as intelligent information systems.2 KB (193 words) - 20:06, 14 October 2008
- Adaptive Systems Agent-Based Systems3 KB (359 words) - 20:06, 14 October 2008
- | Title = The 29th Int'l Conference on Distributed Computing Systems (ICDCS 2009) o Distributed Operating Systems and Middleware2 KB (303 words) - 20:06, 14 October 2008
- |Title=3rd International Conference on Distributed Event-Based Systems ...sage-oriented middleware. The various communities dealing with event based systems have made progress in different aspects of the problem. The DEBS conference6 KB (829 words) - 15:30, 29 January 2021
- | Title = Sixth International Conference on Wireless On-demand Network Systems and Services On-demand Network Systems and Services6 KB (686 words) - 20:06, 14 October 2008
- | Title = IEEE International Conference on Systems, Man and Cybernetics 2009 IEEE International Conference on Systems, Man& Cybernetics6 KB (708 words) - 22:49, 14 October 2008
- ...and demanding settings, like manufacturing, healthcare, security, control systems, etc. ...ystems, production systems, decision support systems, knowledge management systems, etc.2 KB (261 words) - 22:45, 14 October 2008
- ...vasive healthcare seeks to respond to a variety of pressures on healthcare systems, including the increased incidence of life-style related and chronic diseas * Security and privacy in pervasive healthcare6 KB (732 words) - 22:45, 14 October 2008
- ...ectronic collaboration requires advancements in networking, technology and systems, user interfaces and interaction paradigms, and interoperation with applica ...oners, and students interested in collaborative networking, technology and systems, and applications.6 KB (674 words) - 22:45, 14 October 2008
- Data about the activities of user across systems and applications and within a multitude of contexts are an enabler for acce ...iven computing, context-driven computing, information retrieval, database systems, digital libraries, metadata, data mining, user modelling, social networks,6 KB (890 words) - 22:53, 14 October 2008
- | Title = VIII Brazilian Symposium on Human Factors in Computing Systems The Brazilian Symposium of Human Factors on Computer Systems (IHC) is the main forum of the Brazilian Human-Computer Interaction (HCI) c3 KB (502 words) - 22:53, 14 October 2008
- Theme: Computing for Next Generation Systems software development; COTS-based systems; requirements elicitation9 KB (1,193 words) - 22:53, 14 October 2008
- ...ktop interfaces, 3D virtual world environments, and multiple user embedded systems. ...machine interfaces, frameworks, reference models, architectures, tools and systems for CE4 KB (468 words) - 22:54, 14 October 2008
- | Title = Conference on Enterprise Information Systems | Field = Information systems9 KB (1,240 words) - 22:56, 14 October 2008
- ...ntific discovery, data visualization, causal induction and knowledge-based systems. B10. Security and Intrusion Detection2 KB (295 words) - 12:03, 18 October 2008
- ...ter presentations (25, 26, 27th Nov) and demonstrations of neuro-computing systems (26th Nov), followed by workshops. One Workshop on Perception and Control o ...ontrol, Arts and Design; Adaptive integrated/embedded systems; Agent based systems.5 KB (699 words) - 23:04, 14 October 2008
- | Title = Workshop on Logics for Intelligent Agents and Multi-Agent Systems Workshop on Logics for Intelligent Agents and Multi-Agent Systems (WLIAMAS 2008)5 KB (670 words) - 23:04, 14 October 2008
- CAART is organized by INSTICC (Institute for Systems and Technologies of Information, Control and Communication), with technical ...of Computational Intelligence and many other areas related to intelligent systems, on the other hand.18 KB (2,457 words) - 23:04, 14 October 2008
- ...ential specification language for anything ranging from real-time critical systems to networked infrastructures. It is logical techniques that link implementa - Foundations of security5 KB (799 words) - 21:49, 26 February 2020
- ...ases, social networks, distributed computing, web engineering, information systems, natural language processing, soft computing, and human-computer interactio ** Representing and reasoning about trust, privacy, and security6 KB (854 words) - 12:05, 28 May 2016
- �?� Artificial Intelligence and Intelligent Systems �?� Systems Modelling and Optimization13 KB (1,775 words) - 23:04, 14 October 2008
- | Title = International Conference on Artificial Intelligence: Methodology, Systems, Applications Artificial Intelligence: Methodology, Systems, Applications6 KB (827 words) - 23:04, 14 October 2008
- | Title = Sixth International Workshop on Intelligent Solutions in Embedded Systems | Field = Embedded systems2 KB (316 words) - 23:05, 14 October 2008
- ...ational Workshop on Computational Intelligence in Security for Information Systems568 bytes (62 words) - 23:05, 14 October 2008
- * Communication Systems and Networks * Cryptography and Network Security2 KB (167 words) - 23:05, 14 October 2008
- ...amalgamate ongoing research in distributed systems and complex multi-agent systems with the aim of strengthening the synergy between the two fields. * Security, Trust and Privacy4 KB (536 words) - 17:55, 10 February 2021
- |Title=International Conference on Autonomous Agents and Multi-Agent Systems - case studies and implemented systems2 KB (334 words) - 17:14, 12 November 2020
- * models of concurrency, security, and mobility * real-time, embedded and hybrid systems8 KB (1,085 words) - 18:01, 12 February 2009
- ...first-rate research that defines the cutting edge of future translations systems; case studies on practical uses of current translation systems in government and industry;16 KB (2,200 words) - 20:51, 18 February 2021
- languages; Cellular automata and systems; Combinatorial, analysis, foundations of hybrid and real-time systems; lambda5 KB (698 words) - 23:08, 14 October 2008
- |Title=ACM Symposium on Principles of Database Systems |Field=Database Systems3 KB (457 words) - 13:09, 7 December 2016
- * Energy-aware ICT infrastructure, e.g., energy aware systems and networking * Network and IT security issues in developing countries9 KB (1,127 words) - 17:19, 26 April 2011
- - Other aspects of modern information systems such as security, privacy,7 KB (851 words) - 05:29, 15 October 2008
- ...um for exploring research, development, and novel applications of database systems. The Twentieth Australasian Database Conference, ADC 2009, will be held in * Privacy and Security in Databases.2 KB (308 words) - 23:08, 14 October 2008
- Audio/Video Database Systems Cooperative Database Systems and7 KB (1,006 words) - 23:08, 14 October 2008
- * Data privacy and security * Security and privacy in data mining5 KB (661 words) - 16:23, 11 December 2008
- dedicated to non-functional properties of software systems and researches from language non-functional properties of software systems in Domain Specific Modeling Languages, and7 KB (791 words) - 23:09, 14 October 2008
- ...ition, databases and data warehousing, data visualization, knowledge-based systems, and high performance computing. By promoting novel, high quality research ...inclusion, in expanded and revised form, in the Knowledge and Information Systems journal published by Springer-Verlag.5 KB (634 words) - 15:36, 14 December 2008
- are the core of current Decision Support Systems. Traditionally, a data technologies for the design, management and use of information systems10 KB (1,288 words) - 11:52, 18 October 2008
- ...s and half a dozen of RDF stores, inferencing engines, or ontology mapping systems. ...ase, preference will be given to papers that describe software products or systems that are in wide (experimental) use.8 KB (1,081 words) - 08:21, 22 December 2011
- ...enging problems facing the development of future knowledge and information systems, and to shape future directions of research by soliciting and reviewing hig * High performance OLTP systems29 KB (4,077 words) - 18:04, 18 August 2023
- ...ld describe the development and operations of challenging database related systems and applications. * Privacy and security issues3 KB (452 words) - 23:09, 14 October 2008
- ...ial papers on the theory, design and implementation of digital information systems, as well as demonstrations, tutorials, workshops and industrial presentatio - Multimedia Information Systems4 KB (595 words) - 23:09, 14 October 2008
- * mobile database security * wireless multimedia systems7 KB (875 words) - 23:09, 14 October 2008
- | Title = Third International Workshop on Flexible Database and Information Systems Technology ...concerning every aspect of real life. Data are dealt with by heterogeneous systems, concern heterogeneous application domains, are structured in heterogeneous7 KB (917 words) - 23:09, 14 October 2008
- * Data privacy and security * Novel/ Advanced applications and systems6 KB (840 words) - 23:10, 14 October 2008
- |Title=Sixteenth Italian Symposium on Advanced Database Systems § Geographic Information Systems3 KB (305 words) - 08:44, 31 July 2020
- |Title=19th International Conference on Database and Expert Systems Aplications Information systems and database systems have always been a central topic of computer science. Additionally the4 KB (457 words) - 16:14, 16 December 2020
- | Title = Second Workshop on Scalable Data Management, Applications and Systems Second International Workshop on Scalable Data Management Applications and Systems5 KB (644 words) - 23:10, 14 October 2008
- | Title = 3rd Workshop on Data Storage Devices and Systems ...related to the design, development, and evaluation of storage devices and systems. DS2 2008 builds on the success of previous workshops in this series held i4 KB (539 words) - 23:10, 14 October 2008
- ...beyond the capabilities of traditional database and information retrieval systems. These challenges include the development of effective and efficient techni ...l papers on the theory, design and implementation of Web-based information systems, as well as proposals for demonstrations, tutorials and panels. WAIM'08 is10 KB (1,376 words) - 23:10, 14 October 2008
- * Data security, privacy and trust * Distributed information systems4 KB (593 words) - 23:10, 14 October 2008
- · Security control in grid workflow systems · Interoperability between grid workflow systems7 KB (886 words) - 23:10, 14 October 2008
- ...that XML is the main means towards this new generation of data management systems. Following the experience of previous editions of DataX 2004 and DataX 2006 * XML retrieval in P2P systems3 KB (475 words) - 23:10, 14 October 2008
- ...designed using database principles (and vice versa), to network monitoring systems that depend on advanced data management and analysis capabilities�?? sugg * Network algorithms and theory applied to database systems3 KB (332 words) - 23:10, 14 October 2008
- * Privacy and security in Auto ID systems4 KB (471 words) - 23:10, 14 October 2008
- reliability, integrity, privacy, and security issues are still being policy. Furthermore, the complexity of security increases as7 KB (908 words) - 23:10, 14 October 2008
- | Title = 3rd International Workshop on Workflow Systems in e-Science ...as on scientific workflow management and e-Science. Live demos of workflow systems and workflow application are welcome.4 KB (560 words) - 23:10, 14 October 2008
- ...alable, robust and efficient for developing numerous original services and systems. * Embedded Database Systems2 KB (324 words) - 16:49, 16 December 2020
- Best practices for application systems * Building Learning Systems from Reusable and Interoperable Software Components4 KB (503 words) - 23:11, 14 October 2008
- * Adaptive Web Systems * Antenna Systems3 KB (339 words) - 23:11, 14 October 2008
- ...on Networking, sponsored by the IFIP Technical Committee on Communication Systems (TC 6). The main objectives of Networking 2009 are to bring together member ...tures and protocols, network measurements and testbeds, network management systems, content distribution, peer to peer and overlay networks, pricing and billi7 KB (981 words) - 03:18, 6 January 2009
- | Title = Tenth Workshop on Mobile Computing Systems and Applications ...of highly selective, interactive workshops focused on mobile applications, systems, and environments, as well as their underlying state-of-the-art technologie2 KB (243 words) - 23:11, 14 October 2008
- 9. Information Security Technologies 11. Multimedia & Internet Systems, Services and Standards2 KB (200 words) - 23:11, 14 October 2008
- | Title = The First International Conference on COMunication Systems and NETworks The First International Conference on COMunication Systems and NETworks4 KB (465 words) - 23:11, 14 October 2008
- * Grid Computing / Multi-Agent Systems * Network Security & Reliability4 KB (559 words) - 23:11, 14 October 2008
- 6. Optical Networks and Systems Symposium 11. Communication and Information Systems Security Symposium3 KB (431 words) - 09:18, 4 August 2023
- P2P Systems Wireless Communication Systems and Applications7 KB (990 words) - 23:11, 14 October 2008
- | Title = Security and Privacy in Telecommunications and Information Systems | Field = Computer security and reliability4 KB (587 words) - 23:30, 14 October 2008
- ...iscuss the continuous and fast advances in several areas of communications systems and networks. The IWT'09 organizing committee invites you to submit origina - Computer and Communications Network Security3 KB (375 words) - 23:37, 14 October 2008
- ...al Conference on Bio-Inspired Models of Network, Information and Computing Systems ...l Conference on Bio-Inspired Models of Network, Information, and Computing Systems5 KB (694 words) - 23:11, 14 October 2008
- ...International Symposium on Intelligent Signal Processing and Communication Systems ...International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS) is one of the most well known international symposiums in signal p4 KB (496 words) - 23:12, 14 October 2008
- ...onal Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems Modeling, Analysis and Simulation of Wireless and Mobile Systems.4 KB (596 words) - 23:12, 14 October 2008
- | Title = IEEE International Symposium on Wireless Communication Systems 3G, 4G and beyond systems2 KB (244 words) - 23:12, 14 October 2008
- 1 .13 Optical systems, Networks and Applications 2. Transmission Systems and Technologies2 KB (250 words) - 23:12, 14 October 2008
- o Satellite systems/networks and high altitude platforms o Security and privacy9 KB (1,117 words) - 23:12, 14 October 2008
- Communication Systems - Network Security3 KB (465 words) - 23:13, 14 October 2008
- ...rage contributions on policy-based techniques in support of management and security of all types of wireless networks: cellular, Wi-Fi, Mobile Ad Hoc, hybrids, ...a special session devoted to the demonstrations of innovative policy based systems. Papers must describe original work and must not have been accepted or subm5 KB (667 words) - 23:13, 14 October 2008
- ...microwaves, antennas and propagation, and electronic circuits, devices and systems. ...peaceful country in a turbulent area, enjoys extreme levels of safety and security. Jordanian people are internationally known for generosity, hospitality and2 KB (260 words) - 23:13, 14 October 2008
- * Computer Networks and Security * Neural Networks and Intelligent Systems2 KB (283 words) - 23:13, 14 October 2008
- | Title = Fifth Annual Conference on Wireless On demand Network Systems and Services * Security3 KB (413 words) - 23:13, 14 October 2008
- | Title = 5th USENIX Symposium on Networked Systems Design and Implementation The 5th USENIX Symposium on Networked Systems Design and Implementation4 KB (528 words) - 23:13, 14 October 2008
- embedded systems for aerospace, automotive, military, E-commerce, and application-level reliability & performance, security, QoS assurance,5 KB (651 words) - 23:13, 14 October 2008
- and design of wireless systems. Sponsored by the IEEE Communications - B3G Systems, WiMAX and WLAN3 KB (343 words) - 10:31, 14 August 2023
- ...challenging and time consuming task. Autonomic computing systems, that is, systems that are based on self-configuring and self-managing elements, have emerged * Multi-Agent Systems Architectures for Autonomic Web-Services and their Environments3 KB (415 words) - 23:13, 14 October 2008
- Theme: Designing e-Business Systems: Markets, Services and Networks ...real-world impact of e-Business research, and customer-centric information systems respectively. With this year?s workshop being located in Europe, we feel th3 KB (430 words) - 23:13, 14 October 2008
- *Security and privacy in Web search and mining *User profiling and recommendation systems2 KB (237 words) - 12:23, 11 September 2020
- | Title = International Workshop on Security in Opportunistic and SOCial Networks ...rations raise entirely new privacy concerns and require new reflections on security problems.4 KB (457 words) - 23:13, 14 October 2008
- ...rk that demonstrate current research in all areas of Web based information systems and their applications in science, technology, business and commerce. You Web Services Security3 KB (494 words) - 23:16, 14 October 2008
- ...social websites and instant messaging systems. Due to the success of such systems, numerous web users everyday use the Web as a social medium to interact wit ...os, audio recordings) in bibliometrics (publication patterns), in homeland security (terrorist networks).3 KB (453 words) - 23:14, 14 October 2008
- | Title = 27th International Symposium on Reliable Distributed Systems | Field = Embedded systems2 KB (255 words) - 23:14, 14 October 2008
- networks, including user behavior models, security and trust, P2P, issues, and practices on government systems.7 KB (813 words) - 23:14, 14 October 2008
- products, including experimental efforts, innovative systems and * Quality of service in Web Services systems (real-time8 KB (1,158 words) - 23:14, 14 October 2008
- * Data Models for Web Information Systems * Query languages and systems for XML and Web data3 KB (250 words) - 23:14, 14 October 2008
- ...or present insightful results based on practical experience with computer systems. The USENIX conference has a broad scope, and specific topics of interest i * Distributed and parallel systems6 KB (869 words) - 23:14, 14 October 2008
- ...l issue of International Journal of Autonomous and Adaptive Communications Systems will cover the following topical areas but are not limited to them: * Security of WiMAX in NGN1 KB (181 words) - 23:14, 14 October 2008
- * Security * Peer-to-peer systems3 KB (308 words) - 23:15, 14 October 2008
- | Title = 6th USENIX Symposium on Networked Systems Design and Implementation Krishna Gummadi, Max Planck Institute for Software Systems8 KB (1,093 words) - 23:15, 14 October 2008
- |Title=19th International Conference on Autonomous Agents and Multi Agent Systems |Field=Computer Science, Artificial Intelligence,Multi Agent Systems6 KB (659 words) - 17:41, 11 February 2021
- ...h findings on next-generation networked multimedia concepts, technologies, systems, and applications for entertainment covering existing deployments, current * QoS and Security Support for Entertainment8 KB (1,011 words) - 23:15, 14 October 2008
- * Systems and Architectures for P2P Based Web Search * P2P Information Search Systems and Architectures5 KB (554 words) - 23:15, 14 October 2008
- ...EE 3rd International Workshop on Distributed Autonomous Network Management Systems Management Systems6 KB (663 words) - 23:15, 14 October 2008
- collaborators. Technology has evolved from standalone tools, to open systems supporting collaboration in in networking, technology and systems, user interfaces and interaction paradigms, and interoperation with8 KB (1,093 words) - 23:15, 14 October 2008
- 1-03 Heterogeneous and multimedia Systems 1-06 Ubiquitous computing systems5 KB (623 words) - 23:15, 14 October 2008
- NPSec 2008 particularly welcomes new ideas on security in the context of Internet security and new primitives for supporting secure network protocol4 KB (493 words) - 23:15, 14 October 2008
- systems * Giuseppe Persiano: Security of networks of low capability devices4 KB (563 words) - 23:15, 14 October 2008
- * Design of monitoring systems, sampling methods, signal processing methods * Network security threats and countermeasures3 KB (313 words) - 23:15, 14 October 2008
- ...w requirements and challenges on treatment of traffic within communication systems a certain degree of multilayer co-operation has to be achieved. This forms ...* Medium Access Control Protocols and Scheduling Techniques for Wireless Systems5 KB (598 words) - 10:18, 29 May 2016
- | Title = 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services ...d successful ubiquitous systems. Areas addressed by the conference include systems, applications, service-oriented computing, middleware, networking, agents,5 KB (599 words) - 23:15, 14 October 2008
- | Title = 18th International workshop on Network and Operating Systems Support for Digital Audio and Video ...invited to present prototypes of their software, demos, or entire research systems online and interactively.3 KB (322 words) - 23:15, 14 October 2008
- | Title = The Third International ICST Conference on Scalable Information Systems The Third International ICST Conference on Scalable Information Systems4 KB (491 words) - 23:16, 14 October 2008
- - Communication systems and networks - Information forensics and security2 KB (253 words) - 23:16, 14 October 2008
- * Design and implementation of signal processing systems * Information forensics and security4 KB (490 words) - 22:46, 4 February 2009
- * A Student Paper Contest with awards sponsored by Canon Information Systems Research Australia (CiSRA). To enter the contest a paper submission must ha * Hybrid multimedia processing technology and systems incorporating bio-inspired and conventional methods.4 KB (443 words) - 17:06, 24 February 2016
- Communication Systems Spread Spectrum Systems3 KB (362 words) - 23:17, 14 October 2008
- Nonlinear signals and systems Multimedia and Communication Systems4 KB (438 words) - 23:17, 14 October 2008
- ...rks and protocols, wireless communications, machine learning, and embedded systems design. The Information Processing (IP) track will focus on algorithms, systems, and theory pertaining to information processing using networks of embedded4 KB (570 words) - 23:17, 14 October 2008
- Design and implementation of signal processing systems Information forensics and security3 KB (450 words) - 23:04, 4 February 2009
- ...tions in the design, implementation, evaluation, and deployment of storage systems. The conference will consist of two and a half days of technical presentati * Archival storage systems3 KB (345 words) - 14:50, 26 December 2011
- |Title=The First International Workshop on the Critical Computer Based Systems ...l results relevant to the engineering of highly sophisticated and critical systems that are used in automotive, avionics, railway, naval, chemical, nuclear, m5 KB (660 words) - 16:46, 27 December 2015
- ...r-related research domains that increasingly play a key role in connecting systems across network centric environments to allow distributed computing and info * OSS and security, security implication of OSS, security concerns in using OSS5 KB (697 words) - 23:18, 14 October 2008
- + Security, Privacy and Open Source TRACK - Security, privacy and trust methods and solutions for enabling e-Business5 KB (594 words) - 16:29, 25 March 2020
- # security technology and systems # Software Engineering of Autonomic Grid Computing Systems and Applications6 KB (733 words) - 12:48, 27 October 2016
- | Title = The Second IEEE International Workshop on Security in Software Engineering | Field = Computer security and reliability5 KB (615 words) - 09:55, 29 May 2016
- Cyber Security Handheld Devices and Systems3 KB (427 words) - 17:01, 29 May 2016
- ...the development process. With the spread of service-oriented and autonomic systems, software quality is continuously negotiated and adapted at run-time. Requi ...nt original work. Contributions from cognate areas such as formal methods, systems engineering, human and computer interaction, economics and management and s4 KB (503 words) - 23:18, 14 October 2008
- ...es in current systems and potential concerns in the field of communication systems and middleware. The conference will feature a high quality technical progra * Achieving security, reliability, and quality of service in3 KB (358 words) - 23:18, 14 October 2008
- | Title = 2008 ESA Workshop on Avionics Data, Control and Software Systems ESA Workshop on Avionics Data, Control and Software Systems (ADCSS)18 KB (2,714 words) - 23:23, 14 October 2008
- ...his has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society tha3 KB (404 words) - 23:18, 14 October 2008
- Study of these large-scale social networking systems, their to recommendation systems, targeted advertising, and classification/5 KB (592 words) - 23:18, 14 October 2008
- ...ch adapt their behavior to the user preferences and needs, and recommender systems that predict the relevance of diverse items (e.g., movies, travels, product - User profiling in adaptive systems4 KB (570 words) - 23:19, 14 October 2008
- |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability4 KB (487 words) - 10:42, 21 August 2020
- | Title = Second ACM Conference on Wireless Network Security | Field = Computer security and reliability2 KB (291 words) - 23:19, 14 October 2008
- | Title = Work in Progress Session of the 29th International Real-Time Systems Symposium research in real-time systems, theory, and applications. The primary2 KB (322 words) - 00:35, 15 October 2008
- | Title = 16th Annual Network and Distributed System Security Symposium | Field = Computer security and reliability5 KB (673 words) - 23:19, 14 October 2008
- | Title = Ubiquitous Computing Security Systems | Field = Computer security and reliability3 KB (328 words) - 06:40, 22 December 2012
- | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability6 KB (697 words) - 23:19, 14 October 2008
- | Title = The First ACM Computer Security Architecture Workshop | Field = Computer security and reliability5 KB (619 words) - 23:19, 14 October 2008
- | Title = Sixth Annual Conference on Privacy, Security and Trust | Field = Computer security and reliability6 KB (736 words) - 23:20, 14 October 2008
- | Title = The Sixth International Workshop on Security In Information Systems | Field = Computer security and reliability590 bytes (68 words) - 23:20, 14 October 2008
- | Title = Special Session on Systems and Information Security | Field = Computer security and reliability541 bytes (61 words) - 23:20, 14 October 2008
- | Title = 2008 Workshop on Security and High Performance Computing Systems | Field = Computer security and reliability574 bytes (65 words) - 23:20, 14 October 2008
- services. The major emphasis of the workshop this year is security of wireless applications. What are the real security threats towards5 KB (663 words) - 23:20, 14 October 2008
- | Field = Computer security and reliability ...throughout the entire product development cycle in software, hardware, and systems are encouraged. The conference will bridge theory, applications, experience3 KB (337 words) - 23:20, 14 October 2008
- | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security | Field = Computer security and reliability4 KB (565 words) - 23:20, 14 October 2008
- | Title = 23rd International Information Security Conference | Field = Computer security and reliability5 KB (637 words) - 23:20, 14 October 2008
- | Field = Computer security and reliability ...of these innovative materials in secure wireless and optical communication systems, antennas, high-speed circuits, optical sensing, nanoscale imaging and cloa2 KB (276 words) - 23:20, 14 October 2008
- | Title = IEEE Symposium on Security and Privacy | Field = Computer security and reliability2 KB (262 words) - 23:20, 14 October 2008
- |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability6 KB (689 words) - 10:39, 21 August 2020
- | Title = SPIE Defense and Security Symposium | Field = Computer security and reliability1 KB (167 words) - 23:20, 14 October 2008
- | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability4 KB (502 words) - 23:20, 14 October 2008
- multimedia systems, technologies and applications. ICME is co-sponsored by four Systems Society, and the Communications Society).3 KB (425 words) - 23:20, 14 October 2008
- - Personalization, Privacy and Security in Mobile Computing - Distributed Systems Aspects of Mobile Computing10 KB (1,262 words) - 23:20, 14 October 2008
- * Multimedia systems, architecture, and applications * Peer-to-peer multimedia systems and streaming5 KB (595 words) - 23:20, 14 October 2008
- -Pervasive and interactive multimedia systems -Multimedia systems, architecture, and applications for UMC4 KB (573 words) - 23:20, 14 October 2008
- ...state-of-the-art research, development, and implementations of multimedia systems, technologies and applications. ICME is co-sponsored by four IEEE societies including the Circuits and Systems Society, the Com-munications Society, the Computer Society, and the Signal2 KB (296 words) - 23:20, 14 October 2008
- | Title = Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques | Field = Systems6 KB (837 words) - 23:21, 14 October 2008
- ...as of on-line and off-line recognition of handwriting, pen-based interface systems for the processing of multilingual handwritten documents and forms. The pro · Systems and Architectures3 KB (364 words) - 23:21, 14 October 2008
- * Functional Programming and Security * Functional Programming to Animate/Prototype/Implement Systems from Formal or Semi-Formal Specifications5 KB (636 words) - 23:22, 14 October 2008
- Service Security, Privacy and Trust Security, Privacy and Trust in Business Process Management18 KB (2,352 words) - 23:23, 14 October 2008
- ...and the years to come will witness a proliferation in the use of advanced systems. - Security, Privacy and Trust3 KB (357 words) - 23:23, 14 October 2008
- ...existing computer technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in existing IT services. * Multimedia Systems3 KB (415 words) - 23:23, 14 October 2008
- ...s, proof theory, reasoning about security, rewriting, specifications, type systems and type theory, and verification. We welcome submissions in emergent areas2 KB (285 words) - 15:11, 7 November 2016
- Information Security and Cryptography Information Systems3 KB (412 words) - 19:34, 12 November 2020
- ...g in a wide range of areas, as diverse as medicine, robotics, defense, and security. As a rule, the processed data are discrete; therefore, the "discrete appro ...re invited to submit original papers describing in detail working computer systems for image analysis. The algorithms should mostly be based on discrete/combi6 KB (814 words) - 23:25, 14 October 2008
- ..., computer vision, image analysis, signal processing, statistics, computer security, etc. The purpose of this conference is to provide a scientific forum for r * real-time embedded biometric systems3 KB (325 words) - 23:50, 14 October 2008
- | Title = 8th International Workshop on Pattern Recognition in Information Systems Pattern Recognition in Information Systems4 KB (550 words) - 23:25, 14 October 2008
- | Title = The Fourth International Conference on Systems | Field = Systems11 KB (1,492 words) - 23:26, 14 October 2008
- | Field = Systems ...tions in the design, implementation, evaluation, and deployment of storage systems. The conference will consist of two and a half days of technical presentati4 KB (547 words) - 23:26, 14 October 2008
- | Title = The Third International Conference on Systems | Field = Systems6 KB (765 words) - 23:26, 14 October 2008
- ...the International Council on Systems Engineering and 6th Biennial European Systems Engineering Conference | Field = Systems2 KB (309 words) - 23:26, 14 October 2008
- | Field = Computer security and reliability ** Fault injection, detection, Error modeling, Fail-safe and fail-stop systems, Time and space redundancy, dRedundancy/dEnergy (dR/dE) -efficient architec5 KB (598 words) - 01:12, 31 May 2012
- ...onference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '09) |Field=Operating Systems3 KB (406 words) - 17:39, 30 September 2016
- ==Architectures for Distributed Systems== Hawaii International Conference of Systems Sciences6 KB (761 words) - 03:28, 6 January 2009
- ...approaches to the design and implementation of high-performance computing systems. These boundaries between state of the art and innovation constitute the co ...ontiers of computer science and engineering and that will provide advanced systems for current and future applications.3 KB (376 words) - 23:27, 14 October 2008
- * Memory systems * Hardware support for security2 KB (259 words) - 10:14, 29 May 2016
- ...ns and required attributes, such as reliability, availability, safety, and security, as well as human factors. ...r the design, validation, operation and evaluation of dependable computing systems. All kinds of faults are of interest, from traditional hardware and softwar4 KB (528 words) - 23:27, 14 October 2008
- | Title = Cognitive Radio Systems Call for papers: Cognitive Radio Systems3 KB (409 words) - 23:27, 14 October 2008
- - Distributed systems - Network security3 KB (413 words) - 23:28, 14 October 2008
- | Field = Control systems A Special Session on `Design, Analysis and Tools for Integrated Circuits and Systems is organized. Authors who are interested in the special session need to sub4 KB (561 words) - 23:29, 14 October 2008
- * Biologically inspired systems * Multirobot systems3 KB (423 words) - 23:29, 14 October 2008
- ...e = Workshop on Compositional Theory and Technology for Real-Time Embedded Systems (co-located with RTSS 2008) | Field = Real-time systems6 KB (707 words) - 23:29, 14 October 2008
- |Title=The 6th ACM Conference on Embedded Networked Sensor Systems ...omputer Science, Embedded systems, Embedded Network Sensor Systems, Sensor Systems6 KB (771 words) - 16:09, 16 September 2019
- | Title = Third Embedded Systems Week (jointly CODES+ISSS, EMSOFT, and CASES) | Field = Embedded systems11 KB (1,352 words) - 00:33, 15 October 2008
- ...PLAN/SIGBED 2008 Conference on Languages Compilers, and Tools for Embedded Systems | Field = Embedded systems5 KB (673 words) - 23:30, 14 October 2008
- | Title = 20th EuroMicro Conference on Real-Time Systems | Field = Embedded systems7 KB (870 words) - 23:30, 14 October 2008
- | Field = Embedded systems developing systems in a time and cost effective way. Central in this4 KB (537 words) - 23:30, 14 October 2008
- ...etworks, Web services, distributed computing, Web engineering, information systems, natural language processing, multimedia, and human-computer interaction. Trust, Provenance, Security, Privacy, Identity and the Semantic Web4 KB (573 words) - 23:31, 14 October 2008
- | Title = 3rd IEEE International Workshop on Engineering Semantic Agent Systems ...Research and Development of Software Agents, Mobile Agents and Multi-Agent Systems towards INTEGRATING THE DISTRIBUTED WORLDS.10 KB (1,391 words) - 23:31, 14 October 2008
- | Title = The 3rd International Workshop on Real Overlays And Distributed Systems ...place to share new experiences, and work in progress, with an emphasis on systems that actually run in the wide-area Internet.4 KB (577 words) - 23:31, 14 October 2008
- | Title = Track on Dependable and Adaptive Distributed Systems at SAC | Track on Dependable and Adaptive Distributed Systems (DADS) |8 KB (952 words) - 23:31, 14 October 2008
- Distributed OO systems Distributed operating systems5 KB (702 words) - 23:31, 14 October 2008
- | Title = First IEEE/ACM Workshop on Applied Ontologies in Distributed Systems First IEEE/ACM Workshop on Applied Ontologies in Distributed Systems (WAODS)4 KB (523 words) - 23:31, 14 October 2008
- workflow systems are increasingly being developed to enable Although existing workflow systems are able to support complex6 KB (750 words) - 23:31, 14 October 2008
- ...ication, design, verification, validation, testing, maintenance, system of systems, etc. ...ting, sensor networks, inter-operability, security, trusted and dependable systems, fault tolerance, virtual subnets for ORC.3 KB (377 words) - 23:31, 14 October 2008
- - Type systems and program logics - Debugging techniques and tools - Checking or improving the safety, security, or correctness of programs5 KB (667 words) - 14:18, 25 November 2016
- ...and practical implementation techniques such as rule-based transformation systems. In addition, the scope of PEPM covers manipulation and transformations of ...sis, binding-time analysis, dynamic analysis, constraint solving, and type systems.4 KB (468 words) - 23:32, 14 October 2008
- ...ication, design, analysis, and implementation of programming languages and systems. ESOP 2009 is the eighteenth edition in this series and seeks contributions ...semantics, program verification, static analysis, testing, language-based security.6 KB (824 words) - 23:32, 14 October 2008
- ...he conference covers optimization for parallelism, performance, power, and security, where that optimization occurs in the mapping from an input (including API ...Thread extraction and thread-level speculation, especially for multi-core systems3 KB (342 words) - 23:32, 14 October 2008
- ...ng together researchers in the fields of microarchitecture, compilers, and systems for technical exchange. The MICRO community has enjoyed having close intera ...and hybrid techniques for improving system performance, energy-efficiency, security, cost, complexity, programmer productivity, predictability, quality of ser5 KB (580 words) - 10:32, 12 May 2020
- |Has host organization=USENIX The Advanced Computing Systems Association ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more.4 KB (577 words) - 09:28, 12 May 2020
- * probabilistic systems * real-time systems5 KB (656 words) - 11:29, 27 August 2020
- * Specifications and correctness criteria for programs and systems * Hybrid systems and embedded systems verification2 KB (291 words) - 11:09, 20 November 2020
- * Cloud, datacenter, cluster/distributed systems * Security3 KB (327 words) - 13:11, 11 May 2020
- *Big Data platforms with applications to network management, security, measurements *Experience and lessons learned by deploying large-scale networked systems4 KB (514 words) - 12:03, 6 April 2020
- * Security * Type systems and program logics5 KB (678 words) - 20:58, 26 November 2016
- ...Techniques for optimizing for parallelism, especially for multi-core systems �?� Optimization techniques for security and reliability2 KB (201 words) - 23:32, 14 October 2008
- SUMMARY: Reliability, safety, and security are among the most critical requirements of contemporary software. The appl ...process must remain focused on the importance of reliability, safety, and security; our educational institutions must fully integrate these concerns into thei8 KB (1,079 words) - 23:32, 14 October 2008
- ...plication disciplines covered include advanced telecommunication; computer systems; military, government & aerospace; environment, energy, and other industrie ...rogram Chair: LTC Robert Kewley, PhD, Director of Information Engineering, Systems Engineering Department, US Military Academy at West Point6 KB (735 words) - 23:32, 14 October 2008
- ...facturing technology; intelligent inspection, diagnosis and classification systems; robotic automation; special service robots; modular robots; spherical robo ...ternet technologies, multimedia, wireless communications, data privacy and security, authentification, authorization and federation.4 KB (504 words) - 23:33, 14 October 2008
- Topics of legal and social aspects of information systems include but are not limited to: Trust, security, and privacy8 KB (1,075 words) - 23:52, 14 October 2008
- | Title = 12th International Conference on Business Information Systems | Field = Information systems9 KB (1,134 words) - 01:18, 1 February 2009
- We are now seeing increasing deployment of biometric systems in many aspects of life, including face, fingerprint, gait and iris recognition systems at airports as well3 KB (430 words) - 00:41, 15 October 2008
- ?Resource Management Model in Grid ?Internet-based Multi-agent Systems ?Nature-Inspired Computing ? Autonomous Computing ?Internet-based Intellige (4) Systems, Tools and Applications3 KB (367 words) - 23:35, 14 October 2008
- ...Conference on Security and Privacy in Mobile Information and Communication Systems ...edge researchers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymaker4 KB (451 words) - 23:37, 14 October 2008
- * foundations of security * software engineering of service oriented systems6 KB (682 words) - 10:18, 14 April 2020
- ...these general themes, DEON2008 will encourage a special focus on the topic Security and Trust. * the logical study of normative reasoning, including formal systems of deontic logic, defeasible normative reasoning, the logic of action, and5 KB (587 words) - 23:37, 14 October 2008
- fields in computer communications and distributed systems such as sensor - Security4 KB (483 words) - 23:37, 14 October 2008
- ...ibuted computation, remote sensing, environmental monitoring, and embedded systems. All papers submitted to this conference will be double-blind reviewed by SECURITY11 KB (1,533 words) - 23:38, 14 October 2008
- Research on intelligent information agents and systems is inherently Internet and Web technologies, information systems, information retrieval,9 KB (1,215 words) - 23:38, 14 October 2008
- technology aspects of agents and multiagent systems. Building complex agent systems calls for models and technologies that en-8 KB (840 words) - 23:38, 14 October 2008
- * Mobility models & systems * Security, trust, & privacy3 KB (380 words) - 19:34, 17 November 2008
- * Information Security and Cryptography * Information Systems3 KB (386 words) - 23:39, 14 October 2008
- - Parallel File Systems and I/O Libraries - Security and Reliability5 KB (606 words) - 14:17, 8 April 2021
- MEASUREMENT SYSTEMS Automated test & diagnostics systems3 KB (360 words) - 23:39, 14 October 2008
- ...el and emergent applications in smart sensors, biology, homeland security, systems health management, and related areas. Collaborate and network with scientis1 KB (164 words) - 23:39, 14 October 2008
- ...researchers in fields related to microarchitecture, compilers, chips, and systems for technical exchange on traditional microarchitecture topics and emerging * Microarchitecture support for reliability, dependability, and security3 KB (326 words) - 17:43, 8 November 2008
- | Title = 12th Workshop on Hot Topics in Operating Systems | Field = Operating systems6 KB (781 words) - 23:39, 14 October 2008
- Topics of interest include high performance algorithms, systems, * Systems Biology7 KB (876 words) - 23:40, 14 October 2008
- | Title = IEEE 11th International Symposium on High-Assurance Systems Engineering | Field = Computer security and reliability6 KB (748 words) - 14:43, 27 December 2015
- | Title = IASTED International Conference on Power and Energy Systems Power and Energy Systems8 KB (1,082 words) - 23:40, 14 October 2008
- reputation. Computational trust has been used in reputation systems, * Recommender and reputation systems4 KB (499 words) - 23:42, 14 October 2008
- | Title = Fourth International Workshop on the Value of Security through Collaboration ...ties of the ecosystem where the nodes operate may be guaranteed. Thus, the security property of the ecosystem may be driven by self-organizing mechanisms. Depe3 KB (420 words) - 23:42, 14 October 2008
- ward data management. The use of a mobile wireless infrastructure can lead to security and reliability problems. Mobile devices often have usability ...ern healthcare management, ubiquitous and mobile work and dependability of systems. However, while6 KB (771 words) - 23:42, 14 October 2008
- ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network ...ion, e-commerce, e-learning, recommendation, personalization - Intelligent systems and techniques2 KB (303 words) - 23:42, 14 October 2008
- | Title = Third International Workshop on Pervasive Systems Third International Workshop on Pervasive Systems (PerSys'08)6 KB (763 words) - 23:42, 14 October 2008
- PODC solicits papers on all areas of distributed systems. We encourage submissions dealing with any aspect of distributed computing Topics of interest include the following subjects in distributed systems:6 KB (766 words) - 13:19, 28 November 2016
- ..., security, and dependability constraints. Effective construction of these systems is not limited solely to the field of computer science and engineering and2 KB (249 words) - 23:44, 14 October 2008
- |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols13 KB (1,617 words) - 19:03, 24 November 2008
- ** Security, Privacy, and Trust * [[has advisory chair::Mathilde Benveniste]], Wireless Systems Research/En-aerion, USA5 KB (670 words) - 15:15, 16 February 2009
- ...ion; All-IP versus protocol translation; IP simplified network management; Security, trust, and privacy; Network stability under topology change; Delay-toleran ...Internet and smart homes; Internet and Web services; Internet and tracking systems; Internet and ehealth/telemedicine; Internet and sensor networks; Internet7 KB (883 words) - 17:35, 7 January 2021
- * Virtual organization and security issues of instruments and sensors on the Grid * Real-time instrument and sensor systems4 KB (642 words) - 21:17, 9 December 2008
- characterising the behavior and determining the properties of systems. They reliability, security and trust). Such quantities play a central role in6 KB (823 words) - 14:28, 14 December 2008
- |Type=Computer dependability, Critical Infrastructure Security ...Editor in Chief for the "International Journal of Critical Computer-Based Systems" (IJCCBS, Inderscience Publishers).1 KB (186 words) - 17:22, 5 February 2009
- ...Architecture, Associate Editor of Journal of Complex Based Safety-Critical Systems, Guest Editor (Hassan Reza and Jon Whittle) for the Special Issue in Softwa ...are Architecture in the engineering and testing of data analytics software systems (AKA BigData);1 KB (187 words) - 21:13, 12 July 2020
- ...f Academic Excellence in Information Assurance Education from the National Security Agency.2 KB (331 words) - 05:33, 5 January 2009
- development of systems and commercial applications, the capability of large-scale application domains such as Healthcare, Cyber-Physical Systems,7 KB (922 words) - 00:58, 9 January 2009
- |Title=Web Information Systems Modeling Modern Web Information Systems need to fulfill a large number of8 KB (1,101 words) - 15:16, 12 January 2009
- ** mLearning management systems (mLMSs) ** Privacy and security11 KB (1,366 words) - 16:44, 14 January 2009
- |Title=21st EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS |Field=Real-time Systems5 KB (720 words) - 14:46, 17 January 2009
- - Systems multimedia and animation distributed - Distributed Operating Systems6 KB (812 words) - 12:55, 18 January 2009
- Co-hosted by General Dynamics C4 Systems, and the MITRE Corporation The Electronic Systems Center at Hanscom AFB is the MILCOM Department of Defense Advisor.5 KB (526 words) - 01:02, 2 February 2009
- | Title = 3rd International Conference on Network and System Security 3rd International Conference on Network and System Security (NSS 2009)12 KB (1,669 words) - 12:58, 18 January 2009
- o Integrated information systems o Multimedia systems5 KB (567 words) - 12:58, 18 January 2009
- | Title = 3rd International Workshop on Secure systems methodologies using patterns (SPattern'09) 3rd International Workshop on Secure systems methodologies6 KB (740 words) - 12:58, 18 January 2009
- theory, systems, and applications for electronic commerce. The Tenth ACM o Experience with e-commerce systems and markets9 KB (1,221 words) - 12:58, 18 January 2009
- part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...nals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.5 KB (633 words) - 12:58, 18 January 2009
- | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)16 KB (2,178 words) - 12:59, 18 January 2009
- | Title = 4th IEEE Symposium on Industrial Embedded Systems | Field = Embedded systems3 KB (337 words) - 12:59, 18 January 2009
- | Title = Sixth international Workshop on Programming Multi-Agent Systems Programming Multi-Agent Systems (ProMAS'09)8 KB (977 words) - 12:59, 18 January 2009
- ...rn distributed data, information and knowledge management applications and systems. Distributed XML processing deals with both theoretical and practical aspec - Decision Support Systems over Distributed XML Repositories7 KB (1,030 words) - 13:00, 18 January 2009
- part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...nals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.6 KB (860 words) - 13:00, 18 January 2009
- in business intranet environments stressing the need for security and the domain of Information Systems.6 KB (684 words) - 13:00, 18 January 2009
- Intelligent agent-based systems, cognitive and reactive distributed AI systems Security and Access Control4 KB (529 words) - 13:00, 18 January 2009
- systems, applications, and solutions. This year?s conference (DaWaK 2009), builds o - Data warehouse privacy, security, and reliability7 KB (1,006 words) - 13:00, 18 January 2009
- verification of software and hardware systems. In addition to fostering - temporal aspects of agent- and policy-based systems6 KB (872 words) - 13:00, 18 January 2009
- | Title = The 1st International Workshop on Security, Reliability and Quality in Cloud Computing computing brings on security, reliability and quality? In other words, what new issues raised5 KB (624 words) - 13:00, 18 January 2009
- | Title = Second edition of the workshop on E-Transactions Systems 20096 KB (772 words) - 13:00, 18 January 2009
- | Title = The 11th ACM workshop on Multimedia and Security The 11th ACM workshop on Multimedia and Security will be held in Princeton, New Jersey, USA on September 7th and 8th of 20093 KB (303 words) - 17:06, 24 February 2016
- * Security Systems & Services9 KB (1,183 words) - 13:41, 23 January 2009
- * Identification of services in existing systems and business processes * Privacy and security issues with things and services6 KB (798 words) - 13:01, 18 January 2009
- intelligent systems and pursuing artificial intelligence applications. - AI in Computer Security4 KB (582 words) - 14:47, 2 December 2010
- |Title=Tenth International Conference Series on Web Information Systems Engineering WISE 2009 invites submissions on all topics related to Web information systems engineering, including but not limited to those listed below:2 KB (240 words) - 17:46, 21 July 2016
- * Next Generation Wireless Systems and Services o Security in Power Line Communications14 KB (1,518 words) - 13:01, 18 January 2009
- | Field = Control systems Computing and Intelligent Systems3 KB (320 words) - 16:40, 27 December 2015
- Network Security Mobile Computing Systems2 KB (210 words) - 13:01, 18 January 2009
- * Mobility models and systems * Peer-to-peer systems10 KB (1,206 words) - 13:01, 18 January 2009
- ...and distributed computing technologies, including architectures, software systems and tools, algorithms, and applications. Parallel architectures and systems4 KB (490 words) - 17:05, 27 December 2015
- part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...nals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.4 KB (564 words) - 13:01, 18 January 2009
- | Title = IADIS International Conference Intelligent Systems and Agents 2009 IADIS INTERNATIONAL CONFERENCE INTELLIGENT SYSTEMS AND AGENTS 20094 KB (588 words) - 13:01, 18 January 2009
- - Geographical Information Systems 5. Information Systems and Technologies10 KB (1,321 words) - 13:01, 18 January 2009
- • Clinical Informatics and Hospital Information Systems • Decision Support Systems and Computer Aided Diagnosis4 KB (528 words) - 13:01, 18 January 2009
- |Title=2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments 2009 International Workshop on Network Assurance and Security Services in Ubiquitous Environments (NASSUE-2009)6 KB (793 words) - 15:12, 1 October 2020
- ...tle = International Symposium on Multidisciplinary Autonomous Networks and Systems Autonomous Networks and Systems (MANS 2009)6 KB (767 words) - 13:01, 18 January 2009
- Dataspace support or management systems provide co-ordinated access to Workshops and for exhibition of research and commercial systems.4 KB (568 words) - 13:01, 18 January 2009
- | Title = Sixth international Workshop on Programming Multi-Agent Systems Programming Multi-Agent Systems (ProMAS'09)7 KB (917 words) - 13:02, 18 January 2009
- ...nd social revolution have changed the world we are used to. Cyber-Physical Systems (CPS) it is possible to design digital systems that support useful functionality by making socially produced information a3 KB (446 words) - 13:02, 18 January 2009
- | Title = 4th Workshop on Data Storage Devices and Systems ...related to the design, development, and evaluation of storage devices and systems. DS2 2008 builds on the success of previous workshops in this series held i4 KB (532 words) - 15:04, 27 December 2015
- | Title = The 2009 International Workshop on Ubiquitous Computing Security Ubiquitous Computing Security (UC-Sec 09)6 KB (852 words) - 13:02, 18 January 2009
- ...place in conjunction with the 3rd International Conference on Information Security and Assurance, Seoul, Korea http://www.sersc.org/ISA2009. ? MAC and link layer security protocol3 KB (450 words) - 13:02, 18 January 2009
- | Title = 2nd International Symposium on Intelligent Interactive Multimedia Systems and Services Intelligent Interactive Multimedia Systems and Services6 KB (693 words) - 13:03, 18 January 2009
- ...ssues can expose the network infrastructure to stability, performance, and security problems. ...izations. Also, it can be the basis for prevention and response in network security, as typically the detection of attacks and intrusions requires the analysis5 KB (431 words) - 13:03, 18 January 2009
- Migration of legacy eGovernment systems to SOA; Security, privacy and trust4 KB (599 words) - 13:27, 28 January 2009
- - Mobile/wireless computing, communications, systems and services - Security and privacy issues7 KB (976 words) - 23:35, 28 January 2009
- * GRID AND VISUALIZATION SYSTEMS (GVS) * COMPUTERS IN TECHNICAL SYSTEMS (CTS)4 KB (524 words) - 17:20, 12 February 2009
- A-10 Evaluation of Natural Language Systems B-03 Multi-lingual, Multi-Function and Multi-Media Systems4 KB (459 words) - 16:33, 27 February 2009
- | Title = The 4th International ICST Conference on Scalable Information Systems distributed systems proliferate, ranging from simple networks of workstations to highly complex4 KB (512 words) - 16:33, 27 February 2009
- ...in Biomedicine, International Journal of Ultra Wideband Communications and Systems (IJUWBCS) ...Issue is to highlight current and emerging research in applications of UWB systems in biomedicine, which will bring together the latest work in this growing i5 KB (664 words) - 17:20, 5 July 2020
- or application of distributed systems and networks are solicited. * self-stabilizing, self-organizing, and autonomic systems7 KB (890 words) - 15:05, 27 December 2015
- The conference focuses on knowledge-based systems, digital communications models including their theoretical foundations, ena ...temas, Wireless communications, Technologies and applications, Information security8 KB (977 words) - 16:33, 27 February 2009
- - Emerging Web-based Systems - Web Security4 KB (630 words) - 16:33, 27 February 2009
- systems, where the opportunities and challenges with respect to the management of such virtualized systems is of interest to the ICAC5 KB (576 words) - 16:34, 27 February 2009
- with the ever increasing need for mastering systems' complexity, software and hardware systems. They have shown their great utility8 KB (1,079 words) - 17:05, 27 February 2009
- 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) CSET '09 will be co-located with the 18th USENIX Security Symposium (USENIX Security '09), which will take place August 12–14, 2009.7 KB (897 words) - 17:05, 27 February 2009
- construction of high quality computational systems. It is now a - Type systems and category theory in computer7 KB (1,094 words) - 11:42, 29 September 2016
- ...ternational Workshop of Software Engineering for Adaptive Service-oriented Systems (SEASS’09) ...ternational Workshop of Software Engineering for Adaptive Service-oriented Systems (SEASS 2009)6 KB (855 words) - 17:06, 27 February 2009
- systems; concurrency theory; database theory, semi-structured data and finite model systems; ...2 KB (282 words) - 11:28, 21 April 2021
- NETWORKS and COMMUNICATION SYSTEMS • Network security5 KB (654 words) - 17:06, 27 February 2009
- | Title = Int. J. Embedded and Real-Time Communication Systems | Field = Embedded systems5 KB (646 words) - 17:06, 27 February 2009
- Robot Vision Systems Robot Speech Systems3 KB (313 words) - 17:06, 27 February 2009
- | Title = The 2009 International Conference on Web Information Systems and Mining (WISM’09) and the 2009 International Conference on Artificial ...entists and researchers to present the state of the art of web information systems, web mining, artificial intelligence, computational intelligence, with thei5 KB (604 words) - 17:06, 27 February 2009
- · Distributed systems and applications · Reliability, fault-tolerance, and security8 KB (1,050 words) - 18:04, 5 January 2017
- Research in middleware systems has evolved from simple client server models to distributed systems, peer-to-peer (P2P) systems, mobile6 KB (800 words) - 22:11, 27 February 2009
- * Mobility models & systems * Security, trust, & privacy4 KB (559 words) - 17:06, 27 February 2009
- | Title = International Workshop on Hot Topics in Peer-to-Peer Systems Hot Topics in Peer-to-Peer Systems (Hot-P2P 2009)5 KB (623 words) - 17:06, 27 February 2009
- • Intelligent Systems • Manufacturing Process and Systems3 KB (399 words) - 17:06, 27 February 2009
- | Title = Principles, Systems and Applications of IP Telecommunications VoIP, NGN and IMS Security4 KB (621 words) - 17:06, 27 February 2009
- * Security and privacy * Networking for small and embedded systems3 KB (456 words) - 17:06, 27 February 2009
- interchanged and invoked at runtime within and across Web systems, and can environments, such as the Semantic Web, Intelligent Multi-Agent Systems,7 KB (883 words) - 17:06, 27 February 2009
- * Experiences with Real Applications and Systems * Parallel and Distributed Database Systems4 KB (534 words) - 17:07, 27 February 2009
- _ Privacy Preservation and Security Issues in the Process of Data Cleaning _ Data Quality Systems and Tools5 KB (690 words) - 17:07, 27 February 2009
- | Title = 2009 Workshop on Middleware for Ubiquitous and Pervasive Systems 2009 Workshop on Middleware for Ubiquitous and Pervasive Systems6 KB (861 words) - 17:07, 27 February 2009
- | Title = 3rd WORKSHOP ON Practice and Theory of IT Security | Field = Computer security and reliability4 KB (506 words) - 17:07, 27 February 2009
- | Title = Workshop on Trust, Risk and Security Assessments for Network Dependability in Digital Ecosystems (TRSDE) | Field = Computer security and reliability4 KB (600 words) - 17:07, 27 February 2009
- | Title = 5th IEEE International Workshop on Wireless and Sensor Networks Security Wireless and Sensor Networks Security (WSNS'09)4 KB (485 words) - 17:07, 27 February 2009
- ...wn as Cloud computing. It encompasses the semantic web, ontologies, cyber security, privacy, trust and risk management, social networks, web 2.0, 3.0, conver Governance in Large Heterogeneous IT Systems7 KB (941 words) - 17:07, 27 February 2009
- * Authorization, Privacy and Security * Geographical Information Systems9 KB (1,249 words) - 08:42, 7 October 2011
- Intelligent Systems And Automation • Intelligent Systems3 KB (319 words) - 17:07, 27 February 2009
- ...k Modeling, Distributed Simulation and Industry, Modeling Very Large Scale Systems, Aerospace Operations, Revising Simulations Components, Meta-Knowledge Simu ...nufacturing, Simulations, Logistics and Transport, Power Plants, Multibody Systems, Aerospace, etc..38 KB (4,832 words) - 17:07, 27 February 2009
- ...der to move forward, it is important to bring together research as well as systems from a variety of areas including smart environments, web videoconferencing ...nd effective crossovers between media like virtual worlds, videoconference systems, and mobile applications.5 KB (670 words) - 17:08, 27 February 2009
- | Title = The 12th International Conference on Network-Based Information Systems The 12th International Conference on Network-Based Information Systems11 KB (1,440 words) - 17:08, 27 February 2009
- | Title = Second ACM International Workshop on Testing Database Systems Testing Database Systems (DBTest 2009)6 KB (817 words) - 17:08, 27 February 2009
- | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability12 KB (1,690 words) - 17:08, 27 February 2009
- | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability3 KB (480 words) - 17:08, 27 February 2009
- | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability6 KB (828 words) - 17:08, 27 February 2009
- workloads that run on all types of computing systems. New applications wireless and embedded systems at the low end or massively parallel systems4 KB (589 words) - 17:08, 27 February 2009
- | Title = 5th International Conference on Global Security, Safety and Sustainability 5th International Conference on Global Security, Safety and Sustainability3 KB (345 words) - 17:08, 27 February 2009
- * Design of monitoring systems, sampling methods, signal processing methods * Network security threats and countermeasures6 KB (774 words) - 17:08, 27 February 2009
- between applications and underlying platforms (operating systems; * Middleware for embedded systems and sensor networks8 KB (1,144 words) - 20:59, 27 February 2009
- * Systems theory and principles * Human oriented systems4 KB (571 words) - 12:58, 9 March 2020
- |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security5 KB (578 words) - 10:21, 20 November 2020
- - Security Aspects - Intelligent Tutoring Systems5 KB (661 words) - 15:49, 8 December 2009
- |Title=International Conference on Web Information Systems and Technologies (WEBIST) |Field=Web Information Systems3 KB (440 words) - 15:25, 9 December 2009
- |Field=Computer security and reliability and beyond to discuss hot topics in applied network and systems4 KB (530 words) - 15:02, 27 December 2015
- |Title=International Workshop on Wireless Multimedia Computing and Security Services - Security, privacy, and cryptographic protocols for WMC3 KB (477 words) - 16:54, 8 August 2009
- ...LFTRUST 2009, The First Workshop on Computational Trust for Self-Adaptive Systems SELFTRUST 2009, The First Workshop on Computational Trust for Self-Adaptive Systems5 KB (642 words) - 20:34, 9 June 2009
- The 15th International Conference on Parallel and Distributed Systems (ICPADS 2009) ...ith the 13th and 14th International Conference on Parallel and Distributed Systems in 2007 and 2008, respectively. To adhere to the theme of P2PNVE workshops,5 KB (738 words) - 16:48, 10 August 2009
- * Link adaptation for multiuser systems * Network security and intrusion detection5 KB (630 words) - 11:13, 1 November 2009
- ...Fifth International Joint Conference on Autonomous Agents and Multi-Agent Systems. ...ated frameworks and architectures for agent-based spatial decision support systems (SDSS) for natural and man-made disasters,6 KB (783 words) - 17:04, 27 December 2015
- ■Computational and Systems Biologymm ■Internet, web and security visualization4 KB (435 words) - 11:32, 2 August 2009
- Networks and Systems Operating Systems3 KB (412 words) - 19:29, 2 August 2009
- ...deployment of large-scale and high-performance FPGA-based applications and systems – e.g. DSP, networking or embedded system tools and methodologies. ...mpiled accelerators, reconfigurable computing, adaptive computing devices, systems and software, rapid-prototyping.5 KB (632 words) - 11:32, 2 August 2009
- Network Security Mobile Computing Systems2 KB (230 words) - 11:32, 2 August 2009
- | Acronym = IEEE Systems 2010 | Title = 4th Annual IEEE Systems Conference6 KB (706 words) - 11:33, 2 August 2009
- | Title = The Second International Conference on Communication Systems and Networks ...ndia in January 2009, the SECOND International Conference on COMmunication Systems and NETworkS (COMSNETS) will be held in Bangalore, India from 6 January 2017 KB (1,054 words) - 16:43, 27 December 2015
- ...clude all areas in the data management space including database management systems, Web and Information Retrieval and Data Mining. Original research submissio Data Management Systems:4 KB (553 words) - 11:33, 2 August 2009
- ...rging Technologies, Components & Subsystems, Antenna Technology, and Civil/Security Radar Applications.2 KB (203 words) - 11:33, 2 August 2009
- | Title = ACM SAC Special track on Object Oriented Programming Languages and Systems ...ware reuse, dynamic software adaptation, efficiency on multicore hardware, security, and safety.5 KB (743 words) - 17:02, 27 December 2015
- | Title = 7th International Conference on Information Systems for Crisis Response and Management 7th International Conference on Information Systems for Crisis Response and Management4 KB (528 words) - 11:33, 2 August 2009
- Information security IT and network security2 KB (258 words) - 11:33, 2 August 2009
- | Title = The International Conference on Ambient Systems, Networks and Technologies The International Conference on Ambient Systems, Networks and Technologies (ANT-2010)6 KB (751 words) - 16:59, 27 December 2015
- | Acronym = IEEE Intelligent Systems 2010 | Title = IEEE Intelligent Systems Speicla Issue on Social Learning4 KB (525 words) - 11:34, 2 August 2009
- The 1st International Conference on Information Systems & Software Engineering aims to provide an excellent opportunity for academi ...y have made it imperative for a systematic approach to development of such systems. In this sense there seems to be a seamless extension of concepts between k5 KB (657 words) - 11:34, 2 August 2009
- | Field = Information systems The 1st International Conference on Information Systems & Software Engineering aims to provide an excellent opportunity for academi4 KB (564 words) - 12:01, 6 November 2020
- Complex, Intelligent and Software Intensive Systems (CICIS-2010) International Conference ...s present nowadays real challenges to the development of large distributed systems and applications. The aim of this workshop is to present innovative researc7 KB (912 words) - 17:36, 5 November 2020
- * Adaptability and stability of pervasive computing systems * Security and privacy issues for ubiquitous systems5 KB (530 words) - 11:34, 2 August 2009
- |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security5 KB (599 words) - 10:21, 20 November 2020
- constraints in highly dynamic environments. Pervasive systems address these * Decentralised algorithms for pervasive systems4 KB (479 words) - 11:35, 2 August 2009
- dependability, security, accuracy, customer service, trust, etc.). The holistic NFP and SLA management into service oriented systems. Such an8 KB (1,033 words) - 11:35, 2 August 2009
- | Acronym = Security 2009 ...tional Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)6 KB (746 words) - 11:35, 2 August 2009
- ...l control, supply-chain management, healthcare, intelligent transportation systems, military intelligence, reconnaissance and surveillance (ISR), border contr ...ned, dynamic and distributed nature of the sensory systems involved, their security weaknesses, and so on. Novel mechanisms and designs are required which inte5 KB (734 words) - 11:35, 2 August 2009
- | Title = First Iberic Conference on Web-Applications Security (IBWAS’09) First Iberic Conference on Web-Applications Security (IBWAS’09)9 KB (1,261 words) - 11:35, 2 August 2009
- Mediterranean Conference on Information Systems (MCIS 2009) in Athens, Greece. enablers for Service Oriented Systems to evolve, grow, and interact with other4 KB (586 words) - 11:35, 2 August 2009
- * Legacy Systems and Software Maintenance * Software Engineering of Multi-Agent Systems8 KB (1,112 words) - 11:35, 2 August 2009
- * Security issues and solutions for mobile multimedia retrieval. ...dia Communications ( IJMCMC ), International Journal of Mobile Information Systems ( IJMIS ), Signal, Image and Video Processing ( SIVP ), International Journ5 KB (674 words) - 11:35, 2 August 2009
- ...heory, databases, information management, distributed algorithms, embedded systems, wireless communications, and machine learning. In addition to full-length ...rks and protocols, wireless communications, machine learning, and embedded systems design.8 KB (1,119 words) - 09:57, 27 February 2020
- ? Ad Hoc Networks of Autonomous Intelligent Systems ? Security and privacy5 KB (571 words) - 11:35, 2 August 2009
- | Title = The 10th International Symposium on Pervasive Systems, Algorithms and Networks The 10th International Symposium on Pervasive Systems, Algorithms and Networks4 KB (422 words) - 11:36, 2 August 2009
- National and Regional Systems of Innovation Regional innovation systems, clusters and industrial networks4 KB (462 words) - 11:36, 2 August 2009
- ...duce the complexity of accessing sensor services for applications or other systems. ...onse time, resource consumption, throughput, availability, reliability and security.9 KB (1,206 words) - 11:40, 2 August 2009
- - tools and methodologies for developing multilingual systems, - contribution of HLTs to the Homeland Security problems (technology applications and legal aspects),14 KB (1,872 words) - 19:26, 2 August 2009
- * Trust and security issues ...the opportunity to conduct live demonstrations of dynamic spectrum access systems, components and software. The guidelines for demonstration/prototype submis4 KB (549 words) - 11:36, 2 August 2009
- ...ons and Technologies - Applications, Protocols, Algorithms, Simulators and Security Broadband mobile communication systems3 KB (339 words) - 11:36, 2 August 2009
- ...erformance evaluation of Web search engines; Performance evaluation of P2P systems RTSEC: Security for Internet-based real-time systems14 KB (1,651 words) - 15:56, 15 February 2017
- |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security3 KB (352 words) - 12:39, 11 August 2009
- |Title= 12th International Conference on Enterprise Information Systems Conference name: 12th International Conference on Enterprise Information Systems (ICEIS)5 KB (552 words) - 17:06, 12 August 2009
- |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability6 KB (766 words) - 10:54, 26 April 2010
- |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security5 KB (667 words) - 14:27, 13 September 2009
- ...romised. It is widely known that unresolved errors remain in many software systems that we are using every day. ...benchmarking, review, inspection and walkthrough, reliability, safety and security4 KB (583 words) - 12:17, 25 November 2009
- |Title=Special Issue on Ubiquitous Computing Security Systems |Field=Ubiquitous Computing Security Systems1 KB (187 words) - 04:49, 23 September 2009
- * Privacy concerns in Ubiquitous Computing Systems * Trust concerns in Ubiquitous Computing Systems2 KB (205 words) - 05:10, 23 September 2009
- ...t on the development of new generation intelligent distributed information systems. The aim of this symposium is to bring together researchers involved in int - Multi-agent systems4 KB (508 words) - 13:29, 13 July 2010
- - Geographic information systems - Intelligent Systems4 KB (507 words) - 22:37, 18 November 2009
- ...m all over the world in many diverse fields of Command and Control such as systems, human factors, experimentation, and operations. The Journal will also feat Mink Spaans (NED), TNO Defence, Security and Safety;2 KB (233 words) - 23:39, 18 November 2009
- |Field=Multiagent Systems |Superevent=the 4th International KES Symposium AGENTS AND MULTI-AGENT SYSTEMS - TECHNOLOGIES AND APPLICATIONS4 KB (449 words) - 11:04, 26 November 2009
- * Application security * Blended Internet security methods5 KB (607 words) - 18:01, 3 December 2009
- |Title=4th International KES Symposium on Agents and Multi-agent Systems - Technologies and Applications |Field=agent systems6 KB (733 words) - 18:19, 24 September 2020
- ...down if human healthcare workers are (partially) substituted by automated systems. However, all those impressive technological developments are only part of ...al signs, such as blood pressure and blood sugar), supported by technology systems. By Tele-Treatment we mean performing some forms of treatment from distance6 KB (889 words) - 13:48, 26 February 2010
- |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust4 KB (484 words) - 14:20, 14 December 2009
- |Title=7th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS |Field=Computer security and reliability7 KB (982 words) - 19:13, 3 January 2010
- |Title=3rd International Workshop on Wireless Multimedia Computing and Security Services ...ward for a deeper understanding in wireless multimedia computing (WMC) and security services.3 KB (497 words) - 03:43, 28 February 2010
- |Field=Information Security, Cryptography ...p the high value-added convergence components technologies which linked to systems and services such as military, broadcast & telecommunication, ship, automot3 KB (373 words) - 13:50, 19 January 2010
- ...ometrics Technologies and Applications, Pattern Recognition and Biometrics Security, Bioinformatics and IT Applications in the above themes. Fuzzy and neural network systems3 KB (382 words) - 18:27, 20 January 2010
- •Robot Vision Systems •Robot Speech Systems3 KB (413 words) - 05:21, 26 January 2010
- |Title=3rd International Conference on Security of Information and Networks |Field=Computer security10 KB (1,270 words) - 17:12, 20 April 2010
- ...'l Conference on Bio-Inspired Models of Network, Information and Computing Systems |Field=Bio-inspired systems3 KB (338 words) - 16:53, 27 December 2015
- ...s and Data Management", "Programming Languages", "Distributed and Parallel Systems" and "Knowledge Engineering". 3. Distributed Systems3 KB (392 words) - 13:50, 30 April 2020
- |Title=International Conference on Wireless Information Networks and Systems ...erence name: International Conference on Wireless Information Networks and Systems (WINSYS)4 KB (379 words) - 15:35, 5 February 2010
- ...ogether researchers, engineers and practitioners interested on information systems and applications in the context of Signal Processing, including theory and * › Multimedia Systems and Applications3 KB (310 words) - 15:37, 5 February 2010
- |Title=International Conference on Security and Cryptography |Field=Computer security and reliability4 KB (409 words) - 15:40, 5 February 2010
- ...cessing and multimedia applications, and wireless networks and information systems. These are the main knowledge areas that define the six component conferenc2 KB (180 words) - 15:49, 5 February 2010
- ...he current state of research in high performance and large scale computing systems, their use in modeling and simulation, their design, performance and use, a W5: Workshop on Security and High Performance Computing Systems (SHPCS 2010)4 KB (510 words) - 20:56, 7 February 2010
- |Title=2017 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability4 KB (429 words) - 08:55, 1 August 2019
- |Title=2018 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability9 KB (1,092 words) - 09:35, 1 August 2019
- |Title=Trust and Recommender Systems for Social Search and Web-log analysis Modern search systems, as well as online marketing and web-analytics applications can benefit gre6 KB (765 words) - 14:01, 11 April 2010
- ...al Conference on Tools and Algorithms for the Construction and Analysis of Systems ...al Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2019)'''. Held as part of the European Joint Conferences on Theory a3 KB (369 words) - 06:23, 4 August 2020
- * Information security * Intelligent information systems3 KB (380 words) - 15:10, 1 October 2020
- ...non-pertinent, untrustworthy or even malicious data. Trust and Recommender systems, along with personalization techniques, appear to be essential candidates t ...ying the most promising research directions with respect to applying trust systems in the analysis and exploitation of web-activity logs. The main focus is bo4 KB (600 words) - 19:11, 18 February 2010
- ...esults and technical contributions on the field of Vehicular Communication Systems. - Application scenarios for Intelligent Transportation Systems5 KB (624 words) - 21:14, 4 March 2010
- ...in Intelligent Systems and Computer Engineering, Advances in Communication Systems and Electrical Engineering, and Advances in Industrial Engineering and Oper ...010 International Conference of Computational Intelligence and Intelligent Systems4 KB (559 words) - 08:31, 9 March 2010
- › Confidentiality and Data Security › Expert Systems in Healthcare2 KB (238 words) - 13:37, 10 March 2010
- ...of Computational Intelligence and many other areas related to intelligent systems, on the other hand. * › Cognitive Systems4 KB (418 words) - 14:18, 10 March 2010
- * Human Beings in Service Systems * Cloud Security4 KB (405 words) - 20:45, 3 November 2010
- |Field=information systems, ebanking, ecommerce - Security for enabling eCommerce4 KB (601 words) - 00:22, 28 March 2010
- |Title=IEEE Symposium on Security and Privacy |Field=Computer Science, Computer Security and Privacy4 KB (490 words) - 14:42, 6 November 2020
- |Title=3rd International Workshop on Internet and Distributed Computing Systems 2010 (IDCS'10) 3rd International Workshop on Internet and Distributed Computing Systems 2010 (IDCS'10)5 KB (667 words) - 12:08, 19 May 2010
- ...the world are not connected between them as well as associated information systems are not integrated. This scenario can be summarized as too much data and no ...ata (or associate phenomena) as well as potential interoperability between systems through semantic interactions.5 KB (639 words) - 16:17, 20 May 2010
- |Superevent=9th Brazilian Symposium of Human Factors on Computer Systems (IHC) ...which is part of the 9th Brazilian Symposium of Human Factors on Computer Systems (IHC’10). October 05th to 08th, 2010 - Belo Horizonte, Brazil.4 KB (657 words) - 19:43, 12 June 2010
- * › Security Aspects * › Intelligent Tutoring Systems5 KB (532 words) - 12:25, 16 June 2010
- |Title=7th International Conference on Web Information Systems and Technologies (WEBIST) Conference name: 7th International Conference on Web Information Systems and Technologies (WEBIST)5 KB (627 words) - 12:33, 16 June 2010
- ...rnational Conference on Pervasive and Embedded Computing and Communication Systems (PECCS) ...rnational Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)8 KB (1,066 words) - 19:39, 8 July 2010
- ...unction with The 16th International Conference on Parallel and Distributed Systems (ICPADS 2010). ...r via networked links. Examples of NVEs include early DARPA SIMNET and DIS systems as well as currently booming Massively Multiplayer Online Games (MMOGs). So6 KB (858 words) - 09:18, 19 August 2010
- |Title=The Third International Workshop on Systems and Network Telemetry and Analytics (SNTA2020) ...y, Machine learning, data science, High-performance computing, Distributed systems4 KB (584 words) - 17:42, 13 March 2020