Search results

Jump to: navigation, search

Page title matches

  • ...the most recent results in the development of system aspects of ubiquitous computing. Researchers and practitioners working in this area are expected to take th * Privacy concerns in Ubiquitous Computing Systems
    2 KB (205 words) - 05:10, 23 September 2009

Page text matches

  • |Title=The 10th International Conference on Mobile Data Mangement (MDM'09): Systems, Services and Middleware positioning technology has become mature and available. A global, pervasive computing
    13 KB (1,468 words) - 01:23, 22 August 2008
  • | Title=The 3rd KES International Symposium on Agents and Multi-agent Systems - Technologies and applications (KES-AMSTA-09) ...fic research in the technologies and applications of agent and multi-agent systems.
    6 KB (777 words) - 22:54, 14 August 2008
  • |Title=7th International Conference on Network and Computing Technologies 7th International Conference on Network and Computing Technologies (ICNCT 2019), will be held in Nagoya Institute of Technology,
    5 KB (571 words) - 09:22, 19 July 2019
  • |Title=Seventh IEEE International Conference on Pervasive Computing and Communications areas of pervasive computing and communications, which aim at providing a
    12 KB (1,560 words) - 15:03, 27 August 2008
  • systems, biomedical informatics, virtual digital libraries, and pervasive and ubiquitous computing, and trust management are just a
    9 KB (1,189 words) - 14:53, 28 August 2008
  • ...d applications, and interactions of these applications with other types of systems. Management aspects related to these applications and challenges on special ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d
    18 KB (2,408 words) - 02:37, 16 December 2008
  • ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust
    34 KB (4,565 words) - 22:20, 10 January 2018
  • ...eory,design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust
    8 KB (1,037 words) - 22:20, 10 January 2018
  • ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust
    9 KB (1,189 words) - 22:20, 10 January 2018
  • design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include
    26 KB (3,456 words) - 22:20, 10 January 2018
  • ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Fault-tolerant Distributed Systems
    10 KB (1,263 words) - 22:20, 10 January 2018
  • ...ory, design and application of computer networks and distributed computing systems. Aside the regular presentation, the AINA meeting will include keynote addr * Fault-tolerant Distributed Systems
    12 KB (1,537 words) - 22:19, 10 January 2018
  • | Title = The 6th International Conference on Autonomic and Trusted Computing The 6th International Conference on Autonomic and Trusted Computing (ATC-09)
    9 KB (1,216 words) - 17:32, 14 October 2008
  • ...e just entering the era of persuasive technology, of interactive computing systems designed to change people's attitudes and behaviors. Persuasive 2009 builds ===Mobile & Ubiquitous Persuasion===
    8 KB (989 words) - 20:13, 22 February 2009
  • | Title = The 6th IEEE International Conference on Embedded Software and Systems | Field = Embedded systems
    3 KB (375 words) - 17:48, 14 October 2008
  • | Title = The 11th IEEE International Conference on High Performance Computing and Communications ...computing and communications (HPCC). HPCC has moved into the mainstream of computing and has become a key technology in determining future research and developm
    19 KB (2,503 words) - 13:25, 28 October 2020
  • | Title = The 6th International Conference on Ubiquitous Intelligence and Computing The 6th International Conference on Ubiquitous Intelligence and Computing
    7 KB (942 words) - 20:05, 14 October 2008
  • | Title = 9th International Conference on New Technologies of Distributed Systems | Field = Distributed computing
    2 KB (208 words) - 20:05, 14 October 2008
  • ...ital Services in eESociety, eGovernment /eGovernance, eHealth, Information Systems, and Information Management. These broad areas are divided into more detai - Delivery Systems and Environments
    6 KB (780 words) - 20:06, 14 October 2008
  • ...= Fourth International Conference on Intelligent Computing and Information Systems ...tificial and computational intelligence as well as intelligent information systems.
    2 KB (193 words) - 20:06, 14 October 2008
  • |Title=3rd International Conference on Distributed Event-Based Systems |Field=Distributed computing
    6 KB (829 words) - 15:30, 29 January 2021
  • | Title = Sixth International Conference on Wireless On-demand Network Systems and Services On-demand Network Systems and Services
    6 KB (686 words) - 20:06, 14 October 2008
  • | Title = 3rd International Conference on Pervasive Computing Technologies for Healthcare ...vasive healthcare seeks to respond to a variety of pressures on healthcare systems, including the increased incidence of life-style related and chronic diseas
    6 KB (732 words) - 22:45, 14 October 2008
  • | Title = 4th International Conference on Collaborative Computing The 4th International Conference on Collaborative Computing:
    6 KB (674 words) - 22:45, 14 October 2008
  • ...cations, search engines, online shops, audio and video players, mobile and ubiquitous computers; all of these applications forming some type of sensor for user a ...iven computing, context-driven computing, information retrieval, database systems, digital libraries, metadata, data mining, user modelling, social networks,
    6 KB (890 words) - 22:53, 14 October 2008
  • | Title = VIII Brazilian Symposium on Human Factors in Computing Systems The Brazilian Symposium of Human Factors on Computer Systems (IHC) is the main forum of the Brazilian Human-Computer Interaction (HCI) c
    3 KB (502 words) - 22:53, 14 October 2008
  • ...-based services in a global computing environment. Services in AmI will be ubiquitous in that there will be no specific bearer or provider but, instead, they wil ...amalgamate ongoing research in distributed systems and complex multi-agent systems with the aim of strengthening the synergy between the two fields.
    4 KB (536 words) - 17:55, 10 February 2021
  • ...housing, data visualization, knowledge-based systems, and high performance computing. By promoting novel, high quality research findings, and innovative solutio ...inclusion, in expanded and revised form, in the Knowledge and Information Systems journal published by Springer-Verlag.
    5 KB (634 words) - 15:36, 14 December 2008
  • ...ial papers on the theory, design and implementation of digital information systems, as well as demonstrations, tutorials, workshops and industrial presentatio - Multimedia Information Systems
    4 KB (595 words) - 23:09, 14 October 2008
  • * Data management for ubiquitous and mobile computing * Data security, privacy and trust
    4 KB (593 words) - 23:10, 14 October 2008
  • ...that XML is the main means towards this new generation of data management systems. Following the experience of previous editions of DataX 2004 and DataX 2006 * XML retrieval in P2P systems
    3 KB (475 words) - 23:10, 14 October 2008
  • reliability, integrity, privacy, and security issues are still being policy. Furthermore, the complexity of security increases as
    7 KB (908 words) - 23:10, 14 October 2008
  • ...alable, robust and efficient for developing numerous original services and systems. * Context-aware Computing
    2 KB (324 words) - 16:49, 16 December 2020
  • 5. RFID/USN(Ubiquitous Sensor Network) Technologies 9. Information Security Technologies
    2 KB (200 words) - 23:11, 14 October 2008
  • | Title = Third International Workshop on Broadband and Wireless Computing, Communication and Applications | Field = Mobile computing
    7 KB (990 words) - 23:11, 14 October 2008
  • | Title = Security and Privacy in Telecommunications and Information Systems | Field = Computer security and reliability
    4 KB (587 words) - 23:30, 14 October 2008
  • | Title = Fifth Annual Conference on Wireless On demand Network Systems and Services With the increasing variety of wireless technologies, ubiquitous connectivity
    3 KB (413 words) - 23:13, 14 October 2008
  • | Title = 27th International Symposium on Reliable Distributed Systems | Field = Embedded systems
    2 KB (255 words) - 23:14, 14 October 2008
  • | Title = The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing The 4th International Conference on Collaborative Computing:
    8 KB (1,093 words) - 23:15, 14 October 2008
  • | Title = International Conference on Parallel and Distributed Computing, Applications and Technologies ...as, developments and applications in all areas of parallel and distributed computing. Following PDCAT'00 in Hong Kong, PDCAT'01 in Taipei, PDCAT'02 in Kanazawa,
    5 KB (623 words) - 23:15, 14 October 2008
  • ...le = 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services ...management and services, all with special focus on mobility and ubiquitous computing.
    5 KB (599 words) - 23:15, 14 October 2008
  • + Security, Privacy and Open Source TRACK - Security, privacy and trust methods and solutions for enabling e-Business
    5 KB (594 words) - 16:29, 25 March 2020
  • # security technology and systems # Software Engineering of Autonomic Grid Computing Systems and Applications
    6 KB (733 words) - 12:48, 27 October 2016
  • ...es in current systems and potential concerns in the field of communication systems and middleware. The conference will feature a high quality technical progra * Achieving security, reliability, and quality of service in
    3 KB (358 words) - 23:18, 14 October 2008
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 10:42, 21 August 2020
  • | Title = Second ACM Conference on Wireless Network Security | Field = Computer security and reliability
    2 KB (291 words) - 23:19, 14 October 2008
  • | Title = Ubiquitous Computing Security Systems | Field = Computer security and reliability
    3 KB (328 words) - 06:40, 22 December 2012
  • | Title = The Fourth International Symposium on Ubiquitous Applications and Security Services | Field = Computer security and reliability
    6 KB (697 words) - 23:19, 14 October 2008
  • | Field = Mobile computing services. The major emphasis of the workshop this year is security of
    5 KB (663 words) - 23:20, 14 October 2008
  • |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    6 KB (689 words) - 10:39, 21 August 2020
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability
    4 KB (502 words) - 23:20, 14 October 2008
  • | Title = The 2008 International Symposium on Ubiquitous Multimedia Computing The 2008 International Symposium on Ubiquitous Multimedia Computing (UMC-08) will be held in Australia
    4 KB (573 words) - 23:20, 14 October 2008
  • ...and the years to come will witness a proliferation in the use of advanced systems. ...iscuss and exchange ideas, results and experiences in the area of advanced computing for problems in science and engineering applications and inter-disciplinary
    3 KB (357 words) - 23:23, 14 October 2008
  • ...existing computer technologies, including experimental efforts, innovative systems, and investigations that identify weaknesses in existing IT services. * High Performance Computing
    3 KB (415 words) - 23:23, 14 October 2008
  • | Title = Advance computing and communication journal ...the most recent results in the development of system aspects of ubiquitous computing. Researchers and practitioners working in this area are expected to take th
    3 KB (412 words) - 19:34, 12 November 2020
  • | Title = The Fourth International Conference on Systems | Field = Systems
    11 KB (1,492 words) - 23:26, 14 October 2008
  • *Big Data platforms with applications to network management, security, measurements *Experience and lessons learned by deploying large-scale networked systems
    4 KB (514 words) - 12:03, 6 April 2020
  • The second event on "Social and Legal Aspects Under Emerging Computing Topics of legal and social aspects of information systems include but are not limited to:
    8 KB (1,075 words) - 23:52, 14 October 2008
  • | Title = Ubiquitous Computing and Communication Journal ...ing cognitive environments, and discovery and identification of ubiquitous computing applications and services.
    3 KB (386 words) - 23:39, 14 October 2008
  • | Title = Workshop on High Performance and Grid Computing in Medicine and Biology | Field = Grid computing
    7 KB (876 words) - 23:40, 14 October 2008
  • ...However, there remains the open question of how and when to use ubiquitous computing for ward data management. The use of a mobile wireless infrastructure can lead to security and reliability problems. Mobile devices often have usability
    6 KB (771 words) - 23:42, 14 October 2008
  • | Title = The 3rd International Conference on Ubiquitous Information Management and Communication ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network
    2 KB (303 words) - 23:42, 14 October 2008
  • | Title = Third International Workshop on Pervasive Systems | Field = Ubiquitous computing
    6 KB (763 words) - 23:42, 14 October 2008
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...digm/; Recovering and fault-tolerance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Context-aware and context recognition; ...y-tolerant IP networks; Trustworthy Internet; Mobile computing; Ubiquitous computing; Reliability; Resilience; Scalability; User and service mobility; Wireless
    7 KB (883 words) - 17:35, 7 January 2021
  • | Title = IEEE-RIVF International Conference on Computing and Communication Technologies The conference solicits submission of research papers in all major areas of computing, especially results of inter-disciplinary research work combining state-of-
    5 KB (567 words) - 12:58, 18 January 2009
  • part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...nals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.
    5 KB (633 words) - 12:58, 18 January 2009
  • | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)
    16 KB (2,178 words) - 12:59, 18 January 2009
  • ...e 1st International Workshop on Security, Reliability and Quality in Cloud Computing Cloud computing gained prominence in 2007 and is picking up momentum as the next “big
    5 KB (624 words) - 13:00, 18 January 2009
  • Ubiquitous Intelligence and Computing (UIC-09) the Internet of Things. The Ubiquitous Computing community has already
    6 KB (798 words) - 13:01, 18 January 2009
  • | Title = IADIS International Conference Intelligent Systems and Agents 2009 IADIS INTERNATIONAL CONFERENCE INTELLIGENT SYSTEMS AND AGENTS 2009
    4 KB (588 words) - 13:01, 18 January 2009
  • Dataspace support or management systems provide co-ordinated access to Workshops and for exhibition of research and commercial systems.
    4 KB (568 words) - 13:01, 18 January 2009
  • | Title = The 2009 International Workshop on Ubiquitous Computing Security | Field = Ubiquitous computing
    6 KB (852 words) - 13:02, 18 January 2009
  • |Title=First Workshop on Software Engineering for Ubiquitous Computing ...2009 World Congress in Computer Science, Computer Engineering, and Applied Computing.
    7 KB (976 words) - 23:35, 28 January 2009
  • - Emerging Web-based Systems - Context Aware Ubiquitous Computing
    4 KB (630 words) - 16:33, 27 February 2009
  • | Field = Distributed computing Research in middleware systems has evolved from simple client server
    6 KB (800 words) - 22:11, 27 February 2009
  • | Title = 2009 Workshop on Middleware for Ubiquitous and Pervasive Systems | Field = Ubiquitous computing
    6 KB (861 words) - 17:07, 27 February 2009
  • ...k Modeling, Distributed Simulation and Industry, Modeling Very Large Scale Systems, Aerospace Operations, Revising Simulations Components, Meta-Knowledge Simu ...nce is coming on line, Computational resources are becoming cheaper, while ubiquitous network access has started to appear.
    38 KB (4,832 words) - 17:07, 27 February 2009
  • | Title = The 12th International Conference on Network-Based Information Systems The 12th International Conference on Network-Based Information Systems
    11 KB (1,440 words) - 17:08, 27 February 2009
  • | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability
    12 KB (1,690 words) - 17:08, 27 February 2009
  • | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability
    3 KB (480 words) - 17:08, 27 February 2009
  • between applications and underlying platforms (operating systems; system platforms and architectures for future computing and
    8 KB (1,144 words) - 20:59, 27 February 2009
  • |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security
    5 KB (578 words) - 10:21, 20 November 2020
  • | Title = The International Conference on Ambient Systems, Networks and Technologies The International Conference on Ambient Systems, Networks and Technologies (ANT-2010)
    6 KB (751 words) - 16:59, 27 December 2015
  • |Title=International Workshop on P2P, Parallel, Grid and Internet Computing Fourth International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC-2010)
    7 KB (912 words) - 17:36, 5 November 2020
  • ...such as location-based services, mobile data management, ubiquitous computing applications, secured data sharing and processing in sensor networks, ...tributions related to data management in mobile, ubiquitous, and pervasive computing. Topics of interest include, but are not limited to, the following:
    5 KB (530 words) - 11:34, 2 August 2009
  • |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security
    5 KB (599 words) - 10:21, 20 November 2020
  • | Field = Ubiquitous computing constraints in highly dynamic environments. Pervasive systems address these
    4 KB (479 words) - 11:35, 2 August 2009
  • ...ional Workshop on Information Quality and Quality of Service for Pervasive Computing ...l control, supply-chain management, healthcare, intelligent transportation systems, military intelligence, reconnaissance and surveillance (ISR), border contr
    5 KB (734 words) - 11:35, 2 August 2009
  • | Title = The First International Workshop on Ad Hoc and Ubiquitous Computing | Field = Ubiquitous computing
    5 KB (571 words) - 11:35, 2 August 2009
  • | Title = The 10th International Symposium on Pervasive Systems, Algorithms and Networks The 10th International Symposium on Pervasive Systems, Algorithms and Networks
    4 KB (422 words) - 11:36, 2 August 2009
  • ...ons and Technologies - Applications, Protocols, Algorithms, Simulators and Security Broadband mobile communication systems
    3 KB (339 words) - 11:36, 2 August 2009
  • |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security
    3 KB (352 words) - 12:39, 11 August 2009
  • |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security
    5 KB (667 words) - 14:27, 13 September 2009
  • |Title=Special Issue on Ubiquitous Computing Security Systems |Field=Ubiquitous Computing Security Systems
    1 KB (187 words) - 04:49, 23 September 2009
  • ...the most recent results in the development of system aspects of ubiquitous computing. Researchers and practitioners working in this area are expected to take th * Privacy concerns in Ubiquitous Computing Systems
    2 KB (205 words) - 05:10, 23 September 2009
  • |Title=4th International Symposium on Intelligent Distributed Computing |Field=Distributed computing
    4 KB (508 words) - 13:29, 13 July 2010
  • - Ubiquitous Computing - Geographic information systems
    4 KB (507 words) - 22:37, 18 November 2009
  • |Title=4th International KES Symposium on Agents and Multi-agent Systems - Technologies and Applications |Field=agent systems
    6 KB (733 words) - 18:19, 24 September 2020
  • |Field=Information Security, Cryptography |Affiliation=Ubiquitous Computing and Communication Journal
    3 KB (373 words) - 13:50, 19 January 2010
  • |Title=International Conference on Security and Cryptography |Field=Computer security and reliability
    4 KB (409 words) - 15:40, 5 February 2010
  • |Title=High performance computing & simulation conference |Field=High-performance computing
    4 KB (510 words) - 20:56, 7 February 2010
  • |Title=3rd International Workshop on Internet and Distributed Computing Systems 2010 (IDCS'10) |Field=Internet, Distributed Computing
    5 KB (667 words) - 12:08, 19 May 2010
  • ...rnational Conference on Pervasive and Embedded Computing and Communication Systems (PECCS) ...rnational Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)
    8 KB (1,066 words) - 19:39, 8 July 2010
  • - Ubiquitous Computing - Geographic information systems
    6 KB (732 words) - 05:52, 5 December 2010
  • ...rs and developers from academia and industry across all fields of Internet computing and engineering. All accepted papers will be published in the conference pr • AI/Expert systems
    4 KB (579 words) - 15:24, 13 October 2010
  • • Algorithms, Systems and Applications • Ad-hoc Wireless Networks • Mobile Computing • Mobile Satellite Networks
    3 KB (318 words) - 16:46, 5 July 2020
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • ...rnational Conference on Pervasive and Embedded Computing and Communication Systems (PECCS) ...rnational Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)
    4 KB (463 words) - 11:41, 1 July 2011
  • * Are decision support systems in the biomedical domain using ontologies? How? ...ineering, law enforcement, document management, e-government, legislative systems.
    8 KB (1,106 words) - 15:50, 20 July 2011
  • - Security and Data Protection *Ubiquitous Learning
    6 KB (784 words) - 03:09, 22 November 2011
  • Communications modeling; Communications security; Computer Peer-to-peer and overlay networking; Mobile networking and systems;
    6 KB (725 words) - 19:58, 22 November 2020
  • |Field=i-Society, e-Learning, e-Governance, e-Business, e-Science, Green Computing, Secured Technologies, Intelligent Data Management - Ubiquitous Computing
    5 KB (595 words) - 05:03, 15 January 2012
  • ...ernational conference in Healthcare Informatics and Biomedical Engineering Systems ...ernational conference in Healthcare Informatics and Biomedical Engineering Systems (HIBES 2012)
    9 KB (1,186 words) - 17:44, 24 February 2012
  • ...EI Compendex, SCOPUS and IEEEXplore] International Conference in Green and Ubiquitous Technology [EI Compendex, SCOPUS and IEEEXplore] International Conference in Green and Ubiquitous Technology
    10 KB (1,297 words) - 17:49, 24 February 2012
  • ...gineering || Education || Parallel, distributed, and concurrent systems || Security, privacy and trust | Autonomic and (self-)adaptive systems || Empirical software engineering || Software engineering for machine learn
    6 KB (738 words) - 11:21, 6 July 2020
  • ...rning, human-computer interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational lin ...tures), and CoopIS'19 (International Conference on Cooperative Information Systems).
    6 KB (872 words) - 23:11, 24 February 2020
  • ...rnational Conference on Pervasive and Embedded Computing and Communication Systems |Field=Pervasive and Embedded Computing and Communication Systems
    3 KB (422 words) - 16:24, 19 June 2012
  • Platforms and Operating Systems Ubiquitous Computing
    5 KB (600 words) - 14:41, 20 June 2012
  • ...on among physical sciences. Ever-present throughout human history, optical systems and phenomena have been subject of interest in all cultures and epochs, fro ...and biology, providing fundamental analysis tools. The success of optical systems and tecnhologies in high-end scientific research has also found its way int
    8 KB (1,102 words) - 17:23, 18 July 2012
  • *Computer Architecture and Real time Systems *Dependable, reliable and autonomic computing
    2 KB (274 words) - 18:15, 13 August 2012
  • |Title=15th International Conference on Enterprise Information Systems ...Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce, Human Factors and Enterprise Architecture.
    5 KB (552 words) - 15:08, 21 August 2012
  • |Title=The Second Asian Conference on Information Systems ...Electrical Engineers of Japan (IEEJ) and the Electronics, Information and Systems Society under IEEJ and supported by SIIT, OPU, JAIST, NECTEC, PIM, PSU and
    3 KB (408 words) - 11:39, 5 January 2013
  • - Ubiquitous Computing - Geographic information systems
    4 KB (535 words) - 14:38, 17 January 2013
  • • Platforms and Operating SystemsUbiquitous Computing
    5 KB (647 words) - 19:06, 5 April 2013
  • ...national Conference on Pervasive and Embedded Computing and Communications Systems |Field=MOBILE AND PERVASIVE COMPUTING, DIGITAL SIGNAL PROCESSING, EMBEDDED SYSTEMS DESIGN
    3 KB (390 words) - 15:29, 9 May 2013
  • |Title=International Conference of Computing for Engineering and Sciences |Field=Computing in Mathematics, Natural sciences, Engineering and Medicine
    3 KB (308 words) - 17:30, 26 May 2016
  • |Title=The 12th IEEE-RIVF International Conference on Computing and Communication |Field=Computing and Communication Technologies
    3 KB (422 words) - 12:09, 24 April 2016
  • ...boundaries between disciplines such as databases, social networks, mobile systems, artificial intelligence, information retrieval, and computational linguist ...emantics and semantic modelling to enable co-operation between information systems. This year, we would also welcome additional submissions on the challenge o
    9 KB (1,131 words) - 23:18, 24 February 2020
  • * Multi-agent systems * Secure mobile and multi-agent systems
    3 KB (352 words) - 06:14, 20 September 2016
  • ...rning, human-computer interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational lin ...tures), and CoopIS'20 (International Conference on Cooperative Information Systems).
    6 KB (877 words) - 23:06, 24 February 2020
  • - Security and Data Protection *Ubiquitous Learning
    6 KB (790 words) - 13:45, 24 July 2016
  • - Ubiquitous Computing - Geographic information systems
    5 KB (641 words) - 22:32, 29 July 2016
  • ...onference on Distributed Multimedia Systems, Visual Languages and Sentient Systems DMSVLSS2017 (ksiresearchorg.ipage.com/seke/dmsvlss17.html) will be held at ** Embedded and ubiquitous software engineering
    18 KB (2,288 words) - 12:48, 27 October 2016
  • |Title=Seventh International Conference on Innovative Computing Technology Seventh International Conference on Innovative Computing Technology (INTECH 2017)
    5 KB (631 words) - 15:09, 10 April 2017
  • ...ial papers on the theory, design and implementation of digital information systems, as well as demonstrations, tutorials, workshops and industrial presentatio Enterprise Computing
    4 KB (528 words) - 18:46, 29 August 2017
  • *Big Data Computing *Web-Based Health- and Bio- Information Systems
    18 KB (2,394 words) - 16:28, 29 January 2018
  • Large Scale Information Systems (ODBASE'17) provides a forum on the use of systems, information retrieval, knowledge discovery, and computational
    6 KB (798 words) - 23:16, 24 February 2020
  • * Computer Architecture and Real time Systems * Dependable, reliable and autonomic computing
    10 KB (1,396 words) - 13:30, 28 July 2017
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • * Computer Architecture and Real time Systems * Dependable, reliable and autonomic computing
    5 KB (679 words) - 13:28, 28 July 2017
  • * Computer Architecture and Real Time Systems * Dependable, Reliable and Autonomic Computing
    5 KB (651 words) - 11:34, 8 August 2017
  • As a novel technology, cloud computing implementations have been booming in computing. The concentration of SmartCloud 2017 is enabling cloud computing to
    3 KB (464 words) - 09:30, 3 September 2017
  • science and services, Web Information Systems and Applications, Computer Network Special Session: Big Data and Intelligent Computing
    5 KB (673 words) - 09:53, 3 September 2017
  • Security, Computer Vision. Following the past successful symposium SoICT 2016, Conference on Computational Systems-Biology and Bioinformatics:
    4 KB (559 words) - 11:58, 8 August 2017
  • * Accessible Computing Applications * Artificial Intelligence and Soft Computing
    3 KB (347 words) - 10:20, 20 November 2020
  • informatics to solve privacy, security, healthcare, education, poverty, and industry to focus on the human use of computing fields such as communication,
    4 KB (570 words) - 13:30, 28 July 2017
  • * Accessible Computing * Artificial Intelligence and Soft Computing
    3 KB (346 words) - 17:32, 18 February 2021
  • - High Performance Computing - Information Security & Risk Management
    6 KB (814 words) - 09:03, 3 September 2017
  • |Field=security Wireless Networks, Data communication Technologies, and Network Security. The
    4 KB (546 words) - 11:35, 8 August 2017
  • |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
    5 KB (722 words) - 10:00, 21 August 2017
  • |Title=ICNS - Ei 2017 : 2017 The 2nd International Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus |Field=security
    2 KB (308 words) - 11:50, 3 September 2017
  • and network security. Large/Heterogeneous Networks Security, privacy, trust and ethics
    4 KB (442 words) - 10:00, 21 August 2017
  • * Computer Architecture and Real time Systems * Dependable, Reliable and Autonomic Computing
    5 KB (589 words) - 11:46, 8 August 2017
  • |Title=ACM International Conference on Ubiquitous Information Management and Communication on Ubiquitous Information Management and Communication
    4 KB (580 words) - 20:58, 12 November 2020
  • * Cognitive Computing track abstracts submission deadline : 26 October 2017 * Cognitive Computing track full papers submission deadline : 14 November 2017
    12 KB (1,422 words) - 10:18, 5 October 2023
  • contributions to the Wireless & Mobile computing in theoretical and practical aspects. The Wireless & Mobile computing domain emerges from the integration
    5 KB (616 words) - 13:19, 28 July 2017
  • |Title=International Conference on Ubiquitous Information Management and Communication social interaction. The aim of the 12th International Conference on Ubiquitous
    3 KB (346 words) - 19:16, 26 November 2020
  • |Title=ICEIS 2018 : 20th International Conference on Enterprise Information Systems 20th International Conference on Enterprise Information Systems ICEIS
    6 KB (818 words) - 13:40, 3 September 2017
  • |Title=SmartCom 2017 : The 2nd International Conference on Smart Computing and Communication CFP: The 2nd International Conference on Smart Computing and Communication
    3 KB (412 words) - 11:51, 3 September 2017
  • ...CICC - Ei 2018 : 2018 International Conference on Intelligent Control and Computing (ICICC 2018)--Ei Compendex & Scopus 2018 International Conference on Intelligent Control and Computing (ICICC 2018)
    2 KB (246 words) - 12:11, 3 September 2017
  • * Computer Architecture and Real time Systems * Dependable, Reliable and Autonomic computing
    4 KB (478 words) - 08:48, 16 May 2020
  • |Title=29th International Conference on Database and Expert Systems Applications Database, information, and knowledge systems have always been a core subject of computer science. The ever increasing ne
    4 KB (548 words) - 08:05, 13 September 2019
  • |Title=30th International Conference on Database and Expert Systems Applications ...uirements, problems, and solutions in database, information, and knowledge systems. DEXA 2019 will be held in Linz, Austria from 26 to 29 August 2019.
    4 KB (510 words) - 09:37, 21 April 2020
  • ...onference on Distributed Multimedia Systems, Visual Languages and Sentient Systems |Has coordinator=KSI Research Inc., Knowledge Systems Institute
    4 KB (436 words) - 11:49, 21 April 2020
  • *Big Data platforms with applications to network management, security, measurements *Experience and lessons learned by deploying large-scale networked systems
    2 KB (290 words) - 11:16, 6 April 2020
  • |Title=40th International Conference on Information Systems |Field=Information Systems
    2 KB (215 words) - 10:18, 12 June 2019
  • |Title=15th International Conference on Availability, Reliability, and Security The International Conference on Availability, Reliability, and Security (ARES) 2020
    3 KB (313 words) - 17:14, 4 November 2020
  • |Title=16th EAI International Conference on Security and Privacy in Communication Networks * Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
    2 KB (299 words) - 13:10, 30 March 2020
  • *Big data platforms with applications to network management, security, measurements ...insights into real-world deployments of novel networking technologies and systems
    2 KB (238 words) - 11:18, 6 April 2020
  • ...ion of functional and non-functional properties, including performance and security aspects; ...reconfiguration, networked computing, parallel, high-performance and cloud computing;
    2 KB (264 words) - 18:00, 18 February 2021
  • |Title=12th International Conference on Provable Security ...rs and practitioners to exchange new ideas on diverse problems in provable security.
    3 KB (445 words) - 11:59, 9 April 2020
  • * Embedded and ubiquitous software engineering * Autonomic computing and agent-based systems
    5 KB (608 words) - 13:03, 15 April 2020
  • |Title=19th IEEE Conference on Ubiquitous Intelligence and Computing. Ubiquitous * Intelligent/smart systems and services
    3 KB (284 words) - 15:23, 16 April 2020
  • |Title=15th IEEE International Conference on Intelligence and Computing * – Urban Computing and Smart City Systems
    2 KB (243 words) - 15:46, 16 April 2020
  • ...ion of functional and non-functional properties, including performance and security aspects; ...reconfiguration, networked computing, parallel, high-performance and cloud computing;
    3 KB (355 words) - 08:53, 17 April 2020
  • ...Opportunistic unlicensed spectra utilization; Adaptation in Cyber-physical systems; Service availability models ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking;
    14 KB (1,770 words) - 14:56, 19 April 2020
  • * Embedded and ubiquitous software engineering * Autonomic computing and agent-based systems
    4 KB (490 words) - 09:38, 23 April 2020
  • |Title=14-th International Workshop on Advances in Information Security * Security of next generation Operating Systems
    2 KB (200 words) - 12:01, 28 April 2020
  • ...communication and computation capabilities into mobile form factors. These ubiquitous smart devices lie at the heart of a revolution shaping how we connect, coll ...management, nearthreshold/subthreshold systems, digital architectures and systems for emerging applications (e.g. virtual reality, autonomous vehicles).
    5 KB (629 words) - 09:36, 6 May 2020
  • |Field=big data, cloud computing, artificial intelligence, database In recent years, “Big Data” has become a new ubiquitous term. Big Data is transforming science, engineering, medicine, healthcare,
    9 KB (1,187 words) - 14:18, 27 May 2020
  • ...al-time analytics; Real-time data aggregation; Big Data and Industrial 4.0 systems; Internet and Crowdsourcing; Mobile and wearable networks; Smart sensing ne WSSA : Web Services-based Systems and Applications
    14 KB (1,804 words) - 13:49, 5 June 2020
  • |Title=The Fifteenth International Conference on Systems and Networks Communications ICSNC 2020, The Fifteenth International Conference on Systems and Networks Communications
    13 KB (1,636 words) - 11:51, 10 July 2020
  • |Title=The Tenth International Conference on Advanced Collaborative Networks, Systems and Applications ...20, The Tenth International Conference on Advanced Collaborative Networks, Systems and Applications
    8 KB (897 words) - 17:15, 22 March 2021
  • |Title=The Tenth International Conference on Ambient Computing, Applications, Services and Technologies AMBIENT 2020, The Tenth International Conference on Ambient Computing, Applications, Services and Technologies
    6 KB (750 words) - 17:55, 13 January 2021
  • |Field=Networking, Internet, Security, Sensor, Hardware, Technologies ...nferencing systems; Large-scale datacenter networks; Traffic-aware control systems; Short-term traffic forecasting; Energy efficiency; Differentiated services
    7 KB (904 words) - 12:32, 22 January 2021
  • ...chronization; Tracking and partial position information; Failure handling; Security and authentication ...s and the Web; Integration with other systems (e.g., Web-based information systems, process control, enterprise software, etc.); Target tracking; RFID tags; T
    15 KB (1,880 words) - 14:45, 27 August 2020
  • ...aces; Speech and natural language interfaces; Interfaces for collaborative systems; Interfaces for restricted environments; Internationalization and reflectio Human-centered process optimization and systems integration; Human-centered chains; Human-centered risk management and nano
    16 KB (1,964 words) - 13:34, 7 January 2021
  • |Title=8th International Conference on Availability, Reliability, and Security The 8th International Conference on Availability, Reliability and Security (ARES) 2013
    4 KB (468 words) - 11:39, 21 August 2020
  • |Title=9th International Conference on Availability, Reliability and Security The 9th International Conference on Availability, Reliability and Security (ARES) 2014
    4 KB (538 words) - 11:52, 21 August 2020
  • |Title=14th International Conference on Availability, Reliability, and Security The 14th International Conference on Availability, Reliability, and Security (ARES) 2019
    5 KB (627 words) - 10:49, 25 August 2020
  • ...nd ePrescribing systems; Online eHealth communities; Context-aware eHealth systems; eHealth portals; eHealth Literacies ...cipatory medical decisions; Inappropriate prescriptions in self-management systems; Health consumer-centric perspectives; Medication self-managing
    16 KB (2,024 words) - 13:33, 24 August 2020
  • |Title=13th International Conference on Availability, Reliability and Security The 13th International Conference on Availability, Reliability and Security (ARES) 2018
    3 KB (336 words) - 11:20, 25 August 2020
  • |Title=10th International Conference on Availability, Reliability and Security The 10th International Conference on Availability, Reliability and Security (ARES) 2015
    5 KB (590 words) - 11:54, 25 August 2020
  • |Title=11th International Conference on Availability, Reliability and Security The 11th International Conference on Availability, Reliability and Security (ARES) 2016
    5 KB (581 words) - 12:47, 25 August 2020
  • ...Security/Performance 2017 : Elsevier Computer Networks: Special Issue on Security and Performance of SDN/NFV]] ||43 | [[IEEE Symposium on Security and Privacy 2018]] ||[[:39th IEEE Symposium on Security and Privacy]] ||43
    24 KB (2,633 words) - 18:53, 15 October 2020
  • |Title=13th International Conference on Security and Privacy in Communications Networks Also known as: 13th EAI International Conference on Security and Privacy in Communication Networks (EAI = European Alliance for Innovati
    3 KB (326 words) - 09:35, 10 September 2020
  • |Title=12th International Conference on Security and Privacy in Communications Networks Also known as: 12th EAI International Conference on Security and Privacy in Communication Networks (EAI = European Alliance for Innovati
    3 KB (336 words) - 09:51, 10 September 2020
  • |Title=11th Asian Conference Intelligent Information and Database Systems The 11th Asian Conference Intelligent Information and Database Systems (ACIIDS) 2019
    4 KB (478 words) - 11:05, 11 September 2020
  • |Title=The Sixteenth International Conference on Systems - ICONS 2021, The Sixteenth International Conference on Systems
    10 KB (1,210 words) - 20:17, 22 November 2020
  • ...Opportunistic unlicensed spectra utilization; Adaptation in Cyber-physical systems; Service availability models ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking;
    13 KB (1,574 words) - 12:11, 24 November 2020
  • |Field=Computation,Systems,Networks ...eduling; Data analytics and visualization; HPC in IoT (Internet of Things) systems; Observational data and simulations; Complex scientific data sets; Massivel
    11 KB (1,325 words) - 15:01, 18 February 2021
  • ...gnitive Models; Mining cognitive patterns; Bag-of-Features for retrievals; Computing with symmetries; Periphery of Knowledge; Emotions and cooperation levels ...very in neuroimaging; Brain-computer interface; Cognition-inspired complex systems; Aesthetic emotions
    8 KB (972 words) - 18:55, 8 December 2020
  • ...PUTATION 2021, The Thirteenth International Conference on Advanced Service Computing |Field=Servicies computing
    10 KB (1,221 words) - 18:57, 8 December 2020
  • ADVANCED: Next generation wireless systems and services Technologies; Personal and body networks, wearable computing; Digital
    19 KB (2,346 words) - 10:51, 9 December 2020
  • Multimedia systems, architecture, and applications; New multimedia Multimedia meta-modeling techniques and operating systems; Multimedia
    10 KB (1,212 words) - 14:36, 29 December 2020
  • |Field=information systems, big data, software design Information Systems and Technologies
    5 KB (640 words) - 21:39, 17 December 2020
  • ...al-time analytics; Real-time data aggregation; Big Data and Industrial 4.0 systems; Internet and Crowdsourcing; Mobile and wearable networks; Smart sensing ne ...ty labels, semi-supervised); Applications of machine learning (recommender systems, NLP, computer vision, etc.); Data in machine learning (no data, small data
    15 KB (1,921 words) - 01:00, 12 December 2020
  • |Title=14th ACM International Conference on Distributed and Event-based Systems ...reporting of experiences relevant to distributed systems and event‐based computing. The conference aims at providing a forum for academia and industry to exch
    3 KB (344 words) - 15:54, 29 January 2021
  • |Title=15th ACM International Conference on Distributed Event-Based Systems ...processing, event processing in big and fast data, data stream processing, security and encryption in stream processing, complex event forecasting, in-network
    2 KB (300 words) - 16:01, 29 January 2021
  • ...Opportunistic unlicensed spectra utilization; Adaptation in Cyber-physical systems; Service availability models ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking;
    13 KB (1,653 words) - 14:44, 10 February 2021
  • ...-technology service deployment and assurance, Next Generation Networks and Ubiquitous Services, Network Control and Management, Multi Provider QoS/SLA Internetwo ...Opportunistic unlicensed spectra utilization; Adaptation in Cyber-physical systems; Service availability models
    14 KB (1,718 words) - 11:30, 3 March 2021
  • * Security, Privacy and Trust * Distributed AI and Soft/Natural Computing
    2 KB (230 words) - 12:18, 4 March 2021
  • ● Mobile and Ubiquitous Computing ● Network and System Security
    2 KB (314 words) - 04:25, 17 March 2021
  • |Title=2021 International Conference on Computer Systems Adaptive, self-managing and multi-agent systems
    2 KB (273 words) - 04:32, 17 March 2021
  • ...Networks; Database Systems; Parallel and Distributed Computing; Ubiquitous Computing; etc. For more topics, please visit http://www.icacte.org/cfp.html.
    1 KB (198 words) - 09:05, 26 March 2021
  • |Title=2nd International Conference on Computer Communication and Information Systems Autonomic and Trusted Computing
    2 KB (240 words) - 09:51, 13 April 2021
  • * parallel and distributed computing * computability and nonstandard computing models
    3 KB (324 words) - 12:01, 21 April 2021
  • * distributed and parallel computing * computability and nonstandard computing models
    3 KB (425 words) - 14:12, 22 April 2021
  • ADVANCED: Next generation wireless systems and services ...RFID and Sensor Network Technologies; Personal and body networks, wearable computing; Digital home network technologies; Deployment, trial experience, business
    19 KB (2,317 words) - 02:40, 26 November 2021
  • |Title=The Seventeenth International Conference on Systems ICONS 2022, The Seventeenth International Conference on Systems
    10 KB (1,228 words) - 02:46, 26 November 2021
  • ...munications switching and routing; Communications modeling; Communications security; Computer communications; Distributed communications; Signal processing in ...tical networks; Peer-to-peer and overlay networking; Mobile networking and systems; MPLS-VPN, IPSec-VPN networks; Vehicular Networks; GRID networks, Cloud and
    6 KB (832 words) - 02:47, 26 November 2021
  • ...networking; Wired and wireless multimedia systems; Distributed multimedia systems; Multisensor data integration and fusion; Multimedia and P2P; Multimedia st Self-organization in multimedia systems; Self-organization in multimedia communities; Self-organized multimedia net
    10 KB (1,221 words) - 03:35, 3 December 2021
  • ● Mobile and Ubiquitous Computing ● Network and System Security
    4 KB (504 words) - 08:27, 22 September 2023
  • |Has host organization=Association for Computing Machinery Authorization, data privacy and security
    6 KB (723 words) - 07:11, 16 August 2023
  • Power Electronics and Energy Systems Circuits and Systems
    4 KB (501 words) - 04:15, 20 July 2023
  • |Title=International Conference on Cyber Security and Information Engineering |Field=Cyber Security, Information Engineering
    4 KB (517 words) - 04:36, 29 June 2023