Search results
Create the page "Security systems" on this wiki! See also the search results found.
- ...vancements, analysis tools, formal approaches to software engineering, and security.2 KB (243 words) - 22:59, 3 April 2020
- |Field=storage systems ...nologies (FAST '20) co-located with the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20)5 KB (599 words) - 13:41, 26 February 2020
- ...tions in the design, implementation, evaluation, and deployment of storage systems. Co-located with NSDI '19 **Archival storage systems5 KB (597 words) - 13:44, 26 February 2020
- ...tions in the design, implementation, evaluation, and deployment of storage systems. **Archival storage systems4 KB (553 words) - 13:45, 26 February 2020
- ...ernet of Things, machine learning, mobile and social sensing, and embedded systems design. Of special interest are contributions at the confluence of multiple *Outdoor, wide-area, or crowdsourced sensing systems3 KB (412 words) - 09:52, 27 February 2020
- |Title=13th International Conference on Enterprise Information Systems (ICEIS) Conference name: 13th International Conference on Enterprise Information Systems (ICEIS)19 KB (2,462 words) - 19:10, 26 August 2010
- ...happen to be new to these service providers and might be worried about the security of using these online services then, the following benefits are sure to get ...recipient. All of these fax services also boast of good contact management systems they are also akin to our internet email accounts and also having good faci3 KB (610 words) - 16:33, 27 August 2010
- ...011 International Conference of Computational Intelligence and Intelligent Systems The 2011 International Conference of Information Security and Internet Engineering3 KB (458 words) - 08:06, 31 August 2010
- * Security/Surveillance * Vision Systems and Applications2 KB (164 words) - 20:17, 12 May 2020
- * Theory of Security in Networks * Models of Concurrent, Distributed, and Mobile Systems4 KB (602 words) - 06:44, 26 August 2020
- |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium3 KB (343 words) - 16:31, 6 May 2020
- |Title=32nd International Conference on Advanced Information Systems Engineering |Field=Information Systems3 KB (395 words) - 15:14, 24 September 2020
- * Dynamics of neural systems * Itinerant dynamics in neural systems5 KB (574 words) - 15:58, 6 March 2020
- * Distributed operating systems, middleware, database systems * Experimental evaluation of distributed algorithms and systems3 KB (344 words) - 11:30, 21 April 2020
- systems. Within the context and scope of the journal the term imaging is taken - Image Security2 KB (298 words) - 18:24, 10 September 2010
- - Geographic information systems - Intelligent Systems6 KB (732 words) - 05:52, 5 December 2010
- • AI/Expert systems • Distributed systems4 KB (579 words) - 15:24, 13 October 2010
- ...nym=CALL FOR PAPER Journal: International Journal of Computer Science and Security (IJCSS) |Title=International Journal of Computer Science and Security (IJCSS)2 KB (298 words) - 16:47, 5 July 2020
- |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)5 KB (609 words) - 17:01, 5 July 2020
- • Algorithms, Systems and Applications • Ad-hoc Wireless Networks • Network Security and Privacy • Network Services and Applications3 KB (318 words) - 16:46, 5 July 2020
- Clinical Informatics and Hospital Information Systems Decision Support Systems and Computer Aided Diagnosis5 KB (693 words) - 10:44, 14 November 2010
- |Title=14th International Conference on Business Information Systems ..., implementation, application and improvement of business applications and systems. It is addressed to the scientific community, people involved in the develo6 KB (806 words) - 14:48, 16 November 2010
- |Title=The 7th International ASME/IEEE Conference on Mechatronics & Embedded Systems & Applications |Field=Mechatronics & Embedded Systems12 KB (1,378 words) - 21:13, 28 November 2010
- Context-aware systems<br> Security in network, systems, and applications<br>4 KB (554 words) - 12:34, 14 October 2020
- Context-aware systems<br> Security in network, systems, and applications<br>4 KB (556 words) - 12:33, 14 October 2020
- Context-aware systems<br> Security in network, systems, and applications<br>4 KB (552 words) - 08:13, 10 December 2010
- Context-aware systems<br> Security in network, systems, and applications<br>4 KB (554 words) - 10:24, 6 July 2020
- Context-aware systems<br> Security in network, systems, and applications<br>4 KB (554 words) - 12:33, 14 October 2020
- |Title=PECCS Special Session on Self-Aware and Adaptive Embedded Systems Conference name: PECCS Special Session on Self-Aware and Adaptive Embedded Systems - SAAES 20114 KB (598 words) - 18:55, 23 December 2010
- ...eb user profiling, recommender systems, email organization and processing, security, etc.3 KB (344 words) - 19:33, 23 December 2010
- ...ng, graphics, databases, wireless networks, distributed systems, operating systems and so on. - Agent Systems and Applications4 KB (505 words) - 08:07, 14 April 2011
- |Title=PECCS Special Session on Self-Aware and Adaptive Embedded Systems Conference name: PECCS Special Session on Self-Aware and Adaptive Embedded Systems - SAAES 20114 KB (593 words) - 17:49, 7 January 2011
- ...ct and reliable software systems, and an emerging awareness of privacy and security. Even though curriculum committees recognize formal methods as an essential3 KB (448 words) - 17:58, 7 January 2011
- |Field=Computer security and reliability field of Systems Security, which has been created to build on the5 KB (701 words) - 05:52, 14 April 2011
- |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability5 KB (597 words) - 10:45, 21 August 2020
- ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...asing dependency on tightly interconnected, complex and pervasive computer systems and networks. The ubiquitous nature of our digital lifestyle presents many3 KB (462 words) - 11:51, 22 March 2020
- |Title=International Workshop on Visualization and Information Security Management |Field=Security Management3 KB (468 words) - 00:17, 2 March 2011
- * Overlay Networks/Peer-to-Peer Systems * Network Security3 KB (322 words) - 05:59, 8 March 2011
- − Information Security and Applied Cryptography. − Intelligent Information Systems.3 KB (367 words) - 16:37, 27 December 2015
- |Title=The 23th IFIP International Conference on Testing Software and Systems ICTSS 2011: The 23th IFIP International Conference on Testing Software and Systems6 KB (822 words) - 14:44, 18 March 2011
- * Confidentiality and Data Security * Decision Support Systems2 KB (216 words) - 17:51, 29 June 2011
- * Enterprise Information Systems * Information Security2 KB (250 words) - 14:52, 1 October 2020
- ...of Computational Intelligence and many other areas related to intelligent systems, on the other hand. * Hybrid Intelligent Systems4 KB (439 words) - 17:54, 29 June 2011
- ...om his/her way, customs or duties, through the promise of money, honors or security. History shows that this phenomenon has generally been manifesting in diffe ...pects of corruption in different cultures, historical times, and juridical systems. The major questions which will be discussed during this international conf5 KB (676 words) - 16:03, 31 May 2011
- * Confidentiality and Data Security * Decision Support Systems2 KB (260 words) - 17:46, 29 June 2011
- |Title=1st International Conference on Operations Research and Enterprise Systems (ICORES) ...e name: 1st International Conference on Operations Research and Enterprise Systems (ICORES)3 KB (283 words) - 11:37, 1 July 2011
- ...rnational Conference on Pervasive and Embedded Computing and Communication Systems (PECCS) ...rnational Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)4 KB (463 words) - 11:41, 1 July 2011
- * Internet, Web and Security Visualization * Visualization Tools and Systems for Simulation and Modeling4 KB (461 words) - 11:48, 1 July 2011
- ...rs, engineers and practitioners on the area of computer vision application systems. Five simultaneous tracks will be held, covering all different aspects rela * Media Watermarking, Security, and Forensics4 KB (538 words) - 11:34, 21 February 2020
- ...er organizations view the “external” IT as potential disaster recovery systems or as on-demand capacity to boost business continuity and customer service Service and Systems Design and QoS Network Security5 KB (677 words) - 11:59, 1 July 2011
- Intelligent Tutoring Systems Security Aspects4 KB (517 words) - 12:03, 1 July 2011
- |Title=8th International Conference on Web Information Systems and Technologies (WEBIST) Conference name: 8th International Conference on Web Information Systems and Technologies (WEBIST)5 KB (612 words) - 12:07, 1 July 2011
- ...IASTED International Conference on Parallel and Distributed Computing and Systems ...ce the theories and technologies of parallel and distributed computing and systems by sharing their ideas, results, insights, and experiences on these topics.13 KB (1,774 words) - 18:35, 31 August 2011
- * Are decision support systems in the biomedical domain using ontologies? How? ...ineering, law enforcement, document management, e-government, legislative systems.8 KB (1,106 words) - 15:50, 20 July 2011
- ...and how does the distorted vision of other people’s religions and their systems lead to a negative evaluation of those religions? ...tion but potentially one tied to questions of greater human well-being and security. How do we begin to reevaluate the beautiful in terms of psychic well-being10 KB (1,552 words) - 17:04, 24 February 2016
- |Title=Workshop on Model-Driven Engineering for Networked Ambient Systems |Superevent=3rd International Conference on Ambient Systems, Networks and Technologies5 KB (598 words) - 17:05, 24 February 2016
- ...chniques relating to the satellite communications, networking, technology, systems and applications ...rtunities are also currently fueling accelerated research in PSATS enabled systems which we cover in this conference. The services enabled by PSATS not only c9 KB (1,218 words) - 16:06, 1 October 2020
- Parallel and distributed systems, high-performance computing systems Operating systems6 KB (809 words) - 16:26, 28 September 2011
- Trends in Intelligent Systems and Computer Engineering, Advances in Communication Systems and Electrical Engineering, and7 KB (909 words) - 16:30, 10 September 2020
- - Security and Data Protection - Learning Management Systems (LMS)6 KB (784 words) - 03:09, 22 November 2011
- ...sources such as parallel supercomputers, data archives, high-speed storage systems, advanced visualization devices and scientific instruments using high speed • Security-related performance issues in high-performance computing environments such4 KB (485 words) - 12:22, 22 November 2011
- ...nces in building, designing, using and understanding trustworthy computing systems. Trust, Security and Privacy in embedded systems4 KB (451 words) - 12:27, 30 November 2011
- ...tabases offer better feature for a number of social applications. Semantic systems helps to bridge the gap between words and their meaning. Vocabularies are n ...worldwide. Mobile devices and context aware systems (e.g. locations based systems) play a major role for social applications. New threats accompany these tre5 KB (669 words) - 14:40, 20 December 2011
- Trends in Intelligent Systems and Computer Engineering, Advances in Communication Systems and Electrical Engineering, and8 KB (1,085 words) - 16:28, 6 February 2012
- Communications modeling; Communications security; Computer Peer-to-peer and overlay networking; Mobile networking and systems;6 KB (725 words) - 19:58, 22 November 2020
- - Geographic information systems - Intelligent Systems5 KB (595 words) - 05:03, 15 January 2012
- ...e=Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems 6th IEEE International Conference on Self-Adaptive and Self-Organizing Systems7 KB (969 words) - 04:02, 17 January 2012
- ...from various disciplines, such as business process management, distributed systems, computer networks, wireless & mobile computing, grid computing, networking - Security, Privacy and Trust6 KB (745 words) - 15:27, 1 November 2016
- ...012 International Conference of Computational Intelligence and Intelligent Systems ...012 International Conference of Computational Intelligence and Intelligent Systems (ICCIIS 2012)11 KB (1,490 words) - 11:59, 27 January 2012
- |Field=Computer security and reliability The conference theme is 'Building resilient systems that address advanced persistent threats'. The advance persistent threat (A2 KB (304 words) - 10:54, 5 March 2012
- ...ernational conference in Healthcare Informatics and Biomedical Engineering Systems ...ernational conference in Healthcare Informatics and Biomedical Engineering Systems (HIBES 2012)9 KB (1,186 words) - 17:44, 24 February 2012
- ...computing and promoting environmentally friendly computer technologies and systems. The event aims at bringing together researchers and practitioners who are ...tion technology, in particular, can provide monitoring facilities, control systems, intelligent construction models and so on. From a scientific point of view10 KB (1,297 words) - 17:49, 24 February 2012
- ...venth International Workshop on Frontiers in Availability, Reliability and Security |Field=Computer security and reliability2 KB (221 words) - 16:12, 29 February 2012
- |Title=The Fourth International Workshop on Organizational Security Aspects |Field=Computer security and reliability3 KB (368 words) - 16:16, 29 February 2012
- ...d state of the art research from the IMT-Advanced and distributed wireless systems. The scope of the workshop includes a wide range of technical challenges in - Middleware of SON: self-localization, security, data fusion, etc.5 KB (633 words) - 14:08, 2 March 2012
- ...s, the efficiency denotes the time cost of transmission processes, and the security denotes the protection of the transmitted media content. Recently, various - Peer-to-Peer Streaming Systems5 KB (726 words) - 15:28, 2 March 2012
- coupled software systems are only good for niche markets, whereas loosely coupled software systems can be more flexible,4 KB (504 words) - 18:21, 5 March 2012
- ...iles in data centers; Smart energy; Car Connectivity; Green communications systems ...; Evolution from 4G to 5G and beyond; Wireless multimedia and networks and systems; Cellular and Ad hoc networks; Mobile broadband technologies; Mobile softwa13 KB (1,580 words) - 19:35, 18 February 2021
- |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security4 KB (581 words) - 18:48, 24 February 2020
- ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modelling) ...atabase systems, indexing and compression, architectures, distributed data systems, dataspaces, customised hardware)5 KB (653 words) - 13:04, 3 August 2023
- ...r the spreading of misinformation, hate and crime, and the construction of systems which are more about process than people. It is time to ask: can the Web be ...rity & Trust: Safeguarding and governance of the Web and/or AI; anonymity, security and trust for Web access; false news; data for the public good; and crime o6 KB (910 words) - 12:04, 31 January 2020
- |Title=24th International Conference on Database Systems for Advanced Applications '''24th International Conference on Database Systems for Advanced Applications'''4 KB (535 words) - 21:32, 11 February 2020
- |Title=Conference on Database Systems for Advanced Applications '''25th International Conference on Database Systems for Advanced Applications'''4 KB (500 words) - 17:29, 6 January 2021
- ...hitecture|Computer architecture]], [[:category:Operating systems|Operating systems]] * [[:category:Computer_security_and_reliability|Computer security and reliability]]7 KB (815 words) - 18:03, 14 April 2021
- '''Business Information Systems''' *Modeling Distributed Ledger Systems5 KB (663 words) - 11:49, 18 February 2020
- ...gineering || Education || Parallel, distributed, and concurrent systems || Security, privacy and trust | Autonomic and (self-)adaptive systems || Empirical software engineering || Software engineering for machine learn6 KB (738 words) - 11:21, 6 July 2020
- |Title=16th International Conference on Semantic Systems * Trust, Data Privacy, and Security with Semantic Technologies6 KB (872 words) - 14:00, 22 February 2020
- ...for the presentation of new research results, and the demonstration of new systems and techniques, in the broad field of information retrieval (IR). The 43rd Research focusing on recommender systems, rich content representations and content analysis, such as:8 KB (1,024 words) - 09:57, 13 May 2020
- ...rning, human-computer interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational lin ...tures), and CoopIS'19 (International Conference on Cooperative Information Systems).6 KB (872 words) - 23:11, 24 February 2020
- * Multimedia systems and applications * Network security5 KB (630 words) - 05:00, 19 April 2012
- |Title=Conference On Principles Of Distributed Systems |Field=Distributed Systems2 KB (299 words) - 11:51, 8 April 2020
- |Title=International Conference on Circuits and Systems 2012 Call for Papers: International Conference on Circuits and Systems ICCS 201210 KB (1,363 words) - 09:26, 7 May 2012
- ...etworks , Network Modeling and Simulation, Computer Network : Performance, Security and Applications, Neural Networks and Applications, Remote Sensing, Self Or ...lication, Multimedia and Its applications, Information processing and data security Software Engineering, Software Testing, Testing tools, Mutation Testing and3 KB (434 words) - 22:46, 30 May 2012
- * Trust, privacy, and security on the Semantic Web ...journals, including International Journal on Semantic Web and Information Systems (IJSWIS), for fast-track publication in a special issue in these journals.5 KB (699 words) - 14:57, 5 December 2018
- Rendering Algorithms and Systems Data Security10 KB (1,492 words) - 17:22, 26 June 2012
- ...rnational Conference on Pervasive and Embedded Computing and Communication Systems |Field=Pervasive and Embedded Computing and Communication Systems3 KB (422 words) - 16:24, 19 June 2012
- ...in any of the topics listed below. Papers describing advanced prototypes, systems, tools and techniques as well as general survey papers indicating future di Security & Privacy4 KB (466 words) - 16:27, 19 June 2012
- ...rs, engineers and practitioners on the area of computer vision application systems. Five simultaneous tracks will be held, covering all different aspects rela ...k in any of the areas listed below. Papers describing advanced prototypes, systems, tools and techniques as well as general survey papers indicating future di5 KB (599 words) - 11:34, 21 February 2020
- Platforms and Operating Systems Security: Vulnerability and Privacy5 KB (600 words) - 14:41, 20 June 2012
- ...er organizations view the “external” IT as potential disaster recovery systems or as on-demand capacity to boost business continuity and customer service Service and Systems Design and QoS Network Security5 KB (662 words) - 18:50, 20 June 2012
- ...the section “Conference Areas”. Papers describing advanced prototypes, systems, tools and techniques and general survey papers indicating future direction Intelligent Tutoring Systems5 KB (671 words) - 18:54, 20 June 2012
- |Title=2nd International Conference on Smart Grids and Green IT Systems |Field=SMART GRIDS, ENERGY-AWARE SYSTEMS AND TECHNOLOGIES, SUSTAINABLE COMPUTING AND COMMUNICATIONS5 KB (649 words) - 10:44, 21 June 2012
- |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability5 KB (575 words) - 10:16, 1 August 2019
- ...on among physical sciences. Ever-present throughout human history, optical systems and phenomena have been subject of interest in all cultures and epochs, fro ...and biology, providing fundamental analysis tools. The success of optical systems and tecnhologies in high-end scientific research has also found its way int8 KB (1,102 words) - 17:23, 18 July 2012
- |Field=Information and Communication Security ...broad coverage of recent developments in “Information and Communication Security”. In 2012 the IPICS will be hosted by the SBA Research, at Vienna, Austri2 KB (263 words) - 15:04, 24 July 2012
- *Computer Architecture and Real time Systems *Distributed and parallel systems & algorithms2 KB (274 words) - 18:15, 13 August 2012
- - Security and Access Control<br /> - Communication Systems <br />3 KB (466 words) - 13:00, 16 August 2012
- |Title=15th International Conference on Enterprise Information Systems ...ntegration, Artificial Intelligence, Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce, Human5 KB (552 words) - 15:08, 21 August 2012
- ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. • Multi-agent systems6 KB (728 words) - 01:01, 25 August 2012
- - Energy-aware large scale distributed systems, such as Grids, Clouds and service computing ..., manufacture, use, disposal, and recycling of computers and communication systems4 KB (491 words) - 22:39, 28 August 2012
- Trends in Intelligent Systems and Computer Engineering, Advances in Communication Systems and Electrical Engineering, and7 KB (903 words) - 16:27, 10 September 2020
- Trends in Intelligent Systems and Computer Engineering, Advances in Communication Systems and Electrical Engineering, and6 KB (868 words) - 17:21, 29 August 2012
- |Field=databases, data warehousing, data mining,data management,data security ...ta mining, data management, data security and other aspects of information systems and technology involving advanced applications of data.5 KB (558 words) - 13:27, 27 November 2020
- ...Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...e Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".6 KB (801 words) - 11:04, 14 April 2020
- Network Security Web Information systems2 KB (234 words) - 08:25, 26 October 2012
- Information Security Information Systems2 KB (224 words) - 08:27, 26 October 2012
- |title=International Journal of Networks and Systems ( IJNS ) |Field=Computer Science, Networks, Systems2 KB (211 words) - 08:30, 26 October 2012
- |Title=31st Conference on Advanced Information Systems Engineering ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness.3 KB (375 words) - 15:06, 24 September 2020
- ...en Archives Harvester; ProQuest; SCOPUS; Socolar; The Index of Information Systems Journals; ULRICH's Periodicals Directory ...en Archives Harvester; ProQuest; SCOPUS; Socolar; The Index of Information Systems Journals; ULRICH's Periodicals Directory6 KB (764 words) - 02:27, 11 December 2012
- |Title=7th ACM International Conference on Distributed Event-Based Systems ...ents, logistics and networking, to complex event processing in finance and security. The DEBS conference brings together researchers and practitioners from the6 KB (826 words) - 15:44, 29 January 2021
- ...nces in building, designing, using and understanding trustworthy computing systems. ● Trust, Security and Privacy in embedded systems5 KB (677 words) - 15:19, 19 December 2012
- |Title=The Second Asian Conference on Information Systems ...Electrical Engineers of Japan (IEEJ) and the Electronics, Information and Systems Society under IEEJ and supported by SIIT, OPU, JAIST, NECTEC, PIM, PSU and3 KB (408 words) - 11:39, 5 January 2013
- * Cloud Computing, Map Reduce, Parallel, Distributed, P2P Systems * Security, Privacy, Authenticated Query Processing5 KB (584 words) - 14:44, 14 January 2013
- - Geographic information systems - Intelligent Systems4 KB (535 words) - 14:38, 17 January 2013
- Enterprise Information Systems Intelligent information systems3 KB (441 words) - 14:52, 1 October 2020
- - Information systems and people in organizations - Embedded Systems5 KB (702 words) - 10:02, 5 March 2013
- Privacy, Security and Neuroethics The congress will be sponsored by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC).5 KB (571 words) - 11:33, 26 March 2013
- • Platforms and Operating Systems • Security: Vulnerability and Privacy5 KB (647 words) - 19:06, 5 April 2013
- for smart object systems - Security solutions for managed and infrastructureless networks9 KB (1,145 words) - 16:57, 11 April 2013
- ...of Computational Intelligence and many other areas related to intelligent systems, on the other hand. • Multi-Agent Systems4 KB (438 words) - 14:04, 8 May 2013
- ...national Conference on Pervasive and Embedded Computing and Communications Systems |Field=MOBILE AND PERVASIVE COMPUTING, DIGITAL SIGNAL PROCESSING, EMBEDDED SYSTEMS DESIGN3 KB (390 words) - 15:29, 9 May 2013
- - Behavior of software, systems, and networks - Security5 KB (609 words) - 11:08, 26 July 2016
- |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability2 KB (264 words) - 15:32, 7 January 2021
- ...journals, including International Journal on Semantic Web and Information Systems (IJSWIS). More journals will be added soon. ** Representing and reasoning about trust, privacy, and security5 KB (711 words) - 19:02, 7 March 2020
- *Context-aware Systems *Cyber Security3 KB (308 words) - 17:30, 26 May 2016
- *Expert Systems *Information Security and Cryptography2 KB (227 words) - 11:30, 21 June 2016
- |Title=International Conference on Testing Software and Systems |Series=International Conference on Testing Software and Systems3 KB (405 words) - 10:56, 24 April 2016
- ...lligence and Humanized Computing, and International Journal of Distributed Systems and Technologies. ...very and data mining, machine learning, computational biology, agent-based systems, semantic web, information extraction and retrieval, text and web mining, h3 KB (422 words) - 12:09, 24 April 2016
- |Title=Computational Intelligence in Information Systems The main goals of Computational Intelligence in Information Systems (CIIS) are to understand better these technologies and their applications s3 KB (309 words) - 17:11, 18 February 2021
- |Title=12th International Conference on Semantic Systems |Field=Intelligent Systems and Image Processing10 KB (1,347 words) - 15:01, 26 September 2016
- * Trust, security, and privacy ...escribe architecture, design, implementation, or experiments with existing systems which use semantic technologies. Preliminary reports describing research pr6 KB (898 words) - 14:42, 24 September 2016
- |Title=8th International Conference on Knowledge and Systems Engineering The Eighth International Conference on Knowledge and Systems Engineering (KSE 2016)3 KB (359 words) - 22:34, 30 September 2016
- |Title=17th International Conference on Web Information Systems Engineering ...2016 welcomes all submissions that fall in the domain of Web, information systems, data analytics, and knowledge and data engineering. The decision on accept2 KB (230 words) - 00:37, 28 May 2016
- ...boundaries between disciplines such as databases, social networks, mobile systems, artificial intelligence, information retrieval, and computational linguist ...emantics and semantic modelling to enable co-operation between information systems. This year, we would also welcome additional submissions on the challenge o9 KB (1,131 words) - 23:18, 24 February 2020
- |Title=25th European Conference on Information Systems |Field=Information Systems1 KB (177 words) - 10:04, 26 July 2016
- * Multi-agent systems * Secure mobile and multi-agent systems3 KB (352 words) - 06:14, 20 September 2016
- ...esearchers and practitioners from academia and industry to focus on recent systems and techniques in the broad field of Electrical, Electronics, Instrumentati * Embedded Systems and Robotics2 KB (197 words) - 16:16, 10 November 2016
- ...rning, human-computer interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational lin ...tures), and CoopIS'20 (International Conference on Cooperative Information Systems).6 KB (877 words) - 23:06, 24 February 2020
- ...ACM 2016 : 2016 6th International Conference on Communication and Network Security(ICCNS 2016)--ACM, EI and Scopus |Field=information technology, multimedia, wireless, information systems451 bytes (56 words) - 16:17, 8 July 2016
- |Title=IEEE SysCo 2016 : The third IEEE International Conference on Systems of Collaboration ...e systems, social networks, collaborative processes, collaborative systems security494 bytes (60 words) - 16:19, 8 July 2016
- |Title=CISSI 2016 : International Symposium on Information Systems Security |Field=computer sciences, security, big data, cloud computing329 bytes (35 words) - 17:36, 8 July 2016
- * Multimedia Security and Content Protection * Multi-Camera and Multi-View Systems2 KB (250 words) - 19:36, 10 June 2020
- ...rnational Conference on Semantic Technology for Intelligence, Defense, and Security ...chnology and ontology relevant to the fields of Intelligence, Defense, and Security. We are especially interested in papers on the following topics:4 KB (506 words) - 11:39, 8 October 2020
- ...2016 : 11th International Conference on Risks and Security of Internet and Systems |Field=computer security382 bytes (45 words) - 00:54, 14 July 2016
- |Title=ICISSP 2017 : 3rd International Conference on Information Systems Security and Privacy |Field=security systems, privacy385 bytes (48 words) - 16:21, 8 July 2016
- |Title=5th International Conference on Networking, Systems and Security |Field=networking, systems, security339 bytes (40 words) - 21:00, 29 October 2020
- |Field=embedded systems, internet of things, connectivity, safety and security401 bytes (49 words) - 16:22, 8 July 2016
- |Title=9th Asian Conference on Intelligent Information and Database Systems The 9th Asian Conference on Intelligent Information and Database Systems (ACIIDS) 20174 KB (464 words) - 11:38, 4 September 2020
- development of future knowledge and information systems, and to shape future - Main-memory, Real-time, Parallel and Distributed Database Systems12 KB (1,565 words) - 04:15, 5 August 2023
- - Security and Data Protection - Learning Management Systems (LMS)6 KB (790 words) - 13:45, 24 July 2016
- ...2016 : 2nd IEEE International Symposium on Nanoelectronic and Information Systems ...ation systems, iot-big data, nanoelectronic systems, cyberphysical systems security464 bytes (56 words) - 15:35, 27 August 2016
- ...e=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things870 bytes (100 words) - 18:53, 2 March 2021
- |Title=INCISCOS 2016 : International Conference on Information Systems and Computer Science |Field=computer science, information systems, data mining, security472 bytes (58 words) - 15:36, 27 August 2016
- |Title=ICISE 2017 : 2017 2nd International Conference on Information Systems Engineering (ICISE 2017)--IEEE, Ei |Field=information technology, information systems, information security, signal processing454 bytes (53 words) - 15:36, 27 August 2016
- ...016 : 2016 IEEE Workshop on Machine Learning in Security of Cyber-Physical Systems (MLSCPS) |Field=machine learning, cyber security, cyber-physical system, IEEE469 bytes (59 words) - 15:06, 17 August 2016
- |Title=IJCCBS-SI 2016 : Int. J. of Critical Computer-Based Systems. Special Issue on: Methods and Tools for Assurance of Critical Infrastructu |Field=computer science, security, safety, formal methods469 bytes (58 words) - 15:07, 17 August 2016
- * Security/Surveillance * Vision Systems and Applications2 KB (183 words) - 19:28, 12 May 2020
- ...onal Conference on Research and Practical Issues of Enterprise Information Systems |Field=Information Systems925 bytes (116 words) - 11:05, 24 August 2016
- ...prediction systems; Social multimedia as sensors; Sentiment representation systems ...agents and multi-agent systems; Agent-mining intelligent applications and systems; Automated retrieval of multimedia streams; Automated retrieval from multim10 KB (1,305 words) - 00:29, 12 December 2020
- |Title=SMGSSP 2017: Smart Micro-Grid Systems Security and Privacy |Field=privacy, security, smart micro-grids, cyber-physical systems2 KB (246 words) - 09:12, 3 September 2017
- |Title=23rd European Conference on Information Systems |Field=Information Systems3 KB (434 words) - 10:28, 26 July 2016
- |Title=2015 International Conference on Information Systems |Field=Information Systems2 KB (263 words) - 10:32, 26 July 2016
- ...ence covers all aspects of data mining, including algorithms, software and systems, and applications. ...ition, databases and data warehousing, data visualization, knowledge-based systems, and high performance computing. By promoting novel, high quality research3 KB (407 words) - 10:17, 27 July 2016
- ...ale data analytics of textual and graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, ...ining sequences, time series analysis, online advertising, bioinformatics, systems biology, text/web analysis, mining temporal and spatial data, and multimedi2 KB (282 words) - 10:48, 8 February 2020
- ...ale data analytics of textual and graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, ...ining sequences, time series analysis, online advertising, bioinformatics, systems biology, text/web analysis, mining temporal and spatial data, and multimedi2 KB (270 words) - 10:49, 8 February 2020
- - Geographic information systems - Intelligent Systems5 KB (641 words) - 22:32, 29 July 2016
- |Title=Dependable, Adaptive, and Trustworthy Distributed Systems 2017 |Field=adaptiveness, dependability, security, distributed systems439 bytes (49 words) - 16:36, 6 January 2021
- ...munication of research advances on the theoretical foundations of database systems. * data privacy and security4 KB (557 words) - 10:14, 15 May 2019
- ...pers on AI techniques in the context of novel application domains, such as security, sustainability, health care, transportation, and commerce. A special theme10 KB (1,466 words) - 15:17, 7 March 2021
- ...2017 : The 8th International Conference on Information and Communication Systems |Field=online social networks, security, big data, communication systems441 bytes (55 words) - 13:49, 25 September 2016
- |Title=7th Asian Conference Intelligent Information and Database Systems |Field=Intelligen Information and Database Systems3 KB (340 words) - 11:27, 4 September 2020
- |Title=IEEE/IFIP International Conference on Dependable Systems |Field=Computer security and reliability135 bytes (17 words) - 11:02, 9 October 2016
- ...onference on Distributed Multimedia Systems, Visual Languages and Sentient Systems DMSVLSS2017 (ksiresearchorg.ipage.com/seke/dmsvlss17.html) will be held at *Autonomic computing and agent-based systems18 KB (2,288 words) - 12:48, 27 October 2016
- * probabilistic systems * real-time systems4 KB (528 words) - 11:25, 26 June 2020
- * probabilistic systems * real-time systems4 KB (490 words) - 11:42, 26 June 2020
- |Title=20th International Conference on Business Information Systems BIS 2017 |Field=[[Category:Business Information Systems]]9 KB (1,190 words) - 10:12, 5 June 2019
- |Title=8th Asian Conference Intelligent Information and Database Systems |Field=Intelligent Information and Database Systems3 KB (361 words) - 10:38, 4 September 2020
- Circuits, software and systems for 5G ...of multi-modes, multi-bands, multi-standards and multi- applications in 5G systems5 KB (588 words) - 18:00, 21 January 2017
- complex cyber systems for smart cities requires the use of state-of-the-art city services and application systems. IEEE Smart City Innovations(IEEE SCI 2017)4 KB (565 words) - 09:46, 7 February 2017
- |Title=21st European Conference on Advances in Databases and Information Systems * Management of large scale data systems3 KB (421 words) - 20:37, 11 February 2021
- Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin Network and Information Security Innovative Computing Systems and Applications in S & T domains such as –5 KB (631 words) - 15:09, 10 April 2017
- ...ial papers on the theory, design and implementation of digital information systems, as well as demonstrations, tutorials, workshops and industrial presentatio Artificial Intelligence and Decision Support Systems4 KB (528 words) - 18:46, 29 August 2017
- * Trust, security, and privacy ...escribe architecture, design, implementation, or experiments with existing systems using semantic technologies. Preliminary reports describing research protot7 KB (988 words) - 09:50, 14 August 2019
- ...that will be published by Springer book series on Advances in Intelligent Systems and Computing (ISSN: 2194-5357). 6.Computer Security1 KB (209 words) - 10:35, 27 April 2017
- |Title=The 21st International Conference on Business Information Systems |Field=Business Information Systems10 KB (1,309 words) - 10:29, 5 June 2019
- *Web-Based Health- and Bio- Information Systems *Web Security, Integrity, Privacy, and Trust18 KB (2,394 words) - 16:28, 29 January 2018
- "Advances in Intelligent Systems and Computing" 6.Computer Security1 KB (149 words) - 07:56, 17 July 2017
- the 22nd European Symposium on Research in Computer Security (ESORICS information-oriented security.7 KB (887 words) - 15:22, 15 July 2017
- Large Scale Information Systems (ODBASE'17) provides a forum on the use of systems, information retrieval, knowledge discovery, and computational6 KB (798 words) - 23:16, 24 February 2020
- * Computer Architecture and Real time Systems * Distributed and parallel systems & algorithms10 KB (1,396 words) - 13:30, 28 July 2017
- ...uilding Systems Vehicular communications Information Management Systems and Services Computer Physics & BiologyPaper SubmissionAuthors are invit3 KB (403 words) - 09:15, 12 July 2017
- |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)4 KB (597 words) - 13:28, 28 July 2017
- * Computer Architecture and Real time Systems * Distributed and parallel systems & algorithms5 KB (679 words) - 13:28, 28 July 2017
- |Title=International Conference on Semantic Systems 13th International Conference on Semantic Systems6 KB (759 words) - 15:52, 5 December 2018
- * Multimedia Databases and File Systems * Multimedia security and content protection3 KB (384 words) - 13:28, 28 July 2017
- |Title=VLSICS 2017 : International Journal of VLSI design & Communication Systems INTERNATIONAL JOURNAL OF VLSI DESIGN & COMMUNICATION SYSTEMS (VLSICS)4 KB (527 words) - 13:28, 28 July 2017
- systems. The relevant topics include, but not limited to: Real-time data processing architectures and systems4 KB (532 words) - 13:28, 28 July 2017
- look to the “externalized” IT systems and services as a potential cost-savings organizations view the “external” IT as potential disaster recovery systems or7 KB (1,009 words) - 13:39, 3 September 2017
- Security Applications of Big Data Anomaly Detection in Very Large Scale Systems3 KB (461 words) - 13:22, 3 September 2017
- |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)4 KB (562 words) - 12:05, 3 September 2017
- * Computer Architecture and Real Time Systems * Distributed and Parallel Systems & Algorithms5 KB (651 words) - 11:34, 8 August 2017
- advanced distributed systems, which are aligned with other updated technologies, from vehicular systems to mobile applications. Therefore, our mission is to3 KB (464 words) - 09:30, 3 September 2017
- * Internet, Web and Security Visualization * Visualization Tools and Systems for Simulation and Modeling5 KB (615 words) - 10:58, 15 May 2020
- science and services, Web Information Systems and Applications, Computer Network Testing of Software Systems5 KB (673 words) - 09:53, 3 September 2017
- The 21st International Conference on Principles of Distributed Systems distributed computing and distributed computer systems. All aspects of7 KB (1,009 words) - 15:54, 3 September 2019
- Security, Computer Vision. Following the past successful symposium SoICT 2016, Conference on Computational Systems-Biology and Bioinformatics:4 KB (559 words) - 11:58, 8 August 2017
- Artificial Intelligence; Multiagent Systems; Theory of Computer Science; Databases; Security and Cryptography; Operating Systems; Networks, Distributed3 KB (438 words) - 11:45, 8 August 2017
- * Tools and systems for big data * Security and privacy for big data3 KB (436 words) - 10:46, 27 May 2020
- * Mobile communication security issues and requirements * Privacy and Security in Mobile Computing and Wireless Systems6 KB (751 words) - 13:28, 28 July 2017
- ...: 10th International Symposium on Foundations of Information and Knowledge Systems 10th Int’l. Symposium on Foundations of Information and Knowledge Systems9 KB (1,118 words) - 13:41, 3 September 2017
- |Field=security * Dedicated Software and Systems for Developing Interconnect Technology4 KB (472 words) - 14:34, 10 December 2020
- |Title=SPDF-Mobile 2017 : Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” |Field=security4 KB (536 words) - 09:59, 21 August 2017
- * Cryptography, security and privacy of mobile & wireless networks * Performance of mobile and wireless networks and systems6 KB (820 words) - 13:30, 28 July 2017
- Global and local positioning systems in wireless networks Acoustic communication systems3 KB (415 words) - 13:30, 28 July 2017
- - Service Security and Privacy - Location-based Information Systems6 KB (873 words) - 13:30, 28 July 2017
- Multi - antenna and beamforming systems Cryptography and network security4 KB (524 words) - 13:30, 28 July 2017
- * Computer Security * International Journal of Fuzzy Logic Systems4 KB (523 words) - 13:30, 28 July 2017
- * Cryptography and Information security * Database Management Systems3 KB (347 words) - 10:20, 20 November 2020
- informatics to solve privacy, security, healthcare, education, poverty, and * Multimedia Systems & Human-Machine Interaction4 KB (570 words) - 13:30, 28 July 2017
- * Cryptography and Information security * Database Management Systems3 KB (346 words) - 17:32, 18 February 2021
- - Internet of Things and Embedded Systems - IT Architecture and Security1 KB (136 words) - 11:52, 8 August 2017
- Management, Software Engineering and Information Systems to share their ideas, Agile and Complex systems4 KB (497 words) - 11:58, 8 August 2017
- - Information Security & Risk Management - Infrastructure Systems and Services6 KB (814 words) - 09:03, 3 September 2017
- |Field=security Wireless Networks, Data Communication Technologies, and Network Security. The4 KB (486 words) - 11:57, 8 August 2017
- |Field=security Wireless Networks, Data communication Technologies, and Network Security. The4 KB (546 words) - 11:35, 8 August 2017
- |Title=ICISS 2017 : International Conference on Information Systems Security |Field=security5 KB (626 words) - 12:02, 3 September 2017
- |Field=security • Unmanned Autonomous Systems (UAS)441 bytes (45 words) - 13:34, 28 July 2017
- |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities5 KB (722 words) - 10:00, 21 August 2017
- |Title=DMCS 2017 : DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17) |Field=security4 KB (626 words) - 09:30, 3 September 2017
- |Title=ICNS - Ei 2017 : 2017 The 2nd International Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus |Field=security2 KB (308 words) - 11:50, 3 September 2017
- |Field=security robustness, security, privacy, and ergonomics of EEG-based biometric systems and3 KB (450 words) - 15:32, 9 October 2020
- |Title=ASPMI 2018 : Advances in Security and Privacy of Multimodal Interfaces |Field=security4 KB (592 words) - 13:34, 28 July 2017
- |Title=SPIoT 2017 : The 6th International Symposium on Security and Privacy on Internet of Things |Field=security3 KB (379 words) - 12:01, 3 September 2017
- practitioners on the area of computer vision application systems. Five Papers describing advanced prototypes, systems, tools and techniques as well as4 KB (560 words) - 11:35, 21 February 2020
- and network security. Large/Heterogeneous Networks Security, privacy, trust and ethics4 KB (442 words) - 10:00, 21 August 2017
- |Field=security innovative materials, devices and systems inspired by biological systems and/or3 KB (449 words) - 12:30, 3 September 2017
- performance, energy, virtualization, portability, security, or reliability throughput or latency, security, reliability, or functional debugging3 KB (391 words) - 12:32, 11 April 2020
- Systems; Risk Management. Computational Science and Technology: Software Engineering; Operating Systems;4 KB (495 words) - 13:34, 28 July 2017
- mining,Pre-processing techniques, Visualization, Security and information hiding International Journal of Database Management Systems ( IJDMS )5 KB (689 words) - 13:34, 28 July 2017
- |Title=IJDMS 2017 : International Journal of Database Management Systems INTERNATIONAL JOURNAL OF DATABASE MANAGEMENT SYSTEMS (IJDMS)3 KB (398 words) - 13:34, 28 July 2017
- * Computer Architecture and Real time Systems * Distributed, Parallel Systems & Algorithms5 KB (589 words) - 11:46, 8 August 2017
- - Security - Interaction systems / Multimodal interaction4 KB (580 words) - 20:58, 12 November 2020
- - Platforms and Operating Systems - Multi-Agent Systems5 KB (632 words) - 12:30, 3 September 2017
- - In-Memory Systems and Platforms for Big Data Analytics - Performance Evaluation Reports for Big Data Systems4 KB (583 words) - 10:01, 3 September 2017
- 2. Security and Intelligence 3. Information Security4 KB (507 words) - 09:52, 3 September 2017
- * privacy and security for microservices; * microservices’ role in architecting big data systems;2 KB (245 words) - 13:34, 28 July 2017
- foundational, theoretical, empirical, and applied software and systems and systems engineering. Submissions are invited in all areas of software and8 KB (1,150 words) - 10:11, 7 August 2019
- |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)5 KB (640 words) - 13:34, 28 July 2017
- (13) ASIC Design and Embedded Systems (15) Automation, Control Systems, and Mechatronics1 KB (157 words) - 13:19, 28 July 2017
- Broadcasting, Circuits and Devices, Circuits and Systems, Computational Biology, Devices, Electronic and Communication Systems, Electronic Design, Electronics4 KB (554 words) - 13:19, 28 July 2017
- * Intelligent and Autonomous Systems on the Web * Security and Privacy on the Web12 KB (1,422 words) - 10:18, 5 October 2023
- Collective and Cooperative Systems CCS Computer Security SEC5 KB (660 words) - 13:50, 8 April 2020
- Advanced Machine Learning Technologies for Network Security. Advanced Machine Learning Technologies for Education Systems3 KB (355 words) - 12:33, 3 September 2017
- INTERNET BASED SYSTEMS (SITIS 2017) emerging interdisciplinary multimedia research and systems dealing with5 KB (623 words) - 11:57, 8 August 2017
- ...2017 : 2017 2nd International Conference on Communication and Information Systems (ICCIS 2017)--SCOPUS, EI Compendex 2017 2nd International Conference on Communication and Information Systems2 KB (212 words) - 13:19, 28 July 2017
- * Cryptography, Security and Privacy of Mobile & Wireless Networks * Integration of Wired and Wireless Systems5 KB (616 words) - 13:19, 28 July 2017
- vehicles, smart communities, biomedical instruments, security surveillance. Networking for Multimedia Systems5 KB (654 words) - 09:58, 21 August 2017
- communication, Cyber-Physical Systems (CPSs), Mobile-Edge Computing, Social computing as well as mobile and enterprise systems.4 KB (494 words) - 13:20, 28 July 2017
- on Semantic Web and Information Systems (IJSWIS), for fast-track publication in - Trust, privacy, and security on the Semantic Web7 KB (903 words) - 13:23, 28 July 2017
- for the embedded systems community. From a wide range of sensors and all the way to embedded vision, systems are2 KB (298 words) - 09:59, 21 August 2017
- ...ternational Conference on Smart Cities, Automation & Intelligent Computing Systems Intelligent Computing Systems (ICON-SONICS 2017) to be held on 08-10 November4 KB (508 words) - 13:23, 28 July 2017
- System Science & Engineering, Human - Machine Systems and Cybernetics.The Distributed Systems3 KB (324 words) - 13:34, 5 December 2017
- - Security - Interaction systems / Multimodal interaction3 KB (346 words) - 19:16, 26 November 2020
- |Field=information security engines; applications, especially in systems analysis and formal verification;5 KB (670 words) - 13:24, 28 July 2017
- |Acronym=Technologies for Security of EHR 2017 |Title=Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Cha5 KB (650 words) - 13:24, 28 July 2017
- ...: The 19th CSI International Symposium on Computer Architecture & Digital Systems (CADS 2017) * Computer Architecture, Processor Design, and Memory Systems1 KB (178 words) - 10:05, 20 November 2020
- ...cial Section on Formal Approaches at IEICE Transactions on Information and Systems The IEICE Transactions on Information and Systems announces a4 KB (593 words) - 13:24, 28 July 2017
- |Title=ICEIS 2018 : 20th International Conference on Enterprise Information Systems 20th International Conference on Enterprise Information Systems ICEIS6 KB (818 words) - 13:40, 3 September 2017
- cyber-physical systems. Enabling a smart life has become a popular research communications, from smart cloud computing to smart security. The conference is3 KB (412 words) - 11:51, 3 September 2017
- |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security4 KB (565 words) - 17:27, 18 February 2021
- |Field=security * Embedded systems3 KB (434 words) - 13:28, 28 July 2017
- ...EE IINTEC 2017 : International Conference on Internet of Things, Embedded Systems and Communications |Field=security6 KB (743 words) - 11:45, 8 August 2017
- ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security5 KB (611 words) - 11:47, 8 August 2017
- |Title=ICISSP 2018 : 4th International Conference on Information Systems Security and Privacy |Field=security3 KB (380 words) - 12:30, 3 September 2017
- |Field=security about cloud security, privacy, availability, and data protection. To discuss and6 KB (799 words) - 13:28, 28 July 2017
- |Field=security * Web-based Education Systems and Learning Applications7 KB (946 words) - 13:28, 28 July 2017
- |Field=security of smart systems (smart city, intelligence transportation system, smart4 KB (500 words) - 09:56, 21 August 2017
- •Track 4: Biometrics, forensics and security, mobile applications, big data, small sample size, data mining and performance evaluation, intelligent systems,2 KB (240 words) - 13:40, 3 September 2017
- Big Data Security, Privacy and Trust Systems and technologies in e-education2 KB (233 words) - 13:21, 3 September 2017
- ...yberIoT 2017 : Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal |Field=security4 KB (547 words) - 09:58, 21 August 2017
- between industry and academia. Nowadays, complex systems of all types, like Web-based systems, data centers and cloud infrastructures, social11 KB (1,364 words) - 13:23, 3 September 2017
- ...S 2018 : 3rd International Conference on Internet of Things, Big Data and Security |Field=security8 KB (1,170 words) - 13:40, 3 September 2017
- ...TGREENS 2018 : 7th International Conference on Smart Cities and Green ICT Systems 7th International Conference on Smart Cities and Green ICT Systems SMARTGREENS6 KB (825 words) - 13:22, 3 September 2017
- system, the supply chain is a complex set of entities and systems interconnected by numerous physical, financial and information flows, and, as with all systems,2 KB (326 words) - 09:58, 21 August 2017
- |Title=WorldCIS 2017 : World Congress on Internet Security theory and practical implementation of security on the Internet and Computer5 KB (571 words) - 11:53, 3 September 2017
- ...ICDIS 2018 : 2018 First International Conference on Data Intelligence and Security Data intelligence and data security are two closely related views, while data4 KB (484 words) - 10:00, 21 August 2017
- Management Information Systems Information Security2 KB (269 words) - 11:57, 3 September 2017
- Autonomous systems Decision support systems2 KB (246 words) - 12:11, 3 September 2017
- |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service5 KB (571 words) - 10:51, 3 September 2017
- TECHNOLOGY & INTERNET BASED SYSTEMS systems, mobile information systems and services, semantic-based applications6 KB (876 words) - 09:59, 21 August 2017
- * Computer Architecture and Real time Systems * Distributed and Parallel Systems & Algorithms4 KB (478 words) - 08:48, 16 May 2020
- * Design of next generation scholarly big data platforms and systems * Privacy and security issues4 KB (566 words) - 10:00, 21 August 2017
- applications. Particularly, Infrastructure as a Service (IaaS) Cloud systems - rapid evolution and proliferation of Internet of Things systems, we this session6 KB (880 words) - 10:00, 21 August 2017
- ...ring (SOA, choreographies, collaborations, conversations, artifact-centric systems) - RESTful systems (design aspects, hypermedia, linked data, mashups, other protocols, ...)7 KB (910 words) - 10:36, 26 November 2017
- - Access control and security ...ics can be considered in both the case of native and not native management systems4 KB (484 words) - 10:36, 26 November 2017
- ...ring (SOA, choreographies, collaborations, conversations, artifact-centric systems) - Security, compliance, and non-functional requirements and properties4 KB (565 words) - 18:34, 4 July 2020
- collaborations, conversations, artifact-centric systems) - RESTful systems (design aspects, hypermedia, linked data, mashups, other7 KB (1,046 words) - 10:36, 26 November 2017
- ...pers on AI techniques in the context of novel application domains, such as security, sustainability, health care, transportation, and commerce.3 KB (379 words) - 12:11, 13 February 2020
- |Field=Information Systems * Anonymity, security and trust for Web access8 KB (1,023 words) - 19:05, 7 March 2020
- |Title=29th International Conference on Database and Expert Systems Applications Database, information, and knowledge systems have always been a core subject of computer science. The ever increasing ne4 KB (548 words) - 08:05, 13 September 2019
- ...rkshops. It will cover issues in data management, database and information systems research, since they are the technological cornerstones of the emerging app Privacy and Security in Data Management.6 KB (826 words) - 09:45, 19 February 2021
- 14th International Conference on Semantic Systems ...t departments working to develop, implement and evaluate semantic software systems.11 KB (1,487 words) - 13:45, 13 May 2019
- ...data provenance, data linkage, data fusion, data warehousing, privacy and security, modelling) * Infrastructures (e.g., cloud computing, data intensive computing, database systems, indexing and compression, search engine architectures)4 KB (546 words) - 14:37, 3 August 2023
- |Title=9th international conference on Complex Systems Design & Management Paris 2018 |Field="engineering","complex systems","architecture"3 KB (440 words) - 16:01, 14 February 2018
- |Title=3rd Asia-Pacific conference on Complex Systems Design & Management |Field="engineering","complex systems","architecture"3 KB (368 words) - 16:10, 14 February 2018
- * Processor, memory, and storage systems architecture * Multiprocessor systems2 KB (315 words) - 11:47, 11 May 2020
- ...ness, and society; user studies; experiences with large-scale deployments, systems, or applications.<br> ...tures; multicores; power and cooling; power-efficient ("green") computing; security and reliability; high availability solutions; high performance GPU applicat1 KB (173 words) - 23:51, 24 February 2020
- |Title=30th International Conference on Database and Expert Systems Applications ...uirements, problems, and solutions in database, information, and knowledge systems. DEXA 2019 will be held in Linz, Austria from 26 to 29 August 2019.4 KB (510 words) - 09:37, 21 April 2020
- ...chine learning, in fields like medicine, biology, industry, manufacturing, security, education, virtual environments, games, are especially encouraged. * medicine, health, bioinformatics and systems biology3 KB (425 words) - 20:41, 7 September 2019
- ...onference on Distributed Multimedia Systems, Visual Languages and Sentient Systems |Has coordinator=KSI Research Inc., Knowledge Systems Institute4 KB (436 words) - 11:49, 21 April 2020
- |Title=2018 CHI Conference on Human Factors in Computing Systems |Field=Information Security1 KB (161 words) - 11:10, 22 May 2019
- *Big Data platforms with applications to network management, security, measurements *Experience and lessons learned by deploying large-scale networked systems2 KB (290 words) - 11:16, 6 April 2020
- ...onference on Architectural Support for Programming Languages and Operating Systems |Field=Operating Systems4 KB (547 words) - 12:27, 30 September 2019
- |Title=The 22nd International Conference on Business Information Systems |Field=Business Information Systems7 KB (917 words) - 18:07, 17 March 2020
- *Programming Models and Runtime Systems *Security, Privacy and Reliability2 KB (288 words) - 09:18, 6 June 2019
- |Title=40th International Conference on Information Systems |Field=Information Systems2 KB (215 words) - 10:18, 12 June 2019
- |Title=International Conference on Dependable Systems and Networks |Field=Computer security and reliability1 KB (123 words) - 15:25, 3 December 2020
- | Title = The 7th International Conference on Mobile Systems, Applications, and Services MobiSys 2009 seeks papers that take a broad systems perspective rather than focus narrowly on low-level components. The confere4 KB (479 words) - 10:05, 17 August 2023
- '''18th World Congress of the International Fuzzy Systems Association (IFSA) held jointly with the 38th North American Fuzzy Informat Fuzzy systems design and optimization4 KB (401 words) - 07:52, 29 July 2020
- '''Collections, Systems, and Management''' * Digital libraries: and archives preservation systems3 KB (368 words) - 07:27, 17 April 2020
- * Enterprise Systems and Knowledge Management * Information Security, Privacy, and Risk Management1 KB (188 words) - 07:35, 17 April 2020
- * Interfaces for Recommender Systems * Usable Security2 KB (200 words) - 08:47, 17 April 2020
- |Title=The 18th ACM International Conference on Mobile Systems, Applications, and Services ...ks to present innovative and significant research on all aspects of mobile systems, applications, and services. The conference values technical contributions5 KB (759 words) - 15:21, 18 June 2020
- |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:11 KB (1,549 words) - 11:34, 17 April 2020
- |Title=The Twelfth Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict1 KB (152 words) - 10:13, 17 April 2020
- * privacy and security * systems theory2 KB (192 words) - 08:38, 14 April 2020
- |Title=39th International Conference on Computer Safety, Reliability and Security The 39th International Conference on Computer Safety, Reliability and Security ( SafeComp)5 KB (617 words) - 11:54, 19 June 2020
- ...elligence, CRM- and ERP-Systems; Project Management and Quality Management Systems; Computational Social Science; Hypermedia, Multimedia and Social Media; Vis === Information Security ===3 KB (314 words) - 11:52, 27 March 2020
- |Title=15th International Conference on Availability, Reliability, and Security The International Conference on Availability, Reliability, and Security (ARES) 20203 KB (313 words) - 17:14, 4 November 2020
- * Language-Based Security in Data Management * Semantics and Verification of Database Systems2 KB (255 words) - 10:39, 17 April 2020
- * Simulation infrastructure and security issues for large scale distributed and/or cloud-based modeling and simulati * Integration of simulation with other IT systems, methods, and developments including simulation based decision-making, visu3 KB (457 words) - 08:25, 17 April 2020
- * Data Privacy and Security * Distributed Database Systems3 KB (396 words) - 09:53, 19 February 2021
- |Title=17th International Conference on Trust, Privacy and Security in Digital Business ...lack of trust in electronic procedures and the extent to which information security and user privacy can be ensured.5 KB (690 words) - 12:02, 26 March 2020
- |Title=35th International Conference on ICT Systems Security and Privacy Protection1 KB (193 words) - 11:59, 30 March 2020
- |Title=34th International Conference on ICT Systems Security and Privacy Protection686 bytes (89 words) - 12:09, 30 March 2020
- |Title=33rd International Conference on ICT Systems Security and Privacy Protection621 bytes (78 words) - 12:21, 30 March 2020
- |Title=32nd International Conference on ICT Systems Security and Privacy Protection683 bytes (85 words) - 12:39, 30 March 2020
- |Title=16th EAI International Conference on Security and Privacy in Communication Networks * Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks2 KB (299 words) - 13:10, 30 March 2020
- |Title=The 17th ACM International Conference on Mobile Systems, Applications, and Services ...ks to present innovative and significant research on all aspects of mobile systems, applications, and services. The conference values technical contributions5 KB (732 words) - 15:22, 18 June 2020
- * Multiple Antenna Systems and Services * Wireless Network Security2 KB (192 words) - 14:37, 11 December 2023
- *Big data platforms with applications to network management, security, measurements ...insights into real-world deployments of novel networking technologies and systems2 KB (238 words) - 11:18, 6 April 2020
- ...0th International Conference on Distributed Applications and Interoperable Systems Novel and innovative distributed applications and systems, particularly in the areas of2 KB (210 words) - 12:33, 22 December 2020
- ...ion of functional and non-functional properties, including performance and security aspects; *Coordination of multiagent and collective systems: models, languages, infrastructures, self-adaptation, self-organisation, di2 KB (264 words) - 18:00, 18 February 2021
- ..., The Fifteenth International Conference on Emerging Security Information, Systems and Technologies ...Seventh International Conference on Fundamentals and Advances in Software Systems Integration2 KB (238 words) - 17:26, 14 January 2021
- |Title=17th Asian Symposium on Programming Languages and Systems ...d practical issues broadly spanning the areas of programming languages and systems. Papers are solicited on topics such as1 KB (141 words) - 15:22, 8 April 2020
- |Title=16th Asian Symposium on Programming Languages and Systems * Design of languages, type systems, and foundational calculi1 KB (110 words) - 15:22, 8 April 2020
- |Title=The 15th ACM International Conference on Mobile Systems, Applications, and Services ...aspects of mobile systems. MobiSys seeks original papers that take a broad systems perspective rather than focus narrowly on low-level components. Of particul6 KB (944 words) - 15:24, 18 June 2020
- |Title=15th Asian Symposium on Programming Languages and Systems * design of languages, type systems, and foundational calculi1 KB (109 words) - 15:23, 8 April 2020
- |Title=The 16th ACM International Conference on Mobile Systems, Applications, and Services ...ks to present innovative and significant research on all aspects of mobile systems, applications, and services. The conference values technical contributions5 KB (721 words) - 10:07, 17 August 2023
- ...d mobile networks; Heterogeneous optical networks; 5G wireless and mm-Wave systems; Cognitive radars; Signal processing for crowd dynamics; Small-scale prosum ...is (Data and DataFlows); CNN Interference systems; Programmable platforms; Security access; Automatic acceleration platforms; Reconfigurable hardware; Clouds F5 KB (556 words) - 15:23, 14 January 2021
- |Title=14th International Conference on Provable and Practical Security ...nization=Strategic Centre for Research in Privacy-Preserving Technological Systems2 KB (208 words) - 10:19, 9 April 2020
- ...ion, termination checking, binding-time analysis, constraint solving, type systems, automated testing and test case generation. ...and web-based applications, embedded and resource-limited computation, and security.7 KB (1,057 words) - 10:13, 17 April 2020
- |Title=13th International Conference on Provable and Practical Security * Lattice-based security reductions2 KB (195 words) - 11:08, 9 April 2020
- |Title=12th International Conference on Provable Security ...rs and practitioners to exchange new ideas on diverse problems in provable security.3 KB (445 words) - 11:59, 9 April 2020
- |Title=27th International Conference on Cooperative Information Systems * Data Structures in Shared Information Systems2 KB (254 words) - 08:59, 14 April 2020
- * Autonomic computing and agent-based systems * Adaptive Systems5 KB (608 words) - 13:03, 15 April 2020
- ...FIP International Conference on Distributed Applications and Interoperable Systems Novel and innovative distributed applications and systems, particularly in the areas of:3 KB (303 words) - 08:58, 16 April 2020
- ...FIP International Conference on Distributed Applications and Interoperable Systems Novel and innovative distributed applications and systems, particularly in areas of:2 KB (222 words) - 11:23, 16 April 2020
- * Intelligent/smart systems and services * Urban Computing and Smart City Systems3 KB (284 words) - 15:23, 16 April 2020
- * – Urban Computing and Smart City Systems * – Smart Public Safety and Security2 KB (243 words) - 15:46, 16 April 2020
- * Enterprise Systems & Knowledge Management * Information Security, Privacy, and Risk Management1 KB (158 words) - 08:18, 17 April 2020
- ...ion of functional and non-functional properties, including performance and security aspects; *Coordination of multiagent and collective systems: models, languages, infrastructures, self-adaptation, self-organisation, di3 KB (355 words) - 08:53, 17 April 2020
- ...ion, termination checking, binding-time analysis, constraint solving, type systems, automated testing and test case generation. ...and web-based applications, embedded and resource-limited computation, and security.8 KB (1,080 words) - 10:43, 17 April 2020
- |Title=11th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict1 KB (155 words) - 10:20, 17 April 2020
- |Title=10th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict1 KB (153 words) - 10:27, 17 April 2020
- * Language-Based Security in Data Management * Semantics and Verification of Database Systems1 KB (166 words) - 10:53, 17 April 2020
- ...nd video collections; Implementation of signal, image and video processing systems ...ons Networks and mm-Wave Systems; Cognitive radio networks; Cyber-physical security; Social networks and finance applications, etc.10 KB (1,215 words) - 14:46, 19 April 2020
- ...data; Power transient stability margins; Disturbance propagation in power systems; Short-term electrical load prediction; Monitoring residential settings; So ...fficient radio resource management and routing; Hardware energy-efficiency systems; Virtualization techniques for energy efficiency; Simulation/modeling tools10 KB (1,331 words) - 14:52, 19 April 2020
- ...Opportunistic unlicensed spectra utilization; Adaptation in Cyber-physical systems; Service availability models ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking;14 KB (1,770 words) - 14:56, 19 April 2020
- |Title=The Sixteenth International Conference on Autonomic and Autonomous Systems ...020''', The Sixteenth International Conference on Autonomic and Autonomous Systems16 KB (1,897 words) - 12:31, 18 May 2020
- ...queries; Web search as medical services; Web tracking; Web Authentication Systems; Web social ecosystems; Collaborative filtering recommenders; Web scale app ...owsers; Tabular Data on the Web; Web linguistic changes; Web-based systems security; Web preferences; Web pattern semantics; Modeling web user activities; Twit11 KB (1,390 words) - 12:35, 18 May 2020
- |Title=17th International Conference on Distributed Computing in Sensor Systems * Machine intelligence in distributed sensor systems and real time analytics2 KB (185 words) - 17:41, 22 January 2021
- ...open collaboration technologies ranging from entirely new socio-technical systems to MediaWiki extensions * Architecture and design of open innovation systems6 KB (748 words) - 10:02, 30 April 2020
- |Title=13th ACM Conference on Recommender Systems * Bias, bubbles and ethics of recommender systems1 KB (141 words) - 07:08, 18 May 2020
- |Title=12th ACM Conference on Recommender Systems * Conversational recommender systems1 KB (120 words) - 14:53, 22 April 2020
- |Title=11th ACM Conference on Recommender Systems * Conversational recommender systems1 KB (131 words) - 16:35, 21 April 2020
- ==== Collections, Systems, and Management ==== Digital libraries: and archives preservation systems3 KB (361 words) - 14:48, 22 April 2020
- |Title=8th International Workshop on Engineering Multi-Agent Systems ...ledge and expertise developed in the design and development of multi-agent systems (MAS), the systematic development of large-scale and open MAS still poses m8 KB (1,092 words) - 12:49, 22 April 2020
- |Title=38th International Conference on Computer Safety, Reliability, and Security The 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP)3 KB (419 words) - 10:51, 19 June 2020
- ==== Collections, Systems, and Management ==== Digital libraries: and archives preservation systems3 KB (363 words) - 14:44, 22 April 2020
- * Autonomic computing and agent-based systems * Adaptive Systems4 KB (490 words) - 09:38, 23 April 2020
- |Title=International Conference on Unmanned Aircraft Systems, ...ce, and technology standards, all contributing to building high-confidence systems. National and international organizations, agencies, industry and authoriti3 KB (454 words) - 14:16, 27 April 2020
- |Title=International Conference on Unmanned Aircraft Systems ...ventspro/event/1331-icuas-18-international-conference-on-unmanned-aircraft-systems2 KB (265 words) - 15:42, 29 April 2020
- |Title=14-th International Workshop on Advances in Information Security * Security of next generation Operating Systems2 KB (200 words) - 12:01, 28 April 2020
- |Title=International Conference on Unmanned Aircraft Systems ...ntspro/event/1062-icuas-2017-international-conference-on-unmanned-aircraft-systems-icuas3 KB (385 words) - 15:55, 29 April 2020
- * Internet, Web and Security Visualization * Visualization Tools and Systems for Simulation and Modeling3 KB (293 words) - 10:38, 15 May 2020
- ...onal Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). * - Modeling and Simulation of Complex, Intelligent, Adaptive and Autonomous systems5 KB (640 words) - 13:03, 5 May 2020
- The relentless progress of solid-state circuits and systems has a profound impact on our daily lives, changing the way we work, circuits and systems.6 KB (673 words) - 09:29, 6 May 2020
- Continued advances in solid-state circuits and systems have brought evermore powerful communication and computation capabilities i ...management, nearthreshold/subthreshold systems, digital architectures and systems for emerging applications (e.g. virtual reality, autonomous vehicles).5 KB (629 words) - 09:36, 6 May 2020
- ...ng together researchers in the fields of microarchitecture, compilers, and systems for technical exchange. The MICRO community has enjoyed having close intera ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.4 KB (457 words) - 10:25, 6 May 2020
- ...ng together researchers in the fields of microarchitecture, compilers, and systems for technical exchange. The MICRO community has enjoyed having close intera ...omplexity, predictability, quality of service, reliability, dependability, security, scalability, programmer productivity, etc.4 KB (431 words) - 10:40, 6 May 2020
- ...ology and systems, covering ICs/SoCs, reconfigurable hardware and embedded systems, and embedded software. ...as telecom, wireless communications, multimedia, healthcare and automotive systems. Persons involved in innovative industrial designs are particularly encoura12 KB (1,651 words) - 13:30, 27 November 2020
- * WSN Technologies and Systems * Multimedia and Virtual Reality Systems2 KB (175 words) - 10:44, 7 May 2020
- * WSN Technologies and Systems * Multimedia and Virtual Reality Systems2 KB (174 words) - 10:43, 7 May 2020
- * Big Data Analytics: Algorithms, Techniques, and Systems * Scalability and Parallelization using MapReduce, Spark and Related Systems2 KB (217 words) - 12:15, 7 May 2020
- |Has host organization=USENIX The Advanced Computing Systems Association ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more.8 KB (1,078 words) - 09:27, 12 May 2020
- |Has host organization=USENIX The Advanced Computing Systems Association Sponsored by USENIX, the Advanced Computing Systems Association6 KB (729 words) - 09:28, 12 May 2020
- * Security/Surveillance * Vision Systems and Applications2 KB (195 words) - 21:16, 12 May 2020
- * Security/Surveillance * Vision Systems and Applications2 KB (191 words) - 21:02, 12 May 2020
- |Title=37th International Conference on Computer Safety, Reliability, and Security The 37th International Conference on Computer Safety, Reliability and Security (SAFECOMP)4 KB (475 words) - 10:23, 19 June 2020
- ...and dynamic power, power and clock distribution, yield, manufacturability, security, reliability, and testability. ...ocessing, compute acceleration, networking, machine learning, and embedded systems.11 KB (1,541 words) - 15:35, 18 June 2020
- * 2. Embedded Systems and Cyberphysical Systems: * 3. Embedded Systems Software:6 KB (739 words) - 15:08, 13 May 2020
- * Internet, Web and Security Visualization * Visualization Tools and Systems for Simulation and Modeling5 KB (630 words) - 10:01, 15 May 2020
- * Internet, Web and Security Visualization * Visualization Tools and Systems for Simulation and Modeling6 KB (735 words) - 11:44, 15 May 2020
- * Software Systems to Support Big Data Computing * Algorithms and Systems for Big Data Search4 KB (563 words) - 15:55, 23 June 2020
- * Software Systems to Support Big Data Computing * Algorithms and Systems for Big DataSearch5 KB (543 words) - 21:14, 18 May 2020
- * Recommender systems * Security and intrusion detection2 KB (261 words) - 20:06, 20 May 2020
- * New learning theories, models and systems * Privacy and security4 KB (515 words) - 16:39, 25 May 2020
- * Machine learning theories, models and systems. * Knowledge discovery theories, models and systems.3 KB (308 words) - 16:50, 16 December 2020
- ...ocial, sensor/IoT/IoE, and multimedia (audio, video, image, etc.) big data systems and applications. The conference adopts single-blind review policy. We expe * Software Systems to Support Big Data Computing9 KB (1,187 words) - 14:18, 27 May 2020
- * Security and privacy for big data * Tools and systems for big data3 KB (389 words) - 06:51, 9 June 2020
- |Title=28th IEEE International Conference on Fuzzy Systems * Fuzzy systems with big data and cloud computing, fuzzy analytics, and visualization2 KB (238 words) - 17:30, 6 May 2021
- |Field=Database systems, Informations systems, multimedia * Economic Aspects of Security and Privacy2 KB (329 words) - 13:48, 23 June 2020
- |Title=10th IEEE International Conference on Intelligent Systems |Homepage=https://www.ieee-is.org/intelligent-systems-2020/2 KB (239 words) - 14:17, 2 June 2020
- * Non-charge-based devices and systems * Advanced power devices, modules and systems5 KB (795 words) - 15:37, 2 June 2020
- |Title=8th IEEE International Conference on Intelligent Systems * Cognitive Systems2 KB (146 words) - 17:26, 2 June 2020
- ...al-time analytics; Real-time data aggregation; Big Data and Industrial 4.0 systems; Internet and Crowdsourcing; Mobile and wearable networks; Smart sensing ne WSSA : Web Services-based Systems and Applications14 KB (1,804 words) - 13:49, 5 June 2020
- ...rmation systems; Adaptive approaches for mobile computing; Mobile software systems; Context- and Location-aware services; Mobile Cloud services; Mobile social ...ocalization; Industrial environments; Aerial vehicles; Non-RSS range-based systems; Time of Flight; Range modeling; Velocity estimation; Calibration & Auto-ca7 KB (918 words) - 13:51, 5 June 2020
- * Multimedia security, privacy and forensics * Multimedia software, hardware and application systems1 KB (140 words) - 17:50, 9 June 2020
- * Multimedia security, privacy and forensics * Multimedia software, hardware and application systems1 KB (140 words) - 18:05, 9 June 2020
- * Multimedia Privacy, Security and Content Protection * Multi-Camera and Multi-View Systems2 KB (240 words) - 20:30, 10 June 2020
- * Multimedia Privacy, Security and Content Protection * Multi-Camera and Multi-View Systems2 KB (220 words) - 14:09, 11 June 2020
- * - Multimedia Privacy, Security and Content Protection * - Multi-Camera and Multi-View Systems5 KB (552 words) - 21:42, 10 June 2020
- * Evolutionary learning systems * Multi-agent based complex systems5 KB (691 words) - 11:40, 11 June 2020
- * Learning systems * Multi-agent systems6 KB (720 words) - 12:20, 11 June 2020
- * Learning systems * Multi-agent systems5 KB (670 words) - 09:42, 12 June 2020
- * Learning systems * Multi-agent systems6 KB (784 words) - 12:58, 15 June 2020
- ...icles; Potential radicalization on social media; Blockchain and healthcare systems; Risk-based human behavior profiling; Forensic recovery of cloud evidence; ...al health services; Monitoring mission-critical services; Preventing Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Op17 KB (2,088 words) - 12:49, 14 June 2020
- ...prediction systems; Social multimedia as sensors; Sentiment representation systems ...agents and multi-agent systems; Agent-mining intelligent applications and systems; Automated retrieval of multimedia streams; Automated retrieval from multim11 KB (1,356 words) - 12:56, 14 June 2020
- |Title=36th International Conference on Computer Safety, Reliability, and Security ...dependable application of computers in safety-related and safety-critical systems.4 KB (457 words) - 11:48, 17 June 2020
- * A02 Array antennas, antenna systems and architectures * A12 Reflector, feed systems, and components6 KB (885 words) - 12:35, 22 June 2020
- |Title=Conference on the Decision and Game Theory for Security ...eneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically-re401 bytes (52 words) - 06:54, 23 June 2020
- |Title=11th Conference on Decision and Game Theory for Security 2020 Conference on Decision and Game Theory for Security3 KB (353 words) - 12:35, 23 June 2020
- |Title=9th Conference on Decision and Game Theory for Security 2018 Conference on Decision and Game Theory for Security3 KB (423 words) - 11:27, 23 June 2020
- |Title=8th Conference on Decision and Game Theory for Security 2017 Conference on Decision and Game Theory for Security3 KB (407 words) - 11:20, 23 June 2020
- |Field=Database systems, Informations systems, Multimedia, World wide web, * Economic Aspects of Security and Privacy2 KB (291 words) - 14:12, 23 June 2020
- * RADAR Sub-systems and Phenomenology * RADAR Architectures and Systems2 KB (231 words) - 18:01, 25 June 2020
- |Field=Database systems, Informations systems, Multimedia, World wide web, * Economic Aspects of Security and Privacy5 KB (601 words) - 07:58, 24 June 2020
- |Field=Database systems, Informations systems, Multimedia, World wide web, * Economic Aspects of Security and Privacy3 KB (409 words) - 11:05, 24 June 2020
- * RADAR Sub-systems and Modelling * R02* Antenna Systems: Theory, Modelling, Calibration and Measurements2 KB (300 words) - 19:03, 25 June 2020
- * ● Security Radar * Radar Systems:2 KB (258 words) - 18:42, 26 June 2020
- * Signal processing education systems * Information forensics and security2 KB (219 words) - 11:01, 22 August 2023
- * •Ultrasound Systems * •Optical Systems2 KB (222 words) - 21:51, 29 June 2020
- |Title=The Fifteenth International Conference on Systems and Networks Communications ICSNC 2020, The Fifteenth International Conference on Systems and Networks Communications13 KB (1,636 words) - 11:51, 10 July 2020
- * Models of Concurrent, Distributed, and Mobile Systems * Models of Reactive, Hybrid and Stochastic Systems4 KB (556 words) - 06:42, 26 August 2020
- * Algorithmic Aspects of Security and Privacy * Formal and Logical Aspects of Security and Privacy4 KB (503 words) - 06:44, 26 August 2020
- * probabilistic systems * real-time systems4 KB (525 words) - 11:27, 27 August 2020
- * probabilistic systems * real-time systems4 KB (537 words) - 14:06, 27 August 2020
- |Title=IEEE Intelligent Transportation Systems Conference Air, Road, Rail and Waterways Transportation Network and Systems1 KB (156 words) - 13:41, 10 July 2020
- |Title=23rd IEEE International Conference on Intelligent Transportation Systems ...ted to submit papers that fall into the area of Intelligent Transportation Systems. Topics of interest include, but are not limited to, the following:1 KB (175 words) - 13:45, 10 July 2020
- |Title=21st IEEE International Conference on Intelligent Transportation Systems ...ted to submit papers that fall into the area of Intelligent Transportation Systems.2 KB (266 words) - 13:43, 10 July 2020
- ...alysis, design, implementation, testing, and maintenance of large software systems. ASE 2017 invites high quality contributions describing significant, origin * Component-based service-oriented systems5 KB (557 words) - 07:07, 13 July 2020
- |Title=The Ninth International Conference on Advances in Vehicular Systems, Technologies and Applications VEHICULAR 2020, The Ninth International Conference on Advances in Vehicular Systems, Technologies and Applications8 KB (915 words) - 19:45, 9 July 2020
- |Title=The Ninth International Conference on Intelligent Systems and Applications INTELLI 2020, The Ninth International Conference on Intelligent Systems and Applications5 KB (599 words) - 19:46, 9 July 2020
- ...nteractive entertainment; Expressing emotions in multimedia and multimodal systems; Emotional behavior in storytelling; Emotions in geographical and cultural ...gmented reality (Google Glass, Hololens, etc. ); Multimedia and multimodal systems; Smart cities; Interaction design9 KB (1,068 words) - 19:47, 9 July 2020
- |Title=The Tenth International Conference on Advanced Collaborative Networks, Systems and Applications ...20, The Tenth International Conference on Advanced Collaborative Networks, Systems and Applications8 KB (897 words) - 17:15, 22 March 2021
- ...DN Access control; 5G Edge caching techniques; Performance in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality ...and discovery of things on the Internet; Crowd-sourcing and things; Trust, security and privacy in Internet of Things; Lightweight implementations of cryptogra13 KB (1,550 words) - 02:20, 10 July 2020
- ..."Spectrum Allocation and Management", "Wireless and mobile technologies", "Security in wireless and mobile environment" Future in mobile systems11 KB (1,335 words) - 02:28, 10 July 2020
- ...g and telecommunications","Knowledge virtualization","Security in network, systems, and applications","IPv6 Today - Technology and deployment" ...Online shopping; Social commerce acceptance; Digital multi-modal transport systems and crowdsensing; Mobile technologies and self-healthcare; Online education18 KB (2,036 words) - 02:36, 10 July 2020
- (A) SAR Systems and Sensors A1 Spaceborne SAR Systems and Missions2 KB (323 words) - 11:18, 10 July 2020
- Building user-centric systems User centricity: I-centric versus We-centric; User-centric in service-centric systems; User-centric business models; User-centric requirements in network-centric10 KB (1,232 words) - 16:20, 22 March 2021
- ...nalytics; Software for pervasive systems; Software for (self)-configurable systems; Search-based software; Green-oriented software engineering; Symbolic analy ...ased software development; Service-oriented software development; Software security-based development; Aspect-oriented software development13 KB (1,573 words) - 12:00, 10 July 2020
- ...ulations high performance systems; Simulation of Internet of Vehicle (IoV) systems ...aptation simulation; Simulation methodologies for autonomic and autonomous systems; Virtual reality simulation methodologies; Virtualization simulation; Const12 KB (1,421 words) - 12:02, 10 July 2020
- ...nd health; Platform interoperability; Semantic interoperability; Diagnosis systems; Applied health informatics; User interfaces and visualization ...nated-care models; Integrated behavioral and physical health platforms and systems; Dialectical behavior therapy; Cognitive behavioral therapy; Trauma-focused8 KB (970 words) - 16:50, 14 July 2020
- Ambient devices, applications and systems Business model and business cases, security, privacy and trust, Real-life implementations6 KB (750 words) - 17:55, 13 January 2021
- ...ge new ideas, problems, and experience on how to analyze and test software systems. ISSTA 2021 will be held in Aarhus, Denmark, on July 12-16, 2021, co-locate * Andreas Zeller, CISPA Helmholtz Center for Information Security, Germany3 KB (306 words) - 12:12, 16 July 2020
- |Title=12th International Conference on Hybrid Artificial Intelligent Systems The 12th International Conference on Hybrid Artificial Intelligent Systems (HAIS)3 KB (382 words) - 12:25, 22 July 2020
- |Title=13th International Conference on Hybrid Artificial Intelligent Systems The 13th International Conference on Hybrid Artificial Intelligent Systems (HAIS)2 KB (200 words) - 09:20, 24 July 2020
- |Title=14th International Conference on Hybrid Artificial Intelligent Systems The 14th International Conference on Hybrid Artificial Intelligent Systems (HAIS)3 KB (392 words) - 11:02, 24 July 2020
- |Title=15th International Conference on Hybrid Artificial Intelligent Systems The 15th International Conference on Hybrid Artificial Intelligent Systems (HAIS’20)6 KB (871 words) - 12:16, 28 July 2020
- |Title=17th World Congress of International Fuzzy Systems Association ...ciation and 9th International Conference on Soft Computing and Intelligent Systems'''4 KB (422 words) - 08:30, 29 July 2020
- |Title=36th Information Systems Education Conference * Cloud-based Systems1 KB (159 words) - 13:38, 29 July 2020
- * − Precise timing for GNSS and terrestrial systems * − Authentication, security and/or privacy in navigation systems and location-aware communication2 KB (288 words) - 12:10, 30 July 2020
- * – Precise timing for GNSS and terrestrial systems * – Security and privacy in joint communication and navigation systems2 KB (178 words) - 12:38, 30 July 2020
- * Precise timing for GNSS and terrestrial systems * Security and privacy in joint communication and navigation systems1 KB (169 words) - 12:52, 30 July 2020
- |Field=Networking, Internet, Security, Sensor, Hardware, Technologies ...nferencing systems; Large-scale datacenter networks; Traffic-aware control systems; Short-term traffic forecasting; Energy efficiency; Differentiated services7 KB (904 words) - 12:32, 22 January 2021
- ...=The Fourteenth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies15 KB (1,886 words) - 16:16, 25 August 2020
- ...ntation; Photonic integrated circuits; Opto-electro-mechanical sensors and systems ...-based technologies; Ultrasonic technologies; Film-bases sensors; Resonant systems; Optical interferometry; Micro-and nanofabrication; Coating materials9 KB (1,068 words) - 16:15, 25 August 2020
- ...chronization; Tracking and partial position information; Failure handling; Security and authentication ...s and the Web; Integration with other systems (e.g., Web-based information systems, process control, enterprise software, etc.); Target tracking; RFID tags; T15 KB (1,880 words) - 14:45, 27 August 2020
- ...d mobile networks; Heterogeneous optical networks; 5G wireless and mm-Wave systems; Cognitive radars; Signal processing for crowd dynamics; Small-scale prosum ...is (Data and DataFlows); CNN Interference systems; Programmable platforms; Security access; Automatic acceleration platforms; Reconfigurable hardware; Clouds F8 KB (908 words) - 15:13, 14 January 2021
- ...he Sixth International Conference on Fundamentals and Advances in Software Systems Integration |Field=Networking,Internet,Security,Sensor,Hardware,Technologies6 KB (769 words) - 14:09, 24 August 2020
- ** In-vehicle communication and networking systems ** Security, privacy, liability, and dependability of vehicular networks4 KB (493 words) - 23:17, 12 October 2020
- Grid-oriented energy systems Smart Sensing, Metering Systems, Smart Cities6 KB (815 words) - 20:27, 30 July 2020
- ...al Conference on Tools and Algorithms for the Construction and Analysis of Systems ...al Conference on Tools and Algorithms for the Construction and Analysis of Systems'''2 KB (293 words) - 14:54, 3 August 2020
- '''2. Security, Privacy, and Trust''' Physical layer security1 KB (164 words) - 08:17, 4 August 2020
- Information Systems Management (business and technical) topics of interest * Information Systems issues9 KB (896 words) - 16:31, 6 August 2020
- ...aces; Speech and natural language interfaces; Interfaces for collaborative systems; Interfaces for restricted environments; Internationalization and reflectio Human-centered process optimization and systems integration; Human-centered chains; Human-centered risk management and nano16 KB (1,964 words) - 13:34, 7 January 2021
- |Title=8th International Conference on Availability, Reliability, and Security The 8th International Conference on Availability, Reliability and Security (ARES) 20134 KB (468 words) - 11:39, 21 August 2020
- |Title=9th International Conference on Availability, Reliability and Security The 9th International Conference on Availability, Reliability and Security (ARES) 20144 KB (538 words) - 11:52, 21 August 2020
- |Title=14th International Conference on Availability, Reliability, and Security The 14th International Conference on Availability, Reliability, and Security (ARES) 20195 KB (627 words) - 10:49, 25 August 2020