Search results

Jump to: navigation, search
  • ...vancements, analysis tools, formal approaches to software engineering, and security.
    2 KB (243 words) - 22:59, 3 April 2020
  • |Field=storage systems ...nologies (FAST '20) co-located with the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20)
    5 KB (599 words) - 13:41, 26 February 2020
  • ...tions in the design, implementation, evaluation, and deployment of storage systems. Co-located with NSDI '19 **Archival storage systems
    5 KB (597 words) - 13:44, 26 February 2020
  • ...tions in the design, implementation, evaluation, and deployment of storage systems. **Archival storage systems
    4 KB (553 words) - 13:45, 26 February 2020
  • ...ernet of Things, machine learning, mobile and social sensing, and embedded systems design. Of special interest are contributions at the confluence of multiple *Outdoor, wide-area, or crowdsourced sensing systems
    3 KB (412 words) - 09:52, 27 February 2020
  • |Title=13th International Conference on Enterprise Information Systems (ICEIS) Conference name: 13th International Conference on Enterprise Information Systems (ICEIS)
    19 KB (2,462 words) - 19:10, 26 August 2010
  • ...happen to be new to these service providers and might be worried about the security of using these online services then, the following benefits are sure to get ...recipient. All of these fax services also boast of good contact management systems they are also akin to our internet email accounts and also having good faci
    3 KB (610 words) - 16:33, 27 August 2010
  • ...011 International Conference of Computational Intelligence and Intelligent Systems The 2011 International Conference of Information Security and Internet Engineering
    3 KB (458 words) - 08:06, 31 August 2010
  • * Security/Surveillance * Vision Systems and Applications
    2 KB (164 words) - 20:17, 12 May 2020
  • * Theory of Security in Networks * Models of Concurrent, Distributed, and Mobile Systems
    4 KB (602 words) - 06:44, 26 August 2020
  • |Acronym=USENIX-Security 2020 |Title=29th Usenix Security Symposium
    3 KB (343 words) - 16:31, 6 May 2020
  • |Title=32nd International Conference on Advanced Information Systems Engineering |Field=Information Systems
    3 KB (395 words) - 15:14, 24 September 2020
  • * Dynamics of neural systems * Itinerant dynamics in neural systems
    5 KB (574 words) - 15:58, 6 March 2020
  • * Distributed operating systems, middleware, database systems * Experimental evaluation of distributed algorithms and systems
    3 KB (344 words) - 11:30, 21 April 2020
  • systems. Within the context and scope of the journal the term imaging is taken - Image Security
    2 KB (298 words) - 18:24, 10 September 2010
  • - Geographic information systems - Intelligent Systems
    6 KB (732 words) - 05:52, 5 December 2010
  • • AI/Expert systems • Distributed systems
    4 KB (579 words) - 15:24, 13 October 2010
  • ...nym=CALL FOR PAPER Journal: International Journal of Computer Science and Security (IJCSS) |Title=International Journal of Computer Science and Security (IJCSS)
    2 KB (298 words) - 16:47, 5 July 2020
  • |Acronym=CALL FOR PAPER Journal: International Journal of Security (IJS) |Title=CALL FOR PAPER Journal: International Journal of Security (IJS)
    5 KB (609 words) - 17:01, 5 July 2020
  • • Algorithms, Systems and Applications • Ad-hoc Wireless Networks • Network Security and Privacy • Network Services and Applications
    3 KB (318 words) - 16:46, 5 July 2020
  • Clinical Informatics and Hospital Information Systems Decision Support Systems and Computer Aided Diagnosis
    5 KB (693 words) - 10:44, 14 November 2010
  • |Title=14th International Conference on Business Information Systems ..., implementation, application and improvement of business applications and systems. It is addressed to the scientific community, people involved in the develo
    6 KB (806 words) - 14:48, 16 November 2010
  • |Title=The 7th International ASME/IEEE Conference on Mechatronics & Embedded Systems & Applications |Field=Mechatronics & Embedded Systems
    12 KB (1,378 words) - 21:13, 28 November 2010
  • Context-aware systems<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 12:34, 14 October 2020
  • Context-aware systems<br> Security in network, systems, and applications<br>
    4 KB (556 words) - 12:33, 14 October 2020
  • Context-aware systems<br> Security in network, systems, and applications<br>
    4 KB (552 words) - 08:13, 10 December 2010
  • Context-aware systems<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 10:24, 6 July 2020
  • Context-aware systems<br> Security in network, systems, and applications<br>
    4 KB (554 words) - 12:33, 14 October 2020
  • |Title=PECCS Special Session on Self-Aware and Adaptive Embedded Systems Conference name: PECCS Special Session on Self-Aware and Adaptive Embedded Systems - SAAES 2011
    4 KB (598 words) - 18:55, 23 December 2010
  • ...eb user profiling, recommender systems, email organization and processing, security, etc.
    3 KB (344 words) - 19:33, 23 December 2010
  • ...ng, graphics, databases, wireless networks, distributed systems, operating systems and so on. - Agent Systems and Applications
    4 KB (505 words) - 08:07, 14 April 2011
  • |Title=PECCS Special Session on Self-Aware and Adaptive Embedded Systems Conference name: PECCS Special Session on Self-Aware and Adaptive Embedded Systems - SAAES 2011
    4 KB (593 words) - 17:49, 7 January 2011
  • ...ct and reliable software systems, and an emerging awareness of privacy and security. Even though curriculum committees recognize formal methods as an essential
    3 KB (448 words) - 17:58, 7 January 2011
  • |Field=Computer security and reliability field of Systems Security, which has been created to build on the
    5 KB (701 words) - 05:52, 14 April 2011
  • |Title=The Sixth International Conference on Availability, Reliability and Security (AReS 2011) |Field=Computer security and reliability
    5 KB (597 words) - 10:45, 21 August 2020
  • ...n with the Sixth International Conference on Availability, Reliability and Security (ARES 2011 – http://www.ares-conference.eu). ...asing dependency on tightly interconnected, complex and pervasive computer systems and networks. The ubiquitous nature of our digital lifestyle presents many
    3 KB (462 words) - 11:51, 22 March 2020
  • |Title=International Workshop on Visualization and Information Security Management |Field=Security Management
    3 KB (468 words) - 00:17, 2 March 2011
  • * Overlay Networks/Peer-to-Peer Systems * Network Security
    3 KB (322 words) - 05:59, 8 March 2011
  • − Information Security and Applied Cryptography. − Intelligent Information Systems.
    3 KB (367 words) - 16:37, 27 December 2015
  • |Title=The 23th IFIP International Conference on Testing Software and Systems ICTSS 2011: The 23th IFIP International Conference on Testing Software and Systems
    6 KB (822 words) - 14:44, 18 March 2011
  • * Confidentiality and Data Security * Decision Support Systems
    2 KB (216 words) - 17:51, 29 June 2011
  • * Enterprise Information Systems * Information Security
    2 KB (250 words) - 14:52, 1 October 2020
  • ...of Computational Intelligence and many other areas related to intelligent systems, on the other hand. * Hybrid Intelligent Systems
    4 KB (439 words) - 17:54, 29 June 2011
  • ...om his/her way, customs or duties, through the promise of money, honors or security. History shows that this phenomenon has generally been manifesting in diffe ...pects of corruption in different cultures, historical times, and juridical systems. The major questions which will be discussed during this international conf
    5 KB (676 words) - 16:03, 31 May 2011
  • * Confidentiality and Data Security * Decision Support Systems
    2 KB (260 words) - 17:46, 29 June 2011
  • |Title=1st International Conference on Operations Research and Enterprise Systems (ICORES) ...e name: 1st International Conference on Operations Research and Enterprise Systems (ICORES)
    3 KB (283 words) - 11:37, 1 July 2011
  • ...rnational Conference on Pervasive and Embedded Computing and Communication Systems (PECCS) ...rnational Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)
    4 KB (463 words) - 11:41, 1 July 2011
  • * Internet, Web and Security Visualization * Visualization Tools and Systems for Simulation and Modeling
    4 KB (461 words) - 11:48, 1 July 2011
  • ...rs, engineers and practitioners on the area of computer vision application systems. Five simultaneous tracks will be held, covering all different aspects rela * Media Watermarking, Security, and Forensics
    4 KB (538 words) - 11:34, 21 February 2020
  • ...er organizations view the “external” IT as potential disaster recovery systems or as on-demand capacity to boost business continuity and customer service Service and Systems Design and QoS Network Security
    5 KB (677 words) - 11:59, 1 July 2011
  • Intelligent Tutoring Systems Security Aspects
    4 KB (517 words) - 12:03, 1 July 2011
  • |Title=8th International Conference on Web Information Systems and Technologies (WEBIST) Conference name: 8th International Conference on Web Information Systems and Technologies (WEBIST)
    5 KB (612 words) - 12:07, 1 July 2011
  • ...IASTED International Conference on Parallel and Distributed Computing and Systems ...ce the theories and technologies of parallel and distributed computing and systems by sharing their ideas, results, insights, and experiences on these topics.
    13 KB (1,774 words) - 18:35, 31 August 2011
  • * Are decision support systems in the biomedical domain using ontologies? How? ...ineering, law enforcement, document management, e-government, legislative systems.
    8 KB (1,106 words) - 15:50, 20 July 2011
  • ...and how does the distorted vision of other people’s religions and their systems lead to a negative evaluation of those religions? ...tion but potentially one tied to questions of greater human well-being and security. How do we begin to reevaluate the beautiful in terms of psychic well-being
    10 KB (1,552 words) - 17:04, 24 February 2016
  • |Title=Workshop on Model-Driven Engineering for Networked Ambient Systems |Superevent=3rd International Conference on Ambient Systems, Networks and Technologies
    5 KB (598 words) - 17:05, 24 February 2016
  • ...chniques relating to the satellite communications, networking, technology, systems and applications ...rtunities are also currently fueling accelerated research in PSATS enabled systems which we cover in this conference. The services enabled by PSATS not only c
    9 KB (1,218 words) - 16:06, 1 October 2020
  • Parallel and distributed systems, high-performance computing systems Operating systems
    6 KB (809 words) - 16:26, 28 September 2011
  • Trends in Intelligent Systems and Computer Engineering, Advances in Communication Systems and Electrical Engineering, and
    7 KB (909 words) - 16:30, 10 September 2020
  • - Security and Data Protection - Learning Management Systems (LMS)
    6 KB (784 words) - 03:09, 22 November 2011
  • ...sources such as parallel supercomputers, data archives, high-speed storage systems, advanced visualization devices and scientific instruments using high speed • Security-related performance issues in high-performance computing environments such
    4 KB (485 words) - 12:22, 22 November 2011
  • ...nces in building, designing, using and understanding trustworthy computing systems. Trust, Security and Privacy in embedded systems
    4 KB (451 words) - 12:27, 30 November 2011
  • ...tabases offer better feature for a number of social applications. Semantic systems helps to bridge the gap between words and their meaning. Vocabularies are n ...worldwide. Mobile devices and context aware systems (e.g. locations based systems) play a major role for social applications. New threats accompany these tre
    5 KB (669 words) - 14:40, 20 December 2011
  • Trends in Intelligent Systems and Computer Engineering, Advances in Communication Systems and Electrical Engineering, and
    8 KB (1,085 words) - 16:28, 6 February 2012
  • Communications modeling; Communications security; Computer Peer-to-peer and overlay networking; Mobile networking and systems;
    6 KB (725 words) - 19:58, 22 November 2020
  • - Geographic information systems - Intelligent Systems
    5 KB (595 words) - 05:03, 15 January 2012
  • ...e=Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems 6th IEEE International Conference on Self-Adaptive and Self-Organizing Systems
    7 KB (969 words) - 04:02, 17 January 2012
  • ...from various disciplines, such as business process management, distributed systems, computer networks, wireless & mobile computing, grid computing, networking - Security, Privacy and Trust
    6 KB (745 words) - 15:27, 1 November 2016
  • ...012 International Conference of Computational Intelligence and Intelligent Systems ...012 International Conference of Computational Intelligence and Intelligent Systems (ICCIIS 2012)
    11 KB (1,490 words) - 11:59, 27 January 2012
  • |Field=Computer security and reliability The conference theme is 'Building resilient systems that address advanced persistent threats'. The advance persistent threat (A
    2 KB (304 words) - 10:54, 5 March 2012
  • ...ernational conference in Healthcare Informatics and Biomedical Engineering Systems ...ernational conference in Healthcare Informatics and Biomedical Engineering Systems (HIBES 2012)
    9 KB (1,186 words) - 17:44, 24 February 2012
  • ...computing and promoting environmentally friendly computer technologies and systems. The event aims at bringing together researchers and practitioners who are ...tion technology, in particular, can provide monitoring facilities, control systems, intelligent construction models and so on. From a scientific point of view
    10 KB (1,297 words) - 17:49, 24 February 2012
  • ...venth International Workshop on Frontiers in Availability, Reliability and Security |Field=Computer security and reliability
    2 KB (221 words) - 16:12, 29 February 2012
  • |Title=The Fourth International Workshop on Organizational Security Aspects |Field=Computer security and reliability
    3 KB (368 words) - 16:16, 29 February 2012
  • ...d state of the art research from the IMT-Advanced and distributed wireless systems. The scope of the workshop includes a wide range of technical challenges in - Middleware of SON: self-localization, security, data fusion, etc.
    5 KB (633 words) - 14:08, 2 March 2012
  • ...s, the efficiency denotes the time cost of transmission processes, and the security denotes the protection of the transmitted media content. Recently, various - Peer-to-Peer Streaming Systems
    5 KB (726 words) - 15:28, 2 March 2012
  • coupled software systems are only good for niche markets, whereas loosely coupled software systems can be more flexible,
    4 KB (504 words) - 18:21, 5 March 2012
  • ...iles in data centers; Smart energy; Car Connectivity; Green communications systems ...; Evolution from 4G to 5G and beyond; Wireless multimedia and networks and systems; Cellular and Ad hoc networks; Mobile broadband technologies; Mobile softwa
    13 KB (1,580 words) - 19:35, 18 February 2021
  • |Title=IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies |Field=Computer system, Computer networks, Cyber security
    4 KB (581 words) - 18:48, 24 February 2020
  • ...data linkage, data fusion, knowledge graphs, data warehousing, privacy and security, modelling) ...atabase systems, indexing and compression, architectures, distributed data systems, dataspaces, customised hardware)
    5 KB (653 words) - 13:04, 3 August 2023
  • ...r the spreading of misinformation, hate and crime, and the construction of systems which are more about process than people. It is time to ask: can the Web be ...rity & Trust: Safeguarding and governance of the Web and/or AI; anonymity, security and trust for Web access; false news; data for the public good; and crime o
    6 KB (910 words) - 12:04, 31 January 2020
  • |Title=24th International Conference on Database Systems for Advanced Applications '''24th International Conference on Database Systems for Advanced Applications'''
    4 KB (535 words) - 21:32, 11 February 2020
  • |Title=Conference on Database Systems for Advanced Applications '''25th International Conference on Database Systems for Advanced Applications'''
    4 KB (500 words) - 17:29, 6 January 2021
  • ...hitecture|Computer architecture]], [[:category:Operating systems|Operating systems]] * [[:category:Computer_security_and_reliability|Computer security and reliability]]
    7 KB (815 words) - 18:03, 14 April 2021
  • '''Business Information Systems''' *Modeling Distributed Ledger Systems
    5 KB (663 words) - 11:49, 18 February 2020
  • ...gineering || Education || Parallel, distributed, and concurrent systems || Security, privacy and trust | Autonomic and (self-)adaptive systems || Empirical software engineering || Software engineering for machine learn
    6 KB (738 words) - 11:21, 6 July 2020
  • |Title=16th International Conference on Semantic Systems * Trust, Data Privacy, and Security with Semantic Technologies
    6 KB (872 words) - 14:00, 22 February 2020
  • ...for the presentation of new research results, and the demonstration of new systems and techniques, in the broad field of information retrieval (IR). The 43rd Research focusing on recommender systems, rich content representations and content analysis, such as:
    8 KB (1,024 words) - 09:57, 13 May 2020
  • ...rning, human-computer interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational lin ...tures), and CoopIS'19 (International Conference on Cooperative Information Systems).
    6 KB (872 words) - 23:11, 24 February 2020
  • * Multimedia systems and applications * Network security
    5 KB (630 words) - 05:00, 19 April 2012
  • |Title=Conference On Principles Of Distributed Systems |Field=Distributed Systems
    2 KB (299 words) - 11:51, 8 April 2020
  • |Title=International Conference on Circuits and Systems 2012 Call for Papers: International Conference on Circuits and Systems ICCS 2012
    10 KB (1,363 words) - 09:26, 7 May 2012
  • ...etworks , Network Modeling and Simulation, Computer Network : Performance, Security and Applications, Neural Networks and Applications, Remote Sensing, Self Or ...lication, Multimedia and Its applications, Information processing and data security Software Engineering, Software Testing, Testing tools, Mutation Testing and
    3 KB (434 words) - 22:46, 30 May 2012
  • * Trust, privacy, and security on the Semantic Web ...journals, including International Journal on Semantic Web and Information Systems (IJSWIS), for fast-track publication in a special issue in these journals.
    5 KB (699 words) - 14:57, 5 December 2018
  • Rendering Algorithms and Systems Data Security
    10 KB (1,492 words) - 17:22, 26 June 2012
  • ...rnational Conference on Pervasive and Embedded Computing and Communication Systems |Field=Pervasive and Embedded Computing and Communication Systems
    3 KB (422 words) - 16:24, 19 June 2012
  • ...in any of the topics listed below. Papers describing advanced prototypes, systems, tools and techniques as well as general survey papers indicating future di Security & Privacy
    4 KB (466 words) - 16:27, 19 June 2012
  • ...rs, engineers and practitioners on the area of computer vision application systems. Five simultaneous tracks will be held, covering all different aspects rela ...k in any of the areas listed below. Papers describing advanced prototypes, systems, tools and techniques as well as general survey papers indicating future di
    5 KB (599 words) - 11:34, 21 February 2020
  • Platforms and Operating Systems Security: Vulnerability and Privacy
    5 KB (600 words) - 14:41, 20 June 2012
  • ...er organizations view the “external” IT as potential disaster recovery systems or as on-demand capacity to boost business continuity and customer service Service and Systems Design and QoS Network Security
    5 KB (662 words) - 18:50, 20 June 2012
  • ...the section “Conference Areas”. Papers describing advanced prototypes, systems, tools and techniques and general survey papers indicating future direction Intelligent Tutoring Systems
    5 KB (671 words) - 18:54, 20 June 2012
  • |Title=2nd International Conference on Smart Grids and Green IT Systems |Field=SMART GRIDS, ENERGY-AWARE SYSTEMS AND TECHNOLOGIES, SUSTAINABLE COMPUTING AND COMMUNICATIONS
    5 KB (649 words) - 10:44, 21 June 2012
  • |Title=2019 IEEE International Conference on Intelligence and Security Informatics |Field=Computer security and reliability
    5 KB (575 words) - 10:16, 1 August 2019
  • ...on among physical sciences. Ever-present throughout human history, optical systems and phenomena have been subject of interest in all cultures and epochs, fro ...and biology, providing fundamental analysis tools. The success of optical systems and tecnhologies in high-end scientific research has also found its way int
    8 KB (1,102 words) - 17:23, 18 July 2012
  • |Field=Information and Communication Security ...broad coverage of recent developments in “Information and Communication Security”. In 2012 the IPICS will be hosted by the SBA Research, at Vienna, Austri
    2 KB (263 words) - 15:04, 24 July 2012
  • *Computer Architecture and Real time Systems *Distributed and parallel systems & algorithms
    2 KB (274 words) - 18:15, 13 August 2012
  • - Security and Access Control<br /> - Communication Systems <br />
    3 KB (466 words) - 13:00, 16 August 2012
  • |Title=15th International Conference on Enterprise Information Systems ...ntegration, Artificial Intelligence, Decision Support Systems, Information Systems Analysis and Specification, Internet Computing, Electronic Commerce, Human
    5 KB (552 words) - 15:08, 21 August 2012
  • ...tions that have major impacts in solving societal problems such as health, security, energy, environment, and enhancing the sustainability of our society. • Multi-agent systems
    6 KB (728 words) - 01:01, 25 August 2012
  • - Energy-aware large scale distributed systems, such as Grids, Clouds and service computing ..., manufacture, use, disposal, and recycling of computers and communication systems
    4 KB (491 words) - 22:39, 28 August 2012
  • Trends in Intelligent Systems and Computer Engineering, Advances in Communication Systems and Electrical Engineering, and
    7 KB (903 words) - 16:27, 10 September 2020
  • Trends in Intelligent Systems and Computer Engineering, Advances in Communication Systems and Electrical Engineering, and
    6 KB (868 words) - 17:21, 29 August 2012
  • |Field=databases, data warehousing, data mining,data management,data security ...ta mining, data management, data security and other aspects of information systems and technology involving advanced applications of data.
    5 KB (558 words) - 13:27, 27 November 2020
  • ...Software Technologies, Software Engineering, Systems Security, Distributed Systems, Software Project Management ...e Technologies", "Software Engineering and Systems Security", "Distributed Systems", and "Software Project Management".
    6 KB (801 words) - 11:04, 14 April 2020
  • Network Security Web Information systems
    2 KB (234 words) - 08:25, 26 October 2012
  • Information Security Information Systems
    2 KB (224 words) - 08:27, 26 October 2012
  • |title=International Journal of Networks and Systems ( IJNS ) |Field=Computer Science, Networks, Systems
    2 KB (211 words) - 08:30, 26 October 2012
  • |Title=31st Conference on Advanced Information Systems Engineering ...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness.
    3 KB (375 words) - 15:06, 24 September 2020
  • ...en Archives Harvester; ProQuest; SCOPUS; Socolar; The Index of Information Systems Journals; ULRICH's Periodicals Directory ...en Archives Harvester; ProQuest; SCOPUS; Socolar; The Index of Information Systems Journals; ULRICH's Periodicals Directory
    6 KB (764 words) - 02:27, 11 December 2012
  • |Title=7th ACM International Conference on Distributed Event-Based Systems ...ents, logistics and networking, to complex event processing in finance and security. The DEBS conference brings together researchers and practitioners from the
    6 KB (826 words) - 15:44, 29 January 2021
  • ...nces in building, designing, using and understanding trustworthy computing systems. ● Trust, Security and Privacy in embedded systems
    5 KB (677 words) - 15:19, 19 December 2012
  • |Title=The Second Asian Conference on Information Systems ...Electrical Engineers of Japan (IEEJ) and the Electronics, Information and Systems Society under IEEJ and supported by SIIT, OPU, JAIST, NECTEC, PIM, PSU and
    3 KB (408 words) - 11:39, 5 January 2013
  • * Cloud Computing, Map Reduce, Parallel, Distributed, P2P Systems * Security, Privacy, Authenticated Query Processing
    5 KB (584 words) - 14:44, 14 January 2013
  • - Geographic information systems - Intelligent Systems
    4 KB (535 words) - 14:38, 17 January 2013
  • Enterprise Information Systems Intelligent information systems
    3 KB (441 words) - 14:52, 1 October 2020
  • - Information systems and people in organizations - Embedded Systems
    5 KB (702 words) - 10:02, 5 March 2013
  • Privacy, Security and Neuroethics The congress will be sponsored by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC).
    5 KB (571 words) - 11:33, 26 March 2013
  • • Platforms and Operating SystemsSecurity: Vulnerability and Privacy
    5 KB (647 words) - 19:06, 5 April 2013
  • for smart object systems - Security solutions for managed and infrastructureless networks
    9 KB (1,145 words) - 16:57, 11 April 2013
  • ...of Computational Intelligence and many other areas related to intelligent systems, on the other hand. • Multi-Agent Systems
    4 KB (438 words) - 14:04, 8 May 2013
  • ...national Conference on Pervasive and Embedded Computing and Communications Systems |Field=MOBILE AND PERVASIVE COMPUTING, DIGITAL SIGNAL PROCESSING, EMBEDDED SYSTEMS DESIGN
    3 KB (390 words) - 15:29, 9 May 2013
  • - Behavior of software, systems, and networks - Security
    5 KB (609 words) - 11:08, 26 July 2016
  • |Title=32nd Annual Computer Security Applications Conference |Field=Computer security and reliability
    2 KB (264 words) - 15:32, 7 January 2021
  • ...journals, including International Journal on Semantic Web and Information Systems (IJSWIS). More journals will be added soon. ** Representing and reasoning about trust, privacy, and security
    5 KB (711 words) - 19:02, 7 March 2020
  • *Context-aware Systems *Cyber Security
    3 KB (308 words) - 17:30, 26 May 2016
  • *Expert Systems *Information Security and Cryptography
    2 KB (227 words) - 11:30, 21 June 2016
  • |Title=International Conference on Testing Software and Systems |Series=International Conference on Testing Software and Systems
    3 KB (405 words) - 10:56, 24 April 2016
  • ...lligence and Humanized Computing, and International Journal of Distributed Systems and Technologies. ...very and data mining, machine learning, computational biology, agent-based systems, semantic web, information extraction and retrieval, text and web mining, h
    3 KB (422 words) - 12:09, 24 April 2016
  • |Title=Computational Intelligence in Information Systems The main goals of Computational Intelligence in Information Systems (CIIS) are to understand better these technologies and their applications s
    3 KB (309 words) - 17:11, 18 February 2021
  • |Title=12th International Conference on Semantic Systems |Field=Intelligent Systems and Image Processing
    10 KB (1,347 words) - 15:01, 26 September 2016
  • * Trust, security, and privacy ...escribe architecture, design, implementation, or experiments with existing systems which use semantic technologies. Preliminary reports describing research pr
    6 KB (898 words) - 14:42, 24 September 2016
  • |Title=8th International Conference on Knowledge and Systems Engineering The Eighth International Conference on Knowledge and Systems Engineering (KSE 2016)
    3 KB (359 words) - 22:34, 30 September 2016
  • |Title=17th International Conference on Web Information Systems Engineering ...2016 welcomes all submissions that fall in the domain of Web, information systems, data analytics, and knowledge and data engineering. The decision on accept
    2 KB (230 words) - 00:37, 28 May 2016
  • ...boundaries between disciplines such as databases, social networks, mobile systems, artificial intelligence, information retrieval, and computational linguist ...emantics and semantic modelling to enable co-operation between information systems. This year, we would also welcome additional submissions on the challenge o
    9 KB (1,131 words) - 23:18, 24 February 2020
  • |Title=25th European Conference on Information Systems |Field=Information Systems
    1 KB (177 words) - 10:04, 26 July 2016
  • * Multi-agent systems * Secure mobile and multi-agent systems
    3 KB (352 words) - 06:14, 20 September 2016
  • ...esearchers and practitioners from academia and industry to focus on recent systems and techniques in the broad field of Electrical, Electronics, Instrumentati * Embedded Systems and Robotics
    2 KB (197 words) - 16:16, 10 November 2016
  • ...rning, human-computer interaction, social networks, distributed and mobile systems, data and information retrieval, knowledge discovery, and computational lin ...tures), and CoopIS'20 (International Conference on Cooperative Information Systems).
    6 KB (877 words) - 23:06, 24 February 2020
  • ...ACM 2016 : 2016 6th International Conference on Communication and Network Security(ICCNS 2016)--ACM, EI and Scopus |Field=information technology, multimedia, wireless, information systems
    451 bytes (56 words) - 16:17, 8 July 2016
  • |Title=IEEE SysCo 2016 : The third IEEE International Conference on Systems of Collaboration ...e systems, social networks, collaborative processes, collaborative systems security
    494 bytes (60 words) - 16:19, 8 July 2016
  • |Title=CISSI 2016 : International Symposium on Information Systems Security |Field=computer sciences, security, big data, cloud computing
    329 bytes (35 words) - 17:36, 8 July 2016
  • * Multimedia Security and Content Protection * Multi-Camera and Multi-View Systems
    2 KB (250 words) - 19:36, 10 June 2020
  • ...rnational Conference on Semantic Technology for Intelligence, Defense, and Security ...chnology and ontology relevant to the fields of Intelligence, Defense, and Security. We are especially interested in papers on the following topics:
    4 KB (506 words) - 11:39, 8 October 2020
  • ...2016 : 11th International Conference on Risks and Security of Internet and Systems |Field=computer security
    382 bytes (45 words) - 00:54, 14 July 2016
  • |Title=ICISSP 2017 : 3rd International Conference on Information Systems Security and Privacy |Field=security systems, privacy
    385 bytes (48 words) - 16:21, 8 July 2016
  • |Title=5th International Conference on Networking, Systems and Security |Field=networking, systems, security
    339 bytes (40 words) - 21:00, 29 October 2020
  • |Field=embedded systems, internet of things, connectivity, safety and security
    401 bytes (49 words) - 16:22, 8 July 2016
  • |Title=9th Asian Conference on Intelligent Information and Database Systems The 9th Asian Conference on Intelligent Information and Database Systems (ACIIDS) 2017
    4 KB (464 words) - 11:38, 4 September 2020
  • development of future knowledge and information systems, and to shape future - Main-memory, Real-time, Parallel and Distributed Database Systems
    12 KB (1,565 words) - 04:15, 5 August 2023
  • - Security and Data Protection - Learning Management Systems (LMS)
    6 KB (790 words) - 13:45, 24 July 2016
  • ...2016 : 2nd IEEE International Symposium on Nanoelectronic and Information Systems ...ation systems, iot-big data, nanoelectronic systems, cyberphysical systems security
    464 bytes (56 words) - 15:35, 27 August 2016
  • ...e=4th International Doctoral Symposium on Applied Computation and Security Systems * Security for internet of things
    870 bytes (100 words) - 18:53, 2 March 2021
  • |Title=INCISCOS 2016 : International Conference on Information Systems and Computer Science |Field=computer science, information systems, data mining, security
    472 bytes (58 words) - 15:36, 27 August 2016
  • |Title=ICISE 2017 : 2017 2nd International Conference on Information Systems Engineering (ICISE 2017)--IEEE, Ei |Field=information technology, information systems, information security, signal processing
    454 bytes (53 words) - 15:36, 27 August 2016
  • ...016 : 2016 IEEE Workshop on Machine Learning in Security of Cyber-Physical Systems (MLSCPS) |Field=machine learning, cyber security, cyber-physical system, IEEE
    469 bytes (59 words) - 15:06, 17 August 2016
  • |Title=IJCCBS-SI 2016 : Int. J. of Critical Computer-Based Systems. Special Issue on: Methods and Tools for Assurance of Critical Infrastructu |Field=computer science, security, safety, formal methods
    469 bytes (58 words) - 15:07, 17 August 2016
  • * Security/Surveillance * Vision Systems and Applications
    2 KB (183 words) - 19:28, 12 May 2020
  • ...onal Conference on Research and Practical Issues of Enterprise Information Systems |Field=Information Systems
    925 bytes (116 words) - 11:05, 24 August 2016
  • ...prediction systems; Social multimedia as sensors; Sentiment representation systems ...agents and multi-agent systems; Agent-mining intelligent applications and systems; Automated retrieval of multimedia streams; Automated retrieval from multim
    10 KB (1,305 words) - 00:29, 12 December 2020
  • |Title=SMGSSP 2017: Smart Micro-Grid Systems Security and Privacy |Field=privacy, security, smart micro-grids, cyber-physical systems
    2 KB (246 words) - 09:12, 3 September 2017
  • |Title=23rd European Conference on Information Systems |Field=Information Systems
    3 KB (434 words) - 10:28, 26 July 2016
  • |Title=2015 International Conference on Information Systems |Field=Information Systems
    2 KB (263 words) - 10:32, 26 July 2016
  • ...ence covers all aspects of data mining, including algorithms, software and systems, and applications. ...ition, databases and data warehousing, data visualization, knowledge-based systems, and high performance computing. By promoting novel, high quality research
    3 KB (407 words) - 10:17, 27 July 2016
  • ...ale data analytics of textual and graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, ...ining sequences, time series analysis, online advertising, bioinformatics, systems biology, text/web analysis, mining temporal and spatial data, and multimedi
    2 KB (282 words) - 10:48, 8 February 2020
  • ...ale data analytics of textual and graph data, large-scale machine learning systems, distributed computing (cloud, map-reduce, MPI), large-scale optimization, ...ining sequences, time series analysis, online advertising, bioinformatics, systems biology, text/web analysis, mining temporal and spatial data, and multimedi
    2 KB (270 words) - 10:49, 8 February 2020
  • - Geographic information systems - Intelligent Systems
    5 KB (641 words) - 22:32, 29 July 2016
  • |Title=Dependable, Adaptive, and Trustworthy Distributed Systems 2017 |Field=adaptiveness, dependability, security, distributed systems
    439 bytes (49 words) - 16:36, 6 January 2021
  • ...munication of research advances on the theoretical foundations of database systems. * data privacy and security
    4 KB (557 words) - 10:14, 15 May 2019
  • ...pers on AI techniques in the context of novel application domains, such as security, sustainability, health care, transportation, and commerce. A special theme
    10 KB (1,466 words) - 15:17, 7 March 2021
  • ...2017 : The 8th International Conference on Information and Communication Systems |Field=online social networks, security, big data, communication systems
    441 bytes (55 words) - 13:49, 25 September 2016
  • |Title=7th Asian Conference Intelligent Information and Database Systems |Field=Intelligen Information and Database Systems
    3 KB (340 words) - 11:27, 4 September 2020
  • |Title=IEEE/IFIP International Conference on Dependable Systems |Field=Computer security and reliability
    135 bytes (17 words) - 11:02, 9 October 2016
  • ...onference on Distributed Multimedia Systems, Visual Languages and Sentient Systems DMSVLSS2017 (ksiresearchorg.ipage.com/seke/dmsvlss17.html) will be held at *Autonomic computing and agent-based systems
    18 KB (2,288 words) - 12:48, 27 October 2016
  • * probabilistic systems * real-time systems
    4 KB (528 words) - 11:25, 26 June 2020
  • * probabilistic systems * real-time systems
    4 KB (490 words) - 11:42, 26 June 2020
  • |Title=20th International Conference on Business Information Systems BIS 2017 |Field=[[Category:Business Information Systems]]
    9 KB (1,190 words) - 10:12, 5 June 2019
  • |Title=8th Asian Conference Intelligent Information and Database Systems |Field=Intelligent Information and Database Systems
    3 KB (361 words) - 10:38, 4 September 2020
  • Circuits, software and systems for 5G ...of multi-modes, multi-bands, multi-standards and multi- applications in 5G systems
    5 KB (588 words) - 18:00, 21 January 2017
  • complex cyber systems for smart cities requires the use of state-of-the-art city services and application systems. IEEE Smart City Innovations(IEEE SCI 2017)
    4 KB (565 words) - 09:46, 7 February 2017
  • |Title=21st European Conference on Advances in Databases and Information Systems * Management of large scale data systems
    3 KB (421 words) - 20:37, 11 February 2021
  • Architectures and solutions for security and dependable services in the Internet of things and Internet of everythin Network and Information Security Innovative Computing Systems and Applications in S & T domains such as –
    5 KB (631 words) - 15:09, 10 April 2017
  • ...ial papers on the theory, design and implementation of digital information systems, as well as demonstrations, tutorials, workshops and industrial presentatio Artificial Intelligence and Decision Support Systems
    4 KB (528 words) - 18:46, 29 August 2017
  • * Trust, security, and privacy ...escribe architecture, design, implementation, or experiments with existing systems using semantic technologies. Preliminary reports describing research protot
    7 KB (988 words) - 09:50, 14 August 2019
  • ...that will be published by Springer book series on Advances in Intelligent Systems and Computing (ISSN: 2194-5357). 6.Computer Security
    1 KB (209 words) - 10:35, 27 April 2017
  • |Title=The 21st International Conference on Business Information Systems |Field=Business Information Systems
    10 KB (1,309 words) - 10:29, 5 June 2019
  • *Web-Based Health- and Bio- Information Systems *Web Security, Integrity, Privacy, and Trust
    18 KB (2,394 words) - 16:28, 29 January 2018
  • "Advances in Intelligent Systems and Computing" 6.Computer Security
    1 KB (149 words) - 07:56, 17 July 2017
  • the 22nd European Symposium on Research in Computer Security (ESORICS information-oriented security.
    7 KB (887 words) - 15:22, 15 July 2017
  • Large Scale Information Systems (ODBASE'17) provides a forum on the use of systems, information retrieval, knowledge discovery, and computational
    6 KB (798 words) - 23:16, 24 February 2020
  • * Computer Architecture and Real time Systems * Distributed and parallel systems & algorithms
    10 KB (1,396 words) - 13:30, 28 July 2017
  • ...uilding Systems Vehicular communications Information Management Systems and Services Computer Physics & BiologyPaper SubmissionAuthors are invit
    3 KB (403 words) - 09:15, 12 July 2017
  • |Title=IJCIS 2017 : International Journal on Cryptography and Information Security INTERNATIONAL JOURNAL ON CRYPTOGRAPHY AND INFORMATION SECURITY (IJCIS)
    4 KB (597 words) - 13:28, 28 July 2017
  • * Computer Architecture and Real time Systems * Distributed and parallel systems & algorithms
    5 KB (679 words) - 13:28, 28 July 2017
  • |Title=International Conference on Semantic Systems 13th International Conference on Semantic Systems
    6 KB (759 words) - 15:52, 5 December 2018
  • * Multimedia Databases and File Systems * Multimedia security and content protection
    3 KB (384 words) - 13:28, 28 July 2017
  • |Title=VLSICS 2017 : International Journal of VLSI design & Communication Systems INTERNATIONAL JOURNAL OF VLSI DESIGN & COMMUNICATION SYSTEMS (VLSICS)
    4 KB (527 words) - 13:28, 28 July 2017
  • systems. The relevant topics include, but not limited to:  Real-time data processing architectures and systems
    4 KB (532 words) - 13:28, 28 July 2017
  • look to the “externalized” IT systems and services as a potential cost-savings organizations view the “external” IT as potential disaster recovery systems or
    7 KB (1,009 words) - 13:39, 3 September 2017
  • Security Applications of Big Data Anomaly Detection in Very Large Scale Systems
    3 KB (461 words) - 13:22, 3 September 2017
  • |Title=ICSS 2017 : 3rd International Conference on Software Security 3rd International Conference on Software Security (ICSS-2017)
    4 KB (562 words) - 12:05, 3 September 2017
  • * Computer Architecture and Real Time Systems * Distributed and Parallel Systems & Algorithms
    5 KB (651 words) - 11:34, 8 August 2017
  • advanced distributed systems, which are aligned with other updated technologies, from vehicular systems to mobile applications. Therefore, our mission is to
    3 KB (464 words) - 09:30, 3 September 2017
  • * Internet, Web and Security Visualization * Visualization Tools and Systems for Simulation and Modeling
    5 KB (615 words) - 10:58, 15 May 2020
  • science and services, Web Information Systems and Applications, Computer Network Testing of Software Systems
    5 KB (673 words) - 09:53, 3 September 2017
  • The 21st International Conference on Principles of Distributed Systems distributed computing and distributed computer systems. All aspects of
    7 KB (1,009 words) - 15:54, 3 September 2019
  • Security, Computer Vision. Following the past successful symposium SoICT 2016, Conference on Computational Systems-Biology and Bioinformatics:
    4 KB (559 words) - 11:58, 8 August 2017
  • Artificial Intelligence; Multiagent Systems; Theory of Computer Science; Databases; Security and Cryptography; Operating Systems; Networks, Distributed
    3 KB (438 words) - 11:45, 8 August 2017
  • * Tools and systems for big data * Security and privacy for big data
    3 KB (436 words) - 10:46, 27 May 2020
  • * Mobile communication security issues and requirements * Privacy and Security in Mobile Computing and Wireless Systems
    6 KB (751 words) - 13:28, 28 July 2017
  • ...: 10th International Symposium on Foundations of Information and Knowledge Systems 10th Int’l. Symposium on Foundations of Information and Knowledge Systems
    9 KB (1,118 words) - 13:41, 3 September 2017
  • |Field=security * Dedicated Software and Systems for Developing Interconnect Technology
    4 KB (472 words) - 14:34, 10 December 2020
  • |Title=SPDF-Mobile 2017 : Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud” |Field=security
    4 KB (536 words) - 09:59, 21 August 2017
  • * Cryptography, security and privacy of mobile & wireless networks * Performance of mobile and wireless networks and systems
    6 KB (820 words) - 13:30, 28 July 2017
  • Global and local positioning systems in wireless networks Acoustic communication systems
    3 KB (415 words) - 13:30, 28 July 2017
  • - Service Security and Privacy - Location-based Information Systems
    6 KB (873 words) - 13:30, 28 July 2017
  • Multi - antenna and beamforming systems Cryptography and network security
    4 KB (524 words) - 13:30, 28 July 2017
  • * Computer Security * International Journal of Fuzzy Logic Systems
    4 KB (523 words) - 13:30, 28 July 2017
  • * Cryptography and Information security * Database Management Systems
    3 KB (347 words) - 10:20, 20 November 2020
  • informatics to solve privacy, security, healthcare, education, poverty, and * Multimedia Systems & Human-Machine Interaction
    4 KB (570 words) - 13:30, 28 July 2017
  • * Cryptography and Information security * Database Management Systems
    3 KB (346 words) - 17:32, 18 February 2021
  • - Internet of Things and Embedded Systems - IT Architecture and Security
    1 KB (136 words) - 11:52, 8 August 2017
  • Management, Software Engineering and Information Systems to share their ideas, Agile and Complex systems
    4 KB (497 words) - 11:58, 8 August 2017
  • - Information Security & Risk Management - Infrastructure Systems and Services
    6 KB (814 words) - 09:03, 3 September 2017
  • |Field=security Wireless Networks, Data Communication Technologies, and Network Security. The
    4 KB (486 words) - 11:57, 8 August 2017
  • |Field=security Wireless Networks, Data communication Technologies, and Network Security. The
    4 KB (546 words) - 11:35, 8 August 2017
  • |Title=ICISS 2017 : International Conference on Information Systems Security |Field=security
    5 KB (626 words) - 12:02, 3 September 2017
  • |Field=security • Unmanned Autonomous Systems (UAS)
    441 bytes (45 words) - 13:34, 28 July 2017
  • |Acronym=Smart-City-IoT-Security 2017 |Title=Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
    5 KB (722 words) - 10:00, 21 August 2017
  • |Title=DMCS 2017 : DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17) |Field=security
    4 KB (626 words) - 09:30, 3 September 2017
  • |Title=ICNS - Ei 2017 : 2017 The 2nd International Conference on Network Security (ICNS 2017)--ACM, Ei Compendex and Scopus |Field=security
    2 KB (308 words) - 11:50, 3 September 2017
  • |Field=security robustness, security, privacy, and ergonomics of EEG-based biometric systems and
    3 KB (450 words) - 15:32, 9 October 2020
  • |Title=ASPMI 2018 : Advances in Security and Privacy of Multimodal Interfaces |Field=security
    4 KB (592 words) - 13:34, 28 July 2017
  • |Title=SPIoT 2017 : The 6th International Symposium on Security and Privacy on Internet of Things |Field=security
    3 KB (379 words) - 12:01, 3 September 2017
  • practitioners on the area of computer vision application systems. Five Papers describing advanced prototypes, systems, tools and techniques as well as
    4 KB (560 words) - 11:35, 21 February 2020
  • and network security. Large/Heterogeneous Networks Security, privacy, trust and ethics
    4 KB (442 words) - 10:00, 21 August 2017
  • |Field=security innovative materials, devices and systems inspired by biological systems and/or
    3 KB (449 words) - 12:30, 3 September 2017
  • performance, energy, virtualization, portability, security, or reliability throughput or latency, security, reliability, or functional debugging
    3 KB (391 words) - 12:32, 11 April 2020
  • Systems; Risk Management. Computational Science and Technology: Software Engineering; Operating Systems;
    4 KB (495 words) - 13:34, 28 July 2017
  • mining,Pre-processing techniques, Visualization, Security and information hiding International Journal of Database Management Systems ( IJDMS )
    5 KB (689 words) - 13:34, 28 July 2017
  • |Title=IJDMS 2017 : International Journal of Database Management Systems INTERNATIONAL JOURNAL OF DATABASE MANAGEMENT SYSTEMS (IJDMS)
    3 KB (398 words) - 13:34, 28 July 2017
  • * Computer Architecture and Real time Systems * Distributed, Parallel Systems & Algorithms
    5 KB (589 words) - 11:46, 8 August 2017
  • - Security - Interaction systems / Multimodal interaction
    4 KB (580 words) - 20:58, 12 November 2020
  • - Platforms and Operating Systems - Multi-Agent Systems
    5 KB (632 words) - 12:30, 3 September 2017
  • - In-Memory Systems and Platforms for Big Data Analytics - Performance Evaluation Reports for Big Data Systems
    4 KB (583 words) - 10:01, 3 September 2017
  • 2. Security and Intelligence 3. Information Security
    4 KB (507 words) - 09:52, 3 September 2017
  • * privacy and security for microservices; * microservices’ role in architecting big data systems;
    2 KB (245 words) - 13:34, 28 July 2017
  • foundational, theoretical, empirical, and applied software and systems and systems engineering. Submissions are invited in all areas of software and
    8 KB (1,150 words) - 10:11, 7 August 2019
  • |Title=IJSPTM 2017 : International Journal of Security, Privacy and Trust Management INTERNATIONAL JOURNAL OF SECURITY, PRIVACY AND TRUST MANAGEMENT (IJSPTM)
    5 KB (640 words) - 13:34, 28 July 2017
  • (13) ASIC Design and Embedded Systems (15) Automation, Control Systems, and Mechatronics
    1 KB (157 words) - 13:19, 28 July 2017
  • Broadcasting, Circuits and Devices, Circuits and Systems, Computational Biology, Devices, Electronic and Communication Systems, Electronic Design, Electronics
    4 KB (554 words) - 13:19, 28 July 2017
  • * Intelligent and Autonomous Systems on the Web * Security and Privacy on the Web
    12 KB (1,422 words) - 10:18, 5 October 2023
  • Collective and Cooperative Systems CCS Computer Security SEC
    5 KB (660 words) - 13:50, 8 April 2020
  • Advanced Machine Learning Technologies for Network Security. Advanced Machine Learning Technologies for Education Systems
    3 KB (355 words) - 12:33, 3 September 2017
  • INTERNET BASED SYSTEMS (SITIS 2017) emerging interdisciplinary multimedia research and systems dealing with
    5 KB (623 words) - 11:57, 8 August 2017
  • ...2017 : 2017 2nd International Conference on Communication and Information Systems (ICCIS 2017)--SCOPUS, EI Compendex 2017 2nd International Conference on Communication and Information Systems
    2 KB (212 words) - 13:19, 28 July 2017
  • * Cryptography, Security and Privacy of Mobile & Wireless Networks * Integration of Wired and Wireless Systems
    5 KB (616 words) - 13:19, 28 July 2017
  • vehicles, smart communities, biomedical instruments, security surveillance. Networking for Multimedia Systems
    5 KB (654 words) - 09:58, 21 August 2017
  • communication, Cyber-Physical Systems (CPSs), Mobile-Edge Computing, Social computing as well as mobile and enterprise systems.
    4 KB (494 words) - 13:20, 28 July 2017
  • on Semantic Web and Information Systems (IJSWIS), for fast-track publication in - Trust, privacy, and security on the Semantic Web
    7 KB (903 words) - 13:23, 28 July 2017
  • for the embedded systems community. From a wide range of sensors and all the way to embedded vision, systems are
    2 KB (298 words) - 09:59, 21 August 2017
  • ...ternational Conference on Smart Cities, Automation & Intelligent Computing Systems Intelligent Computing Systems (ICON-SONICS 2017) to be held on 08-10 November
    4 KB (508 words) - 13:23, 28 July 2017
  • System Science & Engineering, Human - Machine Systems and Cybernetics.The Distributed Systems
    3 KB (324 words) - 13:34, 5 December 2017
  • - Security - Interaction systems / Multimodal interaction
    3 KB (346 words) - 19:16, 26 November 2020
  • |Field=information security engines; applications, especially in systems analysis and formal verification;
    5 KB (670 words) - 13:24, 28 July 2017
  • |Acronym=Technologies for Security of EHR 2017 |Title=Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic Health Record (EHR): Opportunities and Cha
    5 KB (650 words) - 13:24, 28 July 2017
  • ...: The 19th CSI International Symposium on Computer Architecture & Digital Systems (CADS 2017) * Computer Architecture, Processor Design, and Memory Systems
    1 KB (178 words) - 10:05, 20 November 2020
  • ...cial Section on Formal Approaches at IEICE Transactions on Information and Systems The IEICE Transactions on Information and Systems announces a
    4 KB (593 words) - 13:24, 28 July 2017
  • |Title=ICEIS 2018 : 20th International Conference on Enterprise Information Systems 20th International Conference on Enterprise Information Systems ICEIS
    6 KB (818 words) - 13:40, 3 September 2017
  • cyber-physical systems. Enabling a smart life has become a popular research communications, from smart cloud computing to smart security. The conference is
    3 KB (412 words) - 11:51, 3 September 2017
  • |Title=CPS-SPC 2017 : ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) |Field=security
    4 KB (565 words) - 17:27, 18 February 2021
  • |Field=security * Embedded systems
    3 KB (434 words) - 13:28, 28 July 2017
  • ...EE IINTEC 2017 : International Conference on Internet of Things, Embedded Systems and Communications |Field=security
    6 KB (743 words) - 11:45, 8 August 2017
  • ...e=MIST 2017 : The 9th ACM CCS International Workshop on Managing Insider Security Threats |Field=security
    5 KB (611 words) - 11:47, 8 August 2017
  • |Title=ICISSP 2018 : 4th International Conference on Information Systems Security and Privacy |Field=security
    3 KB (380 words) - 12:30, 3 September 2017
  • |Field=security about cloud security, privacy, availability, and data protection. To discuss and
    6 KB (799 words) - 13:28, 28 July 2017
  • |Field=security * Web-based Education Systems and Learning Applications
    7 KB (946 words) - 13:28, 28 July 2017
  • |Field=security of smart systems (smart city, intelligence transportation system, smart
    4 KB (500 words) - 09:56, 21 August 2017
  • •Track 4: Biometrics, forensics and security, mobile applications, big data, small sample size, data mining and performance evaluation, intelligent systems,
    2 KB (240 words) - 13:40, 3 September 2017
  • Big Data Security, Privacy and Trust Systems and technologies in e-education
    2 KB (233 words) - 13:21, 3 September 2017
  • ...yberIoT 2017 : Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal |Field=security
    4 KB (547 words) - 09:58, 21 August 2017
  • between industry and academia. Nowadays, complex systems of all types, like Web-based systems, data centers and cloud infrastructures, social
    11 KB (1,364 words) - 13:23, 3 September 2017
  • ...S 2018 : 3rd International Conference on Internet of Things, Big Data and Security |Field=security
    8 KB (1,170 words) - 13:40, 3 September 2017
  • ...TGREENS 2018 : 7th International Conference on Smart Cities and Green ICT Systems 7th International Conference on Smart Cities and Green ICT Systems SMARTGREENS
    6 KB (825 words) - 13:22, 3 September 2017
  • system, the supply chain is a complex set of entities and systems interconnected by numerous physical, financial and information flows, and, as with all systems,
    2 KB (326 words) - 09:58, 21 August 2017
  • |Title=WorldCIS 2017 : World Congress on Internet Security theory and practical implementation of security on the Internet and Computer
    5 KB (571 words) - 11:53, 3 September 2017
  • ...ICDIS 2018 : 2018 First International Conference on Data Intelligence and Security Data intelligence and data security are two closely related views, while data
    4 KB (484 words) - 10:00, 21 August 2017
  • Management Information Systems Information Security
    2 KB (269 words) - 11:57, 3 September 2017
  • Autonomous systems Decision support systems
    2 KB (246 words) - 12:11, 3 September 2017
  • |Title=WCICSS 2017 : The World Congress on Industrial Control Systems Security security professionals, managers, developers, educators, vendors and service
    5 KB (571 words) - 10:51, 3 September 2017
  • TECHNOLOGY & INTERNET BASED SYSTEMS systems, mobile information systems and services, semantic-based applications
    6 KB (876 words) - 09:59, 21 August 2017
  • * Computer Architecture and Real time Systems * Distributed and Parallel Systems & Algorithms
    4 KB (478 words) - 08:48, 16 May 2020
  • * Design of next generation scholarly big data platforms and systems * Privacy and security issues
    4 KB (566 words) - 10:00, 21 August 2017
  • applications. Particularly, Infrastructure as a Service (IaaS) Cloud systems - rapid evolution and proliferation of Internet of Things systems, we this session
    6 KB (880 words) - 10:00, 21 August 2017
  • ...ring (SOA, choreographies, collaborations, conversations, artifact-centric systems) - RESTful systems (design aspects, hypermedia, linked data, mashups, other protocols, ...)
    7 KB (910 words) - 10:36, 26 November 2017
  • - Access control and security ...ics can be considered in both the case of native and not native management systems
    4 KB (484 words) - 10:36, 26 November 2017
  • ...ring (SOA, choreographies, collaborations, conversations, artifact-centric systems) - Security, compliance, and non-functional requirements and properties
    4 KB (565 words) - 18:34, 4 July 2020
  • collaborations, conversations, artifact-centric systems) - RESTful systems (design aspects, hypermedia, linked data, mashups, other
    7 KB (1,046 words) - 10:36, 26 November 2017
  • ...pers on AI techniques in the context of novel application domains, such as security, sustainability, health care, transportation, and commerce.
    3 KB (379 words) - 12:11, 13 February 2020
  • |Field=Information Systems * Anonymity, security and trust for Web access
    8 KB (1,023 words) - 19:05, 7 March 2020
  • |Title=29th International Conference on Database and Expert Systems Applications Database, information, and knowledge systems have always been a core subject of computer science. The ever increasing ne
    4 KB (548 words) - 08:05, 13 September 2019
  • ...rkshops. It will cover issues in data management, database and information systems research, since they are the technological cornerstones of the emerging app Privacy and Security in Data Management.
    6 KB (826 words) - 09:45, 19 February 2021
  • 14th International Conference on Semantic Systems ...t departments working to develop, implement and evaluate semantic software systems.
    11 KB (1,487 words) - 13:45, 13 May 2019
  • ...data provenance, data linkage, data fusion, data warehousing, privacy and security, modelling) * Infrastructures (e.g., cloud computing, data intensive computing, database systems, indexing and compression, search engine architectures)
    4 KB (546 words) - 14:37, 3 August 2023
  • |Title=9th international conference on Complex Systems Design & Management Paris 2018 |Field="engineering","complex systems","architecture"
    3 KB (440 words) - 16:01, 14 February 2018
  • |Title=3rd Asia-Pacific conference on Complex Systems Design & Management |Field="engineering","complex systems","architecture"
    3 KB (368 words) - 16:10, 14 February 2018
  • * Processor, memory, and storage systems architecture * Multiprocessor systems
    2 KB (315 words) - 11:47, 11 May 2020
  • ...ness, and society; user studies; experiences with large-scale deployments, systems, or applications.<br> ...tures; multicores; power and cooling; power-efficient ("green") computing; security and reliability; high availability solutions; high performance GPU applicat
    1 KB (173 words) - 23:51, 24 February 2020
  • |Title=30th International Conference on Database and Expert Systems Applications ...uirements, problems, and solutions in database, information, and knowledge systems. DEXA 2019 will be held in Linz, Austria from 26 to 29 August 2019.
    4 KB (510 words) - 09:37, 21 April 2020
  • ...chine learning, in fields like medicine, biology, industry, manufacturing, security, education, virtual environments, games, are especially encouraged. * medicine, health, bioinformatics and systems biology
    3 KB (425 words) - 20:41, 7 September 2019
  • ...onference on Distributed Multimedia Systems, Visual Languages and Sentient Systems |Has coordinator=KSI Research Inc., Knowledge Systems Institute
    4 KB (436 words) - 11:49, 21 April 2020
  • |Title=2018 CHI Conference on Human Factors in Computing Systems |Field=Information Security
    1 KB (161 words) - 11:10, 22 May 2019
  • *Big Data platforms with applications to network management, security, measurements *Experience and lessons learned by deploying large-scale networked systems
    2 KB (290 words) - 11:16, 6 April 2020
  • ...onference on Architectural Support for Programming Languages and Operating Systems |Field=Operating Systems
    4 KB (547 words) - 12:27, 30 September 2019
  • |Title=The 22nd International Conference on Business Information Systems |Field=Business Information Systems
    7 KB (917 words) - 18:07, 17 March 2020
  • *Programming Models and Runtime Systems *Security, Privacy and Reliability
    2 KB (288 words) - 09:18, 6 June 2019
  • |Title=40th International Conference on Information Systems |Field=Information Systems
    2 KB (215 words) - 10:18, 12 June 2019
  • |Title=International Conference on Dependable Systems and Networks |Field=Computer security and reliability
    1 KB (123 words) - 15:25, 3 December 2020
  • | Title = The 7th International Conference on Mobile Systems, Applications, and Services MobiSys 2009 seeks papers that take a broad systems perspective rather than focus narrowly on low-level components. The confere
    4 KB (479 words) - 10:05, 17 August 2023
  • '''18th World Congress of the International Fuzzy Systems Association (IFSA) held jointly with the 38th North American Fuzzy Informat Fuzzy systems design and optimization
    4 KB (401 words) - 07:52, 29 July 2020
  • '''Collections, Systems, and Management''' * Digital libraries: and archives preservation systems
    3 KB (368 words) - 07:27, 17 April 2020
  • * Enterprise Systems and Knowledge Management * Information Security, Privacy, and Risk Management
    1 KB (188 words) - 07:35, 17 April 2020
  • * Interfaces for Recommender Systems * Usable Security
    2 KB (200 words) - 08:47, 17 April 2020
  • |Title=The 18th ACM International Conference on Mobile Systems, Applications, and Services ...ks to present innovative and significant research on all aspects of mobile systems, applications, and services. The conference values technical contributions
    5 KB (759 words) - 15:21, 18 June 2020
  • |Title=15th ACM ASIA Conference on Computer and Communications Security ...ch on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:
    11 KB (1,549 words) - 11:34, 17 April 2020
  • |Title=The Twelfth Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (152 words) - 10:13, 17 April 2020
  • * privacy and security * systems theory
    2 KB (192 words) - 08:38, 14 April 2020
  • |Title=39th International Conference on Computer Safety, Reliability and Security The 39th International Conference on Computer Safety, Reliability and Security ( SafeComp)
    5 KB (617 words) - 11:54, 19 June 2020
  • ...elligence, CRM- and ERP-Systems; Project Management and Quality Management Systems; Computational Social Science; Hypermedia, Multimedia and Social Media; Vis === Information Security ===
    3 KB (314 words) - 11:52, 27 March 2020
  • |Title=15th International Conference on Availability, Reliability, and Security The International Conference on Availability, Reliability, and Security (ARES) 2020
    3 KB (313 words) - 17:14, 4 November 2020
  • * Language-Based Security in Data Management * Semantics and Verification of Database Systems
    2 KB (255 words) - 10:39, 17 April 2020
  • * Simulation infrastructure and security issues for large scale distributed and/or cloud-based modeling and simulati * Integration of simulation with other IT systems, methods, and developments including simulation based decision-making, visu
    3 KB (457 words) - 08:25, 17 April 2020
  • * Data Privacy and Security * Distributed Database Systems
    3 KB (396 words) - 09:53, 19 February 2021
  • |Title=17th International Conference on Trust, Privacy and Security in Digital Business ...lack of trust in electronic procedures and the extent to which information security and user privacy can be ensured.
    5 KB (690 words) - 12:02, 26 March 2020
  • |Title=35th International Conference on ICT Systems Security and Privacy Protection
    1 KB (193 words) - 11:59, 30 March 2020
  • |Title=34th International Conference on ICT Systems Security and Privacy Protection
    686 bytes (89 words) - 12:09, 30 March 2020
  • |Title=33rd International Conference on ICT Systems Security and Privacy Protection
    621 bytes (78 words) - 12:21, 30 March 2020
  • |Title=32nd International Conference on ICT Systems Security and Privacy Protection
    683 bytes (85 words) - 12:39, 30 March 2020
  • |Title=16th EAI International Conference on Security and Privacy in Communication Networks * Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
    2 KB (299 words) - 13:10, 30 March 2020
  • |Title=The 17th ACM International Conference on Mobile Systems, Applications, and Services ...ks to present innovative and significant research on all aspects of mobile systems, applications, and services. The conference values technical contributions
    5 KB (732 words) - 15:22, 18 June 2020
  • * Multiple Antenna Systems and Services * Wireless Network Security
    2 KB (192 words) - 14:37, 11 December 2023
  • *Big data platforms with applications to network management, security, measurements ...insights into real-world deployments of novel networking technologies and systems
    2 KB (238 words) - 11:18, 6 April 2020
  • ...0th International Conference on Distributed Applications and Interoperable Systems Novel and innovative distributed applications and systems, particularly in the areas of
    2 KB (210 words) - 12:33, 22 December 2020
  • ...ion of functional and non-functional properties, including performance and security aspects; *Coordination of multiagent and collective systems: models, languages, infrastructures, self-adaptation, self-organisation, di
    2 KB (264 words) - 18:00, 18 February 2021
  • ..., The Fifteenth International Conference on Emerging Security Information, Systems and Technologies ...Seventh International Conference on Fundamentals and Advances in Software Systems Integration
    2 KB (238 words) - 17:26, 14 January 2021
  • |Title=17th Asian Symposium on Programming Languages and Systems ...d practical issues broadly spanning the areas of programming languages and systems. Papers are solicited on topics such as
    1 KB (141 words) - 15:22, 8 April 2020
  • |Title=16th Asian Symposium on Programming Languages and Systems * Design of languages, type systems, and foundational calculi
    1 KB (110 words) - 15:22, 8 April 2020
  • |Title=The 15th ACM International Conference on Mobile Systems, Applications, and Services ...aspects of mobile systems. MobiSys seeks original papers that take a broad systems perspective rather than focus narrowly on low-level components. Of particul
    6 KB (944 words) - 15:24, 18 June 2020
  • |Title=15th Asian Symposium on Programming Languages and Systems * design of languages, type systems, and foundational calculi
    1 KB (109 words) - 15:23, 8 April 2020
  • |Title=The 16th ACM International Conference on Mobile Systems, Applications, and Services ...ks to present innovative and significant research on all aspects of mobile systems, applications, and services. The conference values technical contributions
    5 KB (721 words) - 10:07, 17 August 2023
  • ...d mobile networks; Heterogeneous optical networks; 5G wireless and mm-Wave systems; Cognitive radars; Signal processing for crowd dynamics; Small-scale prosum ...is (Data and DataFlows); CNN Interference systems; Programmable platforms; Security access; Automatic acceleration platforms; Reconfigurable hardware; Clouds F
    5 KB (556 words) - 15:23, 14 January 2021
  • |Title=14th International Conference on Provable and Practical Security ...nization=Strategic Centre for Research in Privacy-Preserving Technological Systems
    2 KB (208 words) - 10:19, 9 April 2020
  • ...ion, termination checking, binding-time analysis, constraint solving, type systems, automated testing and test case generation. ...and web-based applications, embedded and resource-limited computation, and security.
    7 KB (1,057 words) - 10:13, 17 April 2020
  • |Title=13th International Conference on Provable and Practical Security * Lattice-based security reductions
    2 KB (195 words) - 11:08, 9 April 2020
  • |Title=12th International Conference on Provable Security ...rs and practitioners to exchange new ideas on diverse problems in provable security.
    3 KB (445 words) - 11:59, 9 April 2020
  • |Title=27th International Conference on Cooperative Information Systems * Data Structures in Shared Information Systems
    2 KB (254 words) - 08:59, 14 April 2020
  • * Autonomic computing and agent-based systems * Adaptive Systems
    5 KB (608 words) - 13:03, 15 April 2020
  • ...FIP International Conference on Distributed Applications and Interoperable Systems Novel and innovative distributed applications and systems, particularly in the areas of:
    3 KB (303 words) - 08:58, 16 April 2020
  • ...FIP International Conference on Distributed Applications and Interoperable Systems Novel and innovative distributed applications and systems, particularly in areas of:
    2 KB (222 words) - 11:23, 16 April 2020
  • * Intelligent/smart systems and services * Urban Computing and Smart City Systems
    3 KB (284 words) - 15:23, 16 April 2020
  • * – Urban Computing and Smart City Systems * – Smart Public Safety and Security
    2 KB (243 words) - 15:46, 16 April 2020
  • * Enterprise Systems & Knowledge Management * Information Security, Privacy, and Risk Management
    1 KB (158 words) - 08:18, 17 April 2020
  • ...ion of functional and non-functional properties, including performance and security aspects; *Coordination of multiagent and collective systems: models, languages, infrastructures, self-adaptation, self-organisation, di
    3 KB (355 words) - 08:53, 17 April 2020
  • ...ion, termination checking, binding-time analysis, constraint solving, type systems, automated testing and test case generation. ...and web-based applications, embedded and resource-limited computation, and security.
    8 KB (1,080 words) - 10:43, 17 April 2020
  • |Title=11th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (155 words) - 10:20, 17 April 2020
  • |Title=10th Conference on Security and Cryptography for Networks All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restrict
    1 KB (153 words) - 10:27, 17 April 2020
  • * Language-Based Security in Data Management * Semantics and Verification of Database Systems
    1 KB (166 words) - 10:53, 17 April 2020
  • ...nd video collections; Implementation of signal, image and video processing systems ...ons Networks and mm-Wave Systems; Cognitive radio networks; Cyber-physical security; Social networks and finance applications, etc.
    10 KB (1,215 words) - 14:46, 19 April 2020
  • ...data; Power transient stability margins; Disturbance propagation in power systems; Short-term electrical load prediction; Monitoring residential settings; So ...fficient radio resource management and routing; Hardware energy-efficiency systems; Virtualization techniques for energy efficiency; Simulation/modeling tools
    10 KB (1,331 words) - 14:52, 19 April 2020
  • ...Opportunistic unlicensed spectra utilization; Adaptation in Cyber-physical systems; Service availability models ...ory; Network modeling & simulation; Network monitoring techniques; Network security; Next Generation Networks (NGN); Overlay networks; Peer-to-peer networking;
    14 KB (1,770 words) - 14:56, 19 April 2020
  • |Title=The Sixteenth International Conference on Autonomic and Autonomous Systems ...020''', The Sixteenth International Conference on Autonomic and Autonomous Systems
    16 KB (1,897 words) - 12:31, 18 May 2020
  • ...queries; Web search as medical services; Web tracking; Web Authentication Systems; Web social ecosystems; Collaborative filtering recommenders; Web scale app ...owsers; Tabular Data on the Web; Web linguistic changes; Web-based systems security; Web preferences; Web pattern semantics; Modeling web user activities; Twit
    11 KB (1,390 words) - 12:35, 18 May 2020
  • |Title=17th International Conference on Distributed Computing in Sensor Systems * Machine intelligence in distributed sensor systems and real time analytics
    2 KB (185 words) - 17:41, 22 January 2021
  • ...open collaboration technologies ranging from entirely new socio-technical systems to MediaWiki extensions * Architecture and design of open innovation systems
    6 KB (748 words) - 10:02, 30 April 2020
  • |Title=13th ACM Conference on Recommender Systems * Bias, bubbles and ethics of recommender systems
    1 KB (141 words) - 07:08, 18 May 2020
  • |Title=12th ACM Conference on Recommender Systems * Conversational recommender systems
    1 KB (120 words) - 14:53, 22 April 2020
  • |Title=11th ACM Conference on Recommender Systems * Conversational recommender systems
    1 KB (131 words) - 16:35, 21 April 2020
  • ==== Collections, Systems, and Management ==== Digital libraries: and archives preservation systems
    3 KB (361 words) - 14:48, 22 April 2020
  • |Title=8th International Workshop on Engineering Multi-Agent Systems ...ledge and expertise developed in the design and development of multi-agent systems (MAS), the systematic development of large-scale and open MAS still poses m
    8 KB (1,092 words) - 12:49, 22 April 2020
  • |Title=38th International Conference on Computer Safety, Reliability, and Security The 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP)
    3 KB (419 words) - 10:51, 19 June 2020
  • ==== Collections, Systems, and Management ==== Digital libraries: and archives preservation systems
    3 KB (363 words) - 14:44, 22 April 2020
  • * Autonomic computing and agent-based systems * Adaptive Systems
    4 KB (490 words) - 09:38, 23 April 2020
  • |Title=International Conference on Unmanned Aircraft Systems, ...ce, and technology standards, all contributing to building high-confidence systems. National and international organizations, agencies, industry and authoriti
    3 KB (454 words) - 14:16, 27 April 2020
  • |Title=International Conference on Unmanned Aircraft Systems ...ventspro/event/1331-icuas-18-international-conference-on-unmanned-aircraft-systems
    2 KB (265 words) - 15:42, 29 April 2020
  • |Title=14-th International Workshop on Advances in Information Security * Security of next generation Operating Systems
    2 KB (200 words) - 12:01, 28 April 2020
  • |Title=International Conference on Unmanned Aircraft Systems ...ntspro/event/1062-icuas-2017-international-conference-on-unmanned-aircraft-systems-icuas
    3 KB (385 words) - 15:55, 29 April 2020
  • * Internet, Web and Security Visualization * Visualization Tools and Systems for Simulation and Modeling
    3 KB (293 words) - 10:38, 15 May 2020
  • ...onal Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). * - Modeling and Simulation of Complex, Intelligent, Adaptive and Autonomous systems
    5 KB (640 words) - 13:03, 5 May 2020
  • The relentless progress of solid-state circuits and systems has a profound impact on our daily lives, changing the way we work, circuits and systems.
    6 KB (673 words) - 09:29, 6 May 2020
  • Continued advances in solid-state circuits and systems have brought evermore powerful communication and computation capabilities i ...management, nearthreshold/subthreshold systems, digital architectures and systems for emerging applications (e.g. virtual reality, autonomous vehicles).
    5 KB (629 words) - 09:36, 6 May 2020
  • ...ng together researchers in the fields of microarchitecture, compilers, and systems for technical exchange. The MICRO community has enjoyed having close intera ...privacy preserving computation, IoT/Cloud/Cyber-Physical-System security, security primitives, trusted execution environments, etc.
    4 KB (457 words) - 10:25, 6 May 2020
  • ...ng together researchers in the fields of microarchitecture, compilers, and systems for technical exchange. The MICRO community has enjoyed having close intera ...omplexity, predictability, quality of service, reliability, dependability, security, scalability, programmer productivity, etc.
    4 KB (431 words) - 10:40, 6 May 2020
  • ...ology and systems, covering ICs/SoCs, reconfigurable hardware and embedded systems, and embedded software. ...as telecom, wireless communications, multimedia, healthcare and automotive systems. Persons involved in innovative industrial designs are particularly encoura
    12 KB (1,651 words) - 13:30, 27 November 2020
  • * WSN Technologies and Systems * Multimedia and Virtual Reality Systems
    2 KB (175 words) - 10:44, 7 May 2020
  • * WSN Technologies and Systems * Multimedia and Virtual Reality Systems
    2 KB (174 words) - 10:43, 7 May 2020
  • * Big Data Analytics: Algorithms, Techniques, and Systems * Scalability and Parallelization using MapReduce, Spark and Related Systems
    2 KB (217 words) - 12:15, 7 May 2020
  • |Has host organization=USENIX The Advanced Computing Systems Association ...stem and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more.
    8 KB (1,078 words) - 09:27, 12 May 2020
  • |Has host organization=USENIX The Advanced Computing Systems Association Sponsored by USENIX, the Advanced Computing Systems Association
    6 KB (729 words) - 09:28, 12 May 2020
  • * Security/Surveillance * Vision Systems and Applications
    2 KB (195 words) - 21:16, 12 May 2020
  • * Security/Surveillance * Vision Systems and Applications
    2 KB (191 words) - 21:02, 12 May 2020
  • |Title=37th International Conference on Computer Safety, Reliability, and Security The 37th International Conference on Computer Safety, Reliability and Security (SAFECOMP)
    4 KB (475 words) - 10:23, 19 June 2020
  • ...and dynamic power, power and clock distribution, yield, manufacturability, security, reliability, and testability. ...ocessing, compute acceleration, networking, machine learning, and embedded systems.
    11 KB (1,541 words) - 15:35, 18 June 2020
  • * 2. Embedded Systems and Cyberphysical Systems: * 3. Embedded Systems Software:
    6 KB (739 words) - 15:08, 13 May 2020
  • * Internet, Web and Security Visualization * Visualization Tools and Systems for Simulation and Modeling
    5 KB (630 words) - 10:01, 15 May 2020
  • * Internet, Web and Security Visualization * Visualization Tools and Systems for Simulation and Modeling
    6 KB (735 words) - 11:44, 15 May 2020
  • * Software Systems to Support Big Data Computing * Algorithms and Systems for Big Data Search
    4 KB (563 words) - 15:55, 23 June 2020
  • * Software Systems to Support Big Data Computing * Algorithms and Systems for Big DataSearch
    5 KB (543 words) - 21:14, 18 May 2020
  • * Recommender systems * Security and intrusion detection
    2 KB (261 words) - 20:06, 20 May 2020
  • * New learning theories, models and systems * Privacy and security
    4 KB (515 words) - 16:39, 25 May 2020
  • * Machine learning theories, models and systems. * Knowledge discovery theories, models and systems.
    3 KB (308 words) - 16:50, 16 December 2020
  • ...ocial, sensor/IoT/IoE, and multimedia (audio, video, image, etc.) big data systems and applications. The conference adopts single-blind review policy. We expe * Software Systems to Support Big Data Computing
    9 KB (1,187 words) - 14:18, 27 May 2020
  • * Security and privacy for big data * Tools and systems for big data
    3 KB (389 words) - 06:51, 9 June 2020
  • |Title=28th IEEE International Conference on Fuzzy Systems * Fuzzy systems with big data and cloud computing, fuzzy analytics, and visualization
    2 KB (238 words) - 17:30, 6 May 2021
  • |Field=Database systems, Informations systems, multimedia * Economic Aspects of Security and Privacy
    2 KB (329 words) - 13:48, 23 June 2020
  • |Title=10th IEEE International Conference on Intelligent Systems |Homepage=https://www.ieee-is.org/intelligent-systems-2020/
    2 KB (239 words) - 14:17, 2 June 2020
  • * Non-charge-based devices and systems * Advanced power devices, modules and systems
    5 KB (795 words) - 15:37, 2 June 2020
  • |Title=8th IEEE International Conference on Intelli­gent Systems * Cognitive Systems
    2 KB (146 words) - 17:26, 2 June 2020
  • ...al-time analytics; Real-time data aggregation; Big Data and Industrial 4.0 systems; Internet and Crowdsourcing; Mobile and wearable networks; Smart sensing ne WSSA : Web Services-based Systems and Applications
    14 KB (1,804 words) - 13:49, 5 June 2020
  • ...rmation systems; Adaptive approaches for mobile computing; Mobile software systems; Context- and Location-aware services; Mobile Cloud services; Mobile social ...ocalization; Industrial environments; Aerial vehicles; Non-RSS range-based systems; Time of Flight; Range modeling; Velocity estimation; Calibration & Auto-ca
    7 KB (918 words) - 13:51, 5 June 2020
  • * Multimedia security, privacy and forensics * Multimedia software, hardware and application systems
    1 KB (140 words) - 17:50, 9 June 2020
  • * Multimedia security, privacy and forensics * Multimedia software, hardware and application systems
    1 KB (140 words) - 18:05, 9 June 2020
  • * Multimedia Privacy, Security and Content Protection * Multi-Camera and Multi-View Systems
    2 KB (240 words) - 20:30, 10 June 2020
  • * Multimedia Privacy, Security and Content Protection * Multi-Camera and Multi-View Systems
    2 KB (220 words) - 14:09, 11 June 2020
  • * - Multimedia Privacy, Security and Content Protection * - Multi-Camera and Multi-View Systems
    5 KB (552 words) - 21:42, 10 June 2020
  • * Evolutionary learning systems * Multi-agent based complex systems
    5 KB (691 words) - 11:40, 11 June 2020
  • * Learning systems * Multi-agent systems
    6 KB (720 words) - 12:20, 11 June 2020
  • * Learning systems * Multi-agent systems
    5 KB (670 words) - 09:42, 12 June 2020
  • * Learning systems * Multi-agent systems
    6 KB (784 words) - 12:58, 15 June 2020
  • ...icles; Potential radicalization on social media; Blockchain and healthcare systems; Risk-based human behavior profiling; Forensic recovery of cloud evidence; ...al health services; Monitoring mission-critical services; Preventing Cyber-systems attacks; Identity control and management; Predictive traffic assessment; Op
    17 KB (2,088 words) - 12:49, 14 June 2020
  • ...prediction systems; Social multimedia as sensors; Sentiment representation systems ...agents and multi-agent systems; Agent-mining intelligent applications and systems; Automated retrieval of multimedia streams; Automated retrieval from multim
    11 KB (1,356 words) - 12:56, 14 June 2020
  • |Title=36th International Conference on Computer Safety, Reliability, and Security ...dependable application of computers in safety-related and safety-critical systems.
    4 KB (457 words) - 11:48, 17 June 2020
  • * A02 Array antennas, antenna systems and architectures * A12 Reflector, feed systems, and components
    6 KB (885 words) - 12:35, 22 June 2020
  • |Title=Conference on the Decision and Game Theory for Security ...eneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically-re
    401 bytes (52 words) - 06:54, 23 June 2020
  • |Title=11th Conference on Decision and Game Theory for Security 2020 Conference on Decision and Game Theory for Security
    3 KB (353 words) - 12:35, 23 June 2020
  • |Title=9th Conference on Decision and Game Theory for Security 2018 Conference on Decision and Game Theory for Security
    3 KB (423 words) - 11:27, 23 June 2020
  • |Title=8th Conference on Decision and Game Theory for Security 2017 Conference on Decision and Game Theory for Security
    3 KB (407 words) - 11:20, 23 June 2020
  • |Field=Database systems, Informations systems, Multimedia, World wide web, * Economic Aspects of Security and Privacy
    2 KB (291 words) - 14:12, 23 June 2020
  • * RADAR Sub-systems and Phenomenology * RADAR Architectures and Systems
    2 KB (231 words) - 18:01, 25 June 2020
  • |Field=Database systems, Informations systems, Multimedia, World wide web, * Economic Aspects of Security and Privacy
    5 KB (601 words) - 07:58, 24 June 2020
  • |Field=Database systems, Informations systems, Multimedia, World wide web, * Economic Aspects of Security and Privacy
    3 KB (409 words) - 11:05, 24 June 2020
  • * RADAR Sub-systems and Modelling * R02* Antenna Systems: Theory, Modelling, Calibration and Measurements
    2 KB (300 words) - 19:03, 25 June 2020
  • * ● Security Radar * Radar Systems:
    2 KB (258 words) - 18:42, 26 June 2020
  • * Signal processing education systems * Information forensics and security
    2 KB (219 words) - 11:01, 22 August 2023
  • * •Ultrasound Systems * •Optical Systems
    2 KB (222 words) - 21:51, 29 June 2020
  • |Title=The Fifteenth International Conference on Systems and Networks Communications ICSNC 2020, The Fifteenth International Conference on Systems and Networks Communications
    13 KB (1,636 words) - 11:51, 10 July 2020
  • * Models of Concurrent, Distributed, and Mobile Systems * Models of Reactive, Hybrid and Stochastic Systems
    4 KB (556 words) - 06:42, 26 August 2020
  • * Algorithmic Aspects of Security and Privacy * Formal and Logical Aspects of Security and Privacy
    4 KB (503 words) - 06:44, 26 August 2020
  • * probabilistic systems * real-time systems
    4 KB (525 words) - 11:27, 27 August 2020
  • * probabilistic systems * real-time systems
    4 KB (537 words) - 14:06, 27 August 2020
  • |Title=IEEE Intelligent Transportation Systems Conference Air, Road, Rail and Waterways Transportation Network and Systems
    1 KB (156 words) - 13:41, 10 July 2020
  • |Title=23rd IEEE International Conference on Intelligent Transportation Systems ...ted to submit papers that fall into the area of Intelligent Transportation Systems. Topics of interest include, but are not limited to, the following:
    1 KB (175 words) - 13:45, 10 July 2020
  • |Title=21st IEEE International Conference on Intelligent Transportation Systems ...ted to submit papers that fall into the area of Intelligent Transportation Systems.
    2 KB (266 words) - 13:43, 10 July 2020
  • ...alysis, design, implementation, testing, and maintenance of large software systems. ASE 2017 invites high quality contributions describing significant, origin * Component-based service-oriented systems
    5 KB (557 words) - 07:07, 13 July 2020
  • |Title=The Ninth International Conference on Advances in Vehicular Systems, Technologies and Applications VEHICULAR 2020, The Ninth International Conference on Advances in Vehicular Systems, Technologies and Applications
    8 KB (915 words) - 19:45, 9 July 2020
  • |Title=The Ninth International Conference on Intelligent Systems and Applications INTELLI 2020, The Ninth International Conference on Intelligent Systems and Applications
    5 KB (599 words) - 19:46, 9 July 2020
  • ...nteractive entertainment; Expressing emotions in multimedia and multimodal systems; Emotional behavior in storytelling; Emotions in geographical and cultural ...gmented reality (Google Glass, Hololens, etc. ); Multimedia and multimodal systems; Smart cities; Interaction design
    9 KB (1,068 words) - 19:47, 9 July 2020
  • |Title=The Tenth International Conference on Advanced Collaborative Networks, Systems and Applications ...20, The Tenth International Conference on Advanced Collaborative Networks, Systems and Applications
    8 KB (897 words) - 17:15, 22 March 2021
  • ...DN Access control; 5G Edge caching techniques; Performance in 5G networks; Security and privacy in data-centers; Identity and privacy management; QoS (Quality ...and discovery of things on the Internet; Crowd-sourcing and things; Trust, security and privacy in Internet of Things; Lightweight implementations of cryptogra
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ..."Spectrum Allocation and Management", "Wireless and mobile technologies", "Security in wireless and mobile environment" Future in mobile systems
    11 KB (1,335 words) - 02:28, 10 July 2020
  • ...g and telecommunications","Knowledge virtualization","Security in network, systems, and applications","IPv6 Today - Technology and deployment" ...Online shopping; Social commerce acceptance; Digital multi-modal transport systems and crowdsensing; Mobile technologies and self-healthcare; Online education
    18 KB (2,036 words) - 02:36, 10 July 2020
  • (A) SAR Systems and Sensors A1 Spaceborne SAR Systems and Missions
    2 KB (323 words) - 11:18, 10 July 2020
  • Building user-centric systems User centricity: I-centric versus We-centric; User-centric in service-centric systems; User-centric business models; User-centric requirements in network-centric
    10 KB (1,232 words) - 16:20, 22 March 2021
  • ...nalytics; Software for pervasive systems; Software for (self)-configurable systems; Search-based software; Green-oriented software engineering; Symbolic analy ...ased software development; Service-oriented software development; Software security-based development; Aspect-oriented software development
    13 KB (1,573 words) - 12:00, 10 July 2020
  • ...ulations high performance systems; Simulation of Internet of Vehicle (IoV) systems ...aptation simulation; Simulation methodologies for autonomic and autonomous systems; Virtual reality simulation methodologies; Virtualization simulation; Const
    12 KB (1,421 words) - 12:02, 10 July 2020
  • ...nd health; Platform interoperability; Semantic interoperability; Diagnosis systems; Applied health informatics; User interfaces and visualization ...nated-care models; Integrated behavioral and physical health platforms and systems; Dialectical behavior therapy; Cognitive behavioral therapy; Trauma-focused
    8 KB (970 words) - 16:50, 14 July 2020
  • Ambient devices, applications and systems Business model and business cases, security, privacy and trust, Real-life implementations
    6 KB (750 words) - 17:55, 13 January 2021
  • ...ge new ideas, problems, and experience on how to analyze and test software systems. ISSTA 2021 will be held in Aarhus, Denmark, on July 12-16, 2021, co-locate * Andreas Zeller, CISPA Helmholtz Center for Information Security, Germany
    3 KB (306 words) - 12:12, 16 July 2020
  • |Title=12th International Conference on Hybrid Artificial Intelligent Systems The 12th International Conference on Hybrid Artificial Intelligent Systems (HAIS)
    3 KB (382 words) - 12:25, 22 July 2020
  • |Title=13th International Conference on Hybrid Artificial Intelligent Systems The 13th International Conference on Hybrid Artificial Intelligent Systems (HAIS)
    2 KB (200 words) - 09:20, 24 July 2020
  • |Title=14th International Conference on Hybrid Artificial Intelligent Systems The 14th International Conference on Hybrid Artificial Intelligent Systems (HAIS)
    3 KB (392 words) - 11:02, 24 July 2020
  • |Title=15th International Conference on Hybrid Artificial Intelligent Systems The 15th International Conference on Hybrid Artificial Intelligent Systems (HAIS’20)
    6 KB (871 words) - 12:16, 28 July 2020
  • |Title=17th World Congress of International Fuzzy Systems Association ...ciation and 9th International Conference on Soft Computing and Intelligent Systems'''
    4 KB (422 words) - 08:30, 29 July 2020
  • |Title=36th Information Systems Education Conference * Cloud-based Systems
    1 KB (159 words) - 13:38, 29 July 2020
  • * − Precise timing for GNSS and terrestrial systems * − Authentication, security and/or privacy in navigation systems and location-aware communication
    2 KB (288 words) - 12:10, 30 July 2020
  • * – Precise timing for GNSS and terrestrial systems * – Security and privacy in joint communication and navigation systems
    2 KB (178 words) - 12:38, 30 July 2020
  • * Precise timing for GNSS and terrestrial systems * Security and privacy in joint communication and navigation systems
    1 KB (169 words) - 12:52, 30 July 2020
  • |Field=Networking, Internet, Security, Sensor, Hardware, Technologies ...nferencing systems; Large-scale datacenter networks; Traffic-aware control systems; Short-term traffic forecasting; Energy efficiency; Differentiated services
    7 KB (904 words) - 12:32, 22 January 2021
  • ...=The Fourteenth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies
    15 KB (1,886 words) - 16:16, 25 August 2020
  • ...ntation; Photonic integrated circuits; Opto-electro-mechanical sensors and systems ...-based technologies; Ultrasonic technologies; Film-bases sensors; Resonant systems; Optical interferometry; Micro-and nanofabrication; Coating materials
    9 KB (1,068 words) - 16:15, 25 August 2020
  • ...chronization; Tracking and partial position information; Failure handling; Security and authentication ...s and the Web; Integration with other systems (e.g., Web-based information systems, process control, enterprise software, etc.); Target tracking; RFID tags; T
    15 KB (1,880 words) - 14:45, 27 August 2020
  • ...d mobile networks; Heterogeneous optical networks; 5G wireless and mm-Wave systems; Cognitive radars; Signal processing for crowd dynamics; Small-scale prosum ...is (Data and DataFlows); CNN Interference systems; Programmable platforms; Security access; Automatic acceleration platforms; Reconfigurable hardware; Clouds F
    8 KB (908 words) - 15:13, 14 January 2021
  • ...he Sixth International Conference on Fundamentals and Advances in Software Systems Integration |Field=Networking,Internet,Security,Sensor,Hardware,Technologies
    6 KB (769 words) - 14:09, 24 August 2020
  • ** In-vehicle communication and networking systems ** Security, privacy, liability, and dependability of vehicular networks
    4 KB (493 words) - 23:17, 12 October 2020
  • Grid-oriented energy systems Smart Sensing, Metering Systems, Smart Cities
    6 KB (815 words) - 20:27, 30 July 2020
  • ...al Conference on Tools and Algorithms for the Construction and Analysis of Systems ...al Conference on Tools and Algorithms for the Construction and Analysis of Systems'''
    2 KB (293 words) - 14:54, 3 August 2020
  • '''2. Security, Privacy, and Trust''' Physical layer security
    1 KB (164 words) - 08:17, 4 August 2020
  • Information Systems Management (business and technical) topics of interest * Information Systems issues
    9 KB (896 words) - 16:31, 6 August 2020
  • ...aces; Speech and natural language interfaces; Interfaces for collaborative systems; Interfaces for restricted environments; Internationalization and reflectio Human-centered process optimization and systems integration; Human-centered chains; Human-centered risk management and nano
    16 KB (1,964 words) - 13:34, 7 January 2021
  • |Title=8th International Conference on Availability, Reliability, and Security The 8th International Conference on Availability, Reliability and Security (ARES) 2013
    4 KB (468 words) - 11:39, 21 August 2020
  • |Title=9th International Conference on Availability, Reliability and Security The 9th International Conference on Availability, Reliability and Security (ARES) 2014
    4 KB (538 words) - 11:52, 21 August 2020
  • |Title=14th International Conference on Availability, Reliability, and Security The 14th International Conference on Availability, Reliability, and Security (ARES) 2019
    5 KB (627 words) - 10:49, 25 August 2020

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)