Search results

Jump to: navigation, search
  • ...al studies, systematic reviews, conceptual explorations, innovative ideas, critical appraisals, etc. related to: * knowledge management and engineering,
    7 KB (959 words) - 14:51, 27 December 2015
  • ...First International Workshop on Dependability and Security in Complex and Critical Information Systems ...First International Workshop on Dependability and Security in Complex and Critical Information Systems
    7 KB (960 words) - 17:48, 14 October 2008
  • Most of critical activities in the areas of communications (telephone, Internet), energy & f ...s crucial for data protection and recoverability when implementing mission critical applications and services.
    15 KB (2,175 words) - 21:03, 19 March 2013
  • IBM TORONTO SOFTWARE LABORATORY, IBM CENTERS FOR ADVANCED STUDIES IBM Centers for Advanced Studies. This "Meeting of Minds" provides an
    9 KB (1,193 words) - 22:53, 14 October 2008
  • ...ses on the human actor and software agent collaboration in safety and time critical systems-of-systems. This focus includes topics ranging from: In addition, HCP 2008 welcome progress, innovations, demonstrations and case-studies on the following well-known (non-exhaustive) list of HCP-related topics:
    4 KB (518 words) - 14:42, 27 December 2015
  • multilingual document management/workflow case studies of technology-based solutions
    4 KB (576 words) - 23:06, 14 October 2008
  • case studies on practical uses of current translation systems in government and industry ...how MT is used to meet business needs such as just-in-time localization of critical information, provision of technical support information, or creation of pre
    16 KB (2,200 words) - 20:51, 18 February 2021
  • * creation, delivery and management of humanities digital resources * collaboration between libraries and scholars in the creation, delivery, and management of humanities digital resources
    7 KB (1,033 words) - 23:08, 14 October 2008
  • | Acronym = SPECIAL ISSUE ON MISSION CRITICAL NETWOR 2009 | Title = JSAC CALL FOR PAPERS SPECIAL ISSUE ON MISSION CRITICAL NETWORKING
    5 KB (549 words) - 17:15, 5 July 2020
  • |Title=The First International Workshop on the Critical Computer Based Systems ...practical results relevant to the engineering of highly sophisticated and critical systems that are used in automotive, avionics, railway, naval, chemical, nu
    5 KB (660 words) - 16:46, 27 December 2015
  • ..., strategies for promoting, adopting, using Open Source Solutions and case studies or success stories in specific domains. ..., strategies for promoting, adopting, using Open Source Solutions and case studies or success stories in specific domains.
    5 KB (697 words) - 23:18, 14 October 2008
  • * Run-time management of resilience requirements ...butions of in-depth description of practitioner experience reports or case studies within the scope of SERENE are invited. Submissions should include sufficie
    9 KB (1,264 words) - 18:14, 8 November 2008
  • successfully used to program real-time and safety critical applications, from nuclear power plant management layer to Airbus air
    6 KB (659 words) - 23:18, 14 October 2008
  • ...al studies, systematic reviews, conceptual explorations, innovative ideas, critical appraisals, etc. related to: knowledge management and engineering,
    4 KB (463 words) - 13:54, 18 October 2008
  • * Implementation, deployment and management of network security policies. ...ection: protocols, implementations, metering, watermarking, digital rights management.
    5 KB (673 words) - 23:19, 14 October 2008
  • | Title = Joint iTrust and PST Conferences on Privacy, Trust Management and Security ...ual meeting and conference of the newly formed IFIP Working Group on Trust Management (IFIP WG 11.11). IFIPTM 2007 provided a truly global platform for the repor
    4 KB (565 words) - 23:20, 14 October 2008
  • real-time, safety-critical, embedded, or mobile systems * scheduling and resource management
    2 KB (254 words) - 23:22, 14 October 2008
  • * SECMAN: Security management ...onse planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance
    13 KB (1,617 words) - 19:03, 24 November 2008
  • guaranteeing service timeliness is becoming a critical feature that elevates decision technology, database management and so on. RTSOAA 2009 welcomes the
    7 KB (922 words) - 00:58, 9 January 2009
  • ...resent an opportunity for educators to develop new skills and to stimulate critical debate on theories, approaches, principles and applications of m-learning, ** Case studies in mLearning
    11 KB (1,366 words) - 16:44, 14 January 2009

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)