Search results

Jump to: navigation, search
  • |Title=The Fourth International Conference on Internet and Web Applications and Services he Fourth International Conference on Internet and Web Applications and Services) continues a series of co-located events
    18 KB (2,408 words) - 02:37, 16 December 2008
  • ...self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-x operations to the maximum extent possible without human in ...that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interact
    9 KB (1,216 words) - 17:32, 14 October 2008
  • Most of critical activities in the areas of communications (telephone, Internet), energy & fluids (electricity, gas, water), transportation (railways, airl ...ing. Considering system and feature dependability becomes crucial for data protection and recoverability when implementing mission critical applications and serv
    15 KB (2,175 words) - 21:03, 19 March 2013
  • ...r, PVR, Interconnects, Game Systems, Interactive and Directed Programming, Internet Integration, Next-Generation DVD, Displays Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability, Application Control, H
    3 KB (354 words) - 20:06, 14 October 2008
  • However, for reasons such as: password protection, FORM based interfaces published as special issue of International Journal on WWW/Internet
    7 KB (875 words) - 23:10, 14 October 2008
  • infrastructure protection and operation, emergency and crisis intervention, healthcare servic Internet to reduce cost of deployment and maintenance and to enhance reachability an
    5 KB (549 words) - 17:15, 5 July 2020
  • SIGNAL-IMAGE TECHNOLOGY & INTERNET- BASED SYSTEMS (SITIS'08) - Digital Rights Management and Intellectual Property Protection
    4 KB (587 words) - 23:30, 14 October 2008
  • ...e physical world in multiple ways, and at multiple scales, from the global Internet scale down to micro- and nano-devices. Many of these devices are highly mob ...e physical world in multiple ways, and at multiple scales, from the global Internet scale down to micro- and nano-devices. Many of these devices are highly mob
    5 KB (694 words) - 23:11, 14 October 2008
  • Internet Security & Applications Virus, worms, Trojon Protection
    5 KB (628 words) - 23:15, 14 October 2008
  • ...entation (rather than theory). A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security tec The proceedings are published by the Internet Society.
    5 KB (673 words) - 23:19, 14 October 2008
  • ...esearch can be used to enable innovation and defeat the "dark side" of the Internet. The theme of PST 2008 is �??PST - Enabling Innovation.�?? Like in the * Critical Infrastructure Protection
    6 KB (736 words) - 23:20, 14 October 2008
  • - Multimedia security and content protection - Multimedia analysis and social media on the Internet
    3 KB (425 words) - 23:20, 14 October 2008
  • Mobile learning became a fact, due to the technical accessibility and Internet communications. Many online classes, learning systems, university curricula ...dditionally, they require new monitoring and management paradigms, as self-protection, self-diagnosing, self-maintenance become core design features.
    6 KB (765 words) - 23:26, 14 October 2008
  • * Critical infrastructure protection. * Internet dependability and quality of service.
    4 KB (528 words) - 23:27, 14 October 2008
  • ...n, process automation, CAD/CAM/CAT/CIM and LANs, industrial application of internet technologies, multimedia, wireless communications, data privacy and securit ...and FACTS, Power market, Power distribution network and automation, Power protection, SCADA, EMS, WAMS and substation automation, Green power.
    4 KB (504 words) - 23:33, 14 October 2008
  • International Conference on Internet and Web Applications and Services, as web personalization and protection of users privacy in service
    8 KB (1,075 words) - 23:52, 14 October 2008
  • ...es and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software d Internet security; Security in wireless; Sensor/cellular network security; Ad hoc ne
    13 KB (1,617 words) - 19:03, 24 November 2008
  • o Internet broadcasting * Optical network protection and restoration (single layer and multilayer)
    14 KB (1,518 words) - 13:01, 18 January 2009
  • * Content protection and DRM for UCS * Journal of Internet Technology, MoE, Taiwan
    6 KB (793 words) - 15:12, 1 October 2020
  • - Denial of Service Protection - Internet and Router Security
    8 KB (967 words) - 17:07, 27 February 2009

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)