Search results

Jump to: navigation, search

Page title matches

Page text matches

  • Service Oriented Systems were born with the aim of building large adaptive applications as compositi ...ting with classic Web Services. Finally, features like Quality of Service, security and dependability need to be taken seriously into account, and this investi
    7 KB (957 words) - 15:15, 11 August 2008
  • |Title=The 10th International Conference on Mobile Data Mangement (MDM'09): Systems, Services and Middleware scope to cover research issues in mobile systems, services and middleware.
    13 KB (1,468 words) - 01:23, 22 August 2008
  • | Title=The 3rd KES International Symposium on Agents and Multi-agent Systems - Technologies and applications (KES-AMSTA-09) ...fic research in the technologies and applications of agent and multi-agent systems.
    6 KB (777 words) - 22:54, 14 August 2008
  • ====Computer security and reliability==== ==== Information systems (Business informatics) ====
    6 KB (714 words) - 12:19, 11 December 2020
  • *Network Security *Communication Systems and Networks
    5 KB (571 words) - 09:22, 19 July 2019
  • * Mobile/Wireless computing systems and services in pervasive computing * Programming paradigms for pervasive systems
    12 KB (1,560 words) - 15:03, 27 August 2008
  • ...011 International Conference of Computational Intelligence and Intelligent Systems The 2011 International Conference of Information Security and Internet Engineering
    3 KB (454 words) - 12:34, 8 October 2020
  • systems, biomedical informatics, virtual digital libraries, and * Data Streams and Publish-Subscribe Systems
    9 KB (1,189 words) - 14:53, 28 August 2008
  • ...m for the communication of research advances on the principles of database systems. This year, for the first time, ICDT will be held jointly with [[EDBT 2009] ...uctive databases and knowledge bases; Distributed databases; Integrity and security; Logic and databases; Multimedia databases; Query optimization; Query proce
    5 KB (753 words) - 18:59, 25 June 2012
  • system of systems, etc. inter-operability, security, trusted and dependable systems, fault
    5 KB (715 words) - 17:43, 11 September 2008
  • |Title=International Conference on Autonomous Agents and Multi-Agent Systems |Field=Multi-Agent Systems
    10 KB (1,371 words) - 16:14, 12 November 2020
  • Software Systems The Verisoft Approach to Systems Verification
    5 KB (686 words) - 12:27, 12 September 2008
  • ...cial issues of a high quality international journal and also in Journal of Security and Communication Networks published by John Wiley & Sons. * Security in Wireless and Pervasive systems
    5 KB (645 words) - 18:19, 15 September 2008
  • ...d applications, and interactions of these applications with other types of systems. Management aspects related to these applications and challenges on special ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d
    18 KB (2,408 words) - 02:37, 16 December 2008
  • |Title=8th International Conference on Information Systems Technology |Field=Information systems
    7 KB (763 words) - 12:25, 6 October 2011
  • ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...Spatial databases; Time-series databases; RDF stores; Hybrid DB management systems
    11 KB (1,371 words) - 12:28, 18 May 2020
  • ...emedicine, bioinformatics, finance and marketing, geographical positioning systems put pressure on database communities to push the ‘de facto’ methods to ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.)
    11 KB (1,446 words) - 18:26, 13 October 2008
  • |Title=The 5th International Conference on Open Source Systems (F/OSS 2009) ** Testing, assuring and certifying F/OSS quality and security
    10 KB (1,349 words) - 16:42, 24 September 2008
  • Software Security Agent-Based Software Systems
    2 KB (293 words) - 10:35, 24 June 2011
  • ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust
    34 KB (4,565 words) - 22:20, 10 January 2018

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)