Search results

Jump to: navigation, search
  • |Title=The 9th ACM/IEEE International Conference on Information Processing in Sensor Networks The 9th ACM/IEEE Conference on Information Processing in Sensor Networks
    8 KB (1,119 words) - 09:57, 27 February 2020
  • ...ry, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is ? Security and privacy
    5 KB (571 words) - 11:35, 2 August 2009
  • More information: http://ispan2009.comm.ccu.edu.tw/speakers.html -Journal of Information and Science Engineering (JISE) (SCI)
    4 KB (422 words) - 11:36, 2 August 2009
  • Conference Venue information Information and Communication Technology Management
    4 KB (462 words) - 11:36, 2 August 2009
  • ...ected to the Internet. There is a need for those networks to provide their information in an interpretable form and to reduce the complexity of accessing sensor s ...onse time, resource consumption, throughput, availability, reliability and security.
    9 KB (1,206 words) - 11:40, 2 August 2009
  • LTC 2009 - Call for papers and important information ...ay technological environment. Since the very beginning of the Computer and Information Age these fields have influenced and stimulated each other. The European U
    14 KB (1,872 words) - 19:26, 2 August 2009
  • Human Resource Management Information System and the Security Technology
    2 KB (277 words) - 16:38, 27 December 2015
  • | Title = IEEE International Symposium on Information Theory | Field = Information theory
    2 KB (217 words) - 11:36, 2 August 2009
  • * Information-theoretic aspects of cognitive radio networks * Trust and security issues
    4 KB (549 words) - 11:36, 2 August 2009
  • Submitted for indexing: Elsevier's EI Compendex Database, EI's Engineering Information Index RTSEC: Security for Internet-based real-time systems
    14 KB (1,651 words) - 15:56, 15 February 2017
  • |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security
    3 KB (352 words) - 12:39, 11 August 2009
  • |Title= 12th International Conference on Enterprise Information Systems Conference name: 12th International Conference on Enterprise Information Systems (ICEIS)
    5 KB (552 words) - 17:06, 12 August 2009
  • |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability
    6 KB (766 words) - 10:54, 26 April 2010
  • |Title=International Conference on Information Visualization Theory and Applications Conference name: International Conference on Information Visualization Theory and Applications (IVAPP)
    2 KB (245 words) - 18:52, 7 January 2010
  • |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security
    5 KB (667 words) - 14:27, 13 September 2009
  • ...benchmarking, review, inspection and walkthrough, reliability, safety and security design tools, testing tools, information systems engineering, quality tools
    4 KB (583 words) - 12:17, 25 November 2009
  • |Title=Special Issue on Ubiquitous Computing Security Systems |Field=Ubiquitous Computing Security Systems
    1 KB (187 words) - 04:49, 23 September 2009
  • * How does security address the legal and ethical issues in emerging ubiquitous computing syste ===For More Information===
    2 KB (205 words) - 05:10, 23 September 2009
  • ...great impact on the development of new generation intelligent distributed information systems. The aim of this symposium is to bring together researchers involve - Information extraction and retrieval in distributed environments
    4 KB (508 words) - 13:29, 13 July 2010
  • |Title=6th Annual Conference on Peace and Security |Field=Security
    3 KB (359 words) - 00:15, 17 November 2009

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)