Search results
Create the page "Information Security" on this wiki! See also the search results found.
- |Title=The 9th ACM/IEEE International Conference on Information Processing in Sensor Networks The 9th ACM/IEEE Conference on Information Processing in Sensor Networks8 KB (1,119 words) - 09:57, 27 February 2020
- ...ry, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is ? Security and privacy5 KB (571 words) - 11:35, 2 August 2009
- More information: http://ispan2009.comm.ccu.edu.tw/speakers.html -Journal of Information and Science Engineering (JISE) (SCI)4 KB (422 words) - 11:36, 2 August 2009
- Conference Venue information Information and Communication Technology Management4 KB (462 words) - 11:36, 2 August 2009
- ...ected to the Internet. There is a need for those networks to provide their information in an interpretable form and to reduce the complexity of accessing sensor s ...onse time, resource consumption, throughput, availability, reliability and security.9 KB (1,206 words) - 11:40, 2 August 2009
- LTC 2009 - Call for papers and important information ...ay technological environment. Since the very beginning of the Computer and Information Age these fields have influenced and stimulated each other. The European U14 KB (1,872 words) - 19:26, 2 August 2009
- Human Resource Management Information System and the Security Technology2 KB (277 words) - 16:38, 27 December 2015
- | Title = IEEE International Symposium on Information Theory | Field = Information theory2 KB (217 words) - 11:36, 2 August 2009
- * Information-theoretic aspects of cognitive radio networks * Trust and security issues4 KB (549 words) - 11:36, 2 August 2009
- Submitted for indexing: Elsevier's EI Compendex Database, EI's Engineering Information Index RTSEC: Security for Internet-based real-time systems14 KB (1,651 words) - 15:56, 15 February 2017
- |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security3 KB (352 words) - 12:39, 11 August 2009
- |Title= 12th International Conference on Enterprise Information Systems Conference name: 12th International Conference on Enterprise Information Systems (ICEIS)5 KB (552 words) - 17:06, 12 August 2009
- |Title=17th Annual Network and Distributed System Security Symposium |Field=Computer security and reliability6 KB (766 words) - 10:54, 26 April 2010
- |Title=International Conference on Information Visualization Theory and Applications Conference name: International Conference on Information Visualization Theory and Applications (IVAPP)2 KB (245 words) - 18:52, 7 January 2010
- |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security5 KB (667 words) - 14:27, 13 September 2009
- ...benchmarking, review, inspection and walkthrough, reliability, safety and security design tools, testing tools, information systems engineering, quality tools4 KB (583 words) - 12:17, 25 November 2009
- |Title=Special Issue on Ubiquitous Computing Security Systems |Field=Ubiquitous Computing Security Systems1 KB (187 words) - 04:49, 23 September 2009
- * How does security address the legal and ethical issues in emerging ubiquitous computing syste ===For More Information===2 KB (205 words) - 05:10, 23 September 2009
- ...great impact on the development of new generation intelligent distributed information systems. The aim of this symposium is to bring together researchers involve - Information extraction and retrieval in distributed environments4 KB (508 words) - 13:29, 13 July 2010
- |Title=6th Annual Conference on Peace and Security |Field=Security3 KB (359 words) - 00:15, 17 November 2009