Search results

Jump to: navigation, search
  • |Title=International Conference on Information Society (i-Society 2010) - Geographic information systems
    4 KB (507 words) - 22:37, 18 November 2009
  • Mink Spaans (NED), TNO Defence, Security and Safety; ==IC2J Editorial Staff and Contact Information==
    2 KB (233 words) - 23:39, 18 November 2009
  • dissemination of information in social systems. With the rapid development of information and communication technologies,
    4 KB (449 words) - 11:04, 26 November 2009
  • * Application security * Blended Internet security methods
    5 KB (607 words) - 18:01, 3 December 2009
  • ...d validation. E-business agents. Pervasive computing. Privacy, safety, and security. ...g. Case studies and reports on deployments. Computational infrastructures. Information retrieval. Web services and semantic web. E-learning sys-tems. E-institutio
    6 KB (733 words) - 18:19, 24 September 2020
  • ...Programme, those nations that succeed in harnessing the potential of ICT (Information and Communication Technology) can look forward to greatly expand economic g ...in his/her own environment), there are important related concern, such as security and privacy, which need to be addressed also, since providing powerful (rem
    6 KB (889 words) - 13:48, 26 February 2010
  • |Title=EIGHTH INTERNATIONAL CONFERENCE on PRIVACY, SECURITY, and TRUST |Field=Privacy, Security, and Trust
    4 KB (484 words) - 14:20, 14 December 2009
  • 11. New Information Technology and Education Digital Campus Construction and Data Security Management
    2 KB (195 words) - 04:32, 7 January 2010
  • |Title=7th International Conference on TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS |Field=Computer security and reliability
    7 KB (982 words) - 19:13, 3 January 2010
  • |Title=3rd International Workshop on Wireless Multimedia Computing and Security Services ...ward for a deeper understanding in wireless multimedia computing (WMC) and security services.
    3 KB (497 words) - 03:43, 28 February 2010
  • |Field=Information Security, Cryptography
    3 KB (373 words) - 13:50, 19 January 2010
  • ...ometrics Technologies and Applications, Pattern Recognition and Biometrics Security, Bioinformatics and IT Applications in the above themes. Information retrieval and internet applications
    3 KB (382 words) - 18:27, 20 January 2010
  • •Robots for Security There will be an exhibition site at the conference. Information for prospective exhibitors will be available on the web site.
    3 KB (413 words) - 05:21, 26 January 2010
  • |Title=3rd International Conference on Security of Information and Networks |Field=Computer security
    10 KB (1,270 words) - 17:12, 20 April 2010
  • |Title=The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems The 5th Int'l Conference on Bio-Inspired Models of Network, Information and Computing Systems
    3 KB (338 words) - 16:53, 27 December 2015
  • ...d software development. The conference tracks are "Software Engineering", "Information Systems and Data Management", "Programming Languages", "Distributed and Par - Enterprise Information Systems
    3 KB (392 words) - 13:50, 30 April 2020
  • |Title=International Conference on Wireless Information Networks and Systems Conference name: International Conference on Wireless Information Networks and Systems (WINSYS)
    4 KB (379 words) - 15:35, 5 February 2010
  • ...to representation, storage, authentication and communication of multimedia information. * › Multimedia Security
    3 KB (310 words) - 15:37, 5 February 2010
  • |Title=International Conference on Security and Cryptography |Field=Computer security and reliability
    4 KB (409 words) - 15:40, 5 February 2010
  • ..., signal processing and multimedia applications, and wireless networks and information systems. These are the main knowledge areas that define the six component c
    2 KB (180 words) - 15:49, 5 February 2010

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)