Search results
Create the page "Ubiquitous Computing Security Systems" on this wiki! See also the search results found.
- ...However, there remains the open question of how and when to use ubiquitous computing for ward data management. The use of a mobile wireless infrastructure can lead to security and reliability problems. Mobile devices often have usability6 KB (771 words) - 23:42, 14 October 2008
- | Title = The 3rd International Conference on Ubiquitous Information Management and Communication ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network2 KB (303 words) - 23:42, 14 October 2008
- | Title = Third International Workshop on Pervasive Systems | Field = Ubiquitous computing6 KB (763 words) - 23:42, 14 October 2008
- |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols13 KB (1,617 words) - 19:03, 24 November 2008
- ...digm/; Recovering and fault-tolerance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Context-aware and context recognition; ...y-tolerant IP networks; Trustworthy Internet; Mobile computing; Ubiquitous computing; Reliability; Resilience; Scalability; User and service mobility; Wireless7 KB (883 words) - 17:35, 7 January 2021
- | Title = IEEE-RIVF International Conference on Computing and Communication Technologies The conference solicits submission of research papers in all major areas of computing, especially results of inter-disciplinary research work combining state-of-5 KB (567 words) - 12:58, 18 January 2009
- part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...nals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.5 KB (633 words) - 12:58, 18 January 2009
- | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)16 KB (2,178 words) - 12:59, 18 January 2009
- ...e 1st International Workshop on Security, Reliability and Quality in Cloud Computing Cloud computing gained prominence in 2007 and is picking up momentum as the next “big5 KB (624 words) - 13:00, 18 January 2009
- Ubiquitous Intelligence and Computing (UIC-09) the Internet of Things. The Ubiquitous Computing community has already6 KB (798 words) - 13:01, 18 January 2009
- | Title = IADIS International Conference Intelligent Systems and Agents 2009 IADIS INTERNATIONAL CONFERENCE INTELLIGENT SYSTEMS AND AGENTS 20094 KB (588 words) - 13:01, 18 January 2009
- Dataspace support or management systems provide co-ordinated access to Workshops and for exhibition of research and commercial systems.4 KB (568 words) - 13:01, 18 January 2009
- | Title = The 2009 International Workshop on Ubiquitous Computing Security | Field = Ubiquitous computing6 KB (852 words) - 13:02, 18 January 2009
- |Title=First Workshop on Software Engineering for Ubiquitous Computing ...2009 World Congress in Computer Science, Computer Engineering, and Applied Computing.7 KB (976 words) - 23:35, 28 January 2009
- - Emerging Web-based Systems - Context Aware Ubiquitous Computing4 KB (630 words) - 16:33, 27 February 2009
- | Field = Distributed computing Research in middleware systems has evolved from simple client server6 KB (800 words) - 22:11, 27 February 2009
- | Title = 2009 Workshop on Middleware for Ubiquitous and Pervasive Systems | Field = Ubiquitous computing6 KB (861 words) - 17:07, 27 February 2009
- ...k Modeling, Distributed Simulation and Industry, Modeling Very Large Scale Systems, Aerospace Operations, Revising Simulations Components, Meta-Knowledge Simu ...nce is coming on line, Computational resources are becoming cheaper, while ubiquitous network access has started to appear.38 KB (4,832 words) - 17:07, 27 February 2009
- | Title = The 12th International Conference on Network-Based Information Systems The 12th International Conference on Network-Based Information Systems11 KB (1,440 words) - 17:08, 27 February 2009
- | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability12 KB (1,690 words) - 17:08, 27 February 2009