Search results

Jump to: navigation, search
  • ...However, there remains the open question of how and when to use ubiquitous computing for ward data management. The use of a mobile wireless infrastructure can lead to security and reliability problems. Mobile devices often have usability
    6 KB (771 words) - 23:42, 14 October 2008
  • | Title = The 3rd International Conference on Ubiquitous Information Management and Communication ...e multicast/broadcast network, home network, mobile multimedia QoS, mobile security, ad hoc network
    2 KB (303 words) - 23:42, 14 October 2008
  • | Title = Third International Workshop on Pervasive Systems | Field = Ubiquitous computing
    6 KB (763 words) - 23:42, 14 October 2008
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 19:03, 24 November 2008
  • ...digm/; Recovering and fault-tolerance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Context-aware and context recognition; ...y-tolerant IP networks; Trustworthy Internet; Mobile computing; Ubiquitous computing; Reliability; Resilience; Scalability; User and service mobility; Wireless
    7 KB (883 words) - 17:35, 7 January 2021
  • | Title = IEEE-RIVF International Conference on Computing and Communication Technologies The conference solicits submission of research papers in all major areas of computing, especially results of inter-disciplinary research work combining state-of-
    5 KB (567 words) - 12:58, 18 January 2009
  • part of the IADIS Multi Conference on Computer Science and Information Systems (MCCSIS 2009) ...nals (i.e. IADIS International Journal on Computer Science and Information Systems - ISSN: 1646-3692) including journals from INDERSCIENCE Publishers.
    5 KB (633 words) - 12:58, 18 January 2009
  • | Title = 2nd ACM International Conference on Security of Information and Networks 2nd ACM International Conference on Security of Information and Networks (SIN 2009)
    16 KB (2,178 words) - 12:59, 18 January 2009
  • ...e 1st International Workshop on Security, Reliability and Quality in Cloud Computing Cloud computing gained prominence in 2007 and is picking up momentum as the next “big
    5 KB (624 words) - 13:00, 18 January 2009
  • Ubiquitous Intelligence and Computing (UIC-09) the Internet of Things. The Ubiquitous Computing community has already
    6 KB (798 words) - 13:01, 18 January 2009
  • | Title = IADIS International Conference Intelligent Systems and Agents 2009 IADIS INTERNATIONAL CONFERENCE INTELLIGENT SYSTEMS AND AGENTS 2009
    4 KB (588 words) - 13:01, 18 January 2009
  • Dataspace support or management systems provide co-ordinated access to Workshops and for exhibition of research and commercial systems.
    4 KB (568 words) - 13:01, 18 January 2009
  • | Title = The 2009 International Workshop on Ubiquitous Computing Security | Field = Ubiquitous computing
    6 KB (852 words) - 13:02, 18 January 2009
  • |Title=First Workshop on Software Engineering for Ubiquitous Computing ...2009 World Congress in Computer Science, Computer Engineering, and Applied Computing.
    7 KB (976 words) - 23:35, 28 January 2009
  • - Emerging Web-based Systems - Context Aware Ubiquitous Computing
    4 KB (630 words) - 16:33, 27 February 2009
  • | Field = Distributed computing Research in middleware systems has evolved from simple client server
    6 KB (800 words) - 22:11, 27 February 2009
  • | Title = 2009 Workshop on Middleware for Ubiquitous and Pervasive Systems | Field = Ubiquitous computing
    6 KB (861 words) - 17:07, 27 February 2009
  • ...k Modeling, Distributed Simulation and Industry, Modeling Very Large Scale Systems, Aerospace Operations, Revising Simulations Components, Meta-Knowledge Simu ...nce is coming on line, Computational resources are becoming cheaper, while ubiquitous network access has started to appear.
    38 KB (4,832 words) - 17:07, 27 February 2009
  • | Title = The 12th International Conference on Network-Based Information Systems The 12th International Conference on Network-Based Information Systems
    11 KB (1,440 words) - 17:08, 27 February 2009
  • | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability
    12 KB (1,690 words) - 17:08, 27 February 2009

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)