Search results
Create the page "Ubiquitous Computing Security Systems" on this wiki! See also the search results found.
- | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability3 KB (480 words) - 17:08, 27 February 2009
- between applications and underlying platforms (operating systems; system platforms and architectures for future computing and8 KB (1,144 words) - 20:59, 27 February 2009
- |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security5 KB (578 words) - 10:21, 20 November 2020
- | Title = The International Conference on Ambient Systems, Networks and Technologies The International Conference on Ambient Systems, Networks and Technologies (ANT-2010)6 KB (751 words) - 16:59, 27 December 2015
- |Title=International Workshop on P2P, Parallel, Grid and Internet Computing Fourth International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC-2010)7 KB (912 words) - 17:36, 5 November 2020
- ...such as location-based services, mobile data management, ubiquitous computing applications, secured data sharing and processing in sensor networks, ...tributions related to data management in mobile, ubiquitous, and pervasive computing. Topics of interest include, but are not limited to, the following:5 KB (530 words) - 11:34, 2 August 2009
- |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security5 KB (599 words) - 10:21, 20 November 2020
- | Field = Ubiquitous computing constraints in highly dynamic environments. Pervasive systems address these4 KB (479 words) - 11:35, 2 August 2009
- ...ional Workshop on Information Quality and Quality of Service for Pervasive Computing ...l control, supply-chain management, healthcare, intelligent transportation systems, military intelligence, reconnaissance and surveillance (ISR), border contr5 KB (734 words) - 11:35, 2 August 2009
- | Title = The First International Workshop on Ad Hoc and Ubiquitous Computing | Field = Ubiquitous computing5 KB (571 words) - 11:35, 2 August 2009
- | Title = The 10th International Symposium on Pervasive Systems, Algorithms and Networks The 10th International Symposium on Pervasive Systems, Algorithms and Networks4 KB (422 words) - 11:36, 2 August 2009
- ...ons and Technologies - Applications, Protocols, Algorithms, Simulators and Security Broadband mobile communication systems3 KB (339 words) - 11:36, 2 August 2009
- |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security3 KB (352 words) - 12:39, 11 August 2009
- |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security5 KB (667 words) - 14:27, 13 September 2009
- |Title=Special Issue on Ubiquitous Computing Security Systems |Field=Ubiquitous Computing Security Systems1 KB (187 words) - 04:49, 23 September 2009
- ...the most recent results in the development of system aspects of ubiquitous computing. Researchers and practitioners working in this area are expected to take th * Privacy concerns in Ubiquitous Computing Systems2 KB (205 words) - 05:10, 23 September 2009
- |Title=4th International Symposium on Intelligent Distributed Computing |Field=Distributed computing4 KB (508 words) - 13:29, 13 July 2010
- - Ubiquitous Computing - Geographic information systems4 KB (507 words) - 22:37, 18 November 2009
- |Title=4th International KES Symposium on Agents and Multi-agent Systems - Technologies and Applications |Field=agent systems6 KB (733 words) - 18:19, 24 September 2020
- |Field=Information Security, Cryptography |Affiliation=Ubiquitous Computing and Communication Journal3 KB (373 words) - 13:50, 19 January 2010