Search results

Jump to: navigation, search
  • | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability
    3 KB (480 words) - 17:08, 27 February 2009
  • between applications and underlying platforms (operating systems; system platforms and architectures for future computing and
    8 KB (1,144 words) - 20:59, 27 February 2009
  • |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security
    5 KB (578 words) - 10:21, 20 November 2020
  • | Title = The International Conference on Ambient Systems, Networks and Technologies The International Conference on Ambient Systems, Networks and Technologies (ANT-2010)
    6 KB (751 words) - 16:59, 27 December 2015
  • |Title=International Workshop on P2P, Parallel, Grid and Internet Computing Fourth International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC-2010)
    7 KB (912 words) - 17:36, 5 November 2020
  • ...such as location-based services, mobile data management, ubiquitous computing applications, secured data sharing and processing in sensor networks, ...tributions related to data management in mobile, ubiquitous, and pervasive computing. Topics of interest include, but are not limited to, the following:
    5 KB (530 words) - 11:34, 2 August 2009
  • |Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY International Journal of Computer Science and Information Security
    5 KB (599 words) - 10:21, 20 November 2020
  • | Field = Ubiquitous computing constraints in highly dynamic environments. Pervasive systems address these
    4 KB (479 words) - 11:35, 2 August 2009
  • ...ional Workshop on Information Quality and Quality of Service for Pervasive Computing ...l control, supply-chain management, healthcare, intelligent transportation systems, military intelligence, reconnaissance and surveillance (ISR), border contr
    5 KB (734 words) - 11:35, 2 August 2009
  • | Title = The First International Workshop on Ad Hoc and Ubiquitous Computing | Field = Ubiquitous computing
    5 KB (571 words) - 11:35, 2 August 2009
  • | Title = The 10th International Symposium on Pervasive Systems, Algorithms and Networks The 10th International Symposium on Pervasive Systems, Algorithms and Networks
    4 KB (422 words) - 11:36, 2 August 2009
  • ...ons and Technologies - Applications, Protocols, Algorithms, Simulators and Security Broadband mobile communication systems
    3 KB (339 words) - 11:36, 2 August 2009
  • |Title=The Fifth International Conference on Availability, Reliability and Security (AReS 2010) |Field=it security
    3 KB (352 words) - 12:39, 11 August 2009
  • |Title=CFP - International Journal of Computer Science and Information Security |Series=International Journal of Computer Science and Information Security
    5 KB (667 words) - 14:27, 13 September 2009
  • |Title=Special Issue on Ubiquitous Computing Security Systems |Field=Ubiquitous Computing Security Systems
    1 KB (187 words) - 04:49, 23 September 2009
  • ...the most recent results in the development of system aspects of ubiquitous computing. Researchers and practitioners working in this area are expected to take th * Privacy concerns in Ubiquitous Computing Systems
    2 KB (205 words) - 05:10, 23 September 2009
  • |Title=4th International Symposium on Intelligent Distributed Computing |Field=Distributed computing
    4 KB (508 words) - 13:29, 13 July 2010
  • - Ubiquitous Computing - Geographic information systems
    4 KB (507 words) - 22:37, 18 November 2009
  • |Title=4th International KES Symposium on Agents and Multi-agent Systems - Technologies and Applications |Field=agent systems
    6 KB (733 words) - 18:19, 24 September 2020
  • |Field=Information Security, Cryptography |Affiliation=Ubiquitous Computing and Communication Journal
    3 KB (373 words) - 13:50, 19 January 2010

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)