Search results

Jump to: navigation, search
  • | Title = International Conference & Symposium on Storage Technologies Sponsored by EMC Corporation ...earch illustrate that the volume of data that needs to be stored, managed, secured, maintained, and available is reaching new heights. Additionally, the compl
    1 KB (170 words) - 19:53, 14 October 2008
  • ...w any user to timely use resources using various access technologies under secured (still to be improved) and guaranteed privacy. The family of the mobile dev
    6 KB (765 words) - 22:26, 14 October 2008
  • ...new methods and techniques, which offer users a transparent, efficient and secured access to resources, efficient allocation of resources, decentralization an
    7 KB (912 words) - 16:36, 5 November 2020
  • ...d services, mobile data management, ubiquitous computing applications, secured data sharing and processing in sensor networks, environmental monitor
    5 KB (530 words) - 10:34, 2 August 2009
  • |Title=The 5th International Conference for Internet Technology and Secured Transactions, Technical Co-Sponsored by IEEE UK/RI Communicatins Chapter The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), Technical Co-Sponsored
    5 KB (607 words) - 17:01, 3 December 2009
  • ...e-Learning, e-Governance, e-Business, e-Science, Green Computing, Secured Technologies, Intelligent Data Management *New enabling technologies
    5 KB (595 words) - 04:03, 15 January 2012
  • information technologies, information systems and global security applications. Broadband access technologies
    5 KB (571 words) - 10:53, 3 September 2017
  • ...nth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies
    15 KB (1,886 words) - 15:16, 25 August 2020