Search results

Jump to: navigation, search

Page title matches

Page text matches

  • ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...ons; Target-oriented keyword search; Filter-based profile matching; Mutual information on data streams; Stream processing; Digitized documents streams; Queries wi
    11 KB (1,371 words) - 11:28, 18 May 2020
  • Information theory: distributed network coding, Shannon's entropy, Nash equilibrium Cryptography
    11 KB (1,385 words) - 16:48, 14 October 2008
  • * Cryptography and Security * Information Retrieval
    2 KB (216 words) - 19:05, 14 October 2008
  • - Databases: query processing; information integration; - Security and Privacy: cryptography; access control; security in
    9 KB (1,193 words) - 21:53, 14 October 2008
  • �?� Security and Cryptography �?� Information Systems
    13 KB (1,775 words) - 22:04, 14 October 2008
  • * Cryptography and Network Security * Information Assurance
    2 KB (167 words) - 22:05, 14 October 2008
  • Cryptography; Descriptive complexity; Evolutionary and information and communication complexity.
    5 KB (698 words) - 22:08, 14 October 2008
  • | Title = IEEE Information Theory Workshop on Networking and Information Theory | Field = Information theory
    3 KB (308 words) - 22:15, 14 October 2008
  • 4. Security and Privacy 4-03 Distributed systems security
    5 KB (623 words) - 22:15, 14 October 2008
  • ...e = Sixth International Conference on Cryptography, Coding and Information Security | Field = Computer security and reliability
    3 KB (448 words) - 22:19, 14 October 2008
  • |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability
    4 KB (487 words) - 09:42, 21 August 2020
  • | Title = New Security Paradigms Workshop | Field = Computer security and reliability
    8 KB (1,072 words) - 22:20, 14 October 2008
  • forming, a new way to manage personal information or a new approach to model context information. There is less emphasis on the actual
    5 KB (663 words) - 22:20, 14 October 2008
  • | Title = 23rd International Information Security Conference | Field = Computer security and reliability
    5 KB (637 words) - 22:20, 14 October 2008
  • | Title = Special Issue CFP - New Technologies, Mobility and Security - UbiCC Joural | Field = Computer security and reliability
    4 KB (502 words) - 22:20, 14 October 2008
  • Information Security and Cryptography Information Systems
    3 KB (412 words) - 18:34, 12 November 2020
  • ...tle = The First International Conference on Security and Privacy in Mobile Information and Communication Systems ...edge researchers from academia and industry in the field of mobile systems security and privacy, as well as practitioners, standards developers and policymaker
    4 KB (451 words) - 22:37, 14 October 2008
  • * Information Security and Cryptography * Information Systems
    3 KB (386 words) - 22:39, 14 October 2008
  • |Title=The Third International Conference on Emerging Security Information, Systems and Technologies * ARCH: Security frameworks, architectures and protocols
    13 KB (1,617 words) - 18:03, 24 November 2008
  • ...Program is limited to U.S. Citizens who possess a current Secret personnel security clearance. * Information Management and Dissemination
    5 KB (526 words) - 00:02, 2 February 2009

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)