Search results
Create the page "It security" on this wiki! See also the search results found.
- as it was the case of the special tracks presented in AAMAS-08 and - privacy and security10 KB (1,371 words) - 15:14, 12 November 2020
- ...(AINA 2004) will be held in Fukuoka, Kyushu, Japan in March 29 - 31, 2004. It will include sessions on all aspects of theory, design and application of c * Security and Privacy12 KB (1,537 words) - 21:19, 10 January 2018
- ...working and Application will be held in Xi'an, China in March 27-29, 2003. It will include sessions on all aspects of theory, design and application of c * Security and Privacy8 KB (1,040 words) - 21:20, 10 January 2018
- ...ful International Conference on High Performance and Communications(HPCC). It provides a forum for engineers and scientists in academia, industry, and go * Trust, security and privacy19 KB (2,503 words) - 12:25, 28 October 2020
- * Security and privacy in vehicular networks Thanks guys, I just about lost it lokoing for this.3 KB (378 words) - 13:22, 24 August 2016
- ...hing ranging from real-time critical systems to networked infrastructures. It is logical techniques that link implementation and specification through fo - Foundations of security5 KB (799 words) - 20:49, 26 February 2020
- ** Representing and reasoning about trust, privacy, and security ** Luciano Serafini, IT6 KB (854 words) - 11:05, 28 May 2016
- ...en source toolkits such as Giza++ and Moses. This development, exciting as it is, also bears the danger of introducing uniformity into MT research. AMTA ...g. Submissions should focus on the use of MT in a business setting and how it is integrated with other technologies to support business goals.16 KB (2,200 words) - 19:51, 18 February 2021
- ...languages; query optimization; real-time data; recovery; scientific data; security; semantic Web; semi-structured data; spatial data; temporal data; transacti ...lease forms. One author of each accepted paper will be expected to present it at the conference.3 KB (457 words) - 12:09, 7 December 2016
- ...erence in the series, will be held in Turin, Italy, during September 2008. It will continue to advanced applications and issues related to these areas. It will offer the opportunity to extensively discuss requirements,4 KB (457 words) - 15:14, 16 December 2020
- ...throughout the conference. The history of NEW2AN dates back to 1993, today it is an established conference featured by proceedings published by Springer * Network Security5 KB (598 words) - 09:18, 29 May 2016
- ...volvement of industry and academy. Industry involvement is essential since it poses practical and challenging problems for academic researchers. Therefor * Performance, dependability and security evaluation using analytical models, simulation or empirical approaches5 KB (660 words) - 15:46, 27 December 2015
- as well as to help shape the future of IT-transformed + Security, Privacy and Open Source TRACK5 KB (594 words) - 15:29, 25 March 2020
- | Title = The Second IEEE International Workshop on Security in Software Engineering | Field = Computer security and reliability5 KB (615 words) - 08:55, 29 May 2016
- Since the inaugural ICITA successfully held in Australia five years ago, it has been running four times the event in difference countries. Conference l ...as well as on multi-disciplinary studies. The uniqueness of ICITA is that it crosses narrowly defined subject areas and gathers researchers from not onl3 KB (427 words) - 16:01, 29 May 2016
- |Title=The Forth International Conference on Availability, Reliability and Security |Field=Computer security and reliability4 KB (487 words) - 09:42, 21 August 2020
- |Title=Third International Conference on Availability, Reliability and Security |Field=Computer security and reliability6 KB (689 words) - 09:39, 21 August 2020
- ...o present their latest research findings in these rapidly changing fields. It * Security and availability issues for current/future computer systems3 KB (406 words) - 16:39, 30 September 2016
- Security and privacy ...hnical call for papers. While the poster need not describe completed work, it should report on research for which at least preliminary results are availa6 KB (771 words) - 15:09, 16 September 2019
- - Checking or improving the safety, security, or correctness of programs ...ng to the ACM proceedings format. These 10 pages include everything (i.e., it is the total length of the paper). The program chair will reject papers tha5 KB (667 words) - 13:18, 25 November 2016