Search results
Create the page "Systems Security" on this wiki! See also the search results found.
Page title matches
- * Privacy concerns in Ubiquitous Computing Systems * Trust concerns in Ubiquitous Computing Systems2 KB (205 words) - 04:10, 23 September 2009
- 26 bytes (2 words) - 10:46, 8 August 2017
- 25 bytes (2 words) - 11:30, 3 September 2017
- 24 bytes (2 words) - 10:59, 3 September 2017
- 25 bytes (2 words) - 09:51, 3 September 2017
- 26 bytes (3 words) - 20:04, 29 October 2020
Page text matches
- Service Oriented Systems were born with the aim of building large adaptive applications as compositi ...ting with classic Web Services. Finally, features like Quality of Service, security and dependability need to be taken seriously into account, and this investi7 KB (957 words) - 14:15, 11 August 2008
- |Title=The 10th International Conference on Mobile Data Mangement (MDM'09): Systems, Services and Middleware scope to cover research issues in mobile systems, services and middleware.13 KB (1,468 words) - 00:23, 22 August 2008
- | Title=The 3rd KES International Symposium on Agents and Multi-agent Systems - Technologies and applications (KES-AMSTA-09) ...fic research in the technologies and applications of agent and multi-agent systems.6 KB (777 words) - 21:54, 14 August 2008
- ====Computer security and reliability==== ==== Information systems (Business informatics) ====6 KB (714 words) - 11:19, 11 December 2020
- *Network Security *Communication Systems and Networks5 KB (571 words) - 08:22, 19 July 2019
- * Mobile/Wireless computing systems and services in pervasive computing * Programming paradigms for pervasive systems12 KB (1,560 words) - 14:03, 27 August 2008
- ...011 International Conference of Computational Intelligence and Intelligent Systems The 2011 International Conference of Information Security and Internet Engineering3 KB (454 words) - 11:34, 8 October 2020
- systems, biomedical informatics, virtual digital libraries, and * Data Streams and Publish-Subscribe Systems9 KB (1,189 words) - 13:53, 28 August 2008
- ...m for the communication of research advances on the principles of database systems. This year, for the first time, ICDT will be held jointly with [[EDBT 2009] ...uctive databases and knowledge bases; Distributed databases; Integrity and security; Logic and databases; Multimedia databases; Query optimization; Query proce5 KB (753 words) - 17:59, 25 June 2012
- system of systems, etc. inter-operability, security, trusted and dependable systems, fault5 KB (715 words) - 16:43, 11 September 2008
- |Title=International Conference on Autonomous Agents and Multi-Agent Systems |Field=Multi-Agent Systems10 KB (1,371 words) - 15:14, 12 November 2020
- Software Systems The Verisoft Approach to Systems Verification5 KB (686 words) - 11:27, 12 September 2008
- ...cial issues of a high quality international journal and also in Journal of Security and Communication Networks published by John Wiley & Sons. * Security in Wireless and Pervasive systems5 KB (645 words) - 17:19, 15 September 2008
- ...d applications, and interactions of these applications with other types of systems. Management aspects related to these applications and challenges on special ...iscovery, announcing, monitoring and management; on the other hand, trust, security, performance and scalability are desirable metrics under exploration when d18 KB (2,408 words) - 01:37, 16 December 2008
- |Title=8th International Conference on Information Systems Technology |Field=Information systems7 KB (763 words) - 11:25, 6 October 2011
- ...ures; Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.); Data qualit ...Spatial databases; Time-series databases; RDF stores; Hybrid DB management systems11 KB (1,371 words) - 11:28, 18 May 2020
- ...emedicine, bioinformatics, finance and marketing, geographical positioning systems put pressure on database communities to push the ‘de facto’ methods to ** Design features (data quality, performance, robustness, scalability, security, privacy, parallel and distributed approaches, mobility, etc.)11 KB (1,446 words) - 17:26, 13 October 2008
- |Title=The 5th International Conference on Open Source Systems (F/OSS 2009) ** Testing, assuring and certifying F/OSS quality and security10 KB (1,349 words) - 15:42, 24 September 2008
- Software Security Agent-Based Software Systems2 KB (293 words) - 09:35, 24 June 2011
- ...ory, design and application of computer networks and distributed computing systems. Aside from the regular presentations, the conference will include keynote * Security, Privacy and Trust34 KB (4,565 words) - 21:20, 10 January 2018