Semantic search

From ConfIDent

Event:7cd7c11d-c608-445a-8483-7b9eccb95108 (Academic Field: Academic Field:Information Security,Academic Field:Data Security),Event:03e2932c-5d56-4753-a2b3-f1d977a3cbb5 (Academic Field: Academic Field:Information Security,Academic Field:Data Security),Event:1ff1030d-8fdc-486d-afb8-ca6e5552b3f0 (Academic Field: Academic Field:Information Security,Academic Field:Data Security),Event:64c47922-5944-4f85-8a16-8341d7c295f9 (Academic Field: Academic Field:Information Security,Academic Field:Data Security),Event:C225adb4-f874-4321-ae6b-fa7cb4bcd6eb (Academic Field: Academic Field:Information Security,Academic Field:Data Security),Event:006b7200-500f-4f20-a3b2-450556cfcbb4 (Academic Field: Academic Field:Information Security,Academic Field:Data Security),Event:301e9d4e-e7f6-45d0-a0a9-d2f37fba0d2c (Academic Field: Academic Field:Information Security,Academic Field:Data Security),Event:APGV 2008 (Academic Field: Academic Field:Computer Graphics),Event Series:6c7221de-f5a9-45a2-9f0a-9bc7e30adc81 (Academic Field: Academic Field:Information Technology),Event:C07cccce-85dc-4901-a17b-283d28cc7b75 (Academic Field: Academic Field:Information Technology),Event:5bf958a1-aae6-4674-acd5-ad96e5f59a73 (Academic Field: Academic Field:Information Technology),Event:F0beb49e-e278-407b-a050-4ae692cfb040 (Academic Field: Academic Field:Information Technology),Event:6d8d6ffa-94e8-4bcf-8b2c-c237519229c9 (Academic Field: Academic Field:Information Technology),Event:9e3509b1-5719-4b82-8b69-c8674a8102ed (Academic Field: Academic Field:Information Technology),Event:495cb9a2-212d-4a26-bcf1-3e88fcd7f2a2 (Academic Field: Academic Field:Information Technology),Event Series:APLAS (Academic Field: Academic Field:Software Engineering),Event Series:F41596d0-4fe9-427c-a394-eecf7d7361e5 (Academic Field: Academic Field:Computer Networks,Academic Field:Computer System),Event:B9323d94-f9d6-478a-b177-a13540e3ae2d (Academic Field: Academic Field:Computer Networks,Academic Field:Computer System),Event:47fe1aa5-30e0-49bc-99e5-8d19a9d93a01 (Academic Field: Academic Field:Computer Networks,Academic Field:Computer System),Event:3f89800c-814b-4d16-92c0-7c679fabbc3d (Academic Field: Academic Field:Computer Networks,Academic Field:Computer System),Event:9e120c43-2a8e-4737-b6d6-7068a2ad4d37 (Academic Field: Academic Field:Computer Networks,Academic Field:Computer System),Event:2103990d-c4c0-4b1f-a5b0-e659dfd07061 (Academic Field: Academic Field:Computer Networks,Academic Field:Computer System),Event:APRES 2008 (Academic Field: Academic Field:Embedded Systems),Event Series:APSEC (Academic Field: Academic Field:Software Engineering),Event:APSEC 2008 (Academic Field: Academic Field:Software Engineering),Event:F755edf2-31c3-48bf-a9bf-1aa68c9c0acc (Academic Field: Academic Field:Software Engineering),Event:39b8cd24-5158-45ba-9ce4-abfc37907fdc (Academic Field: Academic Field:Software Engineering),Event:APSIPA ASC 2009 (Academic Field: Academic Field:Signal Processing,Academic Field:Information Technology,Academic Field:Communication),Event Series:APWEB (Academic Field: Academic Field:World Wide Web),Event:APWeb-WAIM 2020 (Academic Field: Academic Field:Computer Networking),Event:ARAMIS 2008 (Academic Field: Academic Field:Software Engineering),Event:ARCS 2008 (Academic Field: Academic Field:Robotics),Event:ARCS 2013 (Academic Field: Academic Field:Computer Architecture),Event:ARCS 2017 2017 (Academic Field: Academic Field:Computer Architecture,Academic Field:Operating System,Academic Field:Computer Engineering),Event:ARDUOUS 2017 (Academic Field: Academic Field:Ubiquitous Computing,Academic Field:Intelligent Systems,Academic Field:Behavior Monitoring,Academic Field:Activity Recognition),Event Series:ARES (Academic Field: Academic Field:Security),Event:0a282542-9253-46b0-b616-c784041d256c (Academic Field: Academic Field:Security),Event:C7d141f9-c88d-4095-9501-98f3694acb05 (Academic Field: Academic Field:Security),Event:ARES 2008 (Academic Field: Academic Field:Computer Security,Academic Field:Computer Reliability),Event:ARES 2009 (Academic Field: Academic Field:Computer Security,Academic Field:Computer Reliability,Academic Field:Security),Event:ARES 2010 (Academic Field: Academic Field:It Security),Event:ARES 2011 (Academic Field: Academic Field:Computer Security,Academic Field:Computer Reliability,Academic Field:Security),Event:ARES 2012 (Academic Field: Academic Field:Computer Security,Academic Field:Computer Reliability,Academic Field:Security),Event:ARES 2013 (Academic Field: Academic Field:Security),Event:ARES 2014 (Academic Field: Academic Field:Security),Event:ARES 2015 (Academic Field: Academic Field:Security),Event:ARES 2016 (Academic Field: Academic Field:Security),Event:ARES 2017 (Academic Field: Academic Field:Security),Event:ARES 2018 (Academic Field: Academic Field:Security),Event:ARES 2019 (Academic Field: Academic Field:Security)

Cookies help us deliver our services. By using our services, you agree to our use of cookies.