Search results

From ConfIDent
Results 1 – 500 of 721
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  • Forum Information Security Data Security CODASPY - ACM Conference on Data and Application Security and Privacy Computer Security Data Security Computer Privacy
    104 bytes (431 words) - 09:00, 19 October 2022
  • Information Security APF 2021 2021-06-17 → 2021-06-18 Information Security Data Security APF 2020 2020-10-22 → 2020-10-23 Information Security Data Security CCS
    104 bytes (448 words) - 10:24, 20 October 2022
  • Information Security Computer Security Communication Security CCS 2018 2019-10-15 → 2019-10-19 Information Security Computer Security Communication Security AsiaCCS
    104 bytes (2,577 words) - 10:02, 1 September 2022
  • Reliability Communication Security CODASPY - ACM Conference on Data and Application Security and Privacy Computer Security Data Security Computer Privacy SACMAT
    91 bytes (1,235 words) - 12:40, 5 May 2023
  • 2022-04-25 → 2022-04-27 Computer Security Data Security Computer Privacy CODASPY 2021 2021-04-26 → 2021-04-28 Computer Security Data Security Computer Privacy CODASPY
    104 bytes (217 words) - 10:03, 1 September 2022
  • 2023-04-24 → 2023-04-26 Computer Security Data Security Computer Privacy CODASPY 2022 2022-04-25 → 2022-04-27 Computer Security Data Security Computer Privacy CODASPY
    563 bytes (273 words) - 11:33, 30 June 2023
  • Financial Cryptography and Data Security Cryptography IMACC - IMA International Conference on Cryptography and Coding Computer Security Cryptography Coding PKC
    104 bytes (144 words) - 12:52, 19 October 2022
  • Information Security Data Security APF 2021 2021-06-17 → 2021-06-18 Information Security Data Security APF 2020 2020-10-22 → 2020-10-23 Information Security Data
    617 bytes (225 words) - 11:13, 23 February 2023
  • Cryptography Data Security FC 2022 2022-05-02 → 2022-05-06 Cryptography Data Security FC 2021 2021-03-01 → 2021-03-05 Cryptography Data Security FC 2020 2
    622 bytes (122 words) - 08:37, 17 August 2023
  • SafettBehavioural SafetyBenchmarksBig DataBig Data AnalyticsBig Data ComputingBig Data ScienceBig Data SystemsBig Social DataBio-InformaticsBio-Inspired Meth
    305 bytes (1,165 words) - 16:17, 2 February 2023
  • Programming Paradigms APF 2015 2015-10-07 → 2015-10-08 Information Security Data Security ICFEM 2014 2014-11-03 → 2014-11-05 Software Engineering
    87 bytes (75 words) - 06:58, 10 August 2023
  • 00wqx6897 Event Series Events List APF 2023 2023-06-01 → 2023-06-02 Data Security
    89 bytes (21 words) - 09:46, 23 February 2023
  • Series Events List APF 2021 2021-06-17 → 2021-06-18 Information Security Data Security
    88 bytes (23 words) - 10:03, 23 February 2023
  • 00w9hey63 Event Series Events List APF 2023 2023-06-01 → 2023-06-02 Data Security
    89 bytes (21 words) - 09:49, 23 February 2023
  • Title Financial Cryptography and Data Security 2023 Ordinal 27 Event Series FC - Financial Cryptography and Data Security Start Date 2023-05-01 End Date
    585 bytes (159 words) - 08:38, 17 August 2023
  • Event Series Events List FC 2023 2023-05-01 → 2023-05-05 Cryptography Data Security
    90 bytes (22 words) - 07:00, 17 August 2023
  • Science Formal Methods APF 2012 2012-10-10 → 2012-10-11 Information Security Data Security FOSSACS 2010 2010-03-20 → 2010-03-28 ETAPS 2010 2010-03-20 → 2010-03-28
    89 bytes (79 words) - 10:27, 25 November 2022
  • E-Learning E-Business E-Governance Green Computing I-Society Intelligent Data Management Security Technologies
    104 bytes (99 words) - 08:57, 20 October 2022
  • E-Learning E-Business E-Governance Green Computing I-Society Intelligent Data Management Security Technologies
    173 bytes (62 words) - 05:58, 20 October 2022
  • Title Financial Cryptography and Data Security 2020 Ordinal 24 Event Series FC - Financial Cryptography and Data Security Start Date 2020-02-10 End Date
    1 KB (171 words) - 08:38, 17 August 2023
  • Title Financial Cryptography and Data Security 2018 Ordinal 22 Event Series FC - Financial Cryptography and Data Security Start Date 2018-02-26 End Date
    915 bytes (164 words) - 07:33, 17 August 2023
  • E-Learning E-Business E-Governance Green Computing I-Society Intelligent Data Management Security Technologies ICETE 2010-07-26 → 2010-07-28 E-Business
    128 bytes (79 words) - 08:54, 20 October 2022
  • E-Learning E-Business E-Governance Green Computing I-Society Intelligent Data Management Security Technologies
    177 bytes (47 words) - 14:56, 20 October 2022
  • E-Learning E-Business E-Governance Green Computing I-Society Intelligent Data Management Security Technologies
    146 bytes (45 words) - 07:10, 20 October 2022
  • E-Learning E-Business E-Governance Green Computing I-Society Intelligent Data Management Security Technologies
    123 bytes (43 words) - 08:53, 20 October 2022
  • E-Learning E-Business E-Governance Green Computing I-Society Intelligent Data Management Security Technologies
    104 bytes (41 words) - 10:40, 20 October 2022
  • Warsaw Region Mazovia Country Poland (PL) Academic Field Data Security, Information Security Official Website https://2022.privacyforum.eu/ Deadlines organization
    954 bytes (191 words) - 10:01, 23 February 2023
  • Conference on Data and Application Security and Privacy Ordinal 12 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start
    789 bytes (187 words) - 09:28, 7 July 2023
  • Title Financial Cryptography and Data Security 2019 Ordinal 23 Event Series FC - Financial Cryptography and Data Security Start Date 2019-02-18 End Date
    887 bytes (171 words) - 07:22, 17 August 2023
  • Title Financial Cryptography and Data Security 2021 Ordinal 25 Event Series FC - Financial Cryptography and Data Security Start Date 2021-03-01 End Date
    501 bytes (141 words) - 08:38, 17 August 2023
  • Title Financial Cryptography and Data Security 2022 Ordinal 26 Event Series FC - Financial Cryptography and Data Security Start Date 2022-05-02 End Date
    597 bytes (163 words) - 08:38, 17 August 2023
  • Scope Data intelligence and data security are two closely related views, while data management is the base of both data intelligence and data security. In
    4 KB (618 words) - 14:03, 19 October 2022
  • Conference on Data and Application Security and Privacy Ordinal 11 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start
    694 bytes (165 words) - 09:54, 15 December 2022
  • Conference on Data and Application Security and Privacy Ordinal 10 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start
    694 bytes (165 words) - 10:11, 15 December 2022
  • Conference on Data and Application Security and Privacy Ordinal 13 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start
    744 bytes (201 words) - 11:54, 4 August 2023
  • Lumière Lyon 2 City Lyon Country France (FR) Academic Field Data Security, Information Security Official Website https://2023.privacyforum.eu/ Submission
    982 bytes (214 words) - 11:13, 23 February 2023
  • 2019 2019-06-13 → 2019-06-14 Information Security Data Security ACNS 2019 2019-06-05 → 2019-06-07 Computer Security Computer Reliability CNSM 2018 2018-11-05 → 2018-11-09
    89 bytes (47 words) - 10:13, 2 February 2023
  • Conference on Data and Application Security and Privacy Ordinal 4 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start
    821 bytes (196 words) - 10:40, 15 December 2022
  • Conference on Data and Application Security and Privacy Ordinal 3 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start
    821 bytes (196 words) - 10:41, 15 December 2022
  • Conference on Data and Application Security and Privacy Ordinal 7 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start
    854 bytes (194 words) - 10:21, 15 December 2022
  • Conference on Data and Application Security and Privacy Ordinal 2 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start
    790 bytes (193 words) - 10:42, 15 December 2022
  • Conference on Data and Application Security and Privacy Ordinal 5 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start
    829 bytes (198 words) - 10:38, 15 December 2022
  • Conference on Data and Application Security and Privacy Ordinal 6 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start
    846 bytes (205 words) - 08:03, 10 July 2023
  • Conference on Data and Application Security and Privacy Ordinal 1 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start
    790 bytes (193 words) - 10:46, 15 December 2022
  • Conference on Data and Application Security and Privacy Ordinal 9 Event Series CODASPY - ACM Conference on Data and Application Security and Privacy Start
    805 bytes (190 words) - 10:15, 15 December 2022
  • City Rome Region Lazio Country Italy (IT) Academic Field Data Security, Information Security Official Website https://2019.privacyforum.eu/ Deadlines organization
    1 KB (215 words) - 10:25, 23 February 2023
  • 2021-06-18 Status as scheduled Mode online Academic Field Data Security, Information Security Official Website https://2021.privacyforum.eu/ DOI https://doi
    789 bytes (178 words) - 09:01, 7 July 2023
  • Vienna Region Vienna Country Austria (AT) Academic Field Data Security, Information Security Official Website https://2017.privacyforum.eu/ Deadlines organization
    916 bytes (193 words) - 10:38, 23 February 2023
  • Limassol Region Limassol Country Cyprus (CY) Academic Field Data Security, Information Security Official Website https://2012.privacyforum.eu/ Deadlines organization
    853 bytes (181 words) - 10:56, 23 February 2023
  • City Athens Region Attica Country Greece (GR) Academic Field Data Security, Information Security Official Website https://2014.privacyforum.eu/ Deadlines organization
    838 bytes (180 words) - 10:52, 23 February 2023
  • Region Luxembourg Country Luxembourg (LU) Academic Field Data Security, Information Security Official Website https://2015.privacyforum.eu/ Deadlines organization
    859 bytes (183 words) - 10:48, 23 February 2023
  • Lisbon Region Lisboa Country Portugal (PT) Academic Field Data Security, Information Security Official Website https://2020.privacyforum.eu/ Deadlines organization
    927 bytes (202 words) - 10:18, 23 February 2023
  • Barcelona Region Catalonia Country Spain (ES) Academic Field Data Security, Information Security Official Website https://2018.privacyforum.eu/ Deadlines organization
    946 bytes (177 words) - 10:29, 23 February 2023
  • Securing data/apps on untrusted platforms Securing the semantic web Security and privacy in GIS/spatial data Security and privacy in healthcare Security and
    6 KB (995 words) - 10:17, 15 December 2022
  • Event Acronym FC 2017 Title FC 2017 : Financial Cryptography and Data Security 2017 Start Date 2017-04-03 End Date 2017-04-07 Status as scheduled Mode
    531 bytes (134 words) - 14:54, 19 October 2022
  • theory; concurrency; constraints; data exchange; data integration; data mining; data modeling; data on the Web; data streams; data warehouses; distributed databases;
    4 KB (614 words) - 06:24, 7 August 2023
  • am Main Region Hesse Country Germany (DE) Academic Field Data Security, Information Security Official Website https://2016.privacyforum.eu/ Deadlines organization
    856 bytes (184 words) - 10:43, 23 February 2023
  • Series Events List APF 2022 2022-06-23 → 2022-06-24 Information Security Data Security
    89 bytes (23 words) - 09:57, 23 February 2023
  • Country Austria (AT) Academic Field Machine Learning, Data Mining, Security In Data Science, Data Science Applications Official Website http://www.idsc
    577 bytes (141 words) - 15:21, 19 October 2022
  • Informationization Equipment and its Management Digital Campus Construction and Data Security Management Dates Concerned Submission Due: April 20, 2010 Acceptance
    2 KB (318 words) - 13:06, 19 October 2022
  • Cryptocurrency IoT Security Cloud security Access control Privacy-enhancing technologies Database security Big data security and privacy Biometric Security Network
    2 KB (321 words) - 12:11, 4 August 2023
  • Series Events List APF 2022 2022-06-23 → 2022-06-24 Information Security Data Security
    89 bytes (23 words) - 09:57, 23 February 2023
  • Scientific and Statistical Databases DATA WAREHOUSING AND KNOWLEDGE DISCOVERY § Data Warehouses, Data Marts and OLAP § Data Mining and Knowledge Discovery §
    3 KB (403 words) - 15:28, 19 October 2022
  • Italy (IT) Academic Field Semantic Web, Internet Of Things, Big Data, Information Security Official Website http://www.sitis-conf.org/en/web-computing-and-applications
    632 bytes (154 words) - 14:55, 19 October 2022
  • Operating system security Intrusion detection Big data security and privacy Biometric Security Network security Formal methods for security Digital forensics
    2 KB (277 words) - 14:19, 19 October 2022
  • Ecuador (EC) Academic Field Computer Science, Information Systems, Data Mining, Security Official Website http://ingenieria.ute.edu.ec/inciscos/index.php/en/call-for-papers
    635 bytes (148 words) - 15:20, 19 October 2022
  • to: Security in new paradigms of smart data Cyber monitoring & incident response smart data Digital forensics in intelligent data Big data security, Database
    3 KB (535 words) - 14:22, 19 October 2022
  • following areas, but not limited to: Information Security Management Data Security Application Security Security Policy Authentication & Authorisation Privacy
    2 KB (322 words) - 14:44, 19 October 2022
  • Series Events List APF 2019 2019-06-13 → 2019-06-14 Information Security Data Security
    89 bytes (23 words) - 10:25, 23 February 2023
  • theory and practice Communication theory Compression Cryptography and data security Detection and estimation Information theory and statistics Information
    2 KB (313 words) - 15:22, 19 October 2022
  • Ad Hoc Network Security • Software Security • Secure Data Streams • Security Testing • Smartphone Security • Usable Security • Web Security • Vulnerability
    5 KB (738 words) - 14:05, 19 October 2022
  • Mining data streams and sensor data * Mining multi-media, graph, spatio-temporal and semi-structured data * Security, privacy, and adversarial data mining
    4 KB (650 words) - 14:45, 19 October 2022
  • Rate-Distortion Theory Shannon Theory Stochastic Processes Cryptology and Data Security Data Networks Applications of Information Theory Multi-User Information
    3 KB (456 words) - 15:22, 19 October 2022
  • Series Events List APF 2018 2018-06-13 → 2018-06-14 Information Security Data Security
    88 bytes (23 words) - 10:30, 23 February 2023
  • query optimization; real-time data; recovery; scientific data; security; semi-structured data; spatial data; temporal data; transactions; updates; views;
    5 KB (780 words) - 14:44, 19 October 2022
  • Scale Security Data Threat Detection using Big Data Analytics Privacy Preserving Big Data Collection/Analytics HCI Challenges for Big Data Security & Privacy
    9 KB (1,351 words) - 06:28, 7 August 2023
  • Computing Techniques for Big Data Big Data as a Service Big Data Open Platforms Big Data in Mobile and Pervasive Computing Big Data Persistence and Preservation
    7 KB (997 words) - 14:08, 19 October 2022
  • Interaction APF 2023 2023-06-01 → 2023-06-02 France (FR) Information Security Data Security Tagung der Fachgruppe Computeralgebra 2023 2023-05-31 → 2023-06-02
    808 bytes (10,171 words) - 10:31, 27 November 2023
  • Series Events List APF 2014 2014-05-20 → 2014-05-21 Information Security Data Security
    88 bytes (23 words) - 10:52, 23 February 2023
  • Dataspaces * Data integration and interoperability * Data management for ubiquitous and mobile computing * Data mining and information extraction * Data modelling
    4 KB (683 words) - 14:45, 19 October 2022
  • to: * Data integration and interoperability * Data management for ubiquitous and mobile computing * Data mining and information extraction * Data modelling
    4 KB (700 words) - 14:45, 19 October 2022
  • Scale Security Data Threat Detection using Big Data Analytics Privacy Preserving Big Data Collection/Analytics HCI Challenges for Big Data Security & Privacy
    5 KB (694 words) - 17:08, 22 November 2023
  • Scale Security Data Threat Detection using Big Data Analytics Privacy Preserving Big Data Collection/Analytics HCI Challenges for Big Data Security & Privacy
    4 KB (683 words) - 17:08, 22 November 2023
  • Series Events List APF 2020 2020-10-22 → 2020-10-23 Information Security Data Security
    35 bytes (17 words) - 10:18, 23 February 2023
  • interpretation. Event Acronym Smart-City-IoT-Security 2017 Title Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart
    5 KB (902 words) - 14:23, 19 October 2022
  • computing Cloud and grid computing for big data Security and privacy for big data Smart devices and hardware Big data applications: Bioinformatics, Multimedia
    3 KB (461 words) - 12:59, 19 October 2022
  • Context-aware and data-centric security * Protection and safety of distributed mobile data * Mobile application security * Security for voice and multimedia
    4 KB (552 words) - 15:28, 19 October 2022
  • Acronym Technologies for Security of EHR 2017 Title Technologies for Security of EHR 2017 : Emerging Technologies for Security and Authentication of Electronic
    5 KB (814 words) - 14:24, 19 October 2022
  • And Streaming Technologies Data Management, Privacy, Security, And Confidentiality Display And Visualization Of Medical Data E-Commerce In Health Informatics
    9 KB (1,352 words) - 13:32, 19 October 2022
  • Series Events List APF 2017 2017-06-07 → 2017-06-08 Information Security Data Security
    35 bytes (17 words) - 10:38, 23 February 2023
  • reports on big data and smart computing. Relevant Topics Techniques, models and algorithms for big data Tools and systems for big data Data mining, graph
    3 KB (568 words) - 12:59, 19 October 2022
  • computing Big data security, Database security Social engineering, insider threats, advance spear phishing Cyber threat intelligence Security and fault tolerance
    4 KB (582 words) - 14:24, 19 October 2022
  • and Network Security Security Cryptology Network Security DBSEC - IFIP WG 11.3 Working Conference on Data and Applications Security Security ESORICS - European
    132 bytes (911 words) - 14:53, 20 October 2022
  • Blockchain security and privacy Cloud computing security Computer forensics Cyber-physical system security Data and application security Embedded systems security
    4 KB (557 words) - 09:56, 17 October 2023
  • 2017-04-04 → 2017-04-06 Security Big Data Online Social Networks Communication Systems SDABBI 2017 2017-04-03 → 2017-04-05 Data Science Big Data Bioinformatics
    104 bytes (963 words) - 08:19, 19 October 2022
  • research in security and privacy, including but not limited to: System security Operating systems security Web security Mobile systems security Distributed
    3 KB (459 words) - 14:23, 19 October 2022
  • evaluation Data exchange and integration Data quality, cleaning and lineage Database monitoring and tuning Data privacy and security Data warehousing Data mining:
    5 KB (645 words) - 14:46, 19 October 2022
  • Cyberphysical SecuritySecurity in Content Delivery • Secure Distributed Computing • Data and Application SecuritySecurity in Crowdsourcing • Security Architectures
    2 KB (304 words) - 11:47, 8 December 2023
  • change tracking of web data sources cost and benefits of web data quality assessment web data quality assessment benchmarks Web Data Cleansing methods for
    4 KB (708 words) - 14:13, 19 October 2022
  • 14:Event DaWaK 2009 (category Data mining)
    semi-structured, and unstructured data - Data warehousing and the semantic web - Data warehouse privacy, security, and reliability - Data warehousing applications:
    8 KB (1,110 words) - 10:01, 4 August 2023
  • limited to): Special Session: Big Data and Intelligent Computing Methods and Techniques for Software Development Big data and Cloud Computing Distributed
    5 KB (807 words) - 14:04, 19 October 2022
  • Distributed, P2P Systems Scientific Data and Data Visualization Security, Privacy, Authenticated Query Processing Data Warehouses, OLAP, Business Intelligence
    5 KB (713 words) - 12:14, 14 December 2022
  • Economies - Social Inclusion «« eHealth »» May include issues relating to: - Data Security Issues - eHealth Policy and Practice - eHealthcare Strategies and Provision
    6 KB (808 words) - 14:55, 19 October 2022
  • location-based services * Data management in wireless networks * Data management in sensor and mobile ad hoc networks * Data management in mobile peer-to-peer
    5 KB (670 words) - 15:27, 19 October 2022
  • with unstructured data and semi-structured data (e.g., XML) * Multimedia data warehouses * Biomedical data warehouses * Data warehousing & OLAP in mobile
    10 KB (1,439 words) - 14:45, 19 October 2022
  • Symposium on Big Data Computing Data Mining Machine Learning Data Analytics Big Data Computing BDCAT - IEEE/ACM International Conference on Big Data Computing
    104 bytes (2,202 words) - 08:59, 19 October 2022
  • Systems Networks Network Security DSN - IEEE/IFIP International Conference on Dependable Systems and Networks Computer Security Computer Reliability Networks
    104 bytes (790 words) - 12:39, 20 October 2022
  • Storage Data Integrity, Security, Protection, Privacy Standards and Policies for Data Management Novel Applications Multimedia Forensics and Security Urban
    5 KB (792 words) - 14:13, 19 October 2022
  • Cyber-physical system security Data and application security Embedded systems security Formal methods for security Hardware-based security and applications
    12 KB (1,651 words) - 06:26, 8 September 2023
  • coding-theoretic approaches to data security 6. Network and Information Security Symposium * 3G and 4G security * 802.11 security and 802.11i * Application/network
    14 KB (1,681 words) - 14:45, 19 October 2022
  • Symposium on Big Data Computing Data Mining Machine Learning Data Analytics Big Data Computing BDCAT - IEEE/ACM International Conference on Big Data Computing
    104 bytes (2,346 words) - 11:38, 20 October 2022
  • trustworthiness of web data tracking the provenance of web data profiling and change tracking of web data sources cost and benefits of web data quality assessment
    7 KB (902 words) - 15:21, 19 October 2022
  • Privacy and Security Security USENIX - USENIX Annual Technical Conference Computer Science Events List SOUPS 2023 2023-08-06 → 2023-08-08 Security USENIX ATC
    89 bytes (389 words) - 13:27, 23 November 2022
  • CRIS (2): CRIS - International Conference on Cryptography and Information Security, CRIS - International Conference on Current Research Information Systems
    221 bytes (219 words) - 14:36, 23 August 2022
  • Rendering B.4 Watermarking Techniques Applications in Copyright Control Data Security Digital Watermarking Identification and Certification C. Signal Processing
    11 KB (1,639 words) - 15:29, 19 October 2022
  • rationality. Trust and reputation. Issues of privacy of communication, data security, and jurisdiction for agent-mediated trading. Coalition and team formation
    9 KB (1,364 words) - 14:45, 19 October 2022
  • 2016-12-08 → 2016-12-10 Computer Science Security Big Data Cloud Computing CloudAM 2016 2016-12-06 → 2016-12-09 Big Data Cloud Computing Social Clouds Fog Computing
    104 bytes (602 words) - 08:25, 19 October 2022
  • Interactive data mining Data-mining-ready structures and pre-processing Data mining visualization Information hiding in data mining Security and privacy
    3 KB (339 words) - 13:00, 19 October 2022
  • ICCDM 2017 2017-05-04 → 2017-05-06 Computer Science Software Engineering Data Mining Image Processing CBI 2017 2017-04-27 → 2017-04-29 Artificial Intelligence
    125 bytes (533 words) - 07:16, 20 October 2022
  • 2016-11-14 → 2016-11-16 Network Security IMC 2015 2015-10-28 → 2015-10-30 Network Security IMC 2014 2014-11-05 → 2014-11-07 Network Security IMC 2013 2013-10-23 → 2013-10-25
    708 bytes (313 words) - 14:18, 14 March 2024
  • Conference on Data Engineering Computer Science Database Data Engineering ICDM - IEEE International Conference on Data Mining Computer Science Data Mining ICME
    88 bytes (6,340 words) - 09:06, 6 March 2023
  • 2016 2016-12-23 → 2016-12-24 Security Communication Networking Network Security URoute 2016 2016-12-05 → 2016-12-08 Big Data Networking Software Defined
    104 bytes (287 words) - 12:40, 20 October 2022
  • Workshop on Intelligent Cross-Data Analysis and Retrieval BDBS - International Conference on Big Data, Blockchain and Security SWIB - Semantic Web in Bibliotheken
    393 bytes (14 words) - 11:24, 24 November 2022
  • 2016-11-30 → 2016-12-02 Security Internet Of Things Radio Frequency Identification I-WeCA 2016 2016-11-28 → 2016-12-01 Information Security Semantic Web Internet
    104 bytes (744 words) - 10:51, 20 October 2022
  • And Security IEEE SysCo 2016 2016-11-28 → 2016-11-29 Social Networks Collaborative Systems Collaborative Processes Collaborative Systems Security CTS 2016
    104 bytes (331 words) - 12:26, 21 October 2022
  • Technologies. COMPUTATIONAL INTELLIGENCE AND BIG DATA ANALYTICS: Soft computing, knowledge discovery and data mining, machine learning, computational biology
    4 KB (490 words) - 14:19, 19 October 2022
  • Engineering Data Mining Information Technology Computing ICNCT 2017 2017-02-20 → 2017-02-22 Cloud Computing Networks Computing Network Security ICICA 2017
    104 bytes (220 words) - 08:49, 19 October 2022
  • Web LD4 - LD4 Conference on Linked Data Semantic Web Digital Libraries Library Science Linked Data LDOW - Linked Data on the Web Semantic Web LSWT - Leipziger
    104 bytes (2,266 words) - 11:56, 21 October 2022
  • Events List iDSC 2017 2017-06-12 → 2017-06-13 Data Mining Machine Learning Security In Data Science Data Science Applications
    145 bytes (38 words) - 14:54, 20 October 2022
  • 2016-12-19 → 2016-12-21 Information Systems Big Data Internet of Things Nanoelectronic Systems Cyberphysical Systems Security November 2016 2016-11-09 → 2016-11-11
    104 bytes (91 words) - 10:52, 20 October 2022
  • interfaces, analog signal processing, power management, computation, data storage, security, and communication; non-silicon, carbon, organic, metaloxide-, compound
    6 KB (818 words) - 07:30, 28 March 2024
  • and Semantic Web applications Web of Things applications Big Data and data analytics Security, privacy, and identity on the Web Web standards All submitted
    6 KB (738 words) - 11:44, 16 January 2024
  • 2016-10-09 → 2016-10-13 Cyber Security Assessment Cyber Risk Management Cyber Training Technologies Cyber Security Data Analytics
    104 bytes (36 words) - 08:54, 19 October 2022
  • 2017 2017-02-22 → 2017-02-24 Security Pattern Recognition Biometrics Behavior Analysis ITPF 2016 2016-12-28 → 2016-12-29 Data Mining Pattern Recognition
    104 bytes (305 words) - 15:19, 20 October 2022
  • Optimization BDAS 2017 2017-05-30 → 2017-06-02 Artificial Intelligence Data Mining Databases Data Science CBR@FLAIRS 2017 2017-05-27 → 2017-05-24 Artificial Intelligence
    104 bytes (4,594 words) - 09:45, 1 September 2022
  • integration; semi-structured data; data mining; knowledge discovery; schema migration; digital libraries; data warehousing - Security and Privacy: cryptography;
    9 KB (1,297 words) - 14:46, 19 October 2022
  • 2016-12-19 → 2016-12-21 Information Systems Big Data Internet of Things Nanoelectronic Systems Cyberphysical Systems Security CONFENIS 2016 2016-12-13 → 2016-12-14
    104 bytes (1,893 words) - 10:24, 20 October 2022
  • 2016-12-19 → 2016-12-21 Information Systems Big Data Internet of Things Nanoelectronic Systems Cyberphysical Systems Security
    104 bytes (36 words) - 08:56, 19 October 2022
  • 2017-04-03 → 2017-04-05 Data Science Big Data Bioinformatics Biomedical Informatics ICIT 2016 2016-12-22 → 2016-12-24 Information Security Biomedical Informatics
    104 bytes (45 words) - 09:47, 1 September 2022
  • 10 Distributed Systems Cloud Computing SNTA 2020 2020-06-23 → 2020-06-23 Data Science Machine Learning High-Performance Computing Distributed Systems Network
    132 bytes (279 words) - 08:13, 20 October 2022
  • Engineering Event Series Events List NSysS 2018 2018-12-05 → 2018-01-08 Security Systems Networking SysCon 2017 2017-04-24 → 2017-04-27 Engineering Electrical
    190 bytes (171 words) - 06:06, 21 October 2022
  • 2017-04-04 → 2017-04-06 Security Big Data Online Social Networks Communication Systems OSNT 2016 2016-11-29 → 2016-12-02 Security Big Data Online Social Networks
    112 bytes (46 words) - 13:11, 20 October 2022
  • International Conference on Compute and Data Analysis 2022-02-25 DSDE 2022 DSDE - International Conference on Data Storage and Data Engineering 2022-02-25 AANN 2022
    372 bytes (12 words) - 11:12, 3 November 2022
  • MTAP-1083T 2017 MTAP-1083T 2017 : MTAP Special Issue on Data Preprocessing for Big Multimedia Data Microservices 2017 Microservices 2017 : Microservices
    141 bytes (0 words) - 10:00, 28 September 2022
  • Events List iDSC 2017 2017-06-12 → 2017-06-13 Data Mining Machine Learning Security In Data Science Data Science Applications
    104 bytes (34 words) - 09:00, 19 October 2022
  • 2016-10-09 → 2016-10-13 Cyber Security Assessment Cyber Risk Management Cyber Training Technologies Cyber Security Data Analytics
    104 bytes (36 words) - 08:54, 19 October 2022
  • Events List ICIT 2016 2016-12-22 → 2016-12-24 Information Security Biomedical Informatics Web Data Analytics
    117 bytes (31 words) - 17:28, 20 October 2022
  • International Conference on Big Data, Blockchain and Security 2022-04-23 DMML DMML - International Conference on Data Mining & Machine Learning 2022-04-23
    378 bytes (12 words) - 11:05, 3 November 2022
  • unconventional means Information security management standards Information systems security policies Mobile and cloud computing security Big data analytics for cybersecurity
    5 KB (630 words) - 12:01, 29 January 2024
  • Communications Event Series Events List ICICS 2017 2017-04-04 → 2017-04-06 Security Big Data Online Social Networks Communication Systems PECCS 2013 2013-02-19 → 2013-02-21
    95 bytes (44 words) - 12:29, 19 October 2022
  • construction, data lakes, large-scale analytics) Data and information acquisition and preprocessing (e.g., data crawling, data quality, data privacy, data wrangling)
    4 KB (608 words) - 12:37, 4 August 2023
  • Engineering IEEE-CGVIS 2017 2017-02-20 → 2017-02-21 Computer Vision Information Security Image Processing Computer Graphics CMVIT 2017 2017-02-17 → 2017-02-19 Computer
    104 bytes (656 words) - 08:47, 19 October 2022
  • Privacy-preserving solutions Security models and threats Security and privacy properties and policies Verification and enforcement of security properties Trust and
    5 KB (717 words) - 14:19, 2 February 2024
  • 2016-12-19 → 2016-12-21 Information Systems Big Data Internet of Things Nanoelectronic Systems Cyberphysical Systems Security
    159 bytes (40 words) - 12:41, 20 October 2022
  • means • Information security management standards • Information systems security policies • Mobile and cloud computing security • Big data analytics for cybersecurity
    4 KB (525 words) - 12:04, 29 January 2024
  • 2016-10-09 → 2016-10-13 Cyber Security Assessment Cyber Risk Management Cyber Training Technologies Cyber Security Data Analytics
    104 bytes (36 words) - 08:54, 19 October 2022
  • 2016-10-09 → 2016-10-13 Cyber Security Assessment Cyber Risk Management Cyber Training Technologies Cyber Security Data Analytics
    104 bytes (36 words) - 08:53, 19 October 2022
  • twork mining Big data visualization analytics Large scale optimization Privacy and security Security, trust and risk in big data Data integrity, matching
    4 KB (596 words) - 14:27, 24 August 2022
  • Acronym DBSEC Title IFIP WG 11.3 Working Conference on Data and Applications Security Academic Field Security Related Identifiers CORE Rankings Year 2018 Rank
    342 bytes (38 words) - 14:27, 24 August 2022
  • unconventional means Information security management standards Information systems security policies Mobile and cloud computing security Big data analytics for cybersecurity
    9 KB (1,152 words) - 12:02, 29 January 2024
  • SOA * Information Filtering, Data Mining & Knowledge from Data * Privacy, Traceability, and Anonymity * National Security and Public Safety * Trust and
    4 KB (596 words) - 14:18, 19 October 2022
  • the security of borders, and the evolution of inter-jurisdictional conflicts, “There has never been a greater need to interpret the haystack of data in
    4 KB (685 words) - 14:44, 19 October 2022
  • Unmanned/Unattended Sensors and Systems Sensor Data Analysis Sensor Data Exploitation and Target Recognition · Information Fusion, Data Mining, and Information Networks
    1 KB (253 words) - 14:46, 19 October 2022
  • integration Management of large-scale data systems Streaming data analysis Data models and query languages Scalable data analysis and analytics Database monitoring
    3 KB (430 words) - 07:43, 10 July 2023
  • not limited to: 1. Big Data Science - Big Data Analytics - Data Science Models and Approaches - Algorithms for Big Data - Big Data Search and Information
    4 KB (711 words) - 13:01, 19 October 2022
  • anomaly detection - Data Stream Mining for Security - Deep Learning for cyber security - Big Data architectures for network security - Identify theft detection
    4 KB (731 words) - 13:06, 19 October 2022
  • Economic theory and game theory Mathematical logic and reasoning Data mining and (big) data analysis Monitoring and measurements Computer simulation experiments
    3 KB (423 words) - 14:37, 24 July 2023
  • Networks and Data Communications �?� Security and Cryptography �?� Computers Architecture �?� Operating Systems �?� Databases, Data Warehouses and Data Mining
    13 KB (1,786 words) - 14:45, 19 October 2022
  • Technologies Economics of Data, Data Services and Data Ecosystems Special Track (please check appropriate topic in submission system) Data Science Following the
    6 KB (883 words) - 14:20, 19 October 2022
  • 14:Event P3DM 2008 (category Computer security and reliability)
    Research, "Protecting Private Data with Data Masking," 35 percent of corporations will start using data masking for private data by 2010. To be able to do
    5 KB (819 words) - 15:28, 19 October 2022
  • "imageLayers":[],"locations":[],"imageoverlays":null} Big data platforms with applications to network management, security, measurements Content distribution and caching
    3 KB (353 words) - 14:10, 18 November 2022
  • Biocomputing, Quantum computing, etc. + Dependable big data foundation and management + Big data privacy and security + Dependable IoT supporting technologies + Social
    12 KB (1,630 words) - 13:06, 19 October 2022
  • "imageLayers":[],"locations":[],"imageoverlays":null} Big Data platforms with applications to network management, security, measurements Content distribution and caching
    3 KB (394 words) - 15:36, 15 December 2022
  • 14:Event DAWAM 2008 (category Data mining)
    privacy and security perspectives such as mining of imbalanced data, bioinformatics data, streaming data, ubiquitous computing data, grid computing data etc.
    7 KB (1,004 words) - 14:45, 19 October 2022
  • Interest Group on Data Communication, Association for Computing Machinery Metrics Organizer Organization Special Interest Group on Data Communication, Association
    4 KB (661 words) - 12:31, 6 June 2023
  • techniques may be in place for data-driven and deeper data analysis. In addition to the quantitative and qualitative challenges, data pressure in systems and
    4 KB (699 words) - 14:22, 19 October 2022
  • protocols peer-to-peer security intellectual property protection database security privacy-enhancing technology security in IT outsourcing data protection secure
    5 KB (728 words) - 15:28, 19 October 2022
  • Information Systems Security Start Date 2016-12-08 End Date 2016-12-10 Status as scheduled Mode on site Country Morocco (MA) Academic Field Big Data, Cloud Computing
    516 bytes (136 words) - 14:45, 19 October 2022
  • Mobile/Wireless Security Multimedia Security Network Security OS Security P2P Security Privacy & Data Protection Privilege Management Resilience Security and Privacy
    3 KB (361 words) - 09:46, 22 February 2023
  • systems Business intelligence systems Data analytics and decision support systems Databases for business Big Data for business Application areas Healthcare
    5 KB (702 words) - 07:56, 3 March 2023
  • management - security as quality of service - secure electronic commerce - security administration - security evaluation - security management - security models
    6 KB (849 words) - 14:55, 19 October 2022
  • dimensional data Mining uncertain data Mining imbalanced data Mining dynamic/streaming data Mining behavioral data Mining multi-media data Mining scientific
    3 KB (360 words) - 14:18, 19 October 2022
  • dimensional data ● Mining uncertain data ● Mining imbalanced data ● Mining dynamic/streaming data ● Mining behavioral data ● Mining multi-media data ● Mining
    2 KB (347 words) - 14:17, 19 October 2022
  • Virtualization, VoIP & Web security Security modeling, tools & simulation Mobile and wireless security Information systems security Security of personal area networks
    6 KB (885 words) - 14:08, 19 October 2022
  • dynamic/streaming data Mining graph and network data Mining heterogeneous/multi-source data Mining high dimensional data Mining imbalanced data Mining multi-media
    3 KB (342 words) - 14:18, 19 October 2022
  • 14:Event MMSEC 2009 (category Computer security and reliability)
    Steganography and steganalysis. * Data hiding in biometrics, security issues of biometrics, biometric template protection, security in multimodal and multifactor
    3 KB (388 words) - 15:28, 19 October 2022
  • network infrastructure security - operating system security - public safety and emergency management - security architectures - security in heterogeneous and
    12 KB (1,720 words) - 15:28, 19 October 2022
  • 14:Event SOSOC 2008 (category Computer security and reliability)
    secure communication * data confidentiality, data integrity * anonymity, pseudonymity * key management * secure bootstrapping * security issues in forwarding
    4 KB (538 words) - 15:30, 19 October 2022
  • City Irbid Country Jordan (JO) Academic Field Online Social Networks, Security, Big Data, Communication Systems Official Website http://www.icics.info/icics2017/
    605 bytes (143 words) - 14:55, 19 October 2022
  • behaviour dataData privacy and security in physiologic & affective computing  Gait-based authentication  Human and social factors of security and privacy
    5 KB (744 words) - 13:00, 19 October 2022
  • management Predictive information systems Big Data and privacy Security and safety management Dark data processing
    3 KB (477 words) - 13:00, 19 October 2022
  • areas of data mining, knowledge discovery, and large-scale data analytics, including, but not limited to: Big Data: Efficient and distributed data mining
    3 KB (425 words) - 07:45, 7 August 2023
  • all areas of data mining, knowledge discovery, and large-scale data analytics, including, but not limited to: - Big Data: Distributed data mining and machine
    3 KB (442 words) - 07:59, 7 August 2023
  • Information Systems, Internet of Things, Big Data, Nanoelectronic Systems, Cyberphysical Systems Security Official Website http://ieee-inis.org/ Deadlines
    644 bytes (148 words) - 15:23, 19 October 2022
  • Knowledge Management A14. Data and Knowledge Visualization B. Data Mining in Specialized Domain B1. High Dimensional Data B2. Temporal Data B3. Biomedical Domains
    2 KB (386 words) - 15:27, 19 October 2022
  • ACNS 2013 2013-06-25 → 2013-06-28 Computer Security Computer Reliability IDEAS 2007 2007-09-06 → 2007-09-08 Data Mining Information System
    89 bytes (45 words) - 12:41, 14 December 2022
  • semi-structured data, and mining temporal, spatial and multimedia data - Mining data streams - Mining spatio-temporal data - Mining with data clouds and Big
    3 KB (526 words) - 13:22, 2 October 2023
  • processing for AI/ML, event processing in big and fast data, publish/subscribe, data stream processing, security and encryption in stream processing, rule-based
    3 KB (491 words) - 07:35, 23 June 2023
  • Interest Group on Data Communication, Association for Computing Machinery Metrics Organizer Organization Special Interest Group on Data Communication, Association
    699 bytes (175 words) - 14:20, 14 March 2024
  • Systems - Peer to Peer Data Management - Interoperability - Mobile Data Management - Data Models for Production Systems and Services - Data Exchange issues and
    4 KB (673 words) - 14:55, 19 October 2022
  • 14:Event SDM 2008 (category Computer security and reliability)
    Event Acronym SDM 2008 Title 5th VLDB Workshop on Secure Data Management Start Date 2008-08-25 End Date 2008-08-25 Status as scheduled Mode on site City
    642 bytes (141 words) - 15:28, 19 October 2022
  • privacy-sensitive data for partial answers, and information-oriented security. The aim of this workshop is to discuss and exchange the ideas related to data privacy
    7 KB (1,038 words) - 13:08, 19 October 2022
  • intelligent event processing, event processing in big and fast data, data stream processing, security and encryption in stream processing, complex event forecasting
    3 KB (443 words) - 07:35, 23 June 2023
  • Intelligence and Machine Learning Robotic Process Automation  (RPA) Big Data, Data Science and Analytics Blockchain applications in IS Simulation and Digital
    3 KB (440 words) - 06:56, 18 November 2022
  • Non-relational, and other Modern Data Models Information Integration and Data Quality Data Cleaning, Data Discovery and Data Exploration Heterogeneous and
    3 KB (489 words) - 08:50, 4 August 2023
  • Knowledge • Data governance • Knowledge representation and semantic knowledge management • Data modeling • Data quality • Data value assessment • Data integration
    7 KB (999 words) - 14:07, 18 October 2022
  • Services Web‐based Enterprise Systems Web Big Data Techniques and Mining Web Data Integration and Mashups Web Data Models Web engineering, metrics and performance
    2 KB (340 words) - 15:30, 19 October 2022
  • networks Summarization, clustering, classification of Web data Wrapper induction Data integration and data cleaning Information extraction, slot-filling Entity
    2 KB (335 words) - 08:57, 8 November 2022
  • interest include (but are not limited to): Attacks against De-identified Data Data Anonymity Disclosure Control Techniques Disclosure Risk and Information
    2 KB (280 words) - 15:27, 19 October 2022
  • Biocomputing, Quantum computing, etc. + Dependable big data foundation and management + Big data privacy and security + Dependable IoT supporting technologies + Social
    12 KB (1,614 words) - 13:07, 19 October 2022
  • Management and Virtualization Tools Risk Management Security Awareness and Education Security Culture Security Requirements Engineering Standards, Best Practices
    4 KB (572 words) - 14:23, 19 October 2022
  • developers from a wide range of ML related areas, and the recent emergence of Big Data processing brings an urgent need for machine learning to address these new
    4 KB (525 words) - 12:17, 11 October 2023
  • Semantic web Data modeling, mining and data analytics Data modeling, aggregation, integration, and transformation Web and text mining Data mining methods
    5 KB (597 words) - 14:18, 19 October 2022
  • Blockchain applications in IS Application of AI and big data in IS Robotic Process Automation Digital twins Data and business analytics IS for collaboration and
    3 KB (481 words) - 06:57, 18 November 2022
  • involving networking systems and security. The conference values papers, which will take a broad networking and/or security perspective(s) covering contemporary
    5 KB (691 words) - 14:14, 19 October 2022
  • Country India (IN) Academic Field Biomedical Informatics, Information Security, Web Data Analytics Official Website http://www.oits-icit.org Deadlines 2016-09-10
    565 bytes (139 words) - 14:56, 19 October 2022
  • site City Agadir Country Morocco (MA) Academic Field Big Data, Online Social Networks, Security Official Website http://emergingtechnet.org/OSNT2016/default
    579 bytes (142 words) - 15:27, 19 October 2022
  • Distributed Sensing • Security-enhanced Mobile Objects Tracking • Security Enhancement Techniques for Positioning Data Processing • Privacy Preserving LBS • Privacy
    4 KB (665 words) - 14:23, 19 October 2022
  • Conference on Data and Applications Security and Privacy Event Series DBSEC - IFIP WG 11.3 Working Conference on Data and Applications Security Start Date
    969 bytes (163 words) - 15:36, 15 December 2022
  • influence the lifetime of data and data-sets. In many scientific environments, data-driven analyses are now performed on large volumes of data and multiple sources
    3 KB (513 words) - 15:29, 19 October 2022
  • Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1982&venue=eurocrypt Deadlines organization
    772 bytes (165 words) - 10:11, 11 August 2023
  • representation graph databases and (semantic) Web data data mining, information extraction, search data streams data-centric (business) process management, workflows
    4 KB (602 words) - 14:05, 19 October 2022
  • Distributed data platforms, including Cloud data systems, key-value stores, and Big Data systems Information extraction and integration Streaming data analysis
    4 KB (540 words) - 07:50, 7 August 2023
  • 14:Event HOTCHIPS 2022 (section Security)
    Highly-Reliable Systems Machine Learning, Vision and Graphics Chips Data Analytics and Big Data Processing IoT and Always-On Functions Custom Chips for Emerging
    2 KB (251 words) - 13:33, 19 October 2022
  • 2017-06-02 → 2017-06-04 Software Engineering Information Systems Information Technology Big Data XP (Research Papers) 2017 2017-05-22 → 2017-05-26 Software Engineering Agile
    145 bytes (4,762 words) - 16:53, 20 October 2022
  • Linked Data & Data Integration Knowledge Discovery & Intelligent Search Business Models, Governance & Data Strategies Big Data & Text Analytics Data Portals
    11 KB (1,179 words) - 15:27, 19 October 2022
  • Computing - Green Computing - Information and Data Management - Telecommunications - Communication protocols - Security and Access Control - Transmission Techniques
    4 KB (457 words) - 14:03, 19 October 2022
  • performance evaluation Crowd sourcing Data models, semantics, query languages Data provenance Data visualization Data warehousing, OLAP, SQL Analytics Database
    4 KB (586 words) - 10:35, 4 November 2022
  • following: Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks Security & Privacy in the Internet of Things (IoT) Security & Privacy
    3 KB (398 words) - 08:57, 5 August 2023
  • Reliability, Security, Privacy and Risk in the domain of Digital Ecosystems. We solicit papers in the area of trust, reliability, security and privacy assessment
    4 KB (691 words) - 15:29, 19 October 2022
  • Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1989&venue=eurocrypt Deadlines organization
    783 bytes (177 words) - 09:53, 11 August 2023
  • Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1985&venue=eurocrypt Deadlines organization
    743 bytes (173 words) - 10:01, 11 August 2023
  • Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1984&venue=eurocrypt Deadlines organization
    745 bytes (175 words) - 10:03, 11 August 2023
  • Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1990&venue=eurocrypt Deadlines organization
    816 bytes (181 words) - 09:51, 11 August 2023
  • Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1994&venue=eurocrypt Deadlines organization
    803 bytes (177 words) - 09:40, 11 August 2023
  • Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1992&venue=eurocrypt Deadlines organization
    780 bytes (174 words) - 09:48, 11 August 2023
  • Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1986&venue=eurocrypt Deadlines organization
    756 bytes (173 words) - 10:00, 11 August 2023
  • Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1988&venue=eurocrypt Deadlines organization
    776 bytes (175 words) - 09:56, 11 August 2023
  • Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1993&venue=eurocrypt Deadlines organization
    805 bytes (177 words) - 09:43, 11 August 2023
  • Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1987&venue=eurocrypt Deadlines organization
    751 bytes (174 words) - 09:58, 11 August 2023
  • 14:Event UC-Sec 2009 (category Computer security and reliability)
    sensors and biometrics to enable security - Security in U-commerce and U-business and other applications - Security in P2P networks and Grid computing
    6 KB (955 words) - 15:30, 19 October 2022
  • 14:Event PDCAT 2008 (category Computer security and reliability)
    Bioinformatics 3-10 Database applications and data mining 3-11 Intelligent computing and neural networks 4. Security and Privacy 4-01 Access control and authorization
    5 KB (769 words) - 15:28, 19 October 2022
  • software, including enterprise data, linked data & open data strategies, methodologies in knowledge modelling and text & data analytics. The SEMANTiCS community
    12 KB (1,700 words) - 14:19, 19 October 2022
  • "Cloud System Security" but also more subjects will be discussed at the conference such as Data Privacy, Cryptology, Information Security, E-Governance
    3 KB (460 words) - 14:10, 19 October 2022
  • for Big Data Intelligence Data Warehouses, Data Lakes Big Data Storage and Indexing Big Data Analytics: Algorithms, Techniques, and Systems Big Data Quality
    2 KB (370 words) - 08:12, 7 August 2023
  • Foundations for Social issues * * Data science meets social science. * Security, trust and risk in big data. * Data integrity, matching and sharing. *
    3 KB (386 words) - 13:08, 19 October 2022
  • Rights Management Systems; Security Policy Analysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies. Networking
    3 KB (468 words) - 06:52, 21 November 2022
  • tests, and deployment Sensor technologies Traffic control and management Security, privacy and safety systems Smart mobility Products and services Modelling
    2 KB (288 words) - 07:53, 7 August 2023
  • - Internet and Router Security - Intrusion Detection and Prevention - Mobile and Wireless Network Security - Multicast Security - Phishing and Online Fraud
    8 KB (1,051 words) - 14:46, 19 October 2022
  • Semantic Web * Web Agents and Web Intelligence * Web Data Integration * Web Data Mashup * Web Data Models * Web Information Retrieval * Web Metrics * Web
    2 KB (350 words) - 15:29, 19 October 2022
  • and Web data * Semi-structured data management * Web Information Extraction * Information retrieval in semi-structured data and the Web * Data integration
    3 KB (335 words) - 15:30, 19 October 2022
  • ICINS-ACM 2016 : 2016 4th International Conference on Information and Network Security (ICINS 2016)--Ei Compendex Start Date 2016-12-28 End Date 2016-12-31 Status
    590 bytes (147 words) - 14:55, 19 October 2022
  • Cryptographic Techniques, Cryptography, Computer Security Official Website http://www.iacr.org/cryptodb/data/conf.php?year=1991&venue=eurocrypt Deadlines organization
    783 bytes (192 words) - 09:50, 11 August 2023
  • following areas: Data and information acquisition and preprocessing (e.g., data crawling, IoT data, data quality, data privacy, mitigating biases, data wrangling)
    36 KB (5,252 words) - 11:51, 4 August 2023
  • armoring and patching •Cross-layer IoT security •IoT ecosystem-level security analysis •Clean-slate IoT security design Important Dates Paper submission:
    4 KB (632 words) - 14:11, 19 October 2022
  • database architectures, distributed data management (e.g., data stream management, P2P, replication, and caching) - Data management applications (e.g., Web
    7 KB (1,001 words) - 11:00, 4 November 2022
  • Engineering Computer-Supported Cooperative Work Data cleansing and noise reduction Data streams and incremental mining Data visualization E-Commerce Solutions and
    6 KB (863 words) - 15:27, 19 October 2022
  • ranging from real-time data processing in web environments, logistics and networking, to complex event processing in finance and security. The DEBS conference
    7 KB (994 words) - 06:08, 4 August 2023
  • experiments on human subjects, or that analyze nonpublic data derived from human subjects (even anonymized data), will be asked to certify that their work was vetted
    6 KB (855 words) - 09:21, 29 August 2023
  • query processing * Context-aware Computing * Data or query Dissemination * Data stream processing * Mobile Data and Services * Location-Based Services * Location
    3 KB (413 words) - 14:46, 19 October 2022
  • Semantic web Data modeling, mining and data analytics Data modeling, aggregation, integration, and transformation Web and text mining Data mining methods
    18 KB (2,436 words) - 14:19, 19 October 2022
  • scheduled Mode on site City Coimbra Country Portugal (PT) Academic Field Data Mining, Database, Information System Official Website http://ideas.concordia
    4 KB (563 words) - 12:39, 14 December 2022
  • ‘information security’ and ‘user privacy’ can be ensured. In answer to these concerns, the 7th International Conference on Trust, Privacy and Security in Digital
    8 KB (1,074 words) - 15:29, 19 October 2022
  • range of IoT-related technologies: - Security and privacy in heterogeneous IoT. - Secure and Privacy Preserving Data Mining and Aggregation in IoT applications
    3 KB (476 words) - 14:23, 19 October 2022
  • Extreme Programming 2. Intelligent Database Systems: Data Warehousing, Data Mining, and Big Data Mobile and Peer-to-Peer Databases Spatial, Temporal, Multimedia
    3 KB (415 words) - 13:25, 18 October 2022
  • middleware Management of Semantic Web Data Languages, tools and methodologies for representing and managing Semantic Web data Database, IR and AI technologies
    6 KB (904 words) - 07:39, 2 February 2024
  • limited to: Data governance Knowledge representation and semantic knowledge management Data modeling Data quality Data value assessment Data integration
    7 KB (981 words) - 14:19, 19 October 2022
  • science data integration and management Authenticity, privacy, security, and trust in Big life science data Knowledge graphs from Big life science data Knowledge
    6 KB (831 words) - 13:07, 19 October 2022
  • experiments on human subjects, or that analyze nonpublic data derived from human subjects (even anonymized data), will be asked to certify that their work was vetted
    5 KB (858 words) - 09:20, 29 August 2023
  • Rights Management Systems; Security Policy Analysis and Crisis Management; Cyber-attacks and Security; Energy Policy and Security of Supplies. Networking
    3 KB (419 words) - 15:47, 15 December 2022
  • theft and data falsification -Encryption together with linked and semantic data -Digital signatures together with linked and semantic data -Data transparency
    7 KB (1,014 words) - 14:19, 19 October 2022
  • Networking, Neural networks, Network security, Biometrics Technologies and Applications, Pattern Recognition and Biometrics Security, Bioinformatics and IT Applications
    4 KB (523 words) - 14:55, 19 October 2022
  • Multi-Databases Data and Information Networks Data and Information Semantics Data Integration, Metadata Management, and Interoperability Data Structures and
    5 KB (661 words) - 12:05, 4 August 2023
  • monitoring, extraction) - Security, compliance, and nonfunctional properties - Cloud-enabled applications, migration to/from the Cloud, big data - Applications,
    7 KB (1,054 words) - 14:26, 19 October 2022
  • Privacy and Security in Databases. * Query processing and optimisation. * Semi-structured data. * Spatial data processing/management. * Stream Data Management
    3 KB (396 words) - 14:44, 19 October 2022
  • Performance evaluation - Management of Incomplete information - Data Cleaning XML and Data Integration - XML query translation - XML and P2P - XML and Web
    3 KB (448 words) - 14:25, 19 October 2022
  • and integrating linked data Querying and consuming linked data Facilitating data reuse both technically and legally (Linked Open Data) Information extraction
    8 KB (981 words) - 14:13, 19 October 2022
  • Radar Radar Signal and Data Processing: ● Waveform Design and Optimization ● Digital Beamforming ● Space Time Adaptive Processing ● Data fusion and Resources
    3 KB (383 words) - 11:58, 4 August 2023
  • Cognitive Systems Computational Finance and Economy Computational Intelligence Data Mining and Knowledge Discovery Evolutionary Computation Evolving Systems
    3 KB (404 words) - 18:22, 20 March 2024
  • 2008-10-13 organization Special Interest Group on Mobility of Systems, Users, Data and Computing, Association for Computing Machinery Metrics Organizer Organization
    2 KB (391 words) - 08:30, 20 September 2023
  • assessment approaches for CPS privacy in CPS network security for CPS game theory applied to CPS security security of embedded systems, IoT and real-time systems
    4 KB (688 words) - 13:06, 19 October 2022
  • forms, ranging from signal, image, and multimedia data to traditional structured data and semi structured data found in the web. The expansion of online multimedia
    5 KB (711 words) - 14:13, 19 October 2022
  • Interoperability in SW & Data systems: Design, exploration, and analysis of architectures and software frameworks for interoperability in SW and Data systems. (e.g
    4 KB (582 words) - 13:32, 19 October 2022
  • function, programmable, reconfigurable, near-data and in-memory accelerators, etc. Architectural support for security, side-channel attacks and mitigation, privacy
    4 KB (605 words) - 11:57, 17 November 2022
  • Networking for Quality, Reliability, Security and Robustness Computer Networking SIGCOMM - ACM Special Interest Group on Data Communications Computer Networking
    104 bytes (3,255 words) - 10:03, 1 September 2022
  • Privacy and security in Auto ID systems * Managing access rights of sensitive RFID data in dynamic supply chains * Standards for Auto ID data * Data Management
    4 KB (574 words) - 15:27, 19 October 2022
  • engineering and metadata management • Ontology-based data management, linked data management, semantic big data management • Processes, workflows, roles and responsibilities
    3 KB (448 words) - 14:19, 19 October 2022
  • specific data mining + Domain specific data mining applications, such as web mining, blog mining, security mining, taxation mining, scientific data mining
    4 KB (604 words) - 14:45, 19 October 2022
  • Web Data Extraction, Web Structure Mining -- Formal Models for Web Data and Knowledge Management: Data Models and Meta-data, Semi-structured Data and XML
    3 KB (530 words) - 15:30, 19 October 2022
  • Mining Social Data Start Date 2008-07-21 End Date 2008-07-22 Status as scheduled Mode on site City Patras Country Greece (GR) Academic Field Data Mining Official
    3 KB (530 words) - 15:28, 19 October 2022
  • Biometric Security and Privacy * liveness (spoof) detection * template protection * cancelable templates * encryption and watermarking * security analysis
    3 KB (412 words) - 15:30, 19 October 2022
  • forms, ranging from signal, image, and multimedia data to traditional structured data and semi-structured data found in the web. SITIS spans two inter-related
    5 KB (786 words) - 15:29, 19 October 2022
  • Management Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs Security & Privacy in Peer-to-Peer and Overlay Networks Security & Privacy
    3 KB (422 words) - 15:55, 15 December 2022
  • Management Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs Security & Privacy in Peer-to-Peer and Overlay Networks Security & Privacy
    3 KB (440 words) - 15:54, 15 December 2022
  • Linked Data Integration and mash-up of Linked Data Mining of Linked Data Big Data and Semantics Ontology engineering for big data Ontology based data integration
    6 KB (818 words) - 14:13, 19 October 2022
  • Real-time data management Cloud data management Recommendation systems Data archive and digital library Data mining Search and information retrieval Data model
    4 KB (561 words) - 15:36, 15 December 2022
  • applications Big data Crowdsourcing Cloud data management Data archive and digital library Data mining Data model and query language Data quality and credibility
    4 KB (529 words) - 13:08, 19 October 2022
  • Big Data application studies on large-scale clusters Applications at the boundary of HPC and Big Data New applications for converged HPC/Big Data clusters
    3 KB (450 words) - 13:16, 28 November 2023
  • transaction management Data management in clouds Data mining and knowledge discovery Data quality, curation, and provenance Data warehousing, large-scale
    3 KB (369 words) - 13:06, 19 October 2022
  • Field Network Security Official Website https://conferences.sigcomm.org/imc/2004/ Deadlines organization Special Interest Group on Data Communication,
    763 bytes (169 words) - 12:28, 14 March 2024
  • Field Network Security Official Website https://conferences.sigcomm.org/imc/2007/ Deadlines organization Special Interest Group on Data Communication,
    672 bytes (167 words) - 11:34, 14 March 2024
  • Field Network Security Official Website https://conferences.sigcomm.org/imc/2002/ Deadlines organization Special Interest Group on Data Communication,
    724 bytes (167 words) - 12:50, 14 March 2024
  • Real-time data processing algorithms  Real-time data processing architectures and systems  Using FPGA, GPU, ASIC technologies for high performance data analytics
    4 KB (662 words) - 14:18, 19 October 2022
  • views of data; since data come from heterogeneous sources, and their structure changes in time, flexible techniques for managing data collected in data warehouses
    7 KB (1,024 words) - 14:56, 19 October 2022
  • replication schemes, optimal data allocation, multidimensional analysis, access patterns, data declustering, Client Caching Data Management Systems, index
    5 KB (735 words) - 15:27, 19 October 2022
  • Search, In-memory Data Management, Hardware Accelerators, Query Processing and Optimization, Storage Management. Privacy and Security in Data Management. Graph
    6 KB (948 words) - 14:23, 19 October 2022
  • experiments on human subjects, or that analyze nonpublic data derived from human subjects (even anonymized data), will be asked to certify that their work was vetted
    7 KB (1,090 words) - 09:23, 29 August 2023
  • Cross-layer design for security ? Formal methods for WSN security ? Resilient revocation mechanism ? Mobile platform and systems security Paper Submission Every
    3 KB (542 words) - 14:55, 19 October 2022
  • distributed data mining algorithms Mining on data streams Graph and subgraph mining Methodologies on large-scale data mining Text, video, multimedia data mining
    3 KB (336 words) - 12:58, 19 October 2022
  • to database systems * Data models, query models, and query languages for networking * Archiving and analysis of network data * Data analysis for network
    3 KB (412 words) - 15:27, 19 October 2022
  • Interest Group on Data Communication, Association for Computing Machinery Metrics Organizer Organization Special Interest Group on Data Communication, Association
    760 bytes (179 words) - 10:53, 14 March 2024
  • Berlin City Berlin Region Berlin Country Germany (DE) Academic Field Network Security Official Website https://conferences.sigcomm.org/imc/2011/ Deadlines organization
    828 bytes (181 words) - 11:30, 14 March 2024
  • Academic Field Network Security Official Website https://www-net.cs.umass.edu/imc2012/ Deadlines organization Special Interest Group on Data Communication, Association
    739 bytes (182 words) - 11:06, 14 March 2024
  • Interest Group on Data Communication, Association for Computing Machinery Metrics Organizer Organization Special Interest Group on Data Communication, Association
    752 bytes (179 words) - 10:42, 14 March 2024
  • Field Network Security Official Website https://www.usenix.org/legacy/events/imc05/ Deadlines organization Special Interest Group on Data Communication
    736 bytes (172 words) - 12:10, 14 March 2024
  • City Vouliagmeni Region Attica Country Greece (GR) Academic Field Network Security Official Website https://conferences.sigcomm.org/imc/2008/ Deadlines organization
    811 bytes (180 words) - 11:30, 14 March 2024
  • Field Network Security Official Website https://conferences.sigcomm.org/imc/2006/ Deadlines organization Special Interest Group on Data Communication,
    752 bytes (172 words) - 12:23, 14 March 2024
  • Field Network Security Official Website https://conferences.sigcomm.org/imc/2003/ Deadlines organization Special Interest Group on Data Communication,
    762 bytes (177 words) - 12:36, 14 March 2024
  • and Education Security and Privacy Issues Cross-Organizational Collaboration Social Media and EIS EIS and Internet of Things Use of Open Data for EIS Semantic
    1 KB (218 words) - 14:45, 19 October 2022
  • Field Network Security Official Website https://conferences.sigcomm.org/imc/2014/ Deadlines organization Special Interest Group on Data Communication,
    764 bytes (183 words) - 10:45, 14 March 2024
  • Field Network Security Official Website https://conferences.sigcomm.org/imc/2009/ Deadlines organization Special Interest Group on Data Communication,
    821 bytes (188 words) - 11:30, 14 March 2024
  • Field Network Security Official Website https://conferences.sigcomm.org/imc/2016/ Deadlines organization Special Interest Group on Data Communication,
    763 bytes (190 words) - 10:34, 14 March 2024
  • to Modern Hardware Data-Centric Programming Abstractions, Comprehensions, Monads Data Integration, Exchange, and Interoperability Data Synchronization and
    2 KB (256 words) - 13:07, 19 October 2022
  • International Conference on Security, Artificial Intelligence and Modeling for the next generation Internet of Things (SAM IoT) 2020 Security and Privacy for IoT:
    6 KB (888 words) - 14:18, 19 October 2022
  • Information Retrieval Data Grids, Data and Information Quality Big Data Management Temporal and Spatial Databases Data Warehouses and Data Mining Web Mining
    4 KB (658 words) - 14:56, 19 October 2022
  • 14:Event SIN 2009 (category Computer security and reliability)
    Signals & security Securing storage: SAN/NAS security Security ontology, models, protocols & policies Semantics of security Software security and testing
    16 KB (2,311 words) - 15:30, 19 October 2022
  • service composition - RESTful Web services (design aspects, hypermedia, linked data, mashups, conversations) - Microservices and Nanoservices (architecture,
    4 KB (700 words) - 14:26, 19 October 2022
  • and management * context-aware data access and query processing * data caching, replication and view materialization * data publication modes: push, broadcast
    7 KB (1,021 words) - 11:16, 24 October 2022
  • Environment Management of Exceptional Events: ​Incidents and Evacuation Security, Privacy and Safety Systems Transportation Smartification Deep Learning
    3 KB (409 words) - 07:51, 7 August 2023
  • Event Processing Data Curation, Annotation and Provenance Data Models and Query Languages Data Streams and Publish-Subscribe Systems Data Structures and
    9 KB (1,011 words) - 13:07, 19 October 2022
  • alternative trend of using collaboration and trust to provide security. Instead of centrally managed security policies, nodes may use specific knowledge (both local
    3 KB (515 words) - 15:28, 19 October 2022
  • databases: * consistent query answering * data exchange * data mining * data warehousing and OLAP for novel forms of data * database repairing * DB + IR * incomplete
    5 KB (747 words) - 15:22, 19 October 2022
  • Computational Learning Theory * Computational Optimization * Cryptography and Security * Data Structures * Distributed and Parallel Algorithms * Experimental Techniques
    2 KB (308 words) - 15:27, 19 October 2022
  • -Intrusion detection -Keyboard information security -Information security governance -Information security management systems -Risk assessment and management
    5 KB (710 words) - 14:13, 19 October 2022
  • and Incident Management Investigative Case Studies Data Hiding Techniques and Steganography Novel Data Recovery Techniques Digital Evidence Extraction Techniques
    4 KB (571 words) - 14:26, 19 October 2022
  • networks, traffic management, complex graphs, semantic Web, Big Data, and network security. Topics of interest for track LHNA Large Network Analysis - methods
    4 KB (554 words) - 14:13, 19 October 2022
  • function, programmable, reconfigurable, near- data and in-memory accelerators, etc. Architectural support for security, side-channel attacks and mitigation, privacy
    6 KB (757 words) - 11:53, 17 November 2022
  • and Optimization for performance, energy, virtualization, portability, security, or reliability concerns, and architectural support - Efficient execution
    4 KB (534 words) - 13:44, 2 May 2023
  • mining social semantic data * Policies, authentication, security, and trust within collaborative scenarios * Producing Semantic Web data from social software
    6 KB (795 words) - 15:27, 19 October 2022
  • social networks. Data mining and inference helps to extract implicit facts. P2P systems are proper answers to an increasing amount of data that shall be exchanged
    5 KB (783 words) - 15:20, 19 October 2022
  • mechanisms in VANETs Security and privacy metrics Authentication and access control in VANETs User and Data trust issues in VANETs Formal security models for VANET
    2 KB (304 words) - 14:23, 19 October 2022
  • modelling and engineering - Web mining and knowledge extraction - Web Big Data and Web data analytics - Mobile Web applications - Web of Things applications -
    5 KB (786 words) - 13:02, 16 January 2024
  • interworking of wired and wireless networks Security issues of data management in wireless networks QoS issues for data-intensive services in wireless networks
    5 KB (691 words) - 14:45, 19 October 2022
  • provisioning, calibration and deployment Data, information, and signal processing Deployment experience and testbeds Data storage and management Experimental
    6 KB (894 words) - 15:30, 19 October 2022
  • Computational Intelligence Cyber Physical Systems Data Analytics Data/Web Mining and Knowledge Discovery Data Science Deep Learning Evolutionary Computation
    3 KB (392 words) - 18:22, 20 March 2024
  • Networks * Component-Based Software Engineering * Cryptography and Network Security * Data Mining and Knownledge Discovery * E-Commerce and its Applications *
    2 KB (242 words) - 15:30, 19 October 2022
  • Software reliability engineering. * Dependability in data streaming. * Dependability benchmarking. * Security. * Software engineering for dependability. * Fault
    4 KB (622 words) - 14:46, 19 October 2022
  • developments in GPR systems, antennas and observation modalities; Advanced data and image processing algorithms; Forward modelling techniques and inversion
    1 KB (249 words) - 20:23, 22 September 2022
  • to Modern Hardware Data-Centric Programming Abstractions, Comprehensions, Monads Data Integration, Exchange, and Interoperability Data Synchronization and
    2 KB (347 words) - 13:08, 19 October 2022
  • approaches) Multimedia and Semantic Web Semantic Annotation of Data Semantic Web Trust, Privacy, Security and Intellectual Property Rights Query Languages and Optimization
    2 KB (377 words) - 06:49, 4 August 2023
  • wireless multimedia computing (WMC) and security services. - Multimedia indexing, processing and retrieval for WMC - Data mining applications for WMC - Content-aware
    4 KB (563 words) - 15:29, 19 October 2022
  • 2009-05-18 2009-03-02 organization Special Interest Group on Management of Data, Association for Computing Machinery organization Special Interest Group
    7 KB (1,010 words) - 09:47, 4 August 2023
  • Processing Data and Information Modelling Data and Information Integration Data and Information Networks Data and Information Privacy and Security Data and Information
    4 KB (587 words) - 10:11, 5 August 2023
  • containers and virtual machines; system software supporting data management, scalable data analytics, machine learning, and deep learning; specialized
    5 KB (728 words) - 16:33, 12 March 2024
  • enterprise integration �?� Long-term large scale project data archiving, access, concurrent data control for CE �?� Industrial scenarios, case studies of
    4 KB (569 words) - 09:53, 14 March 2023
  • 14:Event MIS Review - Special Issue 2009 (category Data mining)
    limited to: DATA WAREHOUSING AND DATA MINING -------------------------------- Models and Algorithms in Data Mining Video and Multimedia Data Mining Parallel
    5 KB (793 words) - 15:26, 19 October 2022
  • Internet of things for smart environments and urban networking • Big data and data mining for smart environments and urban networking • Enabling wireless
    6 KB (813 words) - 14:19, 19 October 2022
  • Multi-Databases Data and Information Networks Data and Information Semantics Data Integration, Metadata Management, and Interoperability Data Structures and
    5 KB (620 words) - 10:24, 4 July 2023
  • answering in large volumes of data Annotation, extraction, summarization, and integration of heterogeneous data resources Semantic data mining Semantic social
    9 KB (1,240 words) - 15:28, 19 October 2022
  • Components, Tx/Rx Module Technologies R04 Radar Front-Ends RADAR Signal and Data Processing R05 Beam-Forming, MIMO and Exploiting Diversity R06 Imaging Techniques
    2 KB (331 words) - 09:14, 5 August 2023
  • Computational Neuro Science Computer Vision Content Based Image Retrieval Data mining Decision Support Systems Distributed AI Emerging Applications Evaluation
    3 KB (448 words) - 15:20, 19 October 2022
  • Networks * Mobile Communication Systems * Network Data Mining * Network Management * Network Security and Cooperation * Optical Networks * Orthogonal Frequency
    3 KB (430 words) - 14:45, 19 October 2022
  • discovery; data mining; differential privacy, pattern recognition; complex knowledge - representation and management; foundations and theories for data analysis
    5 KB (787 words) - 14:12, 19 October 2022
  • services Data management in wireless networks Data management in sensor and mobile ad hoc networks Data management in mobile peer-to-peer networks Data mining
    13 KB (1,346 words) - 15:22, 19 October 2022
  • Extreme Programming 2. Intelligent Database Systems: Data Warehousing, Data Mining, and Big Data Mobile and Peer-to-Peer Databases Spatial, Temporal, Multimedia
    3 KB (420 words) - 12:58, 19 October 2022
  • Remote measurements & telemetry MEASUREMENT-DATA PROCESSING Mathematical modeling of signals and systems Data preprocessing & postprocessing Digital signal
    3 KB (449 words) - 14:55, 19 October 2022
  • are not limited to: 1. security in future Internet architectures - role of security in future architectures - integrating security into future protocols
    4 KB (598 words) - 15:27, 19 October 2022
  • Sourcing _ IQ in the Web, Data Integration, and eBusiness _ Scientific Data _ Data Warehousing and Business Intelligence _ Master Data Management SUBMISSION
    5 KB (801 words) - 14:55, 19 October 2022
  • probed or monitored, data privacy and anonymity for all personally identifiable information, and etiquette for using shared measurement data (see Allman and
    6 KB (907 words) - 15:20, 19 October 2022
  • the formation of network of digital technologies. Information and Data Management Data and Network mining Intelligent agent-based systems, cognitive and
    4 KB (617 words) - 15:26, 19 October 2022
  • Processing Techniques (Compressive Sensing, Multi-Aperture, MIMO, … ) (D) SAR Data Evaluation and Modeling D1 Electromagnetic Modeling and Wave Propagation
    3 KB (441 words) - 12:00, 4 August 2023
  • 14:Event DocEng 2019 (section Security)
    Linked data and semantics enrichment, linking techniques and standards Documents and privacy Secure document workflows, policy, and access, security for mobile
    4 KB (224 words) - 10:03, 5 August 2023
  • 14:Event DocEng 2018 (section Security)
    Linked data and semantics enrichment, linking techniques and standards Documents and privacy Secure document workflows, policy, and access, security for mobile
    4 KB (223 words) - 09:24, 5 August 2023
  • engineering and metadata management Ontology-based data management, linked data management, semantic big data management Governance aspects such as workflows
    7 KB (922 words) - 14:20, 19 October 2022
  • limited to: 1. AI and Big Data Analytics: Artificial intelligence, Knowledge Representation, Machine Learning, Uncertainty. Big data, Data Mining, Information
    4 KB (697 words) - 14:22, 19 October 2022
  • of XML data * Indexing and retrieval of XML data * Query processing over XML data * Benchmarks and performance using XML/Web-databases * Security and privacy
    4 KB (564 words) - 13:08, 19 October 2022
  • applica>ons. Topics: Novel developments in GPR systems and antennas Advanced data and image processing algorithms Forward modelling techniques and inversion
    2 KB (281 words) - 14:12, 19 October 2022
  • Discovery: Machine Learning Deep Learning Data Mining Process Mining Data Analytics Topic 3: Semantic Web and Linked Open Data: Web Architecture Tools Vocabularies
    2 KB (348 words) - 13:08, 19 October 2022
  • implementations of data mining algorithms Privacy- and anonymity-preserving data analysis Stream Data Mining Mining moving object data, RFID data, and data from sensor
    5 KB (711 words) - 14:55, 19 October 2022
  • ======== Grid computing enables the sharing of distributed computing and data resources such as processing, network bandwidth and storage capacity to create
    5 KB (651 words) - 14:55, 19 October 2022
  • Interaction Privacy and Confidentiality Access Control Big Data and Data Mining Android Security
    1 KB (186 words) - 13:00, 19 October 2022
  • paradigms revisited: object, component, aspect, agent Privacy, Trust, and Security is Distributed Systems Context Awareness and Self-Adaptation Fault-Tolerance
    2 KB (296 words) - 15:28, 19 October 2022
  • XML Repositories - XML Data and Knowledge Management over Grids - XML Data and Knowledge Management in Mobile Settings - XML Data and Knowledge Management
    7 KB (1,106 words) - 14:46, 19 October 2022
  • and Summarization 1.6 Semantic Analysis of Multimedia Data 1.7 Statistical Modeling of Multimedia Data 2. Multimedia Signal Processing and Communications
    3 KB (514 words) - 10:31, 6 February 2024
  • behaviours Impact of big data on the development of Web Science Web Science approaches to data science, data analytics, and the Web of data Detecting, preventing
    8 KB (1,094 words) - 09:34, 4 August 2023
  • of interest include but are not limited to: Scalable Data Access Question Answering Big Linked Data processing Natural­ Language generation Benchmarks for
    7 KB (982 words) - 15:22, 19 October 2022
  • of interests: # Applications of Semantic Web technologies # Data Semantics and Linked Data # Semantic Social Networks # Semantic Portals # Semantic Web
    4 KB (544 words) - 15:30, 19 October 2022
  • Network, Passive and MIMO Radars, Multi-Sensor and Multi-Static Systems and Data Fusion R13 Over-the-Horizon, Imaging and CW Radars, Innovative Radar Concepts
    3 KB (416 words) - 12:10, 4 August 2023
  • methods. •Track 4: Biometrics, forensics and security, mobile applications, big data, small sample size, data mining and performance evaluation, intelligent
    2 KB (341 words) - 14:04, 19 October 2022
  • structured data image and video audio and speech user-generated content big data natural language deep learning Description and Integration (of data and services)
    5 KB (616 words) - 09:45, 27 October 2023
  • and multi-media Temporal data analysis, prediction, and forecasting; time series analysis Communications and computer networks Data mining and knowledge discovery
    5 KB (732 words) - 13:23, 8 March 2024
  • Applications ◦ Application Methods and Algorithms ◦ Adaptation to Multicore ◦ Data Distribution, Load Balancing & Scaling ◦ MPI/OpenMP Hybrid Computing ◦ Visualization
    5 KB (642 words) - 11:36, 28 November 2023
  • protocols and technologies for WMC - Security, privacy, and cryptographic protocols for WMC - Network security issues and protocols in WMC - Authentication
    3 KB (551 words) - 15:30, 19 October 2022
  • invited. Analytics (from contents to semantics) Structured data image and video audio and speech big data natural language deep learning Description and Integration
    5 KB (661 words) - 08:13, 27 October 2023
  • USA Zhiling Lan, Illinois Institute of Technology, USA Database and data mining, data management Program vice chair: Makoto Takizawa, Seikei University,
    8 KB (1,222 words) - 14:17, 19 December 2023
  • latest research results and to exchange new ideas and practical experience in data and computer communications, optical fiber communications, microwaves, antennas
    2 KB (345 words) - 14:14, 19 October 2022
  • 2022-05-16 → 2022-05-19 Network Security WiSec 2021 2021-06-28 → 2021-07-02 Network Security WiSec 2020 2020-07-08 → 2020-07-10 Network Security WiSec 2019 2019-05-15 → 2019-05-17
    71 bytes (166 words) - 09:25, 8 November 2022
  • embedded systems, socio-technical systems, cloud computing, big data, machine learning, security, open source, and sustainability. In 2021, MODELS has a special
    2 KB (352 words) - 15:55, 8 September 2023
  • and original papers on the following topics: Smart cities Big data acquisition; Urban security; Biometrics; Enabling wireless and mobile technologies; M2M
    4 KB (640 words) - 14:04, 19 October 2022
  • algorithms for information aggregation in networks * Giuseppe Persiano: Security of networks of low capability devices * Christian Scheideler: Algorithms
    4 KB (644 words) - 14:54, 19 October 2022
  • efficiently manage, transfer, and analyze huge volume of data and knowledge. Grid computing, P2P technology, data and knowledge bases, distributed information retrieval
    4 KB (581 words) - 15:22, 19 October 2022
  • Cyber Security Data Modeling for Cloud-Based Networks E-Learning E-Commerce E-Marketing E-Banking Data Mining Data Mining Techniques Ethics of Data Mining
    2 KB (249 words) - 14:45, 19 October 2022
  • application perspective. Here, networks could mean a set of collaborative data processing nodes that serve as application proxies ( e.g., airborne nodes
    5 KB (786 words) - 14:55, 19 October 2022
  • systems Auditing and provenance Big data, analytics, and data sciences Caching, replication, and consistency Cloud storage Data deduplication Database storage
    5 KB (684 words) - 13:33, 19 October 2022
  • - Audio, music, and speech analysis - Data and web mining - Behavior of software, systems, and networks - Security - Privacy - Analysis of social media
    5 KB (729 words) - 08:36, 27 October 2023
  • and performance; Constraint databases; Data exchange, data integration and interoperability; Data mining; Data models; Database programming and query languages;
    6 KB (798 words) - 14:03, 19 October 2022
  • Online communities - Databases / XML / Data mining - Information integration - Information personalization - Security Intelligent Information Processing -
    5 KB (707 words) - 12:30, 7 November 2023
  • Networks - Network Functions Virtualization - Software Define Network - Big Data Management - Content-oriented Infrastructures - Smart Cities and Urban Computing
    7 KB (976 words) - 09:54, 29 December 2023
  • Information Processing - Information and Data Management - Information Content Security - E-Technology - Cryptography and Data Protection - E-Government - E-Learning
    2 KB (351 words) - 13:08, 19 October 2022
  • Analytics (from contents to semantics): Structured data, image and video, audio and speech, big data, natural language, deep learning Description and Integration:
    3 KB (447 words) - 14:04, 19 October 2022
  • Conference on Information Security and Privacy Ordinal 26 Event Series ACISP - Australasian Conference on Information Security and Privacy Start Date 2021-12-01
    553 bytes (125 words) - 09:39, 6 June 2023
  • of interest include (but are not limited to) the following: Algorithms and Data Structures Algorithmic Game Theory Approximation Algorithms and Online Algorithms
    1 KB (221 words) - 13:06, 19 October 2022
  • Topics of particular interest include, but are not limited to: o Data Management and Data Centers o Distributed Algorithms o Distributed Operating Systems
    2 KB (407 words) - 14:56, 19 October 2022
  • Safety and Security User Interface Design Wearable Computing Internet Initiative Technology and Policy Cloud Computing Grid Computing Big-data Analysis Biomedical
    3 KB (427 words) - 14:13, 19 October 2022
  • conference covers optimization for parallelism, performance, power, and security, where that optimization occurs in the mapping from an input (including
    3 KB (446 words) - 14:45, 19 October 2022
  • and Workflow Management Database Indexing and Tuning Data Privacy and Security Data Warehousing, Data Cubes, and Aggregate Processing Digital Library Disk
    7 KB (1,151 words) - 14:45, 19 October 2022
  • many fields such as embedded systems, distributed systems, data management, system security and applications. The conference places emphasis on layers
    4 KB (604 words) - 15:27, 19 October 2022
  • systems o E-commerce and business integration solutions o Architecture o Security o Performance of information systems o Applications in public health o
    5 KB (657 words) - 15:28, 19 October 2022
  • Fuzzy control, robotics, sensors, fuzzy hardware and architectures Fuzzy data analysis, fuzzy clustering, classification and pattern recognition Type-2
    3 KB (518 words) - 08:54, 30 August 2023
  • Human-machine interfaces and interaction using multiple modalities 5. Multimedia security (data hiding, authentication, and access control) 6. Multimedia networking
    4 KB (562 words) - 15:27, 19 October 2022
  • research area aiming to offer applications easy and efficient access to sensor data at the scale of billions of sensing devices. While a single sensor network
    4 KB (555 words) - 14:55, 19 October 2022
  • 13.4. Design and CAD for security 13.5. Cyberphysical system security 13.6. Nanoelectronic security 13.7. Supply chain security and anti-counterfeiting
    7 KB (1,087 words) - 13:40, 23 February 2023
  • Conflict resolution. Trust and reputation management. Privacy, safety and security. Scalability, robustness and dependability. Social and organizational structures
    6 KB (872 words) - 15:21, 19 October 2022
  • system and network management and troubleshooting, cloud and edge computing, security, privacy, and trust, mobile and wireless, and more. As part of our commitment
    8 KB (1,233 words) - 06:33, 7 August 2023
  • a large set of complex data affected by great level of noise, represented by non-pertinent, untrustworthy or even malicious data. Moreover, the challenge
    6 KB (891 words) - 15:29, 19 October 2022
  • as scheduled Mode on site City Shanghai Country China (CN) Academic Field Data Mining Official Website http://research.microsoft.com/dmx/M3SN Deadlines
    5 KB (681 words) - 15:22, 19 October 2022
  • Intelligence Semantics in Data Science Trust, Data Privacy, and Security with Semantic Technologies Economics of Data, Data Services and Data Ecosystems Special
    7 KB (1,012 words) - 14:18, 19 October 2022
  • the data economy, health futures, political futures Safety, Security & Trust: Safeguarding and governance of the Web and/or AI; anonymity, security and
    7 KB (1,089 words) - 11:48, 4 August 2023
  • Database Constraints NoSQL and NewSQL Databases Big Data and Conceptual Modeling Data Warehousing, Data Mining, Business Intelligence and Analytics Spatial
    5 KB (727 words) - 13:34, 19 October 2022
  • systems Auditing and provenance Big data, analytics, and data sciences Caching, replication, and consistency Cloud storage Data deduplication Database storage
    5 KB (724 words) - 13:33, 19 October 2022
  • Web-based user interfaces and services that securely access Grid resource, data, application, and collaboration services for communities of scientists. As
    3 KB (477 words) - 14:56, 19 October 2022
  • computation power, and data storage space to clients with infrastructural needs. These third party service providers can act as data stores as well as entire
    7 KB (1,027 words) - 15:29, 19 October 2022
  • analysis safety and security guidelines, standards and certification of critical systems safety and security assurance cases safety and security issues of applied
    4 KB (466 words) - 14:23, 19 October 2022
  • Chip Dependable and Fault Tolerant System Designs Test, Verification, and Security of Digital Systems Emerging Technologies in VLSI Reconfigurable and FPGA
    2 KB (281 words) - 13:00, 19 October 2022
  • Mobile Computing and Sensor Networks * Data and the Web * Data Mining, Knowledge Discovery and Stream Databases * Data Warehousing and Decision Support * Uncertainty
    4 KB (626 words) - 15:30, 19 October 2022
  • databases Mobile computing XML and semi-structured data Web Interfaces and Applications Information Security Applications Other topics B. Web mining Web content
    5 KB (730 words) - 15:30, 19 October 2022
  • processing, power management, computation, data storage, and communication; analog/mixed-signal techniques for security and machine learning; non-silicon-, carbon-
    6 KB (862 words) - 07:30, 28 March 2024
  • systems (DBMS), data storage services, and database applications is continuously expanding. New trends in hardware architectures, new data storage requirements
    6 KB (917 words) - 14:45, 19 October 2022
  • Management and Dissemination * Fusion and Data Collection * Network Management * Computer and Network Security Systems * Cyber Operations * Network Operations
    5 KB (653 words) - 15:27, 19 October 2022
  • NVRAM, PRAM, etc) - MEMS-based storage - portable storage - security and privacy - data management Important Dates: Papers submission: Jan 27, 2008 Notification
    4 KB (628 words) - 14:45, 19 October 2022
  • scholarly big data from various data sources Methods for storing, indexing, and query processing for scholarly big data Practices for scholarly big data management
    4 KB (723 words) - 14:10, 19 October 2022
  • Image security and forensics - Cryptanalysis, Information Technology Audit, Steganalysis, Data Remanence, Information Privacy, Usable Security, etc..
    3 KB (429 words) - 14:56, 19 October 2022
  • temporal data models and query languages - temporal query processing and indexing - temporal data mining - time series data management - stream data management
    6 KB (943 words) - 15:30, 19 October 2022
  • Collaborative Environments Computer Games Context-aware Systems Cyber Security Data Mining & Information Retrieval Digital Signal & Image Processing Distributed
    3 KB (375 words) - 14:04, 19 October 2022
  • software development process -Visualization of data base schemes -Protocol and log visualization (security, trust) -Source code visualization -Graph algorithms
    3 KB (437 words) - 15:30, 19 October 2022
  • SIGCOMM is the flagship annual conference of the Special Interest Group on Data Communications, a special interest group of the Association for Computing
    3 KB (464 words) - 15:30, 19 October 2022
  • or blemishes Security Documents and privacy Secure document workflows, policy, and access, security for mobile and printing devices Security printing, including
    4 KB (523 words) - 07:23, 7 August 2023
  • computations and data repositories in a distributed environment, they do not meet the newly emerging requirements from scientists to handle streaming data, accommodate
    6 KB (861 words) - 15:30, 19 October 2022
  • the field of MT continues to grow and attract more and more researchers. Data-driven approaches have become particularly fashionable in recent years. These
    16 KB (2,411 words) - 10:09, 29 December 2022
  • measurement or capturing data such as seismic measurements. Middleware is required to integrate such instruments with computation and data resources to allow
    5 KB (714 words) - 15:29, 19 October 2022
  • systems - Data mining and knowledge discovery - Data and information quality control - Data grid - Data migration and integration - Database security - Emerging
    10 KB (1,472 words) - 15:30, 19 October 2022
  • System Software Engineering Information Security Web Technology Topic 2: Networking Computer Networks Network Security Network Communications Biometric Sensors
    2 KB (380 words) - 14:09, 19 October 2022
  • advantages of such data are numerous, still research has not provided a suitable model to collect, represent, process and manage such data. Current advances
    6 KB (977 words) - 14:45, 19 October 2022
  • "imageoverlays":null} Topics of interest include, but are not limited to: Big multimedia data design and creation Deep learning for multimedia Multimedia search and recommendation
    2 KB (315 words) - 17:20, 9 October 2023
  • Radar Systems Architectures, Radar System Military Applications, Signal & Data Processing, Environmental Applications, Active ESAs, Emerging Technologies
    2 KB (300 words) - 15:28, 19 October 2022
  • for Retrieval Applications - Semantic Analysis of Multimedia and Contextual Data - Multimedia Fusion Methods - Media Content Linking and Threading Methods
    2 KB (308 words) - 14:04, 5 February 2024
  • for Retrieval Applications * Semantic Analysis of Multimedia and Contextual Data * Multimedia Fusion Methods * Media Content Linking and Threading Methods
    2 KB (310 words) - 12:26, 5 February 2024
  • Optimization techniques for security and reliability �?� Optimizations for transactional memory �?� Memory management, including data distribution and synchronization
    2 KB (288 words) - 14:45, 19 October 2022
  • for Retrieval Applications Semantic Analysis of Multimedia and Contextual Data Multimedia Fusion Methods Media Content Browsing and Retrieval Tools Multimedia
    2 KB (317 words) - 13:56, 5 February 2024
  • response in network security, as typically the detection of attacks and intrusions requires the analysis of detailed traces. Furthermore, data collection and
    5 KB (511 words) - 15:30, 19 October 2022
  • describing significant research contributions to the field of computer and data communication networks. We invite submissions on various aspects of networking
    3 KB (477 words) - 15:30, 19 October 2022
  • multimedia contents for mobile contexts. * Security issues and solutions for mobile multimedia retrieval. * Multimedia data compression techniques to enable faster
    5 KB (768 words) - 15:28, 19 October 2022
  • networks: protocols, architectures and applications Distributed and concurrent data structures, replication and consistency Distributed computing: Algorithms
    3 KB (454 words) - 13:07, 12 June 2023
  • mobile and ubiquitous computing * Mobile and ubiquitous data management and processing * Data replication, migration and dissemination in ubiquitous environments
    5 KB (694 words) - 15:26, 19 October 2022
  • including large scale data centres, regional data centres, micro data centres - Ownership models in heterogeneous distributed clouds - Security solutions which
    4 KB (640 words) - 13:33, 19 October 2022
  • Business Intelligence and Management: Data Mining; Data Management; Data Communication and Networking; Data Visualization; Data Warehousing; Intelligent Systems;
    4 KB (630 words) - 13:08, 19 October 2022
  • a large set of complex data affected by great level of noise, represented by non-pertinent, untrustworthy or even malicious data. Trust and Recommender
    5 KB (723 words) - 15:30, 19 October 2022
  • semantics) Structured data image and video audio and speech big data natural language deep learning Description and Integration (of data and services) Semantics
    2 KB (283 words) - 08:36, 27 October 2023
  • experiments on human subjects, or that analyze nonpublic data derived from human subjects (even anonymized data), will be asked to certify that their work was vetted
    6 KB (900 words) - 09:09, 29 August 2023
  • distributed platforms, middleware, embedded- and cyber-physical-systems and security infrastructures. ICTSS is the successor of previous (joint) conferences
    3 KB (475 words) - 14:08, 19 October 2022
  • Computer Graphics and Multimedia Computer Vision and Image Processing Cyber Security Data Structure and Algorithm Digital Evolution Distributed and Parallel Computing
    3 KB (512 words) - 14:55, 19 October 2022
  • Distributed and real-time monitoring and control Security and privacy protection mechanisms Safety/security co-engineering and risk assessment Probabilistic
    5 KB (653 words) - 14:22, 19 October 2022
  • 14:Event CIKM 2008 (category Data mining)
    research on information and knowledge management, as well as recent advances on data and knowledge bases. The purpose of the conference is to identify challenging
    29 KB (3,008 words) - 18:17, 15 June 2023
  • tolerance * Hardware support for security * Hardware support for virtual machines * Instruction level, thread level, and data level parallelism * Power and
    2 KB (343 words) - 15:21, 19 October 2022
  • for Retrieval Applications Semantic Analysis of Multimedia and Contextual Data Multimedia Fusion Methods Multimedia Hyperlinking Media Content Browsing
    2 KB (317 words) - 12:01, 5 February 2024
  • open collaboration technologies Open Data and Open Science Open data quality, standards, measures and metrics Open data and open science methods, applications
    6 KB (854 words) - 14:18, 19 October 2022
  • Trade-off analysis �?� Traffic scheduling SECURITY �?� Base station security management �?� Encryption algorithm �?� Data aggregation �?� Information processing
    11 KB (1,661 words) - 15:29, 19 October 2022
  • Modeling and Programming 2. Intelligent Database Systems: Data Warehousing, Data Mining, and Big Data Mobile and Peer-to-Peer Databases Spatial, Graph, Temporal
    4 KB (512 words) - 13:00, 19 October 2022
  • Extreme Programming 2. Intelligent Database Systems: Data Warehousing, Data Mining, and Big Data Mobile and Peer-to-Peer Databases Spatial, Temporal, Multimedia
    4 KB (502 words) - 12:59, 19 October 2022
  • performance evaluation * Data quality, semantics and integration * Database monitoring and tuning * Data privacy and security * Data mining and OLAP * Embedded
    6 KB (944 words) - 15:30, 19 October 2022
  • software-defined service middleware -Data analytics and data services in and for SOC-based systems -IoT and data marketplaces -Smart data and service contracts -Cognitive
    4 KB (634 words) - 14:22, 19 October 2022
  • Extreme Programming 2. Intelligent Database Systems: Data Warehousing, Data Mining, and Big Data Mobile and Peer-to-Peer Databases Spatial, Temporal, Multimedia
    4 KB (525 words) - 14:44, 19 October 2022
  • ********** TRACK TOPICS FOUNDATIONS OF COMPUTER SCIENCE * algorithms and data structures including sequential, parallel, distributed, approximation, and
    6 KB (807 words) - 15:30, 19 October 2022
  • Management and Policy Data-driven Society: Balancing Prosperity and Security Development and Measurement of Intelligent Government Index Open Data for Sustainable
    2 KB (321 words) - 13:07, 19 October 2022
  • Messaging Systems o Transmission Systems o Network Security and Security Technologies o Wireless Data Networks o Wireless / Mobile Computing o Mobile Computing
    8 KB (1,061 words) - 14:45, 19 October 2022
  • competing aspects. Integration of security and dependability concepts. Balancing and negotiation of dependability and security properties. * Dependability in
    8 KB (1,064 words) - 14:45, 19 October 2022
  • Bio-informatics * Computational Linguistics * Computer Networks * Data Warehousing and Data Mining * Embedded Systems * Pattern Recognition/Image processing
    2 KB (271 words) - 14:55, 19 October 2022
  • (Semantic) Data Dataset Dynamics and Synchronization Big Data Computing User Interfaces and Visualization for the Web of (Linked Semantic) Data at Scale
    18 KB (2,163 words) - 15:29, 19 October 2022
  • QoI-aware wireless sensor networking - Energy-efficient data fusion, sensor fault analysis, sensor data cleansing - QoS for task mapping and scheduling - Cross-layer
    5 KB (817 words) - 15:22, 19 October 2022
  • disciplines such as databases, artificial intelligence, semantic web, or data extraction. Also, ODBASE'08 encourages the submission of papers that examine
    8 KB (1,015 words) - 15:27, 19 October 2022
  • Ontology and reasoning - Knowledge Graph - Linked Data - Big Data and semantics, exchange and integration - Data streams and the Internet of Things - Machine
    7 KB (1,008 words) - 14:14, 19 October 2022
  • environments - Data mining and knowledge discovery in distributed environments - Semantic and knowledge grids - Intelligent integration of data and processes
    5 KB (644 words) - 11:28, 14 November 2023
  • Engineering * Computer Architecture and Design * Computer Networks and Security * Data Mining and Database Applications * High Performance Networks and Protocols
    2 KB (368 words) - 14:56, 19 October 2022
  • systems Auditing and provenance Big data, analytics, and data sciences Caching, replication, and consistency Cloud storage Data deduplication Database storage
    5 KB (643 words) - 13:32, 19 October 2022
  • (Internet of things), big data analysis and a strong heterogeneity of access technologies, sensors, terminals, users’ needs and services (data, content, live streams
    4 KB (628 words) - 13:08, 19 October 2022
  • Economics of information security and privacy * Social factors, including o Usability of e-commerce systems o Human factors in security and privacy o Human
    9 KB (1,409 words) - 09:33, 4 August 2023
  • These assemble together different resources such as parallel supercomputers, data archives, high-speed storage systems, advanced visualization devices and
    4 KB (631 words) - 14:44, 19 October 2022
  • QoS, security, fault tolerance, messaging, reliability, availability, service discovery, service orchestration/composition, data integration and data retention)
    4 KB (628 words) - 15:26, 19 October 2022
  • scheduled Mode on site City Sydney Country Australia (AU) Academic Field Data Mining Official Website http://icaita.org/2017/ICAITA2017/index.html Deadlines
    5 KB (608 words) - 14:03, 19 October 2022
  • ---------------------------------------------------- Overview As volume of data and knowledge keeps increasing, new methods, modeling paradigms, and structures
    4 KB (608 words) - 15:22, 19 October 2022

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

Cookies help us deliver our services. By using our services, you agree to our use of cookies.