Search results
Jump to navigation
Jump to search
- | Title = International Conference & Symposium on Storage Technologies Sponsored by EMC Corporation ...earch illustrate that the volume of data that needs to be stored, managed, secured, maintained, and available is reaching new heights. Additionally, the compl1 KB (170 words) - 12:42, 28 January 2021
- |Title=The 5th International Conference for Internet Technology and Secured Transactions, Technical Co-Sponsored by IEEE UK/RI Communicatins Chapter The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), Technical Co-Sponsored5 KB (608 words) - 10:53, 8 March 2021
- ...e-Learning, e-Governance, e-Business, e-Science, Green Computing, Secured Technologies, Intelligent Data Management *New enabling technologies5 KB (596 words) - 10:48, 8 March 2021
- information technologies, information systems and global security applications. Broadband access technologies5 KB (572 words) - 11:28, 8 March 2021
- ...d services, mobile data management, ubiquitous computing applications, secured data sharing and processing in sensor networks, environmental monitor5 KB (530 words) - 20:01, 17 February 2021
- ...w any user to timely use resources using various access technologies under secured (still to be improved) and guaranteed privacy. The family of the mobile dev6 KB (765 words) - 12:39, 28 January 2021
- ...nth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies15 KB (1,887 words) - 11:19, 8 March 2021
- ...new methods and techniques, which offer users a transparent, efficient and secured access to resources, efficient allocation of resources, decentralization an7 KB (913 words) - 10:24, 8 March 2021