Search results

Jump to navigation Jump to search
  • | Title = International Conference & Symposium on Storage Technologies Sponsored by EMC Corporation ...earch illustrate that the volume of data that needs to be stored, managed, secured, maintained, and available is reaching new heights. Additionally, the compl
    1 KB (170 words) - 12:42, 28 January 2021
  • |Title=The 5th International Conference for Internet Technology and Secured Transactions, Technical Co-Sponsored by IEEE UK/RI Communicatins Chapter The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), Technical Co-Sponsored
    5 KB (608 words) - 10:53, 8 March 2021
  • ...e-Learning, e-Governance, e-Business, e-Science, Green Computing, Secured Technologies, Intelligent Data Management *New enabling technologies
    5 KB (596 words) - 10:48, 8 March 2021
  • information technologies, information systems and global security applications. Broadband access technologies
    5 KB (572 words) - 11:28, 8 March 2021
  • ...d services, mobile data management, ubiquitous computing applications, secured data sharing and processing in sensor networks, environmental monitor
    5 KB (530 words) - 20:01, 17 February 2021
  • ...w any user to timely use resources using various access technologies under secured (still to be improved) and guaranteed privacy. The family of the mobile dev
    6 KB (765 words) - 12:39, 28 January 2021
  • ...nth International Conference on Emerging Security Information, Systems and Technologies |Field=Security Information and technologies
    15 KB (1,887 words) - 11:19, 8 March 2021
  • ...new methods and techniques, which offer users a transparent, efficient and secured access to resources, efficient allocation of resources, decentralization an
    7 KB (913 words) - 10:24, 8 March 2021