181 resources related to Information Management
- Topics related to Information Management
- IEEE Organizations related to Information Management
- Conferences related to Information Management
- Periodicals related to Information Management
- Most published Xplore authors for Information Management
The convergence of current technologies provides the infrastructure for transmitting and storing information faster and cheaper. For information to be used in gaining knowledge, however, environments for collecting, storing, disseminating, sharing and constructing knowledge are needed. Such environments, knowledge media, brings together telecommunication, computer and networking technologies, learning theories and cognitive sciences to form meaningful environments that provides for a variety of learner needs. ITHET 2018 will continue with the traditional themes of previous events. However, our special theme for this year is a fundamental one. We have previously had MOOCs as our special theme, but now they are just infrastructure. Even “Blended Learning” is what we all do anyway. In a time of the unprecedented access to knowledge through IT, it is time for us to revisit the fundamental purpose of our educational system. It is certainly not about knowledge anymore.
Energy conversion and conditioning technologies, power electronics, adjustable speed drives and their applications, power electronics for smarter grid, energy efficiency,technologies for sustainable energy systems, converters and power supplies
The principal theme of ISORC is the application of the latest computing paradigms to real-time systems, applications and research. In the ISORC series, this paradigm emphasizes its spirit of openness where diverse views and new approaches to challenging issues can be freely discussed.
The IEEE VLSI Test Symposium (VTS) explores emerging trends and novel concepts in testing, debug and repair of microelectronic circuits and systems.
COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It isone of the major international forums for academia, industry, and government to discussresearch results, advancements and future trends in computer and software technologies andapplications. The technical program includes keynote addresses, research papers, industrialcase studies, panel discussions, fast abstracts, doctoral symposium, poster sessions, and anumber of workshops on emerging important topics.
The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.
The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...
The IEEE Transactions on Automation Sciences and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. We welcome results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, ...
Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
No Xplore Articles are currently tagged "Information Management"
NIKSUN World Wide Security & Mobility Conference 2011-B Lyons
Group on Earth Observations(GEOSS): Applications
Implantable Wireless Medical Devices and Systems
Infineon Technologies: Power Efficiency from Generation to Consumption
Piero P Bonissone - Lazy Meta-Learning - Creating Customized Model Ensembles on Demand
Mostafa H. Sherif: Managing Projects in Telecommunications Services
Ignite! Session: Jennifer Trelewicz
IEEE Risk Management and Professional Liability Program
Michael Condry: Technology and Engineering Management Society - Studio Tech Talks: Sections Congress 2017
Unobtrusive Smart Sensing and Pervasive Computing for Healthcare - IEEE I&M Society Tutorial
Q&A with Dr. Ling Liu: IEEE Big Data Podcast, Episode 8
Cybersecurity Panel: 2016 Technology Time Machine
APEC Exhibitor Showcase - Texas Instruments Power Management
Programming Human Ethics: Cui Bono? - IEEE AI & Ethics Summit 2016
Mats Edvinsson: Financial Management - Illustrations from IEEE Sweden — Studio Tech Talks: Sections Congress 2017
KeyTalks: Every Application Needs Power
Don't Get Hooked: Safe Strategies on the Net
Protecting Internet Traffic: Security Challenges and Solutions – IEEE Internet Initiative Webinar
26 Years of Risk Management Standardisation - Kevin Knight - Closing Ceremony: Sections Congress 2017
The Federal Government coordinates its unclassified NIT research and development investments through the Networking and Information Technology Research and Development (NITRD) program, which helps ensure that the Nation effectively leverages its strengths, avoids duplication, and increases interoperability in such areas as supercomputing, high-speed networking, cybersecurity, software engineering, and information management. The current study finds that important NITRD investments responsive to the 2010 recommendations have been made, with notable progress in the multi-agency investments in “big data,” NIT-enabled interaction with the physical world, health IT, and cybersecurity.
IEEE Draft Standard for Information technology--Telecommunications and information exchange between systems--Local and metropolitan area networks--Specific requirements Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications Amendment: Physical Layer and Management Parameters for Serial 40 Gb/s Ethernet Operation Over Single Mode Fiber
The scope of this project is to add a single-mode fiber Physical Medium Dependent (PMD) option for serial 40 Gb/s operation by specifying additions to, and appropriate modifications of, IEEE Std 802.3-2008 as amended by the IEEE P802.3ba project (and any other approved amendment or corrigendum).
This standard contains the Management Information Base (MIB) module specifications for IEEE Std 802.3, also known as Ethernet. It includes the Structure of Management Information Version 2 (SMIv2) MIB module specifications formerly produced and published by the Internet Engineering Task Force (IETF), and the Guidelines for the Definition of Managed Objects (GDMO) MIB modules formerly specified within IEEE Std 802.3, ...
IEEE Standard for Information technology--Telecommunications and information exchange between systems--Local and metropolitan area networks--Specific requirements Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications Amendment 5: Media Access Control Parameters, Physical Layers, and Management Parameters for Energy-Efficient Ethernet
This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.