default search action
Computer Science Conferences & Workshops
- > Home
Jump to Conferences & Workshops starting with:
[previous 100 entries] [next 100 entries]
Conferences & Workshops starting from "CORIA - Conférence en Recherche d'Infomations et Applications"
- CORIA - Conférence en Recherche d'Infomations et Applications
- CoRL - Conference on Robot Learning
- Corpus Linguistics Fest (CLiF)
- Correct Hardware Design and Verification Methods; Conference on ... (CHARME)
- Correctness - International Workshop on Software Correctness for HPC Applications
- Correctness; Memory System Performance and ... (MSP)
- COSADE - International Workshop on Constructive Side-Channel Analysis and Secure Design
- CoSECivi - Conference of the Spanish Association for Videogames Sciences
- CoSinE - Illia O. Teplytskyi Workshop on Computer Simulation in Education
- COSIT - Conference On Spatial Information Theory
- COSN - Conference on Online Social Networks
- COTIC - Workshop on Concurrent Constraint Programming for Time Critical Applications and Multi-Agent Systems
- COTIM - Conference on Telecommunications and Information Markets
- COUFLESS - International Workshop on Complex Faults and Failures in Large Software Systems
- CovAI - Workshop on NLP for Conversational AI
- CP - International Conference on Principles and Practice of Constraint Programming
- CPA - Communicating Process Architectures Conference
- CPAIOR - Integration of Constraint Programming, Artificial Intelligence, and Operations Research
- CPITS - Cybersecurity Providing in Information and Telecommunication Systems
- CPM - Annual Symposium on Combinatorial Pattern Matching
- CPP - International Conference on Certified Programs and Proofs
- CPR - Conference on Computers and People Research
- CPS Data - International Workshop on Modelling, Analysis, and Control of Complex CPS
- CPS & IoT Security and Privacy; Joint Workshop on ... (CPSIoTSec)
- CPS Summer School
- CPS-IoT Week - Cyber-Physical Systems and Internet-of-Things Week
- CPS-SPC - Workshop on Cyber-Physical Systems Security and Privacy
- CPS4CIP - Cyber-Physical Security for Critical Infrastructures Protection
- CPSCom - International Conference on Cyber, Physical and Social Computing
- CPSIoTSec - Joint Workshop on CPS & IoT Security and Privacy
- CPSM - International Workshop on Communicating Business Process and Software Models Quality, Understandability, and Maintainability
- CPSN - International Conference on Computers for People with Special Needs
- CPSNA - International Conference on Cyber-Physical Systems, Networks, and Applications
- CPSS - ACM Cyber-Physical System Security Workshop
- CQL - Computers and the Quality of Life
- CQPC - Workshop on Classic, Quantum, and Post-Quantum Cryptography
- CQRE - International Exhibition and Congress on Network Security
- CRC - International Conference on Cybernetics, Robotics and Control
- CRC - International Cyber Resilience Conference
- CREAI - Workshop on Artificial Intelligence and Creativity
- Creating, Connecting and Collaborating through Computing; Conference on ... (C5)
- Creativity and Affective Computing; IEEE Symposium on Computational Intelligence for ... (CICAC)
- Creativity and Fabrication in Education; Annual Conference on ... (FabLearn)
- Creativity and Innovation in Design; Network Conference on ... (DESIRE)
- Creativity & Cognition
- Creativity Support Systems; International Conference on Knowledge, Information, and ... (KICSS)
- CRI - Summit on Clinical Research Informatics
- CRIS - Comparative Review of Information Systems Design Methodologies
- CRIS - International Conference on Current Research Information Systems
- CRiSIS - International Conference on Risks and Security of Internet and Systems
- Crisis Response and Management; International Conference on Information Systems for ... (ISCRAM)
- Critical Alternatives; Decennial Aarhus Conference on ...
- Critical Computing; Decennial Conference on ...
- Critical Information Infrastructures Security (CRITIS)
- Critical Infrastructure Protection; International Conference on ... (ICCIP)
- CRITIS - Critical Information Infrastructures Security
- CRIWG - nternational Conference on Collaboration Technologies and Social Computing
- CRM Workshop
- CRoNe - Congress on Robotics and Neuroscience
- Cross Media Content for Multi-channel Distribution; Automated Production of ... (AXMEDIS)
- Cross-Organisational Workflow Management and Co-ordination; Workshop on ... (WACC)
- CrossCloud - Workshop on CrossCloud Infrastructures & Platforms
- CrossCloud Infrastructures & Platforms; Workshop on ... (CrossCloud)
- Crowd Science and Engineering; International Conference on ... (ICCSE)
- Crowd Science Workshop (CSW)
- Crowd-Based Requirements Engineering; International Workshop on ... (CrowdRE)
- CrowdRE - International Workshop on Crowd-Based Requirements Engineering
- Crowdsourcing; AAAI Conference on Human Computation & ... (HCOMP)
- CrowdSourcing in Software Engineering; International Workshop on ... (CSI-SE)
- Crowdsourcing; VLDB Workshop on Databases and ... (DBCrowd)
- CROWNCOM - International Conference on Cognitive Radio Oriented Wireless Networks and Communications
- CRV - Conference on Computer and Robot Vision
- CRW - Collective Robots
- CRYPTO - Annual International Cryptology Conference
- Crypto Valley Conference on Blockchain Technology (CVCBT)
- Cryptographic Algorithms and their Uses
- Cryptographic Hardware and Embedded Systems; Conference on ... (CHES)
- Cryptographic Techniques; International Conference on the Theory and Application of ... (EUROCRYPT)
- Cryptography and Coding; IMA Conference on ... (IMACC)
- Cryptography and Information Security in the Balkans; International Conference on ... (BalkanCryptSec)
- Cryptography and Lattices (CaLC)
- Cryptography and Security Systems; International Conference on ... (CSS)
- Cryptography Conference; Theory of ... (TCC)
- Cryptography; International Conference on Security and ... (SECRYPT)
- Cryptography; Pairing-Based ... (Pairing)
- Cryptography: Policy and Algorithms
- Cryptography, Security and Privacy; International Conference on ... (CSP)
- Cryptography; Selected Areas in ... (SAC)
- Cryptology and Information Security in Latin America; International Conference on ... (LATINCRYPT)
- Cryptology, and Information Security; International Conference on Codes, ... (C2SI)
- Cryptology and Information Security; International Conference on the Theory and Application of ... (ASIACRYPT)
- Cryptology and Network Security (CANS)
- Cryptology Conference; Annual International ... (CRYPTO)
- Cryptology in Africa; International Conference on ... (AFRICACRYPT)
- Cryptology in India; International Conference on ... (INDOCRYPT)
- Cryptology in Malaysia; International Conference on ... (Mycrypt)
- Cryptology in Vietnam; International Conference on ... (VIETCRYPT)
- Cryptology; International Conference on Information Security and ... (ICISC)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-27 19:05 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint