posted by user: ICeND || 9810 views || tracked by 26 users: [display]

ICeND 2011 : The First International Conference on e-Technologies and Networks for Development (ICeND2011)

FacebookTwitterLinkedInGoogle

Link: http://www.sdiwc.net/tn/index.php
 
When Aug 3, 2011 - Aug 5, 2011
Where Dar-es-Salaam, Tanzania
Submission Deadline Mar 5, 2011
Notification Due Apr 5, 2011
Final Version Due May 5, 2011
Categories    e-government   multimedia networking   data mining   wireless networks
 

Call For Papers

The First International Conference on e-Technologies and Networks for Development (ICeND2011)
The Institute of Finance Management (IFM)
Dar-es-Salaam, Tanzania
Aug. 3-5, 2011
http://www.sdiwc.net/tn/index.php


All the papers will be reviewed and the accepted papers in the conference will be published in the “Communications in Computer and Information Science” (CCIS) of Springer Lecture Notes Series (www.springer.com/series/7899), and will be indexed in many global databases including ISI Proceedings and Scopus. In addition, selected papers after complete modification and revision will be published in the special issues journals.
=======================================================================================

The proposed conference on the above theme will be held at The Institute of Finance Management (IFM), Dar-es-Salaam, Tanzania from Aug. 3-5, 2011. which aims to enable researchers build connections between different digital applications.

The conference welcomes papers on the following (but not limited to) research topics:

- e-Commerce
- e-Government
- e-Learning
- Electronic Payment Systems
- Mobile-Commerce
- Electronic Auctions
- Wireless Networks
- Ad hoc and Sensor Networks
- High Speed Networks
- Internet and Web Applications
- Mobile & Broadband Wireless Internet
- Mobile Networks & Wireless LAN
- Multimedia Networking
- Information Ethics
- Information Content Security
- Data Compression
- Cloud Computing
- Grid Computing
- Green Computing
- Access Controls
- Peer-to-Peer Social Networks
- e-Logistics
- e-Procurement
- e-Services
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineeing
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- e-Logistics
- e-Procurement
- e-Services
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineeing
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- Anti-cyberterrorism
- XML-Based Languages
- Soft Computing Techniques
- Computational Intelligence
- Mobile Networking, Mobility and Nomadicity
- Ubiquitous Computing, Services and Applications
- Forensics, Recognition Technologies and Applications
- Fuzzy and Neural Network Systems
- Signal Processing, Pattern Recognition and Applications
- Distributed and Parallel Applications
- User Interfaces,Visualization and Modeling
- Mobile, Ad Hoc and Sensor Network Management
- Web Services Architecture, Modeling and Design
- Quality of Service, Scalability and Performance
- Self-Organizing Networks and Networked Systems
- Data Management in Mobile Peer-to-Peer Networks
- Data Stream Processing in Mobile/Sensor Networks
- Indexing and Query Processing for Moving Objects
- User Interfaces and Usability Issues form Mobile Applications
- Sensor Networks and Social Sensing
- Embedded Systems and Software
- Information Propagation on Social Networks
- Resource and Knowledge Discovery Using Social Networks
- Computer Crime Prevention and Detection
- Confidentiality Protection
- Critical Infrastructure Management
- Critical Computing and Storage
- Cryptography and Data Protection


Researchers are encouraged to submit their work electronically. Submitted paper should not exceed 15 pages, including illustrations. Papers should be submitted electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.


Important Dates

Submission Deadline : March 5, 2011
Notification of Acceptance: April 5, 2011
Camera Ready Submission : May 5, 2011
Registration : May 5, 2011
Conference Dates : Aug. 3-5, 2011

Related Resources

INNOV 2025   The Fourteenth International Conference on Communications, Computation, Networks and Technologies
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
DeLTA 2025   6th International Conference on Deep Learning Theory and Applications
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
KES-IDT 2025   17th International KES Conference on Intelligent Decision Technologies
AMLDS 2025   IEEE--2025 International Conference on Advanced Machine Learning and Data Science
Springer ICSLT 2025   Springer--2025 11th International Conference on e-Society, e-Learning and e-Technologies (ICSLT 2025)
PAKDD 2025   29th Pacific-Asia Conference on Knowledge Discovery and Data Mining
ICSLT 2025   Springer--2025 11th International Conference on e-Society, e-Learning and e-Technologies (ICSLT 2025)
MAT 2024   10th International Conference of Advances in Materials Science and Engineering