posted by user: ICeND || 9416 views || tracked by 26 users: [display]

ICeND 2011 : The First International Conference on e-Technologies and Networks for Development (ICeND2011)

FacebookTwitterLinkedInGoogle

Link: http://www.sdiwc.net/tn/index.php
 
When Aug 3, 2011 - Aug 5, 2011
Where Dar-es-Salaam, Tanzania
Submission Deadline Mar 5, 2011
Notification Due Apr 5, 2011
Final Version Due May 5, 2011
Categories    e-government   multimedia networking   data mining   wireless networks
 

Call For Papers

The First International Conference on e-Technologies and Networks for Development (ICeND2011)
The Institute of Finance Management (IFM)
Dar-es-Salaam, Tanzania
Aug. 3-5, 2011
http://www.sdiwc.net/tn/index.php


All the papers will be reviewed and the accepted papers in the conference will be published in the “Communications in Computer and Information Science” (CCIS) of Springer Lecture Notes Series (www.springer.com/series/7899), and will be indexed in many global databases including ISI Proceedings and Scopus. In addition, selected papers after complete modification and revision will be published in the special issues journals.
=======================================================================================

The proposed conference on the above theme will be held at The Institute of Finance Management (IFM), Dar-es-Salaam, Tanzania from Aug. 3-5, 2011. which aims to enable researchers build connections between different digital applications.

The conference welcomes papers on the following (but not limited to) research topics:

- e-Commerce
- e-Government
- e-Learning
- Electronic Payment Systems
- Mobile-Commerce
- Electronic Auctions
- Wireless Networks
- Ad hoc and Sensor Networks
- High Speed Networks
- Internet and Web Applications
- Mobile & Broadband Wireless Internet
- Mobile Networks & Wireless LAN
- Multimedia Networking
- Information Ethics
- Information Content Security
- Data Compression
- Cloud Computing
- Grid Computing
- Green Computing
- Access Controls
- Peer-to-Peer Social Networks
- e-Logistics
- e-Procurement
- e-Services
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineeing
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- e-Logistics
- e-Procurement
- e-Services
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineeing
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- Anti-cyberterrorism
- XML-Based Languages
- Soft Computing Techniques
- Computational Intelligence
- Mobile Networking, Mobility and Nomadicity
- Ubiquitous Computing, Services and Applications
- Forensics, Recognition Technologies and Applications
- Fuzzy and Neural Network Systems
- Signal Processing, Pattern Recognition and Applications
- Distributed and Parallel Applications
- User Interfaces,Visualization and Modeling
- Mobile, Ad Hoc and Sensor Network Management
- Web Services Architecture, Modeling and Design
- Quality of Service, Scalability and Performance
- Self-Organizing Networks and Networked Systems
- Data Management in Mobile Peer-to-Peer Networks
- Data Stream Processing in Mobile/Sensor Networks
- Indexing and Query Processing for Moving Objects
- User Interfaces and Usability Issues form Mobile Applications
- Sensor Networks and Social Sensing
- Embedded Systems and Software
- Information Propagation on Social Networks
- Resource and Knowledge Discovery Using Social Networks
- Computer Crime Prevention and Detection
- Confidentiality Protection
- Critical Infrastructure Management
- Critical Computing and Storage
- Cryptography and Data Protection


Researchers are encouraged to submit their work electronically. Submitted paper should not exceed 15 pages, including illustrations. Papers should be submitted electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.


Important Dates

Submission Deadline : March 5, 2011
Notification of Acceptance: April 5, 2011
Camera Ready Submission : May 5, 2011
Registration : May 5, 2011
Conference Dates : Aug. 3-5, 2011

Related Resources

CSTE--EI 2025   2025 The 7th International Conference on Computer Science and Technologies in Education (CSTE 2025)
AAAI 2025   The 39th Annual AAAI Conference on Artificial Intelligence
MTEL 2024   The 18th IEEE International Workshop on Multimedia Technologies for E-Learning (MTEL)
Ei/Scopus-AACIP 2024   2024 2nd Asia Conference on Algorithms, Computing and Image Processing (AACIP 2024)-EI Compendex
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
ICCTech 2025   4th International Conference on Computer Technologies
CSTE 2025   2025 The 7th International Conference on Computer Science and Technologies in Education (CSTE 2025)
KDD 2025   31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining
ICRET--EI 2025   2025 The 11th International Conference On Renewable Energy Technologies (ICRET 2025)
PRIOCHEM 2024   International Symposium PRIORITIES OF CHEMISTRY FOR A SUSTAINABLE DEVELOPMENT