| |||||||||||||||
ICIA 2013 : The Second International Conference on Informatics & Applications | |||||||||||||||
Link: http://sdiwc.net/conferences/2013/icia2013/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The Second International Conference on Informatics & Applications (ICIA2013)
September 23-25, 2013 | Lodz, Poland | icia@sdiwc.net http://sdiwc.net/conferences/2013/icia2013/ All the papers will be submitted to IEEE for potential inclusion to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. Submission Deadline:: August 5, 2013 ICIA2013 will be held in Technical University of Lodz, Poland on September 23-25, 2013. The main objective of this conference is to provide a medium for professionals, engineers, academicians, scientists, and researchers from over the world to present the result of their research activities in the field of Computer Science, Engineering and Information Technology. ICIA2013 provides opportunities for the delegates to share the knowledge, ideas, innovations and problem solving techniques. Submitted papers will be reviewed by the technical program committee of the conference. Topics of interest include, but are not limited to: :: Information Ethics :: Information Content Security :: Data Compression :: E-Technology :: E-Government :: E-Learning :: Cloud Computing :: Grid Computing :: Green Computing :: Access Controls :: Data Mining :: Social Search :: Computer Forensics :: Computer Security :: Peer-to-Peer Social Networks :: Information and Data Management :: Network Security :: Social Networks :: Real-Time Systems :: Internet Modeling :: Assurance of Service :: Image Processing :: Web Services Security :: Multimedia Computing :: Software Engineering :: Biometrics Technologies :: Wireless Communications :: Semantic Web, Ontologies :: Mobile Social Networks :: Distributed and Parallel Applications :: Embedded Systems and Software :: Critical Computing and Storage :: Critical Infrastructure Management :: Soft Computing Techniques :: Confidentiality Protection :: Mobile Networking, Mobility and Nomadicity :: Anti-cyberterrorism :: Ubiquitous Computing, Services and Applications :: Forensics, Recognition Technologies and Applications :: Fuzzy and Neural Network Systems :: Signal Processing, Pattern Recognition and Applications :: User Interfaces,Visualization and Modeling :: Mobile, Ad Hoc and Sensor Network Management :: Web Services Architecture, Modeling and Design :: Quality of Service, Scalability and Performance :: Self-Organizing Networks and Networked Systems :: Computational Intelligence :: Data Management in Mobile Peer-to-Peer Networks :: Data Stream Processing in Mobile/Sensor Networks :: Indexing and Query Processing for Moving Objects :: User Interfaces and Usability Issues form Mobile Applications :: Sensor Networks and Social Sensing :: XML-Based Languages :: Cryptography and Data Protection :: Information Propagation on Social Networks :: Resource and Knowledge Discovery Using Social Networks :: Computer Crime Prevention and Detection PAPER SUBMISSION ----------------- Researchers are encouraged to submit their work electronically. Submitted paper should not exceed 15 pages, including illustrations. Papers are to be numbered starting from page one. Papers should be submitted electronically as MS word or pdf format without author(s) name. URL: http://sdiwc.net/conferences/2013/icia2013/openconf/openconf.php IMPORTANT DATES --------------- Submission Date ------------:: August 5, 2013 Notification of acceptance -:: 4 weeks from the date of submitting the paper or September 5, 2013 Camera Ready submission ----:: September 15, 2013 Registration ---------------:: September 15, 2013 Conference dates -----------:: September 23-25, 2013 CONTACT INFORMATION ------------------- Liezelle Ann Canadilla Conference Manager icia@sdiwc.net / icia2013@gmail.com www.sdiwc.net |
|