| |||||||||||||||||
ICIEIS 2013 : The Second International Conference on Informatics Engineering & Information Science | |||||||||||||||||
Link: http://sdiwc.net/conferences/2013/icieis2013/ | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013)
Universiti Teknologi Malaysia (UTM), Kuala Lumpur, Malaysia Nov. 12-14, 2013. http://sdiwc.net/conferences/2013/icieis2013/ The proposed conference will be held at Universiti Teknologi Malaysia (UTM), Kuala Lumpur, Malaysia. From Nov. 12-14, 2013 which aims to enable researchers build connections between different digital applications. The conference welcomes papers on the following (but not limited to) research topics: - Information Ethics - Information Content Security - Network Security - Social Networks - Real-Time Systems - Internet Modeling - Assurance of Service - Image Processing - Web Services Security - Multimedia Computing - Software Engineeing - Biometrics Technologies - Wireless Communications - Semantic Web, Ontologies - Mobile Social Networks - Anti-cyberterrorism - XML-Based Languages - Soft Computing Techniques - Computational Intelligence - Mobile Networking, Mobility and Nomadicity - Ubiquitous Computing, Services and Applications - Forensics, Recognition Technologies and Applications - Fuzzy and Neural Network Systems - Signal Processing, Pattern Recognition and Applications - Distributed and Parallel Applications - User Interfaces,Visualization and Modeling - Mobile, Ad Hoc and Sensor Network Management - Web Services Architecture, Modeling and Design - Quality of Service, Scalability and Performance - Self-Organizing Networks and Networked Systems - Data Management in Mobile Peer-to-Peer Networks - Data Stream Processing in Mobile/Sensor Networks - Indexing and Query Processing for Moving Objects - User Interfaces and Usability Issues form Mobile Applications - Sensor Networks and Social Sensing - Embedded Systems and Software - Information Propagation on Social Networks - Resource and Knowledge Discovery Using Social Networks - Computer Crime Prevention and Detection - Confidentiality Protection - Critical Infrastructure Management - Critical Computing and Storage - Cryptography and Data Protection Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered. IMPORTANT DATES Submission Deadline : Aug 1, 2013 Notification of Acceptance: Aug 20, 2013 Camera Ready Submission: Aug. 30, 2013 Registration : Sept. 2, 2013 Conference Dates : Nov. 12-14, 2013 |
|