| |||||||||||
ICECIT 2013 : International Conference on Emerging Computation & Information Technologies | |||||||||||
Link: http://icecit.sit.ac.in/ | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
International Conference On Emerging Computation and Information Technologies (ICECIT-2013) will be held on November 22nd and 23rd 2013, at Siddaganga Institute of Technology, Tumkur, Karnataka , India. http://sit.ac.in
ICECIT-2013 invites submissions of original research contributions, as well as descriptions of industrial and application achievements under the following tracks. We encourage submissions relating to all aspects of Computer Science defined broadly, and particularly encourage work on topics of emerging interest in the research and development communities. Both full research papers and work-in-progress papers are welcome. The conference will have both oral and poster sessions. Proceedings of the conference will be published on IEEE Xplore Digital Library Selected papers from the conference is also considered for publication in International Journal of Information Technology and Journal of Intelligent Systems Database Track Topics of the Database track in the conference including but not limited to: • Availability, Reliability, and Scalability • Benchmarking and Performance Evaluation • Big Data and Data analytics • Business Process Modeling • Database Monitoring and Tuning • Data Management in Clouds • Data Processing in Social Networks • Data Mining and Knowledge Discovery • Data Warehousing, OLAP, and ETL Tools • Database Design and Tuning • DBMS on Emerging Hardware Architectures • Heterogeneous Databases and Interoperability • Metadata management and interoperability • Parallel, Distributed, and Grid Data Management • Privacy and Security in Trustworthy Databases • Query Processing and Optimization • Semantic Web and Knowledge Management • Systems performance and transaction management • Web Information and Services • XML and Semi-structured Databases Security Track Topics of the security track in the conference including but not limited to: • Security Algorithms • Mobile Network Security • Security in Grid • Security in Wireless Sensor Networks • Security Protocols • Key Management Techniques • Message Authentication and Hash Functions • Digital Signature Schemes • Secret Sharing • Security in E-Commerce and M-Commerce • Watermarking • Cloud Computing Security • Database Security • Data Mining Security Computing Track Topics of the Computing track in the conference include but not limited to: • Computational Methods, Algorithms and Applications • Green Computing • Soft Computing • Parallel Computing • Grid Computing • Mobile and Pervasive Computing • Distributed Computing • Cloud Computing • Web and Internet Computing • High Performance Computing • Bioinformatics Networks Track Topics of the Networks track in the conference include but not limited to: • Opportunistic networks • IMT2000, UMTS, LTE, IMT-Advanced networks • Vehicular ad hoc networks (VANET) • Cognitive radio networks • Bio-inspired networks • Context-aware mobile network • Wireless body area networks (WBANs) • Tele-medicine/e-health networks • Mobile P2P networking, systems, and applications • Next generation Internet services and applications • QoS provisioning over Multimedia wireless networks • WLANs, WiMAX, satellite, 3G and Beyond • QoS management and traffic modeling • Wireless sensor networks • Mobile ad hoc networks • Wireless mesh networks |
|