| |||||||||||||||
RTA-CSIT 2025 : Recent Trends and Applications in Computer Science and Information Technology | |||||||||||||||
Link: https://sites.google.com/fshn.edu.al/rta-csit/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
We cordially invite you to the 6th International Conference on Recent Trends and Applications in Computer Science and Information Technology held in Tirana, Albania.
PUBLICATION All papers that will be presented at the conference sessions will be published in the conference proceedings. Proceedings shall be submitted for publication online in http://ceur-ws.org/ (open access, online ISSN, previous editions have been indexed by DBLP / Scopus). TOPICS OF INTEREST ARTIFICIAL INTELLIGENCE Constraint-based reasoning and constraint programming AI and evolutionary algorithms Distributed AI systems and architectures Distributed AI algorithms and techniques Heuristic searching methods Evaluation of AI tools Intelligent agents Integration of AI with other technologies Intelligent databases Intelligent data mining and farming Intelligent information systems Intelligent information fusion Intelligent System Design Intelligent networks Intelligent user interfaces Intelligent tutoring systems Languages and programming techniques for AI Intelligent web-based business Multisensor data fusion using neural and fuzzy techniques Learning and adaptive sensor fusion Reasoning strategies Neural networks and applications Social impact of AI Search and meta-heuristics Social intelligence (markets and computational societies) Computer Technologies Design and analysis of algorithms Artificial intelligence Human-Computer Interaction High-Performance Computing Programming Languages Machine Learning Computer Graphics & Virtual Reality Computer Architecture and Embedded Systems Systems Analysis, Design, and Implementation Computer Games Software Engineering Biological computation and computational biology Computer-Aided Design and Manufacturing Intelligence Simulation and Modeling Parallel and Distributed Computing Visual and Multimedia Computing CYBERSECURITY Anonymity and Censorship Resistance Artificial Intelligence for Security Audit and Accountability Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response. Data and Computation Integrity Database Security Digital Content Protection Digital Forensics Formal Methods for Security and Privacy Hardware Security Information Hiding Identity Management Information Flow Control Information Security Intrusion Detection Governance and Management Language-based Security Malware and Unwanted Software Network Security Phishing and Spam Prevention Privacy Technologies and Mechanisms Risk Analysis and Management Secure Electronic Voting Security Economics and Metrics Security and Privacy in Cloud / Fog Systems Security and Privacy of Systems based on Machine Learning and A.I. Security and Privacy in Crowdsourcing Security and Privacy in the IoT and Cyber-Physical Systems Security and Privacy in Location-based Services Security and Privacy for Mobile / Smartphone Platforms Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs) Security and Privacy in Social Networks Security and Privacy in Wireless and Cellular Communications Software Security Systems Security Trustworthy Computing to Secure Networks and Systems Usable Security and Privacy Web Security DATA SCIENCE Data-driven Decision Making and Predictive Analytics Machine Learning (ML) and Deep Learning Algorithms Natural Language Processing (NLP) Computer Vision and Image Processing Graph Analytics and Knowledge Graphs Data Preprocessing, Cleaning, and Imputation Deep Generative Models (GANs, VAEs) ENABLING TECHNOLOGIES AND RECENT TRENDS IN ADVANCED COMPUTING Web Technologies Human Computer Interaction Service-Oriented Architectures Mobile Computing Cloud Computing Grid Computing Distributed Computing GIS and Location Based Services Augmented Reality Multi-agent Systems Log Management and Database Security Semantic Web and Web Mining Multimedia Technologies Formal Methods for Software Security and Reliability Digital Signatures Computing Methods in Bioinformatics Software Engineering Expert Systems Trends in AI Image Processing Information Retrieval Information Security Modern DBMS Business Intelligence Data Mining Mathematical Modelling in Computer Science Applied Informatics in Natural Sciences CHALLENGES IN TEACHING METHODS IN INFORMATICS Challenges in Defining an International Curriculum The Diversity in Informatics Curricula Patterns of Curriculum Design Student Interaction Programming Environments E-Learning E-COMMERCE and E-BUSINESS Modeling and Evaluation of E-Commerce Categories of E-Commerce E-Marketing Web Based E-Commerce Systems CONTACT rtacsit@fshn.edu.al |
|