posted by user: ICeND || 8206 views || tracked by 26 users: [display]

ICeND 2011 : The First International Conference on e-Technologies and Networks for Development (ICeND2011)

FacebookTwitterLinkedInGoogle

Link: http://www.sdiwc.net/tn/index.php
 
When Aug 3, 2011 - Aug 5, 2011
Where Dar-es-Salaam, Tanzania
Submission Deadline Mar 5, 2011
Notification Due Apr 5, 2011
Final Version Due May 5, 2011
Categories    e-government   multimedia networking   data mining   wireless networks
 

Call For Papers

The First International Conference on e-Technologies and Networks for Development (ICeND2011)
The Institute of Finance Management (IFM)
Dar-es-Salaam, Tanzania
Aug. 3-5, 2011
http://www.sdiwc.net/tn/index.php


All the papers will be reviewed and the accepted papers in the conference will be published in the “Communications in Computer and Information Science” (CCIS) of Springer Lecture Notes Series (www.springer.com/series/7899), and will be indexed in many global databases including ISI Proceedings and Scopus. In addition, selected papers after complete modification and revision will be published in the special issues journals.
=======================================================================================

The proposed conference on the above theme will be held at The Institute of Finance Management (IFM), Dar-es-Salaam, Tanzania from Aug. 3-5, 2011. which aims to enable researchers build connections between different digital applications.

The conference welcomes papers on the following (but not limited to) research topics:

- e-Commerce
- e-Government
- e-Learning
- Electronic Payment Systems
- Mobile-Commerce
- Electronic Auctions
- Wireless Networks
- Ad hoc and Sensor Networks
- High Speed Networks
- Internet and Web Applications
- Mobile & Broadband Wireless Internet
- Mobile Networks & Wireless LAN
- Multimedia Networking
- Information Ethics
- Information Content Security
- Data Compression
- Cloud Computing
- Grid Computing
- Green Computing
- Access Controls
- Peer-to-Peer Social Networks
- e-Logistics
- e-Procurement
- e-Services
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineeing
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- e-Logistics
- e-Procurement
- e-Services
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineeing
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- Anti-cyberterrorism
- XML-Based Languages
- Soft Computing Techniques
- Computational Intelligence
- Mobile Networking, Mobility and Nomadicity
- Ubiquitous Computing, Services and Applications
- Forensics, Recognition Technologies and Applications
- Fuzzy and Neural Network Systems
- Signal Processing, Pattern Recognition and Applications
- Distributed and Parallel Applications
- User Interfaces,Visualization and Modeling
- Mobile, Ad Hoc and Sensor Network Management
- Web Services Architecture, Modeling and Design
- Quality of Service, Scalability and Performance
- Self-Organizing Networks and Networked Systems
- Data Management in Mobile Peer-to-Peer Networks
- Data Stream Processing in Mobile/Sensor Networks
- Indexing and Query Processing for Moving Objects
- User Interfaces and Usability Issues form Mobile Applications
- Sensor Networks and Social Sensing
- Embedded Systems and Software
- Information Propagation on Social Networks
- Resource and Knowledge Discovery Using Social Networks
- Computer Crime Prevention and Detection
- Confidentiality Protection
- Critical Infrastructure Management
- Critical Computing and Storage
- Cryptography and Data Protection


Researchers are encouraged to submit their work electronically. Submitted paper should not exceed 15 pages, including illustrations. Papers should be submitted electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.


Important Dates

Submission Deadline : March 5, 2011
Notification of Acceptance: April 5, 2011
Camera Ready Submission : May 5, 2011
Registration : May 5, 2011
Conference Dates : Aug. 3-5, 2011

Related Resources

IDITR-Chengdu 2023   2023 2nd International Conference on Innovations and Development of Information Technologies and Robotics (IDITR 2023)
MLDM 2023   18th International Conference on Machine Learning and Data Mining
Smart Cities 2022   Smart Cities: Enabling Technologies and Applications
WSDM 2023   Web Search and Data Mining
IDITR 2023   2023 2nd International Conference on Innovations and Development of Information Technologies and Robotics (IDITR 2023)
ACM-Ei/Scopus-ITNLP 2022   2022 2nd International Conference on Information Technology and Natural Language Processing (ITNLP 2022) -EI Compendex
ICNCT 2023   2023 10th International Conference on Network and Computing Technologies (ICNCT 2023)
NLPTA 2022   3rd International Conference on NLP Techniques and Applications
ICEMAT--Ei, Scopus 2023   2023 5th International Conference on Energy Management and Applications Technologies (ICEMAT 2023)--EI Compendex, Scopus
ADMA 2022   18th International Conference on Advanced Data Mining and Applications