ICCSSE 2012 - International Conference on Computer Science and Software Engineering (ICCSSE 2012)
Topics/Call fo Papers
The VIII. International Conference on C 194 omputer Science and Software Engineering is the premier forum for the presentation of new advances and research results in the fields of Computer Science and Software Engineering. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. Topics of interest for submission include, but are not limited to:
Artificial Intelligence
Artificial Neural Networks
Automated Problem Solving
Brain Modeling
Case-based Reasoning
Cognitive Science
Collaborative Filtering
Computational Intelligence
Hardware Aspects of AI
Intelligent A 1a0 gents
Intelligent Information Fusion
Knowledge Discovery and Management
Learning and Adaptive Sensor Fusion
Natural Language Processing
Neural Networks and Applications
Pattern Recognition
Robotics
Self-Adaptation Techniques
Swarm Intelligence
Temporal Abstractions
Grid computing
Domain-Specific Approaches to Grid Engineering
Engineer 19a ing Approaches for Grid Applications
Grid Interoperability
Grid Middleware
Grid Monitoring and Accounting
Grid Programming Models and Environments
Grid Workflow and Service Composition
Novel Grid Architectures
Peer-to-peer Architecture
Quality of Service, performance and deployment
Resource Virtualization, Organization and Management
Security, Dependabilit 19d y, Survivability and Reliability
Semantic Basis for Grid Computing
Service-oriented Foundation of Grid Computing
Support for Grid and Cooperative Computing
Computer Graphics
Computer Vision & Scientific Visualization
Data Compression for Graphics
Geometric Computing
Graphics Systems Architecture
Interaction Techniques and HCI
Rendering Tech 19e niques
Shape, Surface & Physically Based Modeling
Stylized Rendering
Virtual and Augmented Reality
Distributed and Parallel Computing
Advanced Web and Proxy Services
Middleware Frameworks and Toolkits
Multimedia Streaming Services
Network Storage
Parallel & Distributed Applications/Algorithms
Parallel & Distributed Architectures
P 19e arallel Programming Environments and Tools
Performance Modeling/Evaluation
Ubiquitous Computing
Database Computing
Advanced Database Applications
Advanced Foundations of Databases
Data Mining/Knowledge Discovery
Data Warehousing
Database System Integration
Database Schema Integration
Federated, Distributed, Parallel and Grid Databases
Exten 19a ded Data Type Management
High Dimensional and Temporal Data
Image/Video Retrieval and Databases
Information Retrieval, Filtering and Dissemination
Performance Issues of Databases
Privacy and Secure Databases
Query Languages, Query Processing and Optimization
Semi-Structured Data
Spatial Data Processing/Management
Stream Data Management
Web Information Syst 19d ems
XML and Databases
Embedded Computing
Agent and Distributed Embedded Computing
Compilation & Debug Techniques for Embedded Architectures
Embedded Component and Reusing technology
Embedded Software/ Hardware and Architecture
Embedded Systems Middleware
Fault-Tolerance or Trusted Embedded Systems
DE & Software Tools for Embedded Systems
19c Performance evaluation technologies of embedded systems
Pervasive/Ubiquitous Computing
Power-aware Computing
Reconfigurable Computing
Systems, Models and Algorithms
Information Security
Access Control, Privacy Protection
Agents and Collaborative Systems for Intelligence Sharing
Authorship Analysis and Identification
Bayesian Networks, Fuzzy and Rough 19b Set
Countering Terrorism
Cryptographic Algorithms, Trust Management
Cyber-Infrastructure Design and Protection
Deception and Intent Detection
Disaster Prevention, Detection, and Management
Forecasting Terrorism
Genetic Algorithms, Evolution Strategies
Information sharing policy and governance
Intelligent Multimedia Security Services
Intrusion Detection
199 Key Management and Authentication
Knowledge Engineering and Management
Measuring the Impact of Terrorism Society
Model for Secure Web Services
Privacy and Civil Liberties Issues
Privacy Preserving Data Mining
Security Web-based Collaboration Applications and Services
Terrorism Root Cause Analysis
Terrorist Incident Chronology
Transportation and Communication 19d Infrastructure Protection
Web-based Intelligence Monitoring and Analysis
Software Engineering
Aspect and Objected-orientation Techniques
Component-based Development
Embedded and Real-time Software
Model Checking for Software
Model-driven Development
Requirements Engineering
Reverse Engineering and Software Maintenance
Semantics and Design of Progra 1a0 mming Languages
Service-oriented Computing and Web Services
Software Architectures and Design
Software Frameworks and Middleware
Software Processes and Workflows
Software Safety and Reliability
Software Testing
Specification and Validation
Contact us: info-AT-waset.org
Artificial Intelligence
Artificial Neural Networks
Automated Problem Solving
Brain Modeling
Case-based Reasoning
Cognitive Science
Collaborative Filtering
Computational Intelligence
Hardware Aspects of AI
Intelligent A 1a0 gents
Intelligent Information Fusion
Knowledge Discovery and Management
Learning and Adaptive Sensor Fusion
Natural Language Processing
Neural Networks and Applications
Pattern Recognition
Robotics
Self-Adaptation Techniques
Swarm Intelligence
Temporal Abstractions
Grid computing
Domain-Specific Approaches to Grid Engineering
Engineer 19a ing Approaches for Grid Applications
Grid Interoperability
Grid Middleware
Grid Monitoring and Accounting
Grid Programming Models and Environments
Grid Workflow and Service Composition
Novel Grid Architectures
Peer-to-peer Architecture
Quality of Service, performance and deployment
Resource Virtualization, Organization and Management
Security, Dependabilit 19d y, Survivability and Reliability
Semantic Basis for Grid Computing
Service-oriented Foundation of Grid Computing
Support for Grid and Cooperative Computing
Computer Graphics
Computer Vision & Scientific Visualization
Data Compression for Graphics
Geometric Computing
Graphics Systems Architecture
Interaction Techniques and HCI
Rendering Tech 19e niques
Shape, Surface & Physically Based Modeling
Stylized Rendering
Virtual and Augmented Reality
Distributed and Parallel Computing
Advanced Web and Proxy Services
Middleware Frameworks and Toolkits
Multimedia Streaming Services
Network Storage
Parallel & Distributed Applications/Algorithms
Parallel & Distributed Architectures
P 19e arallel Programming Environments and Tools
Performance Modeling/Evaluation
Ubiquitous Computing
Database Computing
Advanced Database Applications
Advanced Foundations of Databases
Data Mining/Knowledge Discovery
Data Warehousing
Database System Integration
Database Schema Integration
Federated, Distributed, Parallel and Grid Databases
Exten 19a ded Data Type Management
High Dimensional and Temporal Data
Image/Video Retrieval and Databases
Information Retrieval, Filtering and Dissemination
Performance Issues of Databases
Privacy and Secure Databases
Query Languages, Query Processing and Optimization
Semi-Structured Data
Spatial Data Processing/Management
Stream Data Management
Web Information Syst 19d ems
XML and Databases
Embedded Computing
Agent and Distributed Embedded Computing
Compilation & Debug Techniques for Embedded Architectures
Embedded Component and Reusing technology
Embedded Software/ Hardware and Architecture
Embedded Systems Middleware
Fault-Tolerance or Trusted Embedded Systems
DE & Software Tools for Embedded Systems
19c Performance evaluation technologies of embedded systems
Pervasive/Ubiquitous Computing
Power-aware Computing
Reconfigurable Computing
Systems, Models and Algorithms
Information Security
Access Control, Privacy Protection
Agents and Collaborative Systems for Intelligence Sharing
Authorship Analysis and Identification
Bayesian Networks, Fuzzy and Rough 19b Set
Countering Terrorism
Cryptographic Algorithms, Trust Management
Cyber-Infrastructure Design and Protection
Deception and Intent Detection
Disaster Prevention, Detection, and Management
Forecasting Terrorism
Genetic Algorithms, Evolution Strategies
Information sharing policy and governance
Intelligent Multimedia Security Services
Intrusion Detection
199 Key Management and Authentication
Knowledge Engineering and Management
Measuring the Impact of Terrorism Society
Model for Secure Web Services
Privacy and Civil Liberties Issues
Privacy Preserving Data Mining
Security Web-based Collaboration Applications and Services
Terrorism Root Cause Analysis
Terrorist Incident Chronology
Transportation and Communication 19d Infrastructure Protection
Web-based Intelligence Monitoring and Analysis
Software Engineering
Aspect and Objected-orientation Techniques
Component-based Development
Embedded and Real-time Software
Model Checking for Software
Model-driven Development
Requirements Engineering
Reverse Engineering and Software Maintenance
Semantics and Design of Progra 1a0 mming Languages
Service-oriented Computing and Web Services
Software Architectures and Design
Software Frameworks and Middleware
Software Processes and Workflows
Software Safety and Reliability
Software Testing
Specification and Validation
Contact us: info-AT-waset.org
Other CFPs
- International Conference on Energy and Environment (ICEE 2012)
- International Conference on Building Science and Engineering (ICBSE 2012)
- International Conference on Mechanical, Aeronautical and Manufacturing Engineering (ICMAME 2012)
- International Conference on Electrical, Computer, Electronics and Communication Engineering (ICECECE 2012)
- International Conference on Agricultural, Biotechnology, Biosystems and Biological Engineering (ICABBBE 2012)
Last modified: 2011-06-29 13:11:19