ICIA 2012 - The International Conference on Informatics & Applications (ICIA2012)
Date2012-06-03
Deadline2012-05-05
VenueKuala Tere, Malaysia
KeywordsInformation Technology, Digital Information, Security, Software, E-Technology
Topics/Call fo Papers
The International Conference on Informatics & Applications (ICIA2012)
University Sultan Zainal Abidin, Kuala Terengganu, Malaysia
June 3-5, 2012
http://www.sdiwc.net/icia2012/
The proposed conference on the above theme will be held at University Sultan Zainal Abidin, Kuala Terengganu, Malaysia, From June 3-4, 2012 which aims to enable researchers build connections between different digital applications.
The conference welcomes papers on the following (but not limited to) research topics:
- Information Ethics
- Information Content Security
- Data Compression
- E-Technology
- E-Government
- E-Learning
- Cloud Computing
- Grid Computing
- Green Computing
- Access Controls
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Peer-to-Peer Social Networks
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineering
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- Distributed and Parallel Applications
- Embedded Systems and Software
- Critical Computing and Storage
- Critical Infrastructure Management
- Soft Computing Techniques
- Confidentiality Protection
- Mobile Networking, Mobility and Nomadicity
- Anti-cyberterrorism
- Ubiquitous Computing, Services and Applications
- Forensics, Recognition Technologies and Applications
- Fuzzy and Neural Network Systems
- Signal Processing, Pattern Recognition and Applications
- User Interfaces,Visualization and Modeling
- Mobile, Ad Hoc and Sensor Network Management
- Web Services Architecture, Modeling and Design
- Quality of Service, Scalability and Performance
- Self-Organizing Networks and Networked Systems
- Computational Intelligence
- Data Management in Mobile Peer-to-Peer Networks
- Data Stream Processing in Mobile/Sensor Networks
- Indexing and Query Processing for Moving Objects
- User Interfaces and Usability Issues form Mobile Applications
- Sensor Networks and Social Sensing
- XML-Based Languages
- Cryptography and Data Protection
- Information Propagation on Social Networks
- Resource and Knowledge Discovery Using Social Networks
- Computer Crime Prevention and Detection
Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.
Important Dates
Submission Date : May. 5, 2012
Notification of acceptance : May 10, 2012
Camera Ready submission : May 17, 2012
Registration : May 17, 2012
Conference dates : June 3-5, 2012
University Sultan Zainal Abidin, Kuala Terengganu, Malaysia
June 3-5, 2012
http://www.sdiwc.net/icia2012/
The proposed conference on the above theme will be held at University Sultan Zainal Abidin, Kuala Terengganu, Malaysia, From June 3-4, 2012 which aims to enable researchers build connections between different digital applications.
The conference welcomes papers on the following (but not limited to) research topics:
- Information Ethics
- Information Content Security
- Data Compression
- E-Technology
- E-Government
- E-Learning
- Cloud Computing
- Grid Computing
- Green Computing
- Access Controls
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Peer-to-Peer Social Networks
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineering
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- Distributed and Parallel Applications
- Embedded Systems and Software
- Critical Computing and Storage
- Critical Infrastructure Management
- Soft Computing Techniques
- Confidentiality Protection
- Mobile Networking, Mobility and Nomadicity
- Anti-cyberterrorism
- Ubiquitous Computing, Services and Applications
- Forensics, Recognition Technologies and Applications
- Fuzzy and Neural Network Systems
- Signal Processing, Pattern Recognition and Applications
- User Interfaces,Visualization and Modeling
- Mobile, Ad Hoc and Sensor Network Management
- Web Services Architecture, Modeling and Design
- Quality of Service, Scalability and Performance
- Self-Organizing Networks and Networked Systems
- Computational Intelligence
- Data Management in Mobile Peer-to-Peer Networks
- Data Stream Processing in Mobile/Sensor Networks
- Indexing and Query Processing for Moving Objects
- User Interfaces and Usability Issues form Mobile Applications
- Sensor Networks and Social Sensing
- XML-Based Languages
- Cryptography and Data Protection
- Information Propagation on Social Networks
- Resource and Knowledge Discovery Using Social Networks
- Computer Crime Prevention and Detection
Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.
Important Dates
Submission Date : May. 5, 2012
Notification of acceptance : May 10, 2012
Camera Ready submission : May 17, 2012
Registration : May 17, 2012
Conference dates : June 3-5, 2012
Other CFPs
- The Second International Conference on Digital Information and Communication Technology and its Applications (DICTAP2012)
- The International Conference on Digital Information and Wireless Communications icdiwc2012
- International Conference on Embedded Technology
- 11th METU International ELT Convention
- IEEE International Power Modulator and High Voltage Conference (IEEE IPMHVC 2012 )
Last modified: 2012-04-30 10:29:18