ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICISCEA 2012 - 2nd International Conference on Information System, Computer Engineering & Applications

Date2012-06-22

Deadline2012-03-30

VenueKathmandu, Nepal Nepal

KeywordsInformation Technology, Computer

Websitehttp://www.cfisws.com

Topics/Call fo Papers

Design and Development Methodologies and Frameworks
Iterative and Incremental Methodologies
Agile Methodologies
IS Design and Development as a Component Based Process
IS Design and Development as Social Negotiation Process
IS D Design and Development as a Global and Distributed Process
Outsourcing in IS
Outsourcing Risks, Barriers and Opportunities
IS Project Management
IS Quality Management and Assurance
IS Standards and Compliance Issues
Risk Management in IS
Risk Management in IS Design and Development
Ethical, social, privacy, security and moral issues in an e-society
The role of information in the information society
Myths, taboos and misconceptions in IS
Practitioner and Research Relationship, Projects and Links
Validity, Usefulness and Applicability of IS Academic ResearchIndustrial Research versus Academic Research Issues
Industry Innovation and Leadership and Academic Laggards
IS consultancy as a profession
Organisational IS Roles
Communities of practice and Knowledge Sharing
Power, Cultural, Behavioural and Political issues
New Organisational FormsDilution of Organisational Boundaries
Patterns of Demand for IS Teaching Provision
Fads, Fashions and Fetishes in IS Curricula
Pedagogic practice in Teaching IS
E-Learning in IS
Instructional Design for IS
National Cultures and Approaches to Pedagogy
Multiculturality and Diversity Issues in IS Learning and Teaching
IS and Organisation Development
Enterprise Application Integration
The centrality of IS and IT in Organisational Processes
IS Management
Information Management
Knowledge Management
IS and SMEs
Innovation and IS
Innovation and Knowledge Management
IS and Change Management
Enterprise Resource Planning
Knowledge and Data-Base Systems
Software Engineering
Educational Software
Knowledge Engineering
Security
Software Methodologies
Software Requirements
Software Design and Development
Software Maintenance, Software Metrics
Software Testing
Fault Tolerance
Project Management
Microwave Theory and techniques
CAD design for Microwave Systems
Antennas and Radars
Lightwave technology
Submillimeter-Wave techniques
Microwave High-Power techniques
Microwave and millimeter-Wave Integrated Circuits
Microwave and millimeter-Wave Integrated Solid
State Devices
Microwave Acoustics
Filter and Passive Components
Microwave and Antennas Measurements
Microwave Superconductivity
RFIC's
Wave-guides
Microwave propagation
Mathematical Logic and Computers
Image, Video and Internet Technologies
Web-Based Education
Distributed Real Time Systems
Distributed Data Base
Distributed Knowledge-base Systems
Computer Applications in ScienceComputer
Applications in Engineering
Computer Applications in Business, Commerce and Economics
Computer Applications in Earth Sciences, Aerospace and Transportation Science
Computer Applications in Biology, Chemistry,
Medicine, Healthcare and Bioengineering
Computer Applications in Acoustics, Music, Speech Processing
Computer Applications in Signal and Image Processing
Computer Applications in Communication
Law Aspects related to informaticsReusability
Protocols, Routing, Scheduling
Fault Tolerance
Business Process Change
Optical networks
Security Architectures and Infrastructures
Hacking, Trojian Horses, Viruses, Worms, Spam
Denial of service.
Passive attacks, Active attacks,
Data Mining
Evaluation of Information
Intelligent Networks
Intelligent Agents
Reliability and fault-tolerance
Performance analysis
Data Engineering
Knowledge Engineering
Software Engineering
Information Security,
Threat and attacks to information
Information security services: authentication, access
control, confidentiality, integrity,
Non-repudiation, Secret sharing,
Database security,
Operating systems security.
Modeling and analysis for information security:
Protocols and its logical analysis,
Performance analysis,
Risk analysis.
Standards of information security: AES, IPSec,
Common Criteria.
Infrastructure for information security:
Public Key Infrastructure, Certification Authority.
Tools for information security:
Smart cards, biometrics, watermarking,
intrusion detection, scanners, mobile agents.
Applications of information security:
E-commerce, health information systems, mobile
telephony, E-banking,
E-voting, entertainment industry. Cryptography:
algorithms,
performance analysis.
Advanced topics in security: quantum cryptography.
Multilateral Security: Relationship between privacy and security,
Privacy enhancing technologies,
Anonymity techniques,
High-tech crime prevention,
Information hiding.
Computer Applications in Arts, Archaeology,
Education and Animation
Modelling and Simulation
Software Evaluation Standards Distributed Multimedia

Last modified: 2012-01-21 17:03:04