ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICIEI 2013 - The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013)

Date2013-11-12 - 2013-11-14


Venuekuala lumpur, Malaysia Malaysia



Topics/Call fo Papers

The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013) that will be held in Kuala Lumpur, Malaysia, on Nov. 12-14, 2013. The event will be held over two days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
The conference welcome papers on the following (but not limited to) research topics:
Information Ethics Information Content Security
Network Security Social Networks
Real-Time Systems Internet Modeling
Assurance of Service Image Processing
Web Services Security Multimedia Computing
Software Engineeing Biometrics Technologies
Wireless Communications Semantic Web, Ontologies
Mobile Social Networks Anti-cyberterrorism
XML-Based Languages Soft Computing Techniques
Computational Intelligence Mobile Networking, Mobility and Nomadicity
Ubiquitous Computing, Services and Applications Forensics, Recognition Technologies and Applications
Fuzzy and Neural Network Systems Signal Processing, Pattern Recognition and Applications
Distributed and Parallel Applications User Interfaces,Visualization and Modeling
Mobile, Ad Hoc and Sensor Network Management Web Services Architecture, Modeling and Design
Quality of Service, Scalability and Performance Self-Organizing Networks and Networked Systems
Data Management in Mobile Peer-to-Peer Networks Data Stream Processing in Mobile/Sensor Networks
Indexing and Query Processing for Moving Objects User Interfaces and Usability Issues form Mobile Applications
Sensor Networks and Social Sensing Embedded Systems and Software
Information Propagation on Social Networks Resource and Knowledge Discovery Using Social Networks
Computer Crime Prevention and Detection Confidentiality Protection
Critical Infrastructure Management Critical Computing and Storage
Cryptography and Data Protection
All accepted papers will be included in SDIWC Digital Library, and in the proceedings of the conference.

Last modified: 2012-08-22 23:01:31