ISISE 2012 - Fourth International Symposium on Information Sciences and Engineering
Date2012-12-14 - 2012-12-16
Deadline2012-10-25
VenueShanghai, China
Keywords
Websitehttps://isise2012.shiecn.org
Topics/Call fo Papers
We are soliciting papers that present recent results, as well as more speculative presentations that discuss research challenges, define new applications, propose methodologies for evaluating and the roadmap for achieving the vision of Information Science and Engineering, including but not limited to the following topics:
Information Retrieval Systems
Information systems security
Information and Knowledge Structures
Information Processing Methods
Information theory and statistics
Information theory in networks
Applications of Information Theory
Information Hiding and Watermarking
Quantum Information Processing
Data Compression and Source Coding
Pattern Recognition and Learning
Computer and Communication Systems
Computer Graphics and Visualization
Computer Vision and Image Processing
Access control
Applied cryptography
Authentication and authorization
Biometric security Data and system integrity
Database security
Distributed systems security
Electronic commerce
Fraud control
Grid security
Information hiding and watermarking
Intellectual property protection
Intrusion detection
Key management and key recovery
Language-based security
Operating system security
Network security
Risk evaluation and security certification
Security for mobile computing
Security models
Security protocols
Trusted computin
For more questions regarding submit , please email to the Organizing chair Huqiang Long at hqlong-AT-sjtu.edu.cn (Tel:86-21-5382-4236)
Information Retrieval Systems
Information systems security
Information and Knowledge Structures
Information Processing Methods
Information theory and statistics
Information theory in networks
Applications of Information Theory
Information Hiding and Watermarking
Quantum Information Processing
Data Compression and Source Coding
Pattern Recognition and Learning
Computer and Communication Systems
Computer Graphics and Visualization
Computer Vision and Image Processing
Access control
Applied cryptography
Authentication and authorization
Biometric security Data and system integrity
Database security
Distributed systems security
Electronic commerce
Fraud control
Grid security
Information hiding and watermarking
Intellectual property protection
Intrusion detection
Key management and key recovery
Language-based security
Operating system security
Network security
Risk evaluation and security certification
Security for mobile computing
Security models
Security protocols
Trusted computin
For more questions regarding submit , please email to the Organizing chair Huqiang Long at hqlong-AT-sjtu.edu.cn (Tel:86-21-5382-4236)
Other CFPs
- The Gu Kailai Trial @ Golden Networking's China Happy Hour in New York City - Tuesday 28th, 6PM
- International Conference of Computer Science and Information Systems
- The 2012 Interdisciplinary Linguistics Conference
- 2nd Workshop on Sentiment Analysis where AI meets Psychology
- The 2013 Conference of the North American Chapter of the Association for Computational Linguistics
Last modified: 2012-08-25 10:28:01