ICIA 2013 - The Second International Conference on Informatics and Applications
Topics/Call fo Papers
The Second International Conference on Informatics & Applications (ICIA2013) that will be held in Lodz, Poland on Sept. 23-25, 2013. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
Information Ethics Information Content Security
Data Compression E-Technology
E-Government E-Learning
Cloud Computing Grid Computing
Green Computing Access Controls
Data Mining Social Search
Computer Forensics Computer Security
Peer-to-Peer Social Networks Information and Data Management
Network Security Social Networks
Real-Time Systems Internet Modeling
Assurance of Service Image Processing
Web Services Security Multimedia Computing
Software Engineering Biometrics Technologies
Wireless Communications Semantic Web, Ontologies
Mobile Social Networks Distributed and Parallel Applications
Embedded Systems and Software Critical Computing and Storage
Critical Infrastructure Management Soft Computing Techniques
Confidentiality Protection Mobile Networking, Mobility and Nomadicity
Anti-cyberterrorism Ubiquitous Computing, Services and Applications
Forensics, Recognition Technologies and Applications Fuzzy and Neural Network Systems
Signal Processing, Pattern Recognition and Applications User Interfaces,Visualization and Modeling
Mobile, Ad Hoc and Sensor Network Management Web Services Architecture, Modeling and Design
Quality of Service, Scalability and Performance Self-Organizing Networks and Networked Systems
Computational Intelligence Data Management in Mobile Peer-to-Peer Networks
Data Stream Processing in Mobile/Sensor Networks Indexing and Query Processing for Moving Objects
User Interfaces and Usability Issues form Mobile Applications Sensor Networks and Social Sensing
XML-Based Languages Cryptography and Data Protection
Information Propagation on Social Networks Resource and Knowledge Discovery Using Social Networks
Computer Crime Prevention and Detection
All Papers submitted will be reviewed by a minimum of two reviewers. All the papers will be submitted to IEEE for potential inclusion to IEEE Explore which is abstracted/indexed in ISI Proceedings and Scopus. All Papers submitted will be reviewed by a minimum of two reviewers. In addition, all the registered papers will be submitted to DBLP, EI, INSPEC, Research Bible, Scirus, Microsoft Academic Research, ResearchGate, and Google Scholar for possible inclusion in its database.
Information Ethics Information Content Security
Data Compression E-Technology
E-Government E-Learning
Cloud Computing Grid Computing
Green Computing Access Controls
Data Mining Social Search
Computer Forensics Computer Security
Peer-to-Peer Social Networks Information and Data Management
Network Security Social Networks
Real-Time Systems Internet Modeling
Assurance of Service Image Processing
Web Services Security Multimedia Computing
Software Engineering Biometrics Technologies
Wireless Communications Semantic Web, Ontologies
Mobile Social Networks Distributed and Parallel Applications
Embedded Systems and Software Critical Computing and Storage
Critical Infrastructure Management Soft Computing Techniques
Confidentiality Protection Mobile Networking, Mobility and Nomadicity
Anti-cyberterrorism Ubiquitous Computing, Services and Applications
Forensics, Recognition Technologies and Applications Fuzzy and Neural Network Systems
Signal Processing, Pattern Recognition and Applications User Interfaces,Visualization and Modeling
Mobile, Ad Hoc and Sensor Network Management Web Services Architecture, Modeling and Design
Quality of Service, Scalability and Performance Self-Organizing Networks and Networked Systems
Computational Intelligence Data Management in Mobile Peer-to-Peer Networks
Data Stream Processing in Mobile/Sensor Networks Indexing and Query Processing for Moving Objects
User Interfaces and Usability Issues form Mobile Applications Sensor Networks and Social Sensing
XML-Based Languages Cryptography and Data Protection
Information Propagation on Social Networks Resource and Knowledge Discovery Using Social Networks
Computer Crime Prevention and Detection
All Papers submitted will be reviewed by a minimum of two reviewers. All the papers will be submitted to IEEE for potential inclusion to IEEE Explore which is abstracted/indexed in ISI Proceedings and Scopus. All Papers submitted will be reviewed by a minimum of two reviewers. In addition, all the registered papers will be submitted to DBLP, EI, INSPEC, Research Bible, Scirus, Microsoft Academic Research, ResearchGate, and Google Scholar for possible inclusion in its database.
Other CFPs
- ICS 2013 : 27th International Conference on Supercomputing
- special session on Interpretable systems in machine learning, data analysis, and visualization
- The 3rd International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation
- The 5th International Conference on Advanced Communication and Networking
- The 2013 International Conference on Computer Science and Technology
Last modified: 2012-09-30 16:49:57