ICSIP 2014 - International conference on Signal and Image Processing
Date2014-03-22 - 2014-03-24
Deadline2014-01-13
VenueHammamet, Tunisia
Keywords
Websitehttps://www.wsan.org
Topics/Call fo Papers
The topics of the ICSIP’2014 include, but not limited to, the following:
? 3D and Stereo Imaging
? 3-D and Surface Reconstruction
? Algorithms and modeling for tracking and locating mobile users
? Analog and Mixed Signal Processing
? Application & Others
? Applications (Biomedical, Bioinformatics, Genomic, Seismic, Radar, Sonar, Remote Sensing, Positioning, etc.)
? Applied cryptography, Cryptanalysis, Digital Signatures
? Biometric security
? Boundary control devices
? Certification and accreditation
? Cross-layer design for security
? Data and system integrity, Database security
? Defensive information warfare
? Denial of service protection, Intrusion Detection, Anti-malware
? Distributed systems security
? Electronic commerce
? E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojon Protection
? Grid security
? Information hiding and watermarking & Information survivability
? Insider threat protection, Integrity
? Intellectual property protection
? Internet/Intranet Security
? Key management and key recovery
? Language-based security
? Mobile and wireless security
? Mobile, Ad Hoc and Sensor Network Security
? Monitoring and surveillance
? Multimedia security ,Operating system security, Peer-to-peer security
? Performance Evaluations of Protocols & Security Application
? Privacy and data protection
? Product evaluation criteria and compliance
? Risk evaluation and security certification
? Risk/vulnerability assessment
? Security & Network Management
? Security and Assurance in Operational, Technological, commercial Area
? Security Engineering and Its Application
? Security Models & protocols
? Security threats like DDoS, MiM,
? Illumination and Reflectance Modeling
? Image acquisition & Medical Image processing
? Image and Video Retrieval
? Image coding and compression
? Image Processing & Understanding
? Image segmentation
? Image-Based Modeling
? Information access in wireless networks
? Integration of wired and wireless networks
? Internet Signal Processing
? Knowledge Representation and High-Level Vision
? Medical Image Analysis
? Mobile ad hoc and sensor networks
? Mobile and wireless Networks
? Mobile applications, location-dependent and sensitive applications
? Motion Detection
? Remote Sensing
? Resource management in mobile, wireless and ad-hoc networks
? Routing, and communication primitives in ad hoc and sensor networks
? 3D and Stereo Imaging
? 3-D and Surface Reconstruction
? Algorithms and modeling for tracking and locating mobile users
? Analog and Mixed Signal Processing
? Application & Others
? Applications (Biomedical, Bioinformatics, Genomic, Seismic, Radar, Sonar, Remote Sensing, Positioning, etc.)
? Applied cryptography, Cryptanalysis, Digital Signatures
? Biometric security
? Boundary control devices
? Certification and accreditation
? Cross-layer design for security
? Data and system integrity, Database security
? Defensive information warfare
? Denial of service protection, Intrusion Detection, Anti-malware
? Distributed systems security
? Electronic commerce
? E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojon Protection
? Grid security
? Information hiding and watermarking & Information survivability
? Insider threat protection, Integrity
? Intellectual property protection
? Internet/Intranet Security
? Key management and key recovery
? Language-based security
? Mobile and wireless security
? Mobile, Ad Hoc and Sensor Network Security
? Monitoring and surveillance
? Multimedia security ,Operating system security, Peer-to-peer security
? Performance Evaluations of Protocols & Security Application
? Privacy and data protection
? Product evaluation criteria and compliance
? Risk evaluation and security certification
? Risk/vulnerability assessment
? Security & Network Management
? Security and Assurance in Operational, Technological, commercial Area
? Security Engineering and Its Application
? Security Models & protocols
? Security threats like DDoS, MiM,
? Illumination and Reflectance Modeling
? Image acquisition & Medical Image processing
? Image and Video Retrieval
? Image coding and compression
? Image Processing & Understanding
? Image segmentation
? Image-Based Modeling
? Information access in wireless networks
? Integration of wired and wireless networks
? Internet Signal Processing
? Knowledge Representation and High-Level Vision
? Medical Image Analysis
? Mobile ad hoc and sensor networks
? Mobile and wireless Networks
? Mobile applications, location-dependent and sensitive applications
? Motion Detection
? Remote Sensing
? Resource management in mobile, wireless and ad-hoc networks
? Routing, and communication primitives in ad hoc and sensor networks
Other CFPs
- International Conference on Networking Services
- International Conference on Mobile and Computing and Ubiquitous Systems
- International Conference on Network Technologies and Communication Systems
- International Conference on Network Learning
- International Conference on Networks & Wireless Technology and Applications
Last modified: 2014-01-07 23:28:10