ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

JoACNS 2015 - Journal of Algorithms, Computer Network, and Security (No Fees)

Date2015-12-15 - 2015-12-29

Deadline2015-12-15

VenueOnline, Austria Austria

KeywordsAlgorithms; Computer Network; Network Security

Websitehttps://www.joacns.com

Topics/Call fo Papers

The topics suggested by Journal of Algorithms, Computer Network, and Security are involve concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journals. All papers of the journal are peer reviewed by a team of reviewers, then revised by independent Chief Editor. Scope of the journal includes: algorithms on graphs, arithmetic algorithms, combinatorial searches and objects, complexity studies, complexity theory, discrete optimization, geometric algorithms, methods of algorithmic analysis, new algorithms and data structures, new analyses or comparisons of known algorithms network protocols, wireless networks, network architectures, high speed networks, routing, switching and addressing techniques, next generation internet, next generation web architectures, network operations and management, Adhoc and sensor networks, internet and web applications, ubiquitous networks, mobile networks, wireless LAN, wireless multimedia systems, wireless communications, heterogeneous wireless networks, measurement and performance analysis, peer to peer and overlay networks, QoS and resource management, network based applications, self-organizing networks, networked systems, optical networking, mobile and broadband wireless internet, recent trends and developments in computer networks, network security, access control, computer security, communications security, cryptography, data security, database security, electronic commerce security, information security, multimedia security, security in mobile computing and steganography.
http://www.sciencesolve.com/
http://www.joacns.com/

Last modified: 2015-10-31 01:40:33