ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICCCS 2012 - 2nd International Conference on Communication, Computing & Security

Date2012-10-06

Deadline2012-04-01

VenueRourkela, India India

Keywords

Websitehttps://www.nitrkl.ac.in

Topics/Call fo Papers

ICCCS2012 solicits papers in the areas of Communication Computing and Security. Original, unpublished research papers from all viewpoints, including theory, practice, and experimentation for presentation in the technical sessions of the conference are invited from researchers, academicians and professionals.
The maximum length of the paper is 6 pages (including figures and references). The paper should not contain page numbers or any special headers or footers (such as authors names or the title of the paper on each page, etc.). Mandatory footnotes (that are part of the paper and/or acknowledgements to the sponsors, etc.) are allowed. Acceptance of papers will be communicated to authors by email. Accepted and registered papers will be included in the conference proceedings.
The scope of the Conference includes all the areas of Computing, Communication and Security. Sample areas include, but are certainly not limited to the following:
Communication:- Antenna Applications, Coding Techniques, Modeling & Simulation of Communication Systems, Network Architecture & Protocol, Optical Fiber/Microwave Communication, Satellite Communication, Wired & Wireless Communication, Wireless Sensor Networks and related topics.
Computing:- Artificial Intelligence, Computer Graphics and Virtual Reality, Speech/Image Processing, Data Warehousing & Mining, Distributed Computing, Grid and Cloud Computing, Service Oriented Architecture, Bioinformatics, e-Learning, e-Business, Enterprise Information Systems, and e-Government, Evolutionary Algorithms, Software Engineering, Parallel and Distributed Processing, Semantic Web and related topics.
Security:- Internet Computing & Web Security, Cryptography, Information Hiding, Steganography, Watermarking Security in High speed network, Biometrics, Identification and trust Methodology, Forensic, Peer to Peer Security, Network intrusion, detection and prevention, Privacy Preserving Techniques, System Security and related topics.

Last modified: 2012-02-07 20:51:54