ICISCI 2013 - 2013 年IEEE信息系?与?算智能国?会?
Date2013-01-18
Deadline2012-11-20
VenueHarbin, China
Keywordscomputer;information;technology;control
Websitehttp://www.icisci.org
Topics/Call fo Papers
Prospective authors are invited to submit their draft paper in full paper. The submitted file can be in MS Word format (.doc).
Topics of interest for submission include, but are not limited to:
Mobile Device Security
Multi-Agent Systems
Public Key Cryptosystems
Software Encryption
Neural Networks
Secret Sharing
Web Authentication
Hybrid Systems
Unsupervised Learning
Classification Methods
Novelty Detection
Machine Learning for Data Mining
Data Mining Methods for Security
Intrusion Detection Systems
Information Forensics
Intelligent Methods in Energy and Transportation
Planning and Automated Reasoning in Large System Control
Biometric Identification and Recognition
Biometric Surveillance
Adaptive Defense of Network Infrastucture
Adaptive Reasoning Biometric Access Control
Document Classification and Processing
Semantic Information Representation
Natural Language Acquisition
Web Semantics in Intelligence and Law-Enforcement
Industrial and Commercial Applications of Intelligent Methods for Security
Intelligent Control and Monitoring of Critical Systems
Dynamic Adaptive Railway Operation
Cryptography
Applied Cryptography and provably-secure cryptographic protocols
Supercomputer/cluster/grid integration issues
Grid Performance Evaluation, QoS and SLA Negotiation
Design and analysis of efficient cryptographic primitives: Public-key and symmetric-key cryptosystems, block ciphers, and hash functions
Economic fraud on the Internet: phishing, pharming, spam, and click fraud
Email and web security
Intellectual property protection: Metering, watermarking, and digital rights management.
Grid Middleware, Grid Computing, Data and Networking Infrastructures
Distributed and Large-Scale Data Access and Management
Computer Science, namely on HPC and Grid computing issues
Computational Sciences, with requirements in HPC and Grid
Computational Engineering with a similar focus.
Data Repositories, Distributed Resource Management and Scheduling
Grid and HPC Applications, including e-Science in general and also Science Gateways, Nanomaterials, High Energy Physics, e-Health, e-Business, e-Administration, Life Sciences, Earth Centralized Control Systems
Adaptive Planning for Strategic Reasoning
Extraction of Biometric Features (fingerprint, iris, face, voice, palm, gait)
Sciences, Civil Protection, Computational Sciences and Engineering, ...
User Development Environments and Programming Tools for Grid Computing.
Fault tolerance in virtualized environments
Virtualization in P2P systems
Virtualization-based adaptive/autonomic systems
The creation and management of environments/appliances
Virtualization technologies
Performance modeling (applications and systems)
Virtualization techniques for energy/thermal management
Infrastructure as a service (IaaS)
Virtualization in data centers
Virtualization for resource management and QoS assurance
Security aspects of using virtualization in a distributed environment
Virtual networks
Virtual data, storage as a service
Case studies of applications on IaaS platforms
Deployment studies of virtualization technologies
Tools relevant to virtualization
Topics of interest for submission include, but are not limited to:
Mobile Device Security
Multi-Agent Systems
Public Key Cryptosystems
Software Encryption
Neural Networks
Secret Sharing
Web Authentication
Hybrid Systems
Unsupervised Learning
Classification Methods
Novelty Detection
Machine Learning for Data Mining
Data Mining Methods for Security
Intrusion Detection Systems
Information Forensics
Intelligent Methods in Energy and Transportation
Planning and Automated Reasoning in Large System Control
Biometric Identification and Recognition
Biometric Surveillance
Adaptive Defense of Network Infrastucture
Adaptive Reasoning Biometric Access Control
Document Classification and Processing
Semantic Information Representation
Natural Language Acquisition
Web Semantics in Intelligence and Law-Enforcement
Industrial and Commercial Applications of Intelligent Methods for Security
Intelligent Control and Monitoring of Critical Systems
Dynamic Adaptive Railway Operation
Cryptography
Applied Cryptography and provably-secure cryptographic protocols
Supercomputer/cluster/grid integration issues
Grid Performance Evaluation, QoS and SLA Negotiation
Design and analysis of efficient cryptographic primitives: Public-key and symmetric-key cryptosystems, block ciphers, and hash functions
Economic fraud on the Internet: phishing, pharming, spam, and click fraud
Email and web security
Intellectual property protection: Metering, watermarking, and digital rights management.
Grid Middleware, Grid Computing, Data and Networking Infrastructures
Distributed and Large-Scale Data Access and Management
Computer Science, namely on HPC and Grid computing issues
Computational Sciences, with requirements in HPC and Grid
Computational Engineering with a similar focus.
Data Repositories, Distributed Resource Management and Scheduling
Grid and HPC Applications, including e-Science in general and also Science Gateways, Nanomaterials, High Energy Physics, e-Health, e-Business, e-Administration, Life Sciences, Earth Centralized Control Systems
Adaptive Planning for Strategic Reasoning
Extraction of Biometric Features (fingerprint, iris, face, voice, palm, gait)
Sciences, Civil Protection, Computational Sciences and Engineering, ...
User Development Environments and Programming Tools for Grid Computing.
Fault tolerance in virtualized environments
Virtualization in P2P systems
Virtualization-based adaptive/autonomic systems
The creation and management of environments/appliances
Virtualization technologies
Performance modeling (applications and systems)
Virtualization techniques for energy/thermal management
Infrastructure as a service (IaaS)
Virtualization in data centers
Virtualization for resource management and QoS assurance
Security aspects of using virtualization in a distributed environment
Virtual networks
Virtual data, storage as a service
Case studies of applications on IaaS platforms
Deployment studies of virtualization technologies
Tools relevant to virtualization
Other CFPs
- IEEE Communications Magazine - Network & Service Management Series
- Pregnancy in the Workplace: Strategies to Protect Your Organization from Pregnancy Discrimination Claims - HR Compliance Webinar.
- Organizational Crisis Management: Human Factor Issues - HR Compliance Webinar By ComplianceOnline.
- Auditing the Human Resource Function - HR Compliance Webinar By ComplianceOnline.
- HR Audits: A Critical Compliance Process - HR Compliance Webinar By ComplianceOnline.
Last modified: 2012-01-28 14:49:38