CFP: The Second International Conference on Informatics & Applications, Poland
CALL FOR PAPERS All the papers will be submitted to IEEE for potential inclusion to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. ================= The Second International Conference on Informatics & Applications (ICIA2013) Lodz University of Technology September 23-25, 2013 http://sdiwc.net/conferences/2013/icia2013/ IMPORTANT DATES ================= Submission Date : August 5, 2013 Notification of acceptance : 4 weeks from the date of submitting the paper or September 5, 2013 Camera Ready submission : September 15, 2013 Registration : September 15, 2013 Conference dates : September 23-25, 2013 GENERAL INFORMATION ===================== The Second International Conference on Informatics & Applications (ICIA2013) will be held on September 23-25, 2013. The main objective of this conference is to provide a medium for professionals, engineers, academicians, scientists, and researchers across the globe to present the result of their research activities in the field of Computer Science, Engineering and Information Technology. ICIA2013 provides opportunities for the delegates to share the knowledge, ideas, innovations and problem solving techniques. Submitted papers will be reviewed by the technical program committee of the conference. TOPICS ======= - Information Ethics - Information Content Security - Data Compression - E-Technology - E-Government - E-Learning - Cloud Computing - Grid Computing - Green Computing - Access Controls - Data Mining - Social Search - Computer Forensics - Computer Security - Peer-to-Peer Social Networks - Information and Data Management - Network Security - Social Networks - Real-Time Systems - Internet Modeling - Assurance of Service - Image Processing - Web Services Security - Multimedia Computing - Software Engineering - Biometrics Technologies - Wireless Communications - Semantic Web, Ontologies - Mobile Social Networks - Distributed and Parallel Applications - Embedded Systems and Software - Critical Computing and Storage - Critical Infrastructure Management - Soft Computing Techniques - Confidentiality Protection - Mobile Networking, Mobility and Nomadicity - Anti-cyberterrorism - Ubiquitous Computing, Services and Applications - Forensics, Recognition Technologies and Applications - Fuzzy and Neural Network Systems - Signal Processing, Pattern Recognition and Applications - User Interfaces,Visualization and Modeling - Mobile, Ad Hoc and Sensor Network Management - Web Services Architecture, Modeling and Design - Quality of Service, Scalability and Performance - Self-Organizing Networks and Networked Systems - Computational Intelligence - Data Management in Mobile Peer-to-Peer Networks - Data Stream Processing in Mobile/Sensor Networks - Indexing and Query Processing for Moving Objects - User Interfaces and Usability Issues form Mobile Applications - Sensor Networks and Social Sensing - XML-Based Languages - Cryptography and Data Protection - Information Propagation on Social Networks - Resource and Knowledge Discovery Using Social Networks - Computer Crime Prevention and Detection INSTRUCTIONS FOR AUTHORS =========================== Researchers are encouraged to submit their work electronically. Submitted paper should not exceed 15 pages, including illustrations. Papers are to be numbered starting from page one. Papers should be submitted electronically as MS word or pdf format without author(s) name. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered. Accepted papers will be published in the conference proceedings. Best papers awards will be distributed during the conference. URL: http://sdiwc.net/conferences/2013/icia2013/openconf/openconf.php All accepted papers will be submitted to IEEE for potential inclusion to IEEE Xplore. In addition, all accepted papers will be included in SDIWC Digital Library, and in the proceedings of the conference. All Papers submitted will be reviewed by a minimum of two reviewers. The published proceedings will be reviewed for possible inclusion within the INSPEC Database. In addition, best selected papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor: International Journal of New Computer Architectures and their Applications (IJNCAA) International Journal of Digital Information and Wireless Communications (IJDIWC) International Journal of Cyber-Security and Digital Forensics (IJCSDF) International Journal of E-Entrepreneurship and Innovation (IJEEI) Please send any inquiry on ICIA2013 to icia@sdiwc.net -- Liezelle Ann Canadilla Conference Manager The Society of Digital Information and Wireless Communications (SDIWC) www.sdiwc.net
participants (1)
-
The Second International Conference on Informatics & Applications (ICIA2013)