Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    ICCGI 2010 - The Fifth International Multi-Conference on Computing in the Global Information Technology

    View: 2571

    Website www.iaria.org/conferences.html | Want to Edit it Edit Freely

    Category ICCGI 2010

    Deadline: April 20, 2010 | Date: September 20, 2010

    Venue/Country: Valencia, Spain

    Updated: 2010-06-04 19:32:22 (GMT+9)

    Call For Papers - CFP

    The Fifth International Conference on Computing in the Global Information Technology (ICCGI 2010) initiates a series of international events covering a large spectrum of topics related to global knowledge concerning computation, technologies, mechanisms, cognitive patterns, thinking, communications, user-centric approaches, nanotechnologies, and advanced networking and systems. The conference topics focus on challenging aspects in the next generation of information technology and communications related to the computing paradigms (mobile computing, database computing, GRID computing, multi-agent computing, autonomic computing, evolutionary computation) and communication and networking and telecommunications technologies (mobility, networking, bio-technologies, autonomous systems, image processing, Internet and web technologies), towards secure, self-defendable, autonomous, privacy-safe, and context-aware scalable systems.

    This conference intends to expose the scientists to the latest developments covering a variety of complementary topics, aiming to enhance one’s understanding of the overall picture of computing in the global information technology.

    The integration and adoption of IPv6, also known as the Next Generation of the Internet Protocol is happening throughout the World at this very moment. To maintain global competitiveness, governments are mandating, encouraging or actively supporting the adoption of IPv6 to prepare their respective economies for the future communication infrastructures. Business organizations are increasingly mindful of the IPv4 address space depletion and see within IPv6 a way to solve pressing technical problems while IPv6 technology continues to evolve beyond IPv4 capabilities. Communications equipment manufacturers and applications developers are actively integrating IPv6 in their products based on market demands.

    IPv6 continues to represent a fertile area of technology innovation and investigation. IPv6 is opening the way to new successful research projects. Leading edge Internet Service Providers are guiding the way to a new kind of Internet where any-to-any reachability is not a vivid dream but a notion of reality in production IPv6 networks that have been commercially deployed. National Research and Educational Networks together with internationally known hardware vendors, Service Providers and commercial enterprises have generated a great amount of expertise in designing, deploying and operating IPv6 networks and services. This knowledge can be leveraged to accelerate the deployment of the protocol worldwide.

    ICCGI 2010 comprises a series of independent tracks that complement the challenges on various facets of computation, systems solutions, knowledge processing, system implementation, and communications and networking technologies.

    Industrial systems

    Evolutionary computation

    Autonomic and autonomous systems

    Bio-technologies

    Knowledge data systems

    Mobile and distance education

    Intelligent techniques, logics, and systems

    Knowledge processing

    Information technologies

    Internet and web technologies

    Digital information processing

    Cognitive science and knowledge agent-based systems

    Mobility and multimedia systems

    Systems performance

    Networking and telecommunications

    Software development and deployment

    Knowledge virtualization

    Systems and networks on the chip

    Context-aware systems

    Networking technologies

    Security in network, systems, and applications

    Knowledge for global defense

    Information Systems [IS]

    IPv6 Today - Technology and deployment

    Modeling

    Optimization

    Complexity

    We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.

    Industrial presentations are not subject to these constraints. We expect short and long presentations that express industrial position and status.

    Tutorials on specific related topics and panels on challenging areas are encouraged.

    The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All tracks are open to both research and industry contributions.

    Industrial systems

    Control theory and systems

    Fault-tolerance and reliability

    Data engineering

    Enterprise computing and evaluation

    Electrical and electronics engineering

    Economic decisions and information systems

    Advanced robotics

    Virtual reality systems

    Industrial systems and applications

    Industrial and financial systems

    Industrial control electronics

    Industrial IT solutions

    Evolutionary computation

    Algorithms, procedures, mechanisms and applications

    Computer architecture and systems

    Computational sciences

    Computation in complex systems

    Computer and communication systems

    Computer networks

    Computer science theory

    Computation and computer security

    Computer simulation

    Digital telecommunications

    Distributed and parallel computing

    Computation in embedded and real-time systems

    Soft computing

    User-centric computation

    Autonomic and autonomous systems

    Automation and autonomous systems

    Theory of Computing

    Autonomic computing

    Autonomic networking

    Network computing

    Protecting computing

    Theories of agency and autonomy

    Multi-agent evolution, adaptation and learning

    Adjustable and self-adjustable autonomy

    Pervasive systems and computation

    Computing with locality principles

    GRID networking and services

    Pervasive computing

    Cluster computing and performance

    Artificial intelligence

    Computational linguistics

    Cognitive technologies

    Decision making

    Evolutionary computation

    Expert systems

    Computational biology

    Bio-technologies

    Models and techniques for biometric technologies

    Bioinformatics

    Biometric security

    Computer graphics and visualization

    Computer vision and image processing

    Computational biochemistry

    Finger, facial, iris, voice, and skin biometrics

    Signature recognition

    Multimodal biometrics

    Verification and identification techniques

    Accuracy of biometric technologies

    Authentication smart cards and biometric metrics

    Performance and assurance testing

    Limitations of biometric technologies

    Biometric card technologies

    Biometric wireless technologies

    Biometric software and hardware

    Biometric standards

    Knowledge data systems

    Data mining and Web mining

    Knowledge databases and systems

    Data warehouse and applications

    Data warehousing and information systems

    Database performance evaluation

    Semantic and temporal databases

    Database systems

    Databases and information retrieval

    Digital library design

    Meta-data modeling

    Mobile and distance education

    Human computer interaction

    Educational technologies

    Computer in education

    Distance learning

    E-learning

    Mobile learning

    Cognitive support for learning

    Internet-based education

    Impact of ICT on education and society

    Group decision making and software

    Habitual domain and information technology

    Computer-mediated communications

    Immersing authoring

    Contextual and cultural challenges in user mobility

    Intelligent techniques, logics, and systems

    Intelligent agent technologies

    Intelligent and fuzzy information processing

    Intelligent computing and knowledge management

    Intelligent systems and robotics

    Fault-tolerance and reliability

    Fuzzy logic & systems

    Genetic algorithms

    Haptic phenomena

    Graphic recognition

    Neural networks

    Symbolic and algebraic computation

    Modeling, simulation and analysis of business processes and systems

    Knowledge processing

    Knowledge representation models

    Knowledge languages

    Cognitive science

    Knowledge acquisition

    Knowledge engineering

    Knowledge processing under uncertainty

    Machine intelligence

    Machine learning

    Making decision through Internet

    Networking knowledge plan

    Information technologies

    Information technology and organizational behavior

    Agents, data mining and ontologies

    Information retrieval systems

    Information and network security

    Information ethics and legal evaluations

    Optimization and information technology

    Organizational information systems

    Information fusion

    Information management systems

    Information overload

    Information policy making

    Information security

    Information systems

    Information discovery

    Internet and web technologies

    Internet and WWW-based computing

    Web and Grid computing

    Internet service and training

    IT and society

    IT in education and health

    Management information systems

    Visualization and group decision making

    Web based language development

    Web search and decision making

    Web service ontologies

    Scientific web intelligence

    Online business and decision making

    Business rule language

    E-Business

    E-Commerce

    Online and collaborative work

    Social eco-systems and social networking

    Social decisions on Internet

    Computer ethics

    Digital information processing

    Mechatronics

    Natural language processing

    Medical imaging

    Image processing

    Signal processing

    Speech processing

    Video processing

    Pattern recognition

    Pattern recognition models

    Graphics & computer vision

    Medical systems and computing

    Cognitive science and knowledge agent-based systems

    Cognitive support for e-learning and mobile learning

    Agents and cognitive models

    Agents & complex systems; computational ecosystems

    Agent architectures; perception, action & planning in agents

    Agent communication: languages, semantics, pragmatics & protocols

    Agent-based electronic commerce and trading systems

    Multi-agent constraint satisfaction

    Agent programming languages, development environments and testbeds

    Computational complexity in autonomous agents

    Multi-agent planning and cooperation

    Logics and formal models of for agency verification

    Nomadic agents

    Negotiation, auctions, persuasion

    Privacy and security issues in multi-agent systems

    Mobility and multimedia systems

    Mobile communications

    Multimedia and visual programming

    Multimedia and decision making

    Multimedia systems

    Mobile multimedia systems

    User-centered mobile applications

    Designing for the mobile devices

    Contextual user mobility

    Mobile strategies for global market

    Interactive television and mobile commerce

    Systems performance

    Performance evaluation

    Performance modeling

    Performance of parallel computing

    Reasoning under uncertainty

    Reliability and fault-tolerance

    Performance instrumentation

    Performance monitoring and corrections

    Performance in entity-dependable systems

    Real-time performance and near-real time performance evaluation

    Performance in software systems

    Performance and hybrid systems

    Measuring performance in embedded systems

    Networking and telecommunications

    Telecommunication and Networking

    Telecommunication Systems and Evaluation

    Multiple Criteria Decision Making in Information Technology

    Network and Decision Making

    Networks and Security

    Communications protocols (SIP/H323/MPLS/IP)

    Specialized networks (GRID/P2P/Overlay/Ad hoc/Sensor)

    Advanced services (VoIP/IPTV/Video-on-Demand

    Network and system monitoring and management

    Feature interaction detection and resolution

    Policy-based monitoring and managements systems

    Traffic modeling and monitoring

    Traffic engineering and management

    Self-monitoring, self-healing and self-management systems

    Man-in-the-loop management paradigm

    Software development and deployment

    Software requirements engineering

    Software design, frameworks, and architectures

    Software interactive design

    Formal methods for software development, verification and validation

    Neural networks and performance

    Patterns/Anti-patterns/Artifacts/Frameworks

    Agile/Generic/Agent-oriented programming

    Empirical software evaluation metrics

    Software vulnerabilities

    Reverse engineering

    Software reuse

    Software security, reliability and safety

    Software economics

    Software testing and debugging

    Tracking defects in the OO design

    Distributed and parallel software

    Programming languages

    Declarative programming

    Real-time and embedded software

    Open source software development methodologies

    Software tools and deployment environments

    Software Intelligence

    Software Performance and Evaluation

    Knowledge virtualization

    Modeling techniques, tools, methodologies, languages

    Model-driven architectures (MDA)

    Service-oriented architectures (SOA)

    Utility computing frameworks and fundamentals

    Enabled applications through virtualization

    Small-scale virtualization methodologies and techniques

    Resource containers, physical resource multiplexing, and segmentation

    Large-scale virtualization methodologies and techniques

    Management of virtualized systems

    Platforms, tools, environments, and case studies

    Making virtualization real

    On-demand utilities

    Adaptive enterprise

    Managing utility-based systems

    Development environments, tools, prototypes

    Systems and networks on the chip

    Microtechnology and nanotechnology

    Real-time embedded systems

    Programming embedded systems

    Controlling embedded systems

    High speed embedded systems

    Designing methodologies for embedded systems

    Performance on embedded systems

    Updating embedded systems

    Wireless/wired design of systems-on-the-chip

    Testing embedded systems

    Technologies for systems processors

    Migration to single-chip systems

    Context-aware systems

    Context-aware autonomous entities

    Context-aware fundamental concepts, mechanisms, and applications

    Modeling context-aware systems

    Specification and implementation of awareness behavioral contexts

    Development and deployment of large-scale context-aware systems and subsystems

    User awareness requirements

    Design techniques for interfaces and systems

    Methodologies, metrics, tools, and experiments for specifying context-aware systems

    Tools evaluations, Experiment evaluations

    Networking technologies

    Next generation networking

    Network, control and service architectures

    Network signalling, pricing and billing

    Network middleware

    Telecommunication networks architectures

    On-demand networks, utility computing architectures

    Next generation networks [NGN] principles

    Storage area networks [SAN]

    Access and home networks

    High-speed networks

    Optical networks

    Peer-to-peer and overlay networking

    Mobile networking and systems

    MPLS-VPN, IPSec-VPN networks

    GRID networks

    Broadband networks

    Security in network, systems, and applications

    IT in national and global security

    Formal aspects of security

    Systems and network security

    Security and cryptography

    Applied cryptography

    Cryptographic protocols

    Key management

    Access control

    Anonymity and pseudonymity management

    Security management

    Trust management

    Protection management

    Certification and accreditation

    Virii, worms, attacks, spam

    Intrusion prevention and detection

    Information hiding

    Legal and regulatory issues

    Knowledge for global defense

    Business continuity and availability

    Risk assessment

    Aerospace computing technologies

    Systems and networks vulnerabilities

    Developing trust in Internet commerce

    Performance in networks, systems, and applications

    Disaster prevention and recovery

    IT for anti-terrorist technology innovations (ATTI)

    Networks and applications emergency services

    Privacy and trust in pervasive communications

    Digital rights management

    User safety and protection

    Information Systems [IS]

    Management Information Systems

    Decision Support Systems

    Innovation and IS

    Enterprise Application Integration

    Enterprise Resource Planning

    Business Process Change

    Design and Development Methodologies and Frameworks

    Iterative and Incremental Methodologies

    Agile Methodologies

    IS Standards and Compliance Issues

    Risk Management in IS Design and Development

    Research Core Theories

    Conceptualisations and Paradigms in IS

    Research Ontological Assumptions in IS Research

    IS Research Constraints, Limitations and Opportunities

    IS vs Computer Science Research

    IS vs Business Studies

    IPv6 Today - Technology and deployment

    IP Upgrade - An Engineering Exercise or a Necessity?

    Worldwide IPv6 Adoption - Trends and Policies

    IPv6 Programs, from Research to Knowledge Dissemination

    IPv6 Technology - Practical Information

    Advanced Topics and Latest Developments in IPv6

    IPv6 Deployment Experiences and Case Studies

    IPv6 Enabled Applications and Devices

    Modeling

    Continuous and Discrete Models

    Optimal Models

    Complex System Modeling

    Individual-Based Models

    Modeling Uncertainty

    Compact Fuzzy Models

    Modeling Languages

    Real-time modeling

    Peformance modeling

    Optimization

    Multicriteria Optimization

    Multilervel Optimization

    Goal Programming

    Optimization and Efficiency

    Optimization-based decisions

    Evolutionary Optimization

    Self-Optimization

    Extreme Optimization

    Combinatorial Optimization

    Disccrete Optimization

    Fuzzy Optimization

    Lipschitzian Optimization

    Non-Convex Optimization

    Convexity

    Continuous Optimization

    Interior point methods

    Semidefinite and Conic Programming

    Complexity

    Complexity Analysis

    Computational Complexity

    Complexity Reduction

    Optimizing Model Complexity

    Communication Complexity

    Managing Complexity

    Modeling Complexity in Social Systems

    Low-complexity Global Optimization

    Software Development for Modeling and Optimization

    Industrial applications

    INSTRUCTION FOR THE AUTHORS

    Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.

    Important deadlines:

    Submission (full paper) April 20, 2010

    Notification May 25, 2010

    Registration June 17, 2010

    Camera ready June 17, 2010

    Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via an automated system.

    Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.

    Your paper should also comply with the additional editorial rules.

    Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.

    Poster Forum

    Posters are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as poster. Submissions are expected to be 6-8 slide deck. Posters will not be published in the Proceedings. One poster with all the slides together should be used for discussions. Presenters will be allocated a space where they can display the slides and discuss in an informal manner. The poster slide decks will be posted on the IARIA site.

    For more details, see the Poster Forum explanation page.

    Work in Progress

    Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.

    For more details, see the Work in Progress explanation page

    Technical marketing/business/positioning presentations

    The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to petreatiaria.org.

    Tutorials

    Tutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials' slide decks will be posted on the IARIA's site. Please send your proposals to petreatiaria.org

    Panel proposals:

    The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel's slide deck will be posted on the IARIA's site.

    For more information, petreatiaria.org

    Workshop proposals

    We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petreatiaria.org.


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.