ICCNS 2012 - International Conference on Computer Networks and Security (ICCNS 2012)
View: 620
Website www.waset.org/events.php |
Edit Freely
Category ICCNS 2012
Deadline: February 29, 2012 | Date: July 11, 2012-July 13, 2012
Venue/Country: Ba rcelona, Spain
Updated: 2011-06-29 13:56:03 (GMT+9)
Call For Papers - CFP
The VIII. International Conferen 194 ce on Computer Networks and Security is the premier forum for the presentation of new advances and research results in the fields of Computer Networks and Security. The conference will bring together leading researchers, engineers and scientists in the domain of interest f 199 rom around the world. Topics of interest for submission include, but are not limited to: Computer Networks Computer Networking Mobile and Wireless Technologies (UWB, MIMO, WiMAX, etc.) and Networks Radio Wave Propagation (modelling, channel measurements and characterisation) Software Defined Radio Application of FP 197 GA and DSP in Communication Devices and Networks Ad-hoc Networks Signal Processing for Wireless Communications Modulation, Coding and Multiple Access Schemes in Communications Internet and Intranet Technologies and Services Intelligent Spatial and Co-located Data Access and Management Information Theory and Coding Theory Networking Theory and Technolog 199 ies Antennas Simulation, Design, Measurements and Applications Microwave (RF) System Simulations, Design, Build and Measurements Network and Data Security Hardware and Software Applications Communication Protocols and Standards University-Industry Collaboration or Knowledge Transfer Activities Network Architecture Network Interfaces Network 19b Reliability Network Performance Network Management Network protocols Quality Service Issues Wireless Protocol, Architecture and Design Concerns Adhoc Networks Heterogeneous Networks High Performance Network Protocol Services and Interconnection of High Speed Networks Methodologies and development for high speed Network Performa 19f nce in High Speed Network VoIP Blue tooth Technology Broadband Access Control Wireless Access ControlSecurity Issues Cryptography Network Security Wireless Network Security Information Hiding, Stegnography, Watermarking Security in High speed network Biometrics Identification and trust Methodology Forensic 1a5 Peer to Peer Security Network intrusion, detection and prevention Contact us: info
waset.org
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.