ICISCEA 2012 - 2nd International Conference on Information System, Computer Engineering & Applications
View: 2942
Website http://www.cfisws.com |
Edit Freely
Category Information Technology, Computer
Deadline: March 30, 2012 | Date: June 22, 2012-June 23, 2012
Venue/Country: Kathmandu, Nepal
Updated: 2012-01-21 17:03:04 (GMT+9)
Call For Papers - CFP
Design and Development Methodologies and Frameworks Iterative and Incremental Methodologies Agile Methodologies IS Design and Development as a Component Based Process IS Design and Development as Social Negotiation Process IS D Design and Development as a Global and Distributed Process Outsourcing in IS Outsourcing Risks, Barriers and Opportunities IS Project Management IS Quality Management and Assurance IS Standards and Compliance Issues Risk Management in IS Risk Management in IS Design and Development Ethical, social, privacy, security and moral issues in an e-society The role of information in the information society Myths, taboos and misconceptions in IS Practitioner and Research Relationship, Projects and Links Validity, Usefulness and Applicability of IS Academic ResearchIndustrial Research versus Academic Research Issues Industry Innovation and Leadership and Academic Laggards IS consultancy as a profession Organisational IS Roles Communities of practice and Knowledge Sharing Power, Cultural, Behavioural and Political issues New Organisational FormsDilution of Organisational Boundaries Patterns of Demand for IS Teaching Provision Fads, Fashions and Fetishes in IS Curricula Pedagogic practice in Teaching IS E-Learning in IS Instructional Design for IS National Cultures and Approaches to Pedagogy Multiculturality and Diversity Issues in IS Learning and Teaching IS and Organisation Development Enterprise Application Integration The centrality of IS and IT in Organisational Processes IS Management Information Management Knowledge Management IS and SMEs Innovation and IS Innovation and Knowledge Management IS and Change Management Enterprise Resource Planning Knowledge and Data-Base Systems Software Engineering Educational Software Knowledge Engineering Security Software Methodologies Software Requirements Software Design and Development Software Maintenance, Software Metrics Software Testing Fault Tolerance Project Management Microwave Theory and techniques CAD design for Microwave Systems Antennas and Radars Lightwave technology Submillimeter-Wave techniques Microwave High-Power techniques Microwave and millimeter-Wave Integrated Circuits Microwave and millimeter-Wave Integrated Solid State Devices Microwave Acoustics Filter and Passive Components Microwave and Antennas Measurements Microwave Superconductivity RFIC's Wave-guides Microwave propagation Mathematical Logic and Computers Image, Video and Internet Technologies Web-Based Education Distributed Real Time Systems Distributed Data Base Distributed Knowledge-base Systems Computer Applications in ScienceComputer Applications in Engineering Computer Applications in Business, Commerce and Economics Computer Applications in Earth Sciences, Aerospace and Transportation Science Computer Applications in Biology, Chemistry, Medicine, Healthcare and Bioengineering Computer Applications in Acoustics, Music, Speech Processing Computer Applications in Signal and Image Processing Computer Applications in Communication Law Aspects related to informaticsReusabilityProtocols, Routing, Scheduling Fault ToleranceBusiness Process Change Optical networks Security Architectures and Infrastructures Hacking, Trojian Horses, Viruses, Worms, Spam Denial of service. Passive attacks, Active attacks, Data Mining Evaluation of Information Intelligent Networks Intelligent Agents Reliability and fault-tolerance Performance analysis Data Engineering Knowledge Engineering Software Engineering Information Security, Threat and attacks to information Information security services: authentication, access control, confidentiality, integrity, Non-repudiation, Secret sharing, Database security, Operating systems security. Modeling and analysis for information security: Protocols and its logical analysis, Performance analysis, Risk analysis. Standards of information security: AES, IPSec, Common Criteria. Infrastructure for information security: Public Key Infrastructure, Certification Authority. Tools for information security: Smart cards, biometrics, watermarking, intrusion detection, scanners, mobile agents. Applications of information security: E-commerce, health information systems, mobile telephony, E-banking, E-voting, entertainment industry. Cryptography: algorithms, performance analysis. Advanced topics in security: quantum cryptography. Multilateral Security: Relationship between privacy and security, Privacy enhancing technologies, Anonymity techniques, High-tech crime prevention, Information hiding.Computer Applications in Arts, Archaeology, Education and Animation Modelling and Simulation Software Evaluation Standards Distributed Multimedia
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.