Our Sponsors
Website http://sdiwc.net/conferences/2013/icieis2013/ |
Edit Freely
Category Computer Science; Information Technology; Information Ethics; Network Security; Computational Intelligence; Wireless Communications; Software Engineering; Multimedia Computing; Image Processing;
Deadline: August 01, 2013 | Date: November 12, 2013-November 14, 2013
Venue/Country: Kuala Lumpur, Malaysia
Updated: 2012-09-08 05:38:50 (GMT+9)
The proposed conference will be held at Universiti Teknologi Malaysia (UTM), Kuala Lumpur, Malaysia. From Nov. 12-14, 2013 which aims to enable researchers build connections between different digital applications.The conference welcomes papers on the following (but not limited to) research topics:- Information Ethics - Information Content Security- Network Security - Social Networks- Real-Time Systems - Internet Modeling- Assurance of Service - Image Processing- Web Services Security - Multimedia Computing- Software Engineering - Biometrics Technologies- Wireless Communications - Semantic Web, Ontologies- Mobile Social Networks - Anti-cyberterrorism- XML-Based Languages - Soft Computing Techniques- Computational Intelligence - Mobile Networking, Mobility and Nomadicity- Ubiquitous Computing, Services and Applications - Forensics, Recognition Technologies and Applications- Fuzzy and Neural Network Systems - Signal Processing, Pattern Recognition and Applications- Distributed and Parallel Applications - User Interfaces,Visualization and Modeling- Mobile, Ad Hoc and Sensor Network Management - Web Services Architecture, Modeling and Design- Quality of Service, Scalability and Performance - Self-Organizing Networks and Networked Systems- Data Management in Mobile Peer-to-Peer Networks - Data Stream Processing in Mobile/Sensor Networks- Indexing and Query Processing for Moving Objects - User Interfaces and Usability Issues form Mobile Applications- Sensor Networks and Social Sensing - Embedded Systems and Software- Information Propagation on Social Networks - Resource and Knowledge Discovery Using Social Networks- Computer Crime Prevention and Detection - Confidentiality Protection- Critical Infrastructure Management - Critical Computing and Storage- Cryptography and Data Protection Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.IMPORTANT DATESSubmission Deadline : Aug 1, 2013Notification of Acceptance: Aug 20, 2013Camera Ready Submission: Aug. 30, 2013Registration : Sept. 2, 2013Conference Dates : Nov. 12-14, 2013Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.