Sign for Notice Everyday    注册| 登陆| 友情链接| English|

Our Sponsors


    ICCCS 2012 - 2nd International Conference on Communication, Computing & Security

    View: 2428

    Website www.nitrkl.ac.in | Want to Edit it Edit Freely

    Category ICCCS 2012

    Deadline: April 01, 2012 | Date: October 06, 2012-October 08, 2012

    Venue/Country: Rourkela, India

    Updated: 2012-02-07 20:51:54 (GMT+9)

    Call For Papers - CFP

    ICCCS2012 solicits papers in the areas of Communication Computing and Security. Original, unpublished research papers from all viewpoints, including theory, practice, and experimentation for presentation in the technical sessions of the conference are invited from researchers, academicians and professionals.

    The maximum length of the paper is 6 pages (including figures and references). The paper should not contain page numbers or any special headers or footers (such as authors names or the title of the paper on each page, etc.). Mandatory footnotes (that are part of the paper and/or acknowledgements to the sponsors, etc.) are allowed. Acceptance of papers will be communicated to authors by email. Accepted and registered papers will be included in the conference proceedings.

    The scope of the Conference includes all the areas of Computing, Communication and Security. Sample areas include, but are certainly not limited to the following:

    Communication:- Antenna Applications, Coding Techniques, Modeling & Simulation of Communication Systems, Network Architecture & Protocol, Optical Fiber/Microwave Communication, Satellite Communication, Wired & Wireless Communication, Wireless Sensor Networks and related topics.

    Computing:- Artificial Intelligence, Computer Graphics and Virtual Reality, Speech/Image Processing, Data Warehousing & Mining, Distributed Computing, Grid and Cloud Computing, Service Oriented Architecture, Bioinformatics, e-Learning, e-Business, Enterprise Information Systems, and e-Government, Evolutionary Algorithms, Software Engineering, Parallel and Distributed Processing, Semantic Web and related topics.

    Security:- Internet Computing & Web Security, Cryptography, Information Hiding, Steganography, Watermarking Security in High speed network, Biometrics, Identification and trust Methodology, Forensic, Peer to Peer Security, Network intrusion, detection and prevention, Privacy Preserving Techniques, System Security and related topics.


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.