ICCGI 2009 - The Fourth International Multi-Conference on Computing in the Global Information Technology ICCGI 2009
View: 2354
Website http://www.iaria.org/conferences2009/CfPICCGI09.html |
Edit Freely
Category ICCGI 2009
Deadline: March 20, 2009 | Date: August 23, 2009
Venue/Country: Cannes, France
Updated: 2010-06-04 19:32:22 (GMT+9)
Call For Papers - CFP
The Fourth International Multi-Conference on Computing in the Global Information Technology ICCGI 2009 The Fourth International Conference on Computing in the Global Information Technology (ICCGI 2009) initiates a series of international events covering a large spectrum of topics related to global knowledge concerning computation, technologies, mechanisms, cognitive patterns, thinking, communications, user-centric approaches, nanotechnologies, and advanced networking and systems. The conference topics focus on challenging aspects in the next generation of information technology and communications related to the computing paradigms (mobile computing, database computing, GRID computing, multi-agent computing, autonomic computing, evolutionary computation) and communication and networking and telecommunications technologies (mobility, networking, bio-technologies, autonomous systems, image processing, Internet and web technologies), towards secure, self-defendable, autonomous, privacy-safe, and context-aware scalable systems.This conference intends to expose the scientists to the latest developments covering a variety of complementary topics, aiming to enhance one¡¯s understanding of the overall picture of computing in the global information technology.The integration and adoption of IPv6, also known as the Next Generation of the Internet Protocol is happening throughout the World at this very moment. To maintain global competitiveness, governments are mandating, encouraging or actively supporting the adoption of IPv6 to prepare their respective economies for the future communication infrastructures. Business organizations are increasingly mindful of the IPv4 address space depletion and see within IPv6 a way to solve pressing technical problems while IPv6 technology continues to evolve beyond IPv4 capabilities. Communications equipment manufacturers and applications developers are actively integrating IPv6 in their products based on market demands. IPv6 continues to represent a fertile area of technology innovation and investigation. IPv6 is opening the way to new successful research projects. Leading edge Internet Service Providers are guiding the way to a new kind of Internet where any-to-any reachability is not a vivid dream but a notion of reality in production IPv6 networks that have been commercially deployed. National Research and Educational Networks together with internationally known hardware vendors, Service Providers and commercial enterprises have generated a great amount of expertise in designing, deploying and operating IPv6 networks and services. This knowledge can be leveraged to accelerate the deployment of the protocol worldwide.ICCGI 2009 comprises a series of independent tracks that complement the challenges on various facets of computation, systems solutions, knowledge processing, system implementation, and communications and networking technologies.Industrial systemsEvolutionary computationAutonomic and autonomous systemsBio-technologies Knowledge data systemsMobile and distance education Intelligent techniques, logics, and systemsKnowledge processingInformation technologiesInternet and web technologies Digital information processingCognitive science and knowledge agent-based systemsMobility and multimedia systemsSystems performance Networking and telecommunications Software development and deployment Knowledge virtualizationSystems and networks on the chipContext-aware systemsNetworking technologies Security in network, systems, and applications Knowledge for global defenseInformation Systems [IS]IPv6 Today - Technology and deployment ModelingOptimizationComplexityWe welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals. The topics suggested by the conference can be discussed in term of concepts, state of the art, standards, implementations, running experiments and applications. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. Industrial presentations are not subject to these constraints. We expect short and long presentations that express industrial position and status. Tutorials on specific related topics and panels on challenging areas are encouraged. The topics suggested by the conference can be discussed in term of concepts, state of the art, standards, implementations, running experiments and applications. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas:Industrial systemsControl theory and systemsFault-tolerance and reliabilityData engineeringEnterprise computing and evaluationElectrical and electronics engineeringEconomic decisions and information systemsAdvanced roboticsVirtual reality systemsIndustrial systems and applicationsIndustrial and financial systemsIndustrial control electronicsIndustrial IT solutionsEvolutionary computationAlgorithms, procedures, mechanisms and applicationsComputer architecture and systemsComputational sciencesComputation in complex systemsComputer and communication systemsComputer networksComputer science theoryComputation and computer securityComputer simulationDigital telecommunicationsDistributed and parallel computingComputation in embedded and real-time systemsSoft computingUser-centric computation Autonomic and autonomous systemsAutomation and autonomous systemsTheory of ComputingAutonomic computingAutonomic networkingNetwork computingProtecting computingTheories of agency and autonomyMulti-agent evolution, adaptation and learningAdjustable and self-adjustable autonomyPervasive systems and computationComputing with locality principlesGRID networking and servicesPervasive computingCluster computing and performanceArtificial intelligenceComputational linguisticsCognitive technologiesDecision makingEvolutionary computationExpert systemsComputational biologyBio-technologies Models and techniques for biometric technologiesBioinformaticsBiometric securityComputer graphics and visualizationComputer vision and image processingComputational biochemistryFinger, facial, iris, voice, and skin biometricsSignature recognitionMultimodal biometricsVerification and identification techniquesAccuracy of biometric technologiesAuthentication smart cards and biometric metricsPerformance and assurance testingLimitations of biometric technologiesBiometric card technologiesBiometric wireless technologiesBiometric software and hardwareBiometric standards Knowledge data systemsData mining and Web miningKnowledge databases and systemsData warehouse and applicationsData warehousing and information systemsDatabase performance evaluationSemantic and temporal databasesDatabase systemsDatabases and information retrievalDigital library designMeta-data modelingMobile and distance education Human computer interactionEducational technologiesComputer in educationDistance learningE-learningMobile learningCognitive support for learningInternet-based educationImpact of ICT on education and societyGroup decision making and softwareHabitual domain and information technologyComputer-mediated communicationsImmersing authoringContextual and cultural challenges in user mobilityIntelligent techniques, logics, and systemsIntelligent agent technologiesIntelligent and fuzzy information processingIntelligent computing and knowledge managementIntelligent systems and roboticsFault-tolerance and reliabilityFuzzy logic & systemsGenetic algorithmsHaptic phenomenaGraphic recognitionNeural networksSymbolic and algebraic computationModeling, simulation and analysis of business processes and systemsKnowledge processingKnowledge representation modelsKnowledge languagesCognitive scienceKnowledge acquisitionKnowledge engineeringKnowledge processing under uncertaintyMachine intelligenceMachine learningMaking decision through InternetNetworking knowledge planInformation technologiesInformation technology and organizational behaviorAgents, data mining and ontologiesInformation retrieval systemsInformation and network securityInformation ethics and legal evaluationsOptimization and information technologyOrganizational information systemsInformation fusionInformation management systemsInformation overloadInformation policy makingInformation securityInformation systemsInformation discoveryInternet and web technologies Internet and WWW-based computingWeb and Grid computingInternet service and trainingIT and societyIT in education and healthManagement information systemsVisualization and group decision makingWeb based language developmentWeb search and decision makingWeb service ontologiesScientific web intelligenceOnline business and decision makingBusiness rule languageE-BusinessE-CommerceOnline and collaborative workSocial eco-systems and social networkingSocial decisions on InternetComputer ethicsDigital information processingMechatronicsNatural language processingMedical imagingImage processingSignal processingSpeech processingVideo processingPattern recognitionPattern recognition modelsGraphics & computer visionMedical systems and computingCognitive science and knowledge agent-based systemsCognitive support for e-learning and mobile learningAgents and cognitive modelsAgents & complex systems; computational ecosystemsAgent architectures; perception, action & planning in agentsAgent communication: languages, semantics, pragmatics & protocolsAgent-based electronic commerce and trading systemsMulti-agent constraint satisfactionAgent programming languages, development environments and testbedsComputational complexity in autonomous agentsMulti-agent planning and cooperationLogics and formal models of for agency verificationNomadic agentsNegotiation, auctions, persuasionPrivacy and security issues in multi-agent systems Mobility and multimedia systemsMobile communicationsMultimedia and visual programmingMultimedia and decision makingMultimedia systemsMobile multimedia systemsUser-centered mobile applicationsDesigning for the mobile devicesContextual user mobilityMobile strategies for global marketInteractive television and mobile commerceSystems performance Performance evaluationPerformance modelingPerformance of parallel computingReasoning under uncertaintyReliability and fault-tolerancePerformance instrumentationPerformance monitoring and correctionsPerformance in entity-dependable systemsReal-time performance and near-real time performance evaluationPerformance in software systemsPerformance and hybrid systemsMeasuring performance in embedded systems Networking and telecommunications Telecommunication and NetworkingTelecommunication Systems and EvaluationMultiple Criteria Decision Making in Information TechnologyNetwork and Decision MakingNetworks and SecurityCommunications protocols (SIP/H323/MPLS/IP)Specialized networks (GRID/P2P/Overlay/Ad hoc/Sensor)Advanced services (VoIP/IPTV/Video-on-DemandNetwork and system monitoring and managementFeature interaction detection and resolutionPolicy-based monitoring and managements systemsTraffic modeling and monitoringTraffic engineering and managementSelf-monitoring, self-healing and self-management systemsMan-in-the-loop management paradigmSoftware development and deployment Software requirements engineeringSoftware design, frameworks, and architecturesSoftware interactive designFormal methods for software development, verification and validationNeural networks and performancePatterns/Anti-patterns/Artifacts/FrameworksAgile/Generic/Agent-oriented programmingEmpirical software evaluation metricsSoftware vulnerabilitiesReverse engineeringSoftware reuseSoftware security, reliability and safetySoftware economicsSoftware testing and debuggingTracking defects in the OO designDistributed and parallel softwareProgramming languagesDeclarative programmingReal-time and embedded softwareOpen source software development methodologiesSoftware tools and deployment environmentsSoftware IntelligenceSoftware Performance and EvaluationKnowledge virtualizationModeling techniques, tools, methodologies, languagesModel-driven architectures (MDA)Service-oriented architectures (SOA)Utility computing frameworks and fundamentalsEnabled applications through virtualizationSmall-scale virtualization methodologies and techniquesResource containers, physical resource multiplexing, and segmentationLarge-scale virtualization methodologies and techniquesManagement of virtualized systemsPlatforms, tools, environments, and case studiesMaking virtualization realOn-demand utilitiesAdaptive enterpriseManaging utility-based systems Development environments, tools, prototypesSystems and networks on the chipMicrotechnology and nanotechnologyReal-time embedded systemsProgramming embedded systemsControlling embedded systemsHigh speed embedded systemsDesigning methodologies for embedded systemsPerformance on embedded systemsUpdating embedded systemsWireless/wired design of systems-on-the-chipTesting embedded systemsTechnologies for systems processorsMigration to single-chip systemsContext-aware systemsContext-aware autonomous entitiesContext-aware fundamental concepts, mechanisms, and applications Modeling context-aware systemsSpecification and implementation of awareness behavioral contextsDevelopment and deployment of large-scale context-aware systems and subsystemsUser awareness requirementsDesign techniques for interfaces and systemsMethodologies, metrics, tools, and experiments for specifying context-aware systemsTools evaluations, Experiment evaluationsNetworking technologies Next generation networkingNetwork, control and service architecturesNetwork signalling, pricing and billingNetwork middlewareTelecommunication networks architecturesOn-demand networks, utility computing architecturesNext generation networks [NGN] principlesStorage area networks [SAN]Access and home networksHigh-speed networksOptical networksPeer-to-peer and overlay networkingMobile networking and systemsMPLS-VPN, IPSec-VPN networksGRID networksBroadband networksSecurity in network, systems, and applications IT in national and global securityFormal aspects of securitySystems and network securitySecurity and cryptographyApplied cryptographyCryptographic protocolsKey managementAccess controlAnonymity and pseudonymity managementSecurity managementTrust managementProtection managementCertification and accreditationVirii, worms, attacks, spamIntrusion prevention and detectionInformation hidingLegal and regulatory issuesKnowledge for global defenseBusiness continuity and availabilityRisk assessmentAerospace computing technologiesSystems and networks vulnerabilitiesDeveloping trust in Internet commercePerformance in networks, systems, and applications Disaster prevention and recovery IT for anti-terrorist technology innovations (ATTI)Networks and applications emergency services Privacy and trust in pervasive communications Digital rights managementUser safety and protection Information Systems [IS]Management Information SystemsDecision Support SystemsInnovation and ISEnterprise Application IntegrationEnterprise Resource PlanningBusiness Process ChangeDesign and Development Methodologies and Frameworks Iterative and Incremental Methodologies Agile Methodologies IS Standards and Compliance Issues Risk Management in IS Design and Development Research Core TheoriesConceptualisations and Paradigms in IS Research Ontological Assumptions in IS Research IS Research Constraints, Limitations and Opportunities IS vs Computer Science Research IS vs Business Studies IPv6 Today - Technology and deployment IP Upgrade ¨C An Engineering Exercise or a Necessity?Worldwide IPv6 Adoption ¨C Trends and PoliciesIPv6 Programs, from Research to Knowledge DisseminationIPv6 Technology ¨C Practical InformationAdvanced Topics and Latest Developments in IPv6IPv6 Deployment Experiences and Case StudiesIPv6 Enabled Applications and DevicesModelingContinuous and Discrete ModelsOptimal ModelsComplex System ModelingIndividual-Based ModelsModeling UncertaintyCompact Fuzzy ModelsModeling LanguagesReal-time modelingPeformance modeling OptimizationMulticriteria OptimizationMultilervel OptimizationGoal ProgrammingOptimization and EfficiencyOptimization-based decisionsEvolutionary OptimizationSelf-OptimizationExtreme OptimizationCombinatorial OptimizationDisccrete OptimizationFuzzy OptimizationLipschitzian OptimizationNon-Convex OptimizationConvexityContinuous OptimizationInterior point methodsSemidefinite and Conic Programming Complexity Complexity AnalysisComputational ComplexityComplexity ReductionOptimizing Model ComplexityCommunication ComplexityManaging ComplexityModeling Complexity in Social SystemsLow-complexity Global OptimizationSoftware Development for Modeling and OptimizationIndustrial applications INSTRUCTION FOR THE AUTHORSThe ICCGI 2009 Proceedings will be published by IEEE Computer Society Press and on-line via IEEE XPlore Digital Library. IEEE will index the papers with major indexes. Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.Important deadlines:Submission (full paper) March 20, 2009 Notification April 25, 2009 Registration May 10, 2009 Camera ready May 15, 2009 Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via an automated system. Final author manuscripts will be 8.5" x 11" (two columns IEEE format), not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here. Once you receive the notification of paper acceptance, you will be provided by the IEEE CS Press an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.Poster ForumPosters are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the track/workshop preference as "POSTER : Poster Forum". Submissions are expected to be 6-8 slide deck. Posters will not be published in the Proceedings. One poster with all the slides together should be used for discussions. Presenters will be allocated a space where they can display the slides and discuss in an informal manner.Work in ProgressWork-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the track/workshop preference as "WIP: Work in Progress". Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.Technical marketing/business/positioning presentationsThe conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference¡¯s CD collection. Please send your presentations to petreiaria.org.TutorialsTutorials provide overviews of current high interest topics. They should be about three hours long. One page with the title, tutorial summary, and a short bio are expected. Please send your proposals to petreiaria.orgPanel proposals:The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies.For more information, petreiaria.orgWorkshop proposalsWe welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petreiaria.org.
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.