Country: Malaysia (MAL)
The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013)
Universiti Teknologi Malaysia (UTM), Kuala Lumpur, Malaysia
Nov. 12-14, 2013.
http://sdiwc.net/conferences/2013/icieis2013/
===================================================================================================================
The proposed conference will be held at Universiti Teknologi Malaysia (UTM), Kuala Lumpur, Malaysia. From Nov. 12-14, 2013 which aims to enable researchers build connections between different digital applications.
The conference welcomes papers on the following (but not limited to) research topics:
- Information Ethics
- Information Content Security
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineering
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- Anti-cyberterrorism
- XML-Based Languages
- Soft Computing Techniques
- Computational Intelligence
- Mobile Networking, Mobility and Nomadicity
- Ubiquitous Computing, Services and Applications
- Forensics, Recognition Technologies and Applications
- Fuzzy and Neural Network Systems
- Signal Processing, Pattern Recognition and Applications
- Distributed and Parallel Applications
- User Interfaces,Visualization and Modeling
- Mobile, Ad Hoc and Sensor Network Management
- Web Services Architecture, Modeling and Design
- Quality of Service, Scalability and Performance
- Self-Organizing Networks and Networked Systems
- Data Management in Mobile Peer-to-Peer Networks
- Data Stream Processing in Mobile/Sensor Networks
- Indexing and Query Processing for Moving Objects
- User Interfaces and Usability Issues form Mobile Applications
- Sensor Networks and Social Sensing
- Embedded Systems and Software
- Information Propagation on Social Networks
- Resource and Knowledge Discovery Using Social Networks
- Computer Crime Prevention and Detection
- Confidentiality Protection
- Critical Infrastructure Management
- Critical Computing and Storage
- Cryptography and Data Protection
Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.
======================================================================================================================
IMPORTANT DATES
Submission Deadline : Aug 1, 2013
Notification of Acceptance: Aug 20, 2013
Camera Ready Submission: Aug. 30, 2013
Registration : Sept. 2, 2013
Conference Dates : Nov. 12-14, 2013