ICIEIS2013-CFP

The Second International Conference on Informatics Engineering &
Information Science (ICIEIS2013)
          Universiti Teknologi Malaysia (UTM), Kuala Lumpur, Malaysia
                              Nov. 12-14, 2013
                http://sdiwc.net/conferences/2013/icieis2013/
============================================================================
The proposed conference will be held at Universiti Teknologi Malaysia
(UTM), Kuala Lumpur, Malaysia. From Nov. 12-14, 2013 which aims to enable
researchers build connections between different digital applications.

The conference welcomes papers on the following (but not limited to)
research topics:

- Information Ethics
- Information Content Security
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineering
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- Anti-cyberterrorism
- XML-Based Languages
- Soft Computing Techniques
- Computational Intelligence
- Mobile Networking, Mobility and Nomadicity
- Ubiquitous Computing, Services and Applications
- Forensics Recognition Technologies and Applications
- Fuzzy and Neural Network Systems
- Signal Processing Pattern Recognition and Applications
- Distributed and Parallel Applications
- User Interfaces,Visualization and Modeling
- Mobile, Ad Hoc and Sensor Network Management
- Web Services Architecture, Modeling and Design
- Quality of Service, Scalability and Performance
- Self-Organizing Networks and Networked Systems
- Data Management in Mobile Peer-to-Peer Networks
- Data Stream Processing in Mobile/Sensor Networks
- Indexing and Query Processing for Moving Objects
- User Interfaces and Usability Issues form Mobile Applications
- Sensor Networks and Social Sensing
- Embedded Systems and Software
- Information Propagation on Social Networks
- Resource and Knowledge Discovery Using Social Networks
- Computer Crime Prevention and Detection
- Confidentiality Protection
- Critical Infrastructure Management
- Critical Computing and Storage
- Cryptography and Data Protection

Researchers are encouraged to submit their work electronically. All papers
will be fully refereed by a minimum of two specialized referees. Before
final acceptance, all referees comments must be considered.

=================
IMPORTANT DATES

Submission Deadline    : Aug 1, 2013
Notification of Acceptance: Aug 20, 2013
Camera Ready Submission: Aug. 30, 2013
Registration           : Sept. 2, 2013
Conference Dates       : Nov. 12-14, 2013

Received on Sunday, 25 November 2012 19:48:44 UTC