The Third International Conference on Informatics Engineering and
Information Science (ICIEIS2014)
Lodz University of Technology, Lodz, Poland
September 22-24, 2014.
http://goo.gl/6cQuYG
========================================================================
The proposed conference on the above theme will be held at Lodz University
of Technology, Lodz, Poland from September 22-24, 2014 which aims to
enable researchers build connections between different digital
applications.
The conference welcomes papers on the following (but not limited to)
research topics
- Information Ethics
- Information Content Security
- Data Compression
- E-Technology
- E-Government
- E-Learning
- Cloud Computing
- Grid Computing
- Green Computing
- Access Controls
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Peer-to-Peer Social Networks
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineering
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- Anti-cyber-terrorism
- XML-Based Languages
- Soft Computing Techniques
- Computational Intelligence
- Mobile Networking, Mobility and Nomadicity
- Ubiquitous Computing, Services and Applications
- Forensics, Recognition Technologies and Applications
- Fuzzy and Neural Network Systems
- Signal Processing, Pattern Recognition and Applications
- Distributed and Parallel Applications
- User Interfaces, Visualization and Modeling
- Mobile, Ad Hoc and Sensor Network Management
- Web Services Architecture, Modeling and Design
- Quality of Service, Scalability and Performance
- Self-Organizing Networks and Networked Systems
- Data Management in Mobile Peer-to-Peer Networks
- Data Stream Processing in Mobile/Sensor Networks
- Indexing and Query Processing for Moving Objects
- User Interfaces and Usability Issues form Mobile Applications
- Sensor Networks and Social Sensing
- Embedded Systems and Software
- Information Propagation on Social Networks
- Resource and Knowledge Discovery Using Social Networks
- Computer Crime Prevention and Detection
- Confidentiality Protection
- Critical Infrastructure Management
- Critical Computing and Storage
- Cryptography and Data Protection
Researchers are encouraged to submit their work electronically. All papers
will be fully refereed by a minimum of two specialized referees. Before
final acceptance, all referees comments must be considered.
Important Dates
==============
Submission Date : Aug. 22, 2014
Notification of acceptance: Sept. 06, 2014
Camera Ready submission: Sept. 12, 2014
Registration : Sept. 12, 2014
Conference dates : Sept. 22-24, 2014
**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************