[Comp-neuro] ICITST-2009: Second Call for Papers and Workshop Proposals.

y.zhao at icitst.org y.zhao at icitst.org
Mon Apr 13 23:05:24 CEST 2009


Apologies for cross-postings. Please send it to interested 
colleagues and students. Thanks!

SECOND CALL FOR PAPERS AND WORKSHOP PROPOSALS

The 4th International Conference for Internet Technology 
and Secured Transactions (ICITST-2009), Technical Co-Sponsored 
by IEEE UK/RI Section, November 9–12, 2009, London, UK 
(www.icitst.org)                                 
                                                                                                                         
The 4th International Conference for Internet Technology 
and Secured Transactions (ICITST-2009) is co-sponsored  
by IEEE UK/RI Section. The ICITST is an international 
refereed conference dedicated to the advancement of the 
theory and practical implementation of secured Internet 
transactions and to fostering discussions on information 
technology evolution. The ICITST aims to provide a highly 
professional and comparative academic research forum
that promotes collaborative excellence between academia 
and industry. The objectives of the ICITST are to bridge 
the knowledge gap between academia and industry, promote 
research esteem in secured Internet transactions and 
the importance of information technology evolution to 
secured transactions. The ICITST-2009 invites research 
papers that encompass conceptual analysis, design 
implementation and performance evaluation. 
All the accepted papers will appear in the proceedings 
published by IEEE and fully indexed by IEEE Xplore. 
All the ICITST papers are indexed by DBLP.

 
The topics in ICITST-2009 include but are not confined 
to the following areas:
 
*  Application of agents 
*  Application security 
*  Blended Internet security methods 
*  Biometrics 
*  Boundary issues of Internet security 
*  Broadband access technologies 
*  Challenges of content authoring 
*  Data mining security 
*  E-society 
*  Globalisation of information society 
*  Government, and corporate Internet security policy 
*  Internet architecture 
*  Infonomics 
*  IPSec quality of services 
*  Patentability 
*  Regulation, self-regulation, and co-regulation Web services 
*  Secured database systems 
*  Synchronising e-security 
*  Software Architectures
*  Technology-enabled information 
*  Trust, privacy, and data security 
*  Wireless transactions 
*  Context-Awareness and its Data mining for Ubi-com service 
*  Human-Computer Interface and Interaction for Ubi-com 
*  Smart Homes and its business model for Ubi-com service 
*  Intelligent Multimedia Service and its Data management for Ubi-com 
*  USN / RF-ID for Ubi-com service 
*  Network security issues, protocols, data security in Ubi-com 
*  Database protection for Ubi-com 
*  Privacy Protection and Forensic in Ubi-com 
*  Multimedia Security in Ubi-com 
*  Quality of Service Issues 
*  Authentication and Access control for data protection in Ubi-com 
*  Information visualization 
*  Web services
*  Service, Security and its Data management for U-commerce 
*  New novel mechanism and Applications for Ubi-com 
*  Information Management 
*  Multimedia Information Systems 
*  Information Retrieval 
*  Natural Language Processing 
*  Digital Libraries 
*  Data and Information Quality Management 
*  Data Grids, Data and Information Quality 
*  Database Management 
*  Web Databases 
*  Temporal and Spatial Databases 
*  Data Mining 
*  Web Mining including Web Intelligence and Web 3.0 
*  E-Learning, eCommerce, e-Business and e-Government 
*  Web Metrics and its applications 
*  XML and other extensible languages 
*  Semantic Web and Ontology 
*  Human-Computer Interaction 
*  Artificial Intelligence and Expert Systems 
*  Knowledge Management 
*  Ubiquitous Systems 
*  Peer to Peer Data Management 
*  Interoperability 
*  Mobile Data Management 
*  Data Models for Production Systems and Services 
*  Data Exchange issues and Supply Chain 
*  Data Life Cycle in Products and Processes 
*  Case Studies on Data Management, Monitoring and Analysis 
*  Security and Access Control 
*  Information Content Security 
*  Software Architecture 
*  System design and verification 
*  Mobile, Ad Hoc and Sensor Network Security 
*  Distributed information systems


IMPORTANT DATES
  
Extended Abstract Submission Date 			April 30, 2009  
Paper Submission Date 					May 31, 2009 
Proposal for Workshops and Tutorials 			April 30, 2009  
Notification of Workshop Acceptance  			May 15, 2009  
Proposal for Industrial Presentation 			April 30, 2009  
Notification of Extended Abstract Acceptance/Rejection  May 15, 2009  
Notification of Industrial Presentation Acceptance 	May 15, 2009 
Notification of Paper Acceptance/Rejection 		June 30, 2009  
Camera Ready Paper Due 					September 1, 2009  
Author Registration 					September 15, 2009  
Early Bird Attendee registration 			October 01, 2009  
Conference Dates 					November 9-12, 2009  


The ICITST also encourages organisations to submit their Job 
Fair Booth Reservations and/or Exhibit Proposals. If your 
organisation is interested, kindly submit a brief Proposal (not
more than 1 side of A4 page) to jobfair at icitst.org 

For more details, visit www.icitst.org


More information about the Comp-neuro mailing list