Difference between revisions of "IJCSIS 2009"

From Openresearch
Jump to: navigation, search
(Event created)
 
Line 1: Line 1:
 
{{Event
 
{{Event
| Acronym = IJCSIS 2009
+
|Acronym=IJCSIS 2009
| Title = INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY
+
|Title=INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY
| Type = Conference
+
|Type=Conference
| Series =
+
|Field=Computer science
| Field = Computer science
+
|Start date=2009/07/21
| Homepage = sites.google.com/site/ijcsis
+
|End date=2009/07/31
| Start date = Jul 21, 2009  
+
|Submission deadline=2009/07/31
| End date = Jul 31, 2009
+
|Homepage=sites.google.com/site/ijcsis
| City= USA
+
|City=USA
| State =  
+
|Country=USA
| Country = USA
+
|Camera ready=2009/07/20
| Abstract deadline =
 
| Submission deadline = Jul 31, 2009
 
| Notification =
 
| Camera ready = Jul 20, 2009
 
 
}}
 
}}
  
<pre>
 
 
International Journal of Computer Science and Information Security
 
International Journal of Computer Science and Information Security
 
IJCSIS – AUGUST 2009
 
IJCSIS – AUGUST 2009

Revision as of 15:10, 23 September 2020

IJCSIS 2009
INTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY
Dates 2009/07/21 (iCal) - 2009/07/31
Homepage: sites.google.com/site/ijcsis
Location
Location: USA, USA
Loading map...

Important dates
Submissions: 2009/07/31
Camera ready due: 2009/07/20
Table of Contents


International Journal of Computer Science and Information Security IJCSIS – AUGUST 2009 ISSN: 1947-5500 Vol. 4, No.1 (A) & No.2 (B)

Original papers are invited in the area of computer and network security. Topics of interest include but are not limited to the following:

Track A:

 Security and Privacy in Wired, Wireless, Mobile, Sensor Ad Hoc Networks  Web 2.0 Security, Mobile Internet  Ubiquitous Computing Security, Pervasive Computing and Emerging Models  Wireless Network Architecture and Technologies Systems  Wireless Routing Techniques  Wireless Network Algorithms, Protocols, Performance Evaluation  Biometric Security, Artificial Intelligence  Authentication and Identification, Cryptography and Security Protocols  Cryptographic Algorithms and their Applications  Internet Security & Applications  Security & Network Management  E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojon Protection  Security threats & countermeasures, Network Intrusion Detection and Prevention, Firewalls  Intelligent Multimedia Security Services  Information Assurance, Risk-Management and Evaluating Systems  Applications, design, and performance of wireless ad hoc and sensor networks  Delay/disruption tolerant networks  Experimental test-beds, models and case studies


Track B:  Internet Technologies, Infrastructure, Services and Applications  Open Source Tools, Open Models and Architectures  Navigation Systems, Location Based Services Social Networks and Online Communities  ICT Convergence, Digital Economy and Digital Divide  Networks and Communications Protocols: error recovery, flow and congestion control, routing, multicasting, medium access control  Computing and Information Systems  Grid Architectures and Services  Emerging applications and systems  QoS architecture, algorithms and provisioning  Handoff and mobility management  IP-based mobility management  Radio resource management  Cognitive radio networks and spectrum assignment  Wireless network planning and deployment  Multimedia over mobile peer-to-peer (P2P) networks  Scalability and manageability of wireless network architectures  Cross-layer design, modeling and optimization  Mobile networks modeling and simulation  Implementation, deployment and management of security systems  IP multimedia system operations and management over wireless  Autonomous management of IMS architectures  UMTS/HSPA, EV-DO, LTE, WiMAX, WiFi interworking  Need and requirements of Beyond 3G and 4G networks  Challenges and opportunities for 4G wireless networks  Multi-access network and multi-technologies management  End-to-end IP multimedia services over wireless networks  Video, real-time streaming in wireless multimedia communications  Performance analysis, modeling, simulation and experiment of wireless networks  Testbed, prototype, practical systems and architectures  Standardization activities, specifications and enhancements in the emerging standards  Case studies and market analysis related to emerging wireless systems  Algorithms, Artificial Intelligence, Computational Intelligence  Multimedia in Wireless Networks and Multimedia Applications  RFID, Bluetooth and 802.1x Technologies  Computer Networks and Data Communication, QoS and Traffic Analysis  Mobile Computing Systems, Location based Services  Information Systems, Applications and Value-Added Services  Database System, Data Mining, Information retrieval  Hybrid Computational Methods  Web- and Grid-based Simulation and Computing  Parallel and Distributed Computing  Neural Networks, Pattern Recognition, Computer Vision  Advanced Computing Architectures and New Programming Models  Visualization and Virtual Reality as Applied to Computational Science  Computer Architecture and Embedded Systems  Technology in Education, Theoretical Computer Science  Computing Ethics, Computing Practices & Applications


All submitted papers will be judged based on their quality by the technical committee and reviewers. Papers that describe research and experimentation are encouraged. All paper submissions will be handled electronically and detailed instructions on submission procedure are available on IJCSIS web pages (http://sites.google.com/site/ijcsis/). Accepted papers will be published online and indexed by Google Scholar, CiteSeerX and Directory for Open Access Journal (DOAJ).

Important Dates: Paper Submission Date: 31 July 2009 Acceptance Notification: 16 August 2009 Online Publication Date: 01 September 2009

Submit your manuscripts to the IJCSIS Managing Editor, (ijcsiseditor@gmail.com)

This CfP was obtained from WikiCFP

Facts about "IJCSIS 2009"
AcronymIJCSIS 2009 +
Camera ready dueJuly 20, 2009 +
End dateJuly 31, 2009 +
Event typeConference +
Has coordinates39° 47' 1", -100° 26' 45"Latitude: 39.783730555556
Longitude: -100.44588333333
+
Has location cityUSA +
Has location countryCategory:USA +
Homepagehttp://sites.google.com/site/ijcsis +
IsACFP +
Start dateJuly 21, 2009 +
Submission deadlineJuly 31, 2009 +
TitleINTERNATIONAL JOURNAL of COMPUTER SCIENCE AND INFORMATION SECURITY +