ICITST-2010
Revision as of 17:01, 3 December 2009 by Icitst2009 (talk | contribs) (New page: {{Event |Acronym=ICITST-2010 |Title=The 5th International Conference for Internet Technology and Secured Transactions, Technical Co-Sponsored by IEEE UK/RI Communicatins Chapter |Series=IC...)
ICITST-2010 | |
---|---|
The 5th International Conference for Internet Technology and Secured Transactions, Technical Co-Sponsored by IEEE UK/RI Communicatins Chapter
| |
Event in series | ICITST |
Dates | 2010/11/08 (iCal) - 2010/11/11 |
Homepage: | http://www.icitst.org |
Location | |
Location: | London, England, United Kingdom |
Loading map... | |
Important dates | |
Submissions: | 2010/05/31 |
Table of Contents | |
The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), Technical Co-Sponsored
by IEEE UK/RI Communications Chapter, November 8–11, 2010, London, UK
(www.icitst.org)
Topics
The topics in ICITST-2010 include but are not confined to the following areas:
- Application of agents
- Application security
- Blended Internet security methods
- Biometrics
- Boundary issues of Internet security
- Broadband access technologies
- Challenges of content authoring
- Data mining security
- E-society
- Globalisation of information society
- Government, and corporate Internet security policy
- Internet architecture
- Infonomics
- IPSec quality of services
- Patentability
- Regulation, self-regulation, and co-regulation Web services
- Secured database systems
- Synchronising e-security
- Software Architectures
- Technology-enabled information
- Trust, privacy, and data security
- Wireless transactions
- Context-Awareness and its Data mining for Ubi-com service
- Human-Computer Interface and Interaction for Ubi-com
- Smart Homes and its business model for Ubi-com service
- Intelligent Multimedia Service and its Data management for Ubi-com
- USN / RF-ID for Ubi-com service
- Network security issues, protocols, data security in Ubi-com
- Database protection for Ubi-com
- Privacy Protection and Forensic in Ubi-com
- Multimedia Security in Ubi-com
- Quality of Service Issues
- Authentication and Access control for data protection in Ubi-com
- Information visualization
- Web services
- Service, Security and its Data management for U-commerce
- New novel mechanism and Applications for Ubi-com
- Information Management
- Multimedia Information Systems
- Information Retrieval
- Natural Language Processing
- Digital Libraries
- Data and Information Quality Management
- Data Grids, Data and Information Quality
- Database Management
- Web Databases
- Temporal and Spatial Databases
- Data Mining
- Web Mining including Web Intelligence and Web 3.0
- E-Learning, eCommerce, e-Business and e-Government
- Web Metrics and its applications
- XML and other extensible languages
- Semantic Web and Ontology
- Human-Computer Interaction
- Artificial Intelligence and Expert Systems
- Knowledge Management
- Ubiquitous Systems
- Peer to Peer Data Management
- Interoperability
- Mobile Data Management
- Data Models for Production Systems and Services
- Data Exchange issues and Supply Chain
- Data Life Cycle in Products and Processes
- Case Studies on Data Management, Monitoring and Analysis
- Security and Access Control
- Embedded Systems
- Defence Systems
- Information Content Security
- Software Architecture
- System design and verification
- Mobile, Ad Hoc and Sensor Network Security
- Distributed information systems
Submissions
Important Dates
IMPORTANT DATES
- Full Paper Submission Date:May 31, 2010
- Extended Abstract (Work in Progress) Submission Date: April 01, 2010
- Proposal for Workshops and Tutorials: April 30, 2010
- Notification of Workshop and Tutorial Acceptance: March 15, 2010
- Proposal for Industrial Presentation: April 30, 2010
- Notification of Extended Abstract Acceptance/Rejection: May 15, 2010
- Notification of Industrial Presentation Acceptance: May 15, 2010
- Notification of Paper Acceptance/Rejection: June 30, 2010
- Camera Ready Extended Abstract Due: July 31, 2010
- Camera Ready Paper Due: July 31, 2010
- Early Registration Deadline: January 01 to July 31, 2010
- Late Registration Deadline: July 31 to November 08, 2010
- Conference Dates: November 08-11, 2010
Committees
Honorary Chair
- Kevin Warwick, University of Reading, UK
General Chair
- Bernd Markscheffel, Technische Universität Ilmenau, Germany
General Vice-Chair
- Emmanuel Hooper, Harvard University, Harvard MIT Yale Scholar, USA
Technical Program Chair
- Daniel Fischer, Technische Universität Ilmenau, Germany
International Chairs
- Nicu Bizon, University of Pitesti, Romania
- Ali Al-Dahoud, Al-Zaytoonah University of Jordan, Jordan
Publication Chair
- Charles A. Shoniregun, Infonomics Society, UK
Publicity and Workshop Chair
- Galyna Akmayeva, Wessex Institute of Technology / University of Wales, UK
Industrial Chair
- Jen-Yao Chung, IBM T. J. Watson Research Center, New York, USA
Steering Committee Chair
- Charles A. Shoniregun, Infonomics Society, UK
Steering Committees
- Zabih Ghassemlooy, University of Northumbria, Newcastle, UK
- Paul Hofmann, SAP Research Americas and China Labs, USA
- Liang-Jie (LJ) Zhang, IBM T. J. Watson Research Centre, New York, USA
- Ion Tutanescu, University of Pitesti, Romania
- Kinshuk, Athabasca University, Canada
- Charles Winer, Purdue University Calumet, USA
Facts about "ICITST-2010"
Acronym | ICITST-2010 + |
End date | November 11, 2010 + |
Event in series | ICITST + |
Event type | Conference + |
Has coordinates | 51° 30' 26", -0° 7' 40"Latitude: 51.507322222222 Longitude: -0.12764722222222 + |
Has location city | London + |
Has location country | Category:UK + |
Has location state | England + |
Homepage | http://www.icitst.org + |
IsA | Event + |
Logo | ICITST Logo.jpg + |
Start date | November 8, 2010 + |
Submission deadline | May 31, 2010 + |
Title | The 5th International Conference for Internet Technology and Secured Transactions, Technical Co-Sponsored by IEEE UK/RI Communicatins Chapter + |