Appel: ICITST-2009, Second Call For Papers and Workshop Proposals

Thierry Hamon thierry.hamon at LIPN.UNIV-PARIS13.FR
Tue Apr 7 16:23:16 UTC 2009


Date: Sat, 04 Apr 2009 21:09:21 +0200
From: info at icitst.org
Message-Id: <25148970.3375811238872161049.JavaMail.servlet at kundenserver>


Kindly email this Call for Papers and Workshops to your colleagues,
faculty members and postgraduate students.

SECOND CALL FOR PAPERS AND WORKSHOP PROPOSALS


The 4th International Conference for Internet Technology and 
Secured Transactions (ICITST-2009), Technical Co-Sponsored 
by IEEE UK/RI Section, November 9–12, 2009, London, UK
(www.icitst.org)
                                                                                                                         
The 4th International Conference for Internet Technology and Secured
Transactions (ICITST-2009) is co-sponsored by IEEE UK/RI Section.  The
ICITST is an international refereed conference dedicated to the
advancement of the theory and practical implementation of secured
Internet transactions and to fostering discussions on information
technology evolution. The ICITST aims to provide a highly professional
and comparative academic research forum that promotes collaborative
excellence between academia and industry. The objectives of the ICITST
are to bridge the knowledge gap between academia and industry, promote
research esteem in secured Internet transactions and the importance of
information technology evolution to secured transactions. The
ICITST-2009 invites research papers that encompass conceptual
analysis, design implementation and performance evaluation.
All the accepted papers will appear in the proceedings published by
IEEE and fully indexed by IEEE Xplore. All the ICITST papers are
indexed by DBLP.

 
The topics in ICITST-2009 include but are not confined to the
following areas:
 
*  Application of agents 
*  Application security 
*  Blended Internet security methods 
*  Biometrics 
*  Boundary issues of Internet security 
*  Broadband access technologies 
*  Challenges of content authoring 
*  Data mining security 
*  E-society 
*  Globalisation of information society 
*  Government, and corporate Internet security policy 
*  Internet architecture 
*  Infonomics 
*  IPSec quality of services 
*  Patentability 
*  Regulation, self-regulation, and co-regulation Web services 
*  Secured database systems 
*  Synchronising e-security 
*  Software Architectures
*  Technology-enabled information 
*  Trust, privacy, and data security 
*  Wireless transactions 
*  Context-Awareness and its Data mining for Ubi-com service 
*  Human-Computer Interface and Interaction for Ubi-com 
*  Smart Homes and its business model for Ubi-com service 
*  Intelligent Multimedia Service and its Data management for Ubi-com 
*  USN / RF-ID for Ubi-com service 
*  Network security issues, protocols, data security in Ubi-com 
*  Database protection for Ubi-com 
*  Privacy Protection and Forensic in Ubi-com 
*  Multimedia Security in Ubi-com 
*  Quality of Service Issues 
*  Authentication and Access control for data protection in Ubi-com 
*  Information visualization 
*  Web services
*  Service, Security and its Data management for U-commerce 
*  New novel mechanism and Applications for Ubi-com 
*  Information Management 
*  Multimedia Information Systems 
*  Information Retrieval 
*  Natural Language Processing 
*  Digital Libraries 
*  Data and Information Quality Management 
*  Data Grids, Data and Information Quality 
*  Database Management 
*  Web Databases 
*  Temporal and Spatial Databases 
*  Data Mining 
*  Web Mining including Web Intelligence and Web 3.0 
*  E-Learning, eCommerce, e-Business and e-Government 
*  Web Metrics and its applications 
*  XML and other extensible languages 
*  Semantic Web and Ontology 
*  Human-Computer Interaction 
*  Artificial Intelligence and Expert Systems 
*  Knowledge Management 
*  Ubiquitous Systems 
*  Peer to Peer Data Management 
*  Interoperability 
*  Mobile Data Management 
*  Data Models for Production Systems and Services 
*  Data Exchange issues and Supply Chain 
*  Data Life Cycle in Products and Processes 
*  Case Studies on Data Management, Monitoring and Analysis 
*  Security and Access Control 
*  Information Content Security 
*  Mobile, Ad Hoc and Sensor Network Security 
*  Distributed information systems 


IMPORTANT DATES
  
Extended Abstract Submission Date 			April 30, 2009  
Paper Submission Date 					May 31, 2009 
Proposal for Workshops and Tutorials 			April 30, 2009  
Notification of Workshop Acceptance  			May 15, 2009  
Proposal for Industrial Presentation 			April 30, 2009  
Notification of Extended Abstract Acceptance/Rejection  May 15, 2009  
Notification of Industrial Presentation Acceptance 	May 15, 2009 
Notification of Paper Acceptance/Rejection 		June 30, 2009  
Camera Ready Paper Due 					September 1, 2009  
Author Registration 					September 15, 2009  
Early Bird Attendee registration 			October 01, 2009  
Conference Dates 					November 9-12, 2009  


The ICITST also encourages organisations to submit their Job Fair
Booth Reservations and/or Exhibit Proposals. If your organisation is
interested, kindly submit a brief Proposal (not more than 1 side of A4
page) to jobfair at icitst.org


PROGRAM COMMITTEES

Honorary Chair
Kevin Warwick, University of Reading, UK 

General Chairs
Godfried Williams, University of East London, UK 
Ion Tutanescu, University of Pitesti, Romania 

General Vice-Chairs 
Kevin J. Lü, Brunel University, UK
Shi-Cho Cha, National Taiwan University of Science and Technology,
Taiwan, ROC

Technical Program Chair
Emmanuel Hooper, Harvard University, Harvard MIT Yale Scholar, USA
Bernd Markscheffel, Technische Universität Ilmenau, Germany 

International Chairs 
Nicu Bizon, University of Pitesti, Romania
Titus Olaniyi, London South Bank University, UK 
Hiroshi Ishikawa, Shizuoka University, Japan

Poster and Demo Chair 
Fred Mtenzi, Dublin Institute of Technology, Ireland

Local Arrangements Chairs
Alex Logvynovskiy, University of East London, UK
Cyril Azenabor, University of East London, UK 

Post-Conference Tour Chair
Babatunde Ali-Alao, University of Greenwich, UK 

Research Student Forum Chairs
Taiwo Ayodele, University of Portsmouth, UK
Terry Walcott, University of East London, UK

Publication Chairs
Charles A. Shoniregun, Sheridan Institute of Technology and Advanced
Learning, Canada
Maaruf Ali, Oxford Brookes University, UK

Publicity and Workshop Chair 
Galyna Akmayeva, Wessex Institute of Technology/University of Wales, UK 

Industrial Chair
Jen-Yao Chung, IBM T. J. Watson Research Center, New York, USA

Steering Committee Chair
Charles A. Shoniregun, Sheridan Institute of Technology and Advanced
Learning, Canada

Steering Committees
Paul Hofmann, Vice President Research, SAP Labs, USA
Brendan O’Shea, Dublin Institute of Technology, Ireland
Liang-Jie (LJ) Zhang, IBM T. J. Watson Research Centre, New York, USA 
Maaruf Ali, Oxford Brookes University, UK
Dragana Martinovic, University of Windsor, Canada
Victor Ralevich, Sheridan Institute of Technology and Advanced
Learning, Canada
Ali Al-Dahoud, Al-Zaytoonah University of Jordan, Jordan 
Charles Winer, Purdue University Calumet, USA

TECHNICAL PROGRAM COMMITTEES
Technical Program Committee members names and their affiliations are
available at www.icitst.org

-------------------------------------------------------------------------
Message diffuse par la liste Langage Naturel <LN at cines.fr>
Informations, abonnement : http://www.atala.org/article.php3?id_article=48
English version       : 
Archives                 : http://listserv.linguistlist.org/archives/ln.html
                                http://liste.cines.fr/info/ln

La liste LN est parrainee par l'ATALA (Association pour le Traitement
Automatique des Langues)
Information et adhesion  : http://www.atala.org/
-------------------------------------------------------------------------



More information about the Ln mailing list