posted by user: ICeND || 9040 views || tracked by 26 users: [display]

ICeND 2011 : The First International Conference on e-Technologies and Networks for Development (ICeND2011)

FacebookTwitterLinkedInGoogle

Link: http://www.sdiwc.net/tn/index.php
 
When Aug 3, 2011 - Aug 5, 2011
Where Dar-es-Salaam, Tanzania
Submission Deadline Mar 5, 2011
Notification Due Apr 5, 2011
Final Version Due May 5, 2011
Categories    e-government   multimedia networking   data mining   wireless networks
 

Call For Papers

The First International Conference on e-Technologies and Networks for Development (ICeND2011)
The Institute of Finance Management (IFM)
Dar-es-Salaam, Tanzania
Aug. 3-5, 2011
http://www.sdiwc.net/tn/index.php


All the papers will be reviewed and the accepted papers in the conference will be published in the “Communications in Computer and Information Science” (CCIS) of Springer Lecture Notes Series (www.springer.com/series/7899), and will be indexed in many global databases including ISI Proceedings and Scopus. In addition, selected papers after complete modification and revision will be published in the special issues journals.
=======================================================================================

The proposed conference on the above theme will be held at The Institute of Finance Management (IFM), Dar-es-Salaam, Tanzania from Aug. 3-5, 2011. which aims to enable researchers build connections between different digital applications.

The conference welcomes papers on the following (but not limited to) research topics:

- e-Commerce
- e-Government
- e-Learning
- Electronic Payment Systems
- Mobile-Commerce
- Electronic Auctions
- Wireless Networks
- Ad hoc and Sensor Networks
- High Speed Networks
- Internet and Web Applications
- Mobile & Broadband Wireless Internet
- Mobile Networks & Wireless LAN
- Multimedia Networking
- Information Ethics
- Information Content Security
- Data Compression
- Cloud Computing
- Grid Computing
- Green Computing
- Access Controls
- Peer-to-Peer Social Networks
- e-Logistics
- e-Procurement
- e-Services
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineeing
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- e-Logistics
- e-Procurement
- e-Services
- Data Mining
- Social Search
- Computer Forensics
- Computer Security
- Information and Data Management
- Network Security
- Social Networks
- Real-Time Systems
- Internet Modeling
- Assurance of Service
- Image Processing
- Web Services Security
- Multimedia Computing
- Software Engineeing
- Biometrics Technologies
- Wireless Communications
- Semantic Web, Ontologies
- Mobile Social Networks
- Anti-cyberterrorism
- XML-Based Languages
- Soft Computing Techniques
- Computational Intelligence
- Mobile Networking, Mobility and Nomadicity
- Ubiquitous Computing, Services and Applications
- Forensics, Recognition Technologies and Applications
- Fuzzy and Neural Network Systems
- Signal Processing, Pattern Recognition and Applications
- Distributed and Parallel Applications
- User Interfaces,Visualization and Modeling
- Mobile, Ad Hoc and Sensor Network Management
- Web Services Architecture, Modeling and Design
- Quality of Service, Scalability and Performance
- Self-Organizing Networks and Networked Systems
- Data Management in Mobile Peer-to-Peer Networks
- Data Stream Processing in Mobile/Sensor Networks
- Indexing and Query Processing for Moving Objects
- User Interfaces and Usability Issues form Mobile Applications
- Sensor Networks and Social Sensing
- Embedded Systems and Software
- Information Propagation on Social Networks
- Resource and Knowledge Discovery Using Social Networks
- Computer Crime Prevention and Detection
- Confidentiality Protection
- Critical Infrastructure Management
- Critical Computing and Storage
- Cryptography and Data Protection


Researchers are encouraged to submit their work electronically. Submitted paper should not exceed 15 pages, including illustrations. Papers should be submitted electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.


Important Dates

Submission Deadline : March 5, 2011
Notification of Acceptance: April 5, 2011
Camera Ready Submission : May 5, 2011
Registration : May 5, 2011
Conference Dates : Aug. 3-5, 2011

Related Resources

EAIT 2024   2024 The 5th International Conference on Education and Artificial Intelligence Technologies (EAIT 2024)
ECAI 2024   27th European Conference on Artificial Intelligence
ICENT 2024   2024 6th International Conference on Emerging Networks Technologies (ICENT 2024)
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
ICENT--EI 2024   2024 6th International Conference on Emerging Networks Technologies (ICENT 2024)
AIM@EPIA 2024   Artificial Intelligence in Medicine
ICMLA 2024   23rd International Conference on Machine Learning and Applications
CVIV 2024   2024 6th International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2024) -EI Compendex
ICONIP 2024   31st International Conference on Neural Information Processing
BPMDS 2024   Business Process Modeling, Development, and Support