posted by user: SETECEC || 3689 views || tracked by 7 users: [display]

HIASCIT 2013 : First International Conference on Horizons for Information Architecture, Security and Cloud Intelligent Technology (HIASCIT 2013)

FacebookTwitterLinkedInGoogle

Link: http://www.ainci.com/hiascit/conference_HIASCIT_2013.html
 
When Apr 22, 2013 - Apr 23, 2013
Where Venice - Italy
Submission Deadline Apr 12, 2013
Categories    information architecture   cloud computing, security   software, quality, hardware   cyber behaviour, business
 

Call For Papers

International Conference HIASCIT 2013 :: Venice, Italy :: Call for Papers, Posters, and Demos

::
ALAIPO :: Latin Association of Human-Computer Interaction :: www.alaipo.com
AInCI :: International Association of Interactive Communication :: www.ainci.com
::

First International Conference on Horizons for Information Architecture, Security and Cloud Intelligent Technology (HIASCIT 2013): Programming, Software Quality, Online Communities, Cyber Behaviour and Business

::
:: Venice - Italy :: April 23 - 24, 2013
::

http://www.ainci.com/hiascit/conference_HIASCIT_2013.html

HIASCIT 2013 will be composed of research presentations, keynote lectures, invited presentations, workshops, doctoral consortium, demo session and poster presentations.

Papers must be submitted following the instructions found on the submission of papers section. All accepted papers will be published in the respective conference proceedings (in printed book form, CD/DVD and magazine) by international and prestigious publishing houses in USA and Europe:

http://www.ainci.com/HIASCIT/conference_HIASCIT_2013_publications.html

Very Important: The authors can present more than one paper with only one registration (maximum 3 papers). More information (publications session):

http://www.ainci.com/HIASCIT/conference_HIASCIT_2013_registration.html

All contributions –papers, workshops, demos and doctoral consortium, should be of high quality, originality, clarity, significance and impact. In the current international conference it is demonstrated how with a correct integration among professionals of formal and factual sciences interesting research lines in the following subjects Innovative Design for Information Architecture, Virtual Communities, Emerging Interactive Technologies, Hypermedia, Mobile Computing, Intelligent Web-Based Business, Metrics and Quality Evaluation, Security, Social and Human Factors, Communicability, Computer Sciences, Systems and Software Engineering, and other computational areas are solicited on, but not limited to (alphabetical order):


:: Access Control and Privacy Protection
:: Access to Online Information: Rights and Obligations
:: Administration Security Policy
:: Advanced Multi-modal Interfaces for Security
:: Attack Information: Analysis for Detection and Prevention
:: Authentication Mechanisms and Systems
:: Business and Security Risk Models
:: Business Intelligence for Local and Global Users
:: Business Intelligence and Business Analytics
:: Business Ontology
:: Business Quality Models for Universities, Enterprises and Industries
:: Cloud Backup and Recovery
:: Cloud Compatibility and Interoperability
:: Cloud Development Tools and Applications
:: Cloud Programming Models and Paradigms
:: Cloud Quality Services and Costs
:: Communicability for Business Intelligence
:: Consequences of the Cyber Destruction and International Legislation
:: Cryptographic Protocols
:: Cyber Behaviour
:: Cyber Destructors and Parochialism
:: Cyber Security Automation
:: Data Management and Security for Outsourcing
:: Data Privacy and Security
:: Data Warehousing for Business Intelligence
:: Database: Design, Security and Authorization
:: Digital Cartography for the Localization of the Cyber Destructors
:: Digital Contents and Copyright Protection Techniques
:: Education and Cloud Computing
:: Ethics and Aesthetics of the Interactive Contents Online and Off-line
:: Evaluation of the Impact of Security Efficiency on User Satisfaction
:: Federated Database System and Cloud Computing
:: Firewall Systems and Management
:: Green and Original Cloud Applications
:: Hacking Democracy
:: Health Informatics, Health Technologies and Information Privacy
:: Heuristic Evaluation for Cyber Attacks
:: Human and Social Factors in Security and Confidential Information
:: Identity Theft Protection and Profession Cloning Detection
:: Information Architecture Design for Cloud Computing and Security
:: Information Society and International Legislation for New Technologies
:: Intellectual Property and Copyright
:: Intelligent Information Systems and Security Services
:: Interactive Design for International Users Security and Privacy Information
:: Interfaces Models and the Interaction with Security Systems
:: Intrusion Detection
:: Key Management and Authentication
:: Library Systems and Database Development for Information Architecture
:: Methods and Techniques for Stopping Attacks in Social Networking
:: Mobile Cloud for Industrial Production and Business
:: Mobile Security Systems and Technologies
:: Multimedia Mobile Data Vulnerable
:: Multimedia Mobile Phone for Business Intelligence
:: Natural Interfaces, Communicability and Strong Security for Interactive Systems
:: Network Security Engineering
:: Network Security Issues and Protocols
:: Networking for Business Intelligence
:: Networking Security Systems for Cloud Computing
:: New Media and Marketing for Cloud Computing
:: Ontology for Private and Confidential Information Management
:: Open Software and Commercial Software for Anti-virus
:: Persuasion and Manipulation of the Online Information for Business
:: Pervasive Systems and Ubiquitous Computing in the Cloud
:: Privacy and Integrity of the Information for Outsourcing
:: Privacy in Cloud Computing
:: Psychiatry for Cyber Destructors
:: Quality Attributes and Metrics for the Evaluation of the Cyber Destructors
:: Real-time Business Intelligence
:: Security Certification: Standardization and Guidelines
:: Security in Grid
:: Security Policies and User Behaviour
:: Security, Trust and Privacy in Commerce Online
:: Semantic Computing and Security
:: Social Psychology and Human Behaviour in Safety, Security and Privacy
:: Special Algorithms for Optimization Security and Cloud Computing Information
:: Standard and High Performance Cloud Computing
:: Strategies for Cloud Assessment
:: Techniques and Methodologies for Virtual Defense
:: Theory and Applications of Cryptology
:: Usability Engineering and Communicability for Information Architecture
:: Veracity, Credibility and Reputation Management
:: Voice, Face and Signature Recognition Systems for Security
:: Vulnerability Analysis
:: Web 2.0: Safety and Security
:: Web 3.0 and Business Intelligence
:: Wireless Data Communications and Privacy


All submitted papers will be reviewed by a double-blind (at least three reviewers), non-blind, and participative peer review. These three kinds of review will support the selection process of those that will be accepted for their presentation at the international conference. Authors of accepted papers who registered in the conference can have access to the evaluations and possible feedback provided by the reviewers who recommended the acceptance of their papers, so they can accordingly improve the final version of their papers.

::
--------------------
Important Dates
--------------------
::

Papers Submissions: April, 12 :: 23:59 – local time in Hawaiian Islands
Authors Notification: 3 days, after the submission
Camera-ready, full papers: Thursday, April 18

::

Invited Session Papers, Workshops, Technical Demo and Poster Session
Submission of Papers: Set by Session Chair
Notification of Acceptance: Set by Sessions Chair
Upload of Final Publication Files: Thursday, April 18

Related Resources

IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
ADMIT 2024   2024 3rd International Conference on Algorithms, Data Mining, and Information Technology (ADMIT 2024)
AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)
HiPEAC SC 2024   HiPEAC Reproducibility Student Challenge
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)
InCIT 2024   The 8th International Conference on Information Technology
LAJC 2024   Latin-American Journal of Computing
CompAuto--EI 2024   2024 4th International Conference on Computers and Automation (CompAuto 2024)
ICISE 2024   ACM--2024 9th International Conference on Information Systems Engineering (ICISE 2024)
CAIT 2024   IEEE--2024 5th International Conference on Computers and Artificial Intelligence Technology (CAIT 2024)