ICECIT – 2017 is organized during December 15th and 16th 2017 at Siddaganga Institute of Technology, Tumkur, Karnataka, India. This conference provides an opportunity for the researchers from academia and industry to meet and discuss the problems, latest solutions, scientific results and methods in the field of emerging computations and Information Technologies.
The conference will have several Keynote Speakers from academia and industry whose talks would put everyone through the paces of the trends, developments and future vision in the areas of research related to Computing, Database, Networking and Security.
ICECIT – 2017 invites submissions of original research contributions, as well as descriptions of industrial and application achievements under the following tracks. Computing, Database, Networks and Security. We do encourage submissions relating to all aspects of Computer Science defined broadly, and particularly encourage work on topics of emerging interest in the research and development communities.
Proceedings of the conference will be submitted for inclusion to IEEE Xplore.
There are 4 diferrent tracks, but topics are not only limited to only mentioned in the track
Database Track
Availability, Reliability, and Scalability
Benchmarking and Performance Evaluation
Big Data and Data analytics
Business Process Modeling
Database Monitoring and Tuning
Data Management in Clouds
Data Processing in Social Networks
Data Mining and Knowledge Discovery
Data Warehousing, OLAP, and ETL Tools
Database Design and Tuning
DBMS on Emerging Hardware Architectures
Heterogeneous Databases and Interoperability
Metadata management and interoperability
Parallel, Distributed, and Grid Data Management
Privacy and Security in Trustworthy Databases
Query Processing and Optimization
Semantic Web and Knowledge Management
Systems performance and transaction management
Web Information and Services
XML and Semi-structured Databases
Security Track
Security Algorithms
Mobile Network Security
Security in Grid
Security in Wireless Sensor Networks
Security Protocols
Key Management Techniques
Message Authentication and Hash Functions
Digital Signature Schemes
Secret Sharing
Security in E-Commerce and M-Commerce
Watermarking
Cloud Computing Security
Database Security
Data Mining Security
Networks Track
Opportunistic networks
IMT2000, UMTS, LTE, IMT-Advanced networks
Vehicular ad hoc networks (VANET)
Cognitive radio networks
Bio-inspired networks
Context-aware mobile network
Wireless body area networks (WBANs)
Tele-medicine/e-health networks
Mobile P2P networking, systems, and applications
Next generation Internet services and applications
QoS provisioning over Multimedia wireless networks
WLANs, WiMAX, satellite, 3G and Beyond
QoS management and traffic modeling
Wireless sensor networks
Mobile ad hoc networks
Wireless mesh networks
Computing Track
Computational Methods and Algorithms
Green Computing
Soft Computing
Parallel Computing
Grid Computing
Mobile and Pervasive Computing
Distributed Computing
Cloud Computing
Web and Internet Computing
High Performance Computing
Bioinformatics
12月15日
2017
12月16日
2017
摘要截稿日期
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
留言