ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Classic View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Topic: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Message-ID: <[log in to unmask]>
Sender: "ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
From: Yu Wang <[log in to unmask]>
Date: Fri, 15 Jun 2012 21:18:50 +1000
Content-Type: text/plain; charset=ISO-8859-1
MIME-Version: 1.0
Reply-To: Yu Wang <[log in to unmask]>
Parts/Attachments: text/plain (189 lines)
Submission Deadline Extends to June 30, 2012

Joint CFP (three co-located conferences)

Main website,
Fujian Normal University, Wu Yi Shan (Wu Yi Mountain), Fujian, China,
November 21-23, 2012

The 6th International Conference on Network and System Security (NSS 2012)
The 5th International Conference on Internet and Dsitributed Computing
Systems (IDCS 2012)
2012 International Conference on Data and Knowledge Engineering (ICDKE 2012)

Important Dates
Workshop Proposal Deadline: Ongoing as received
Paper Submission Deadline: June 30, 2012
Authors Notification: August 10, 2012
Final Manuscript Due: September 2, 2012

Conference proceedings will be published by Springer-Verlag as a volume of
the LNCS
Accepted papers, after substantial extension, will be recommended for
special issues in

* Concurrency and Computation: Practice and Experience, Wiley. (SCI, Impact
Factor: 0.907)
* Future Generation Computer Systems, Elsevier. (SCI, Impact Factor: 2.365)
* Telecommunication Systems, Springer. (SCI, Impact Factor: 0.67)
* Journal of Internet Technology. (SCI, Impact Factor: 0.448)
* Journal of Computer and System Sciences, Elsevier. (SCI, Impact Factor:


The 6th International Conference on Network and System Security (NSS 2012)

NSS 2012

* Active Defense Systems
* Hardware Security
* Security in P2P systems
* Adaptive Defense SystemsAnalysis
* Benchmark of Security Systems
* Identity Management
* Intelligent Defense Systems
* Security in Cloud and Grid Systems
* Security in E-Commerce
* Applied Cryptography
* Authentication
* Insider Threats
* Intellectual Property Rights Protection
* Security in Pervasive/Ubiquitous Computing
* Security and Privacy in Smart Grid
* Biometric Security
* Complex Systems Security
* Internet and Network Forensics
* Intrusion Detection and Prevention
* Secure Mobile Agents and Mobile Code
* Security and Privacy in Wireless Networks
* Database and System Security
* Data Protection
* Large-scale Attacks and Defense Security Policy
* Security Protocols
* Data/System Integrity
* Distributed Access Control
* Malware
* Network Resiliency
* Security Simulation and Tools
* Security Theory and Tools
* Distributed Attack Systems
* Network Security
* Standards and Assurance Methods
* Denial-of-Service
* RFID Security and Privacy
* Trusted Computing
* High Performance
* Network Virtualization
* Security Architectures
* Trust Management
* High Performance Security Systems
* Security for Critical Infrastructures
* World Wide Web Security

Related link


The 5th International Conference on Internet and Dsitributed Computing
Systems (IDCS 2012)

IDCS 2012

Track 1: Ad Hoc and Sensor Networks

* Middleware for Wireless Sensor Networks
* Networked Sensing and Control
* Sensor Fusion, Tracking and Localisation
* Embedded Software for Sensor Networks
* Environmental Sensing Applications
* Body Sensor Networks
* Vehicular Ad-Hoc Networks

Track 2: Internet and Web Technologies

* Internet Architectures and Protocols
* Modeling and Evaluation of Internet-based Systems
* Internet Quality of Service
* Real-time Multimedia Communication Systems
* Web services and Mash-ups

Track 3: Network Operations & Management

* Energy Efficiency in Large-scale Distributed Systems
* Security of Network-based Systems
* Network-based Applications (VoIP, Streaming)
* Network Traffic Engineering
* Tools and Techniques for Network Measurements

Track 4: Information Infrastructure

* Next Generation Content Delivery Network
* Grid, Cloud, and P2P Computing
* Distributed Computing Applications
* Autonomic Computing
* Computational Economy for Distributed Systems

Track 5: Resilience, Fault tolerance, and Availability

* Fault Tolerant and Self-managing Distributed Systems
* Dependability and Dependable Systems
* Computing Models for Resilient Distributed Systems
* Principles for Resilient Software Architecture
* Availability Design

Related link


2012 International Conference on Data and Knowledge Engineering (ICDKE 2012)

ICDKE 2012

* Data Models and Languages
* Database Indexing and Search
* Query Processing and Optimisation
* Data Mining and Knowledge Discovery
* Semi-structured and Unstructured Data Management
* Data Quality
* Data Integration
* Information Extraction and Retrieval
* Data Privacy and Security
* Workflows and Data Provenance
* Performance of Data Management
* Web Services and Semantic Web
* Web Intelligence
* P2P, Mobile and Ubiquitous Data Management
* Fuzzy, Uncertain and Probabilistic Databases
* Scientific Databases
* Spatial, Temporal & Multimedia Databases
* Stream Databases
* Parallel and Distributed Databases
* Grid and Cloud Computing
* Bioinformatics and Health Informatics
* Enterprise and Business Data Management
* Knowledge Acquisition & Management
* Knowledge-based and Expert Systems

Related link

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see