|
The Fifth International Multi-Conference on Computing in the Global Information Technology
ICCGI 2010
September 20-25, 2010 - Valencia, Spain |
The Fifth International Conference on Computing in the Global Information Technology (ICCGI 2010) continues a series of international events covering a large spectrum of topics related to global knowledge concerning computation, technologies, mechanisms, cognitive patterns, thinking, communications, user-centric approaches, nanotechnologies, and advanced networking and systems. The conference topics focus on challenging aspects in the next generation of information technology and communications related to the computing paradigms (mobile computing, database computing, GRID computing, multi-agent computing, autonomic computing, evolutionary computation) and communication and networking and telecommunications technologies (mobility, networking, bio-technologies, autonomous systems, image processing, Internet and web technologies), towards secure, self-defendable, autonomous, privacy-safe, and context-aware scalable systems.
This conference intends to expose the scientists to the latest developments covering a variety of complementary topics, aiming to enhance one’s understanding of the overall picture of computing in the global information technology.
The integration and adoption of IPv6, also known as the Next Generation of the Internet Protocol is happening throughout the World at this very moment. To maintain global competitiveness, governments are mandating, encouraging or actively supporting the adoption of IPv6 to prepare their respective economies for the future communication infrastructures. Business organizations are increasingly mindful of the IPv4 address space depletion and see within IPv6 a way to solve pressing technical problems while IPv6 technology continues to evolve beyond IPv4 capabilities. Communications equipment manufacturers and applications developers are actively integrating IPv6 in their products based on market demands.
IPv6 continues to represent a fertile area of technology innovation and investigation. IPv6 is opening the way to new successful research projects. Leading edge Internet Service Providers are guiding the way to a new kind of Internet where any-to-any reachability is not a vivid dream but a notion of reality in production IPv6 networks that have been commercially deployed. National Research and Educational Networks together with internationally known hardware vendors, Service Providers and commercial enterprises have generated a great amount of expertise in designing, deploying and operating IPv6 networks and services. This knowledge can be leveraged to accelerate the deployment of the protocol worldwide.
ICCGI 2010 comprises a series of independent tracks that complement the challenges on various facets of computation, systems solutions, knowledge processing, system implementation, and communications and networking technologies.
Industrial systems
Evolutionary computation
Autonomic and autonomous systems
Bio-technologies
Knowledge data systems
Mobile and distance education
Intelligent techniques, logics, and systems
Knowledge processing
Information technologies
Internet and web technologies
Digital information processing
Cognitive science and knowledge agent-based systems
Mobility and multimedia systems
Systems performance
Networking and telecommunications
Software development and deployment
Knowledge virtualization
Systems and networks on the chip
Context-aware systems
Networking technologies
Security in network, systems, and applications
Knowledge for global defense
Information Systems [IS]
IPv6 Today - Technology and deployment
Modeling
Optimization
Complexity
We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.
Industrial presentations are not subject to these constraints. We expect short and long presentations that express industrial position and status.
Tutorials on specific related topics and panels on challenging areas are encouraged.
The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All tracks are open to both research and industry contributions.
Industrial systems
Control theory and systems
Fault-tolerance and reliability
Data engineering
Enterprise computing and evaluation
Electrical and electronics engineering
Economic decisions and information systems
Advanced robotics
Virtual reality systems
Industrial systems and applications
Industrial and financial systems
Industrial control electronics
Industrial IT solutions
Evolutionary computation
Algorithms, procedures, mechanisms and applications
Computer architecture and systems
Computational sciences
Computation in complex systems
Computer and communication systems
Computer networks
Computer science theory
Computation and computer security
Computer simulation
Digital telecommunications
Distributed and parallel computing
Computation in embedded and real-time systems
Soft computing
User-centric computation
Autonomic and autonomous systems
Automation and autonomous systems
Theory of Computing
Autonomic computing
Autonomic networking
Network computing
Protecting computing
Theories of agency and autonomy
Multi-agent evolution, adaptation and learning
Adjustable and self-adjustable autonomy
Pervasive systems and computation
Computing with locality principles
GRID networking and services
Pervasive computing
Cluster computing and performance
Artificial intelligence
Computational linguistics
Cognitive technologies
Decision making
Evolutionary computation
Expert systems
Computational biology
Bio-technologies
Models and techniques for biometric technologies
Bioinformatics
Biometric security
Computer graphics and visualization
Computer vision and image processing
Computational biochemistry
Finger, facial, iris, voice, and skin biometrics
Signature recognition
Multimodal biometrics
Verification and identification techniques
Accuracy of biometric technologies
Authentication smart cards and biometric metrics
Performance and assurance testing
Limitations of biometric technologies
Biometric card technologies
Biometric wireless technologies
Biometric software and hardware
Biometric standards
Knowledge data systems
Data mining and Web mining
Knowledge databases and systems
Data warehouse and applications
Data warehousing and information systems
Database performance evaluation
Semantic and temporal databases
Database systems
Databases and information retrieval
Digital library design
Meta-data modeling
Mobile and distance education
Human computer interaction
Educational technologies
Computer in education
Distance learning
E-learning
Mobile learning
Cognitive support for learning
Internet-based education
Impact of ICT on education and society
Group decision making and software
Habitual domain and information technology
Computer-mediated communications
Immersing authoring
Contextual and cultural challenges in user mobility
Intelligent techniques, logics, and systems
Intelligent agent technologies
Intelligent and fuzzy information processing
Intelligent computing and knowledge management
Intelligent systems and robotics
Fault-tolerance and reliability
Fuzzy logic & systems
Genetic algorithms
Haptic phenomena
Graphic recognition
Neural networks
Symbolic and algebraic computation
Modeling, simulation and analysis of business processes and systems
Knowledge processing
Knowledge representation models
Knowledge languages
Cognitive science
Knowledge acquisition
Knowledge engineering
Knowledge processing under uncertainty
Machine intelligence
Machine learning
Making decision through Internet
Networking knowledge plan
Information technologies
Information technology and organizational behavior
Agents, data mining and ontologies
Information retrieval systems
Information and network security
Information ethics and legal evaluations
Optimization and information technology
Organizational information systems
Information fusion
Information management systems
Information overload
Information policy making
Information security
Information systems
Information discovery
Internet and web technologies
Internet and WWW-based computing
Web and Grid computing
Internet service and training
IT and society
IT in education and health
Management information systems
Visualization and group decision making
Web based language development
Web search and decision making
Web service ontologies
Scientific web intelligence
Online business and decision making
Business rule language
E-Business
E-Commerce
Online and collaborative work
Social eco-systems and social networking
Social decisions on Internet
Computer ethics
Digital information processing
Mechatronics
Natural language processing
Medical imaging
Image processing
Signal processing
Speech processing
Video processing
Pattern recognition
Pattern recognition models
Graphics & computer vision
Medical systems and computing
Cognitive science and knowledge agent-based systems
Cognitive support for e-learning and mobile learning
Agents and cognitive models
Agents & complex systems; computational ecosystems
Agent architectures; perception, action & planning in agents
Agent communication: languages, semantics, pragmatics & protocols
Agent-based electronic commerce and trading systems
Multi-agent constraint satisfaction
Agent programming languages, development environments and testbeds
Computational complexity in autonomous agents
Multi-agent planning and cooperation
Logics and formal models of for agency verification
Nomadic agents
Negotiation, auctions, persuasion
Privacy and security issues in multi-agent systems
Mobility and multimedia systems
Mobile communications
Multimedia and visual programming
Multimedia and decision making
Multimedia systems
Mobile multimedia systems
User-centered mobile applications
Designing for the mobile devices
Contextual user mobility
Mobile strategies for global market
Interactive television and mobile commerce
Systems performance
Performance evaluation
Performance modeling
Performance of parallel computing
Reasoning under uncertainty
Reliability and fault-tolerance
Performance instrumentation
Performance monitoring and corrections
Performance in entity-dependable systems
Real-time performance and near-real time performance evaluation
Performance in software systems
Performance and hybrid systems
Measuring performance in embedded systems
Networking and telecommunications
Telecommunication and Networking
Telecommunication Systems and Evaluation
Multiple Criteria Decision Making in Information Technology
Network and Decision Making
Networks and Security
Communications protocols (SIP/H323/MPLS/IP)
Specialized networks (GRID/P2P/Overlay/Ad hoc/Sensor)
Advanced services (VoIP/IPTV/Video-on-Demand
Network and system monitoring and management
Feature interaction detection and resolution
Policy-based monitoring and managements systems
Traffic modeling and monitoring
Traffic engineering and management
Self-monitoring, self-healing and self-management systems
Man-in-the-loop management paradigm
Software development and deployment
Software requirements engineering
Software design, frameworks, and architectures
Software interactive design
Formal methods for software development, verification and validation
Neural networks and performance
Patterns/Anti-patterns/Artifacts/Frameworks
Agile/Generic/Agent-oriented programming
Empirical software evaluation metrics
Software vulnerabilities
Reverse engineering
Software reuse
Software security, reliability and safety
Software economics
Software testing and debugging
Tracking defects in the OO design
Distributed and parallel software
Programming languages
Declarative programming
Real-time and embedded software
Open source software development methodologies
Software tools and deployment environments
Software Intelligence
Software Performance and Evaluation
Knowledge virtualization
Modeling techniques, tools, methodologies, languages
Model-driven architectures (MDA)
Service-oriented architectures (SOA)
Utility computing frameworks and fundamentals
Enabled applications through virtualization
Small-scale virtualization methodologies and techniques
Resource containers, physical resource multiplexing, and segmentation
Large-scale virtualization methodologies and techniques
Management of virtualized systems
Platforms, tools, environments, and case studies
Making virtualization real
On-demand utilities
Adaptive enterprise
Managing utility-based systems
Development environments, tools, prototypes
Systems and networks on the chip
Microtechnology and nanotechnology
Real-time embedded systems
Programming embedded systems
Controlling embedded systems
High speed embedded systems
Designing methodologies for embedded systems
Performance on embedded systems
Updating embedded systems
Wireless/wired design of systems-on-the-chip
Testing embedded systems
Technologies for systems processors
Migration to single-chip systems
Context-aware systems
Context-aware autonomous entities
Context-aware fundamental concepts, mechanisms, and applications
Modeling context-aware systems
Specification and implementation of awareness behavioral contexts
Development and deployment of large-scale context-aware systems and subsystems
User awareness requirements
Design techniques for interfaces and systems
Methodologies, metrics, tools, and experiments for specifying context-aware systems
Tools evaluations, Experiment evaluations
Networking technologies
Next generation networking
Network, control and service architectures
Network signalling, pricing and billing
Network middleware
Telecommunication networks architectures
On-demand networks, utility computing architectures
Next generation networks [NGN] principles
Storage area networks [SAN]
Access and home networks
High-speed networks
Optical networks
Peer-to-peer and overlay networking
Mobile networking and systems
MPLS-VPN, IPSec-VPN networks
GRID networks
Broadband networks
Security in network, systems, and applications
IT in national and global security
Formal aspects of security
Systems and network security
Security and cryptography
Applied cryptography
Cryptographic protocols
Key management
Access control
Anonymity and pseudonymity management
Security management
Trust management
Protection management
Certification and accreditation
Virii, worms, attacks, spam
Intrusion prevention and detection
Information hiding
Legal and regulatory issues
Knowledge for global defense
Business continuity and availability
Risk assessment
Aerospace computing technologies
Systems and networks vulnerabilities
Developing trust in Internet commerce
Performance in networks, systems, and applications
Disaster prevention and recovery
IT for anti-terrorist technology innovations (ATTI)
Networks and applications emergency services
Privacy and trust in pervasive communications
Digital rights management
User safety and protection
Information Systems [IS]
Management Information Systems
Decision Support Systems
Innovation and IS
Enterprise Application Integration
Enterprise Resource Planning
Business Process Change
Design and Development Methodologies and Frameworks
Iterative and Incremental Methodologies
Agile Methodologies
IS Standards and Compliance Issues
Risk Management in IS Design and Development
Research Core Theories
Conceptualisations and Paradigms in IS
Research Ontological Assumptions in IS Research
IS Research Constraints, Limitations and Opportunities
IS vs Computer Science Research
IS vs Business Studies
IPv6 Today - Technology and deployment
IP Upgrade - An Engineering Exercise or a Necessity?
Worldwide IPv6 Adoption - Trends and Policies
IPv6 Programs, from Research to Knowledge Dissemination
IPv6 Technology - Practical Information
Advanced Topics and Latest Developments in IPv6
IPv6 Deployment Experiences and Case Studies
IPv6 Enabled Applications and Devices
Modeling
Continuous and Discrete Models
Optimal Models
Complex System Modeling
Individual-Based Models
Modeling Uncertainty
Compact Fuzzy Models
Modeling Languages
Real-time modeling
Peformance modeling
Optimization
Multicriteria Optimization
Multilervel Optimization
Goal Programming
Optimization and Efficiency
Optimization-based decisions
Evolutionary Optimization
Self-Optimization
Extreme Optimization
Combinatorial Optimization
Disccrete Optimization
Fuzzy Optimization
Lipschitzian Optimization
Non-Convex Optimization
Convexity
Continuous Optimization
Interior point methods
Semidefinite and Conic Programming
Complexity
Complexity Analysis
Computational Complexity
Complexity Reduction
Optimizing Model Complexity
Communication Complexity
Managing Complexity
Modeling Complexity in Social Systems
Low-complexity Global Optimization
Software Development for Modeling and Optimization
Industrial applications
INSTRUCTION FOR THE AUTHORS
Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.
Publisher: CPS (see: http://www2.computer.org/portal/web/cscps/)
Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore
Submitted for indexing: Elsevier's EI Compendex Database, EI’s Engineering Information Index
Other indexes are being considered: INSPEC, DBLP, Thomson Reuters Conference Proceedings Citation Index
Important deadlines:
As a result of many requests, submission deadline is set to May 4, 2010
Submission (full paper) |
April 20, 2010 May 4 , 2010 |
Notification |
May 25, 2010 May 29, 2010 |
Registration |
June 17, 2010 |
Camera ready |
June 17, 2010 |
Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via an automated system.
Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.
Your paper should also comply with the additional editorial rules.
Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.
Posters
Posters are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as poster. Submissions are expected to be 6-8 slide deck. Posters will not be published in the Proceedings. One poster with all the slides together should be used for discussions. Presenters will be allocated a space where they can display the slides and discuss in an informal manner. The poster slide decks will be posted on the IARIA site.
For more details, see the Posters explanation page.
Work in Progress
Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.
For more details, see the Work in Progress explanation page
Technical marketing/business/positioning presentations
The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to petre@iaria.org.
Tutorials
Tutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials' slide decks will be posted on the IARIA's site. Please send your proposals to petre@iaria.org
Panel proposals:
The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel's slide deck will be posted on the IARIA's site.
For more information, petre@iaria.org
Workshop proposals
We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petre@iaria.org.