以文本方式查看主题

-  中文XML论坛 - 专业的XML技术讨论区  (http://bbs.xml.org.cn/index.asp)
--  『 科研生涯 』   (http://bbs.xml.org.cn/list.asp?boardid=70)
----  [2010-4-15]The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010)  (http://bbs.xml.org.cn/dispbbs.asp?boardid=70&rootid=&id=83496)


--  作者:corrinetao
--  发布时间:2/6/2010 9:29:00 PM

--  [2010-4-15]The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010)
Call for Papers
The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010)
4-6 November 2010 — Nanjing, China
http://www.ieee-mines.org

We cordially invite you to attend the 2010 International Conference on Multimedia Information Networking and Security (MINES 2010) to be held on November 4–6, 2010 in Nanjing, China. The conference will be organized by Nanjing University.

MINES 2010 aims to provide a platform for worldwide researchers and engineers to exchange the latest research results on multimedia information services, with the focuses on multimedia, networking, services and security. The manuscripts covering the novel algorithms, architectures, implementations and experiences are welcome. Papers will be accepted based on peer review and should contain original, high quality work. The topics include but are not limited to:

Track I: Multimedia computing and intelligence
Multimedia coding                            Adaptive multimedia transmission
Multimedia semantic analysis                    Multimedia broadcasting
Multimedia indexing and retrieval            Wireless multimedia communication
Multimedia data mining                            Ubiquitous multimedia computing
Multimedia interaction                            Multimedia sensor networks
Intelligent surveillance                    Multimedia network convergence
Biometric recognition                            Distributed multimedia processing
Track II: Information networking and communication
Internet architecture and design            IPTV/Mobile TV
Next generation networks                    Network coding and applications
VoIP protocols and management                    Ad Hoc, sensor, and mesh networks
Unicast, multicast, broadcast routing protocols    Autonomic networking
Traffic management and control                    Frequency and channel allocation
Overlay and peer-to-peer networks            Pervasive and wearable computing
Network convergence                            Cross-layer design and interactions
Mobile/wireless network management                 Ubiquitous and mobile access
Home network and platform                    Cognitive radio networks
Peer-to-Peer content delivery system               Machine-to-machine communication
Track III: Service science and Intelligence
Multimedia service applications                    Service computing
Service oriented architecture (SOA)            Service security privacy and compliance
Complex systems and complex networks            Service system design and analysis
Agent models and architectures                    Network-delivered service/software as a service (SaaS)
Mutli-agent systems and mobile agents            Intelligent supply chain/logistics applications
Service-driven business process                   Intelligent E-Commerce/E-Government applications
Business model integration and management    Industrial engineering applications of AI
Service quality and operation management    Decision support systems
Grid/Web Services development                    Web intelligence and semantic web
Cloud computing for service                    Social intelligence
Knowledge management and engineering            Intelligent and collaborative business systems
Track IV: Multimedia information security
Copyright protection                            Piracy detection and tracing
Copyright surveillance                            Mobile System Security
Forgery detection                            Secure user interaction
Copy prevention                              Person identification from multimedia
Conditional access                            Behavior analysis based on multimedia
Object identification on the Web            Security for web services
Digital rights management                    Security in social networks
Track V: Communication and network security
Biometric authentication and multimodal access     Security in mobile System
Secure payment and e-commerce                    Security in Sensor and Ad Hoc Network
Illegal content filtering                    Security in machine-to-machine communication
Privacy protection                            Security in Peer-to-Peer communication
Content analysis for credibility evaluation    Security in grid Computing
Object identification on the Web            Security in cloud computing
Forecasting Terrorism                       Security in ubiquitous Computing
Cryptography and security protocols            Intrusion detection and prevention
Authentication and Identification            Denial of Service and other attacks

Prospective authors are encouraged to submit a full paper for review by April 15, 2010, in PDF format. Papers will be accepted based on peer review and should contain original, high quality work. All papers must be written in English. Submit a standard paper should not succeed 5 pages (two columns IEEE format), including figures and references with 10-12 point font. Helpful information for paper formatting can be found on the IEEE Authors Kit (Paper Formatting).The papers will be published by IEEE Computer Society Press, available in the conference, and indexed by EI Compendex and ISTP. High-quality Papers selected from the conference will be published by several special issues of international journals.

Manuscript Due: April 15, 2010
Acceptance Notification: June 15, 2010
Final Manuscript Due: July 10, 2010
Registration Due:July 20, 2010
Conference Date:November 4-6, 2010

Contact Information
Website:http://www.ieee-mines.org
Email: ieeemines@gmail.com


W 3 C h i n a ( since 2003 ) 旗 下 站 点
苏ICP备05006046号《全国人大常委会关于维护互联网安全的决定》《计算机信息网络国际联网安全保护管理办法》
46.875ms