{"id":14334,"date":"2015-07-31T20:13:17","date_gmt":"2015-07-31T17:13:17","guid":{"rendered":"http:\/\/hgpu.org\/?p=14334"},"modified":"2015-07-31T20:13:17","modified_gmt":"2015-07-31T17:13:17","slug":"international-conference-on-communication-and-information-processing-iccip-2015","status":"publish","type":"post","link":"https:\/\/hgpu.org\/?p=14334","title":{"rendered":"International Conference on Communication and Information Processing (ICCIP), 2015"},"content":{"rendered":"<p>Topics:<br \/>\n\u2022 Digital Information Processing and Communications<br \/>\n\u2022 Access Controls<br \/>\n\u2022 Anti-cyberterrorism<br \/>\n\u2022 Assurance of Service<br \/>\n\u2022 Biometrics Technologies<br \/>\n\u2022 Cloud Computing<br \/>\n\u2022 Computational Intelligence<br \/>\n\u2022 Computer Crime Prevention and Detection<br \/>\n\u2022 Computer Forensics<br \/>\n\u2022 Computer Security<br \/>\n\u2022 Confidentiality Protection<br \/>\n\u2022 Critical Infrastructure Management<br \/>\n\u2022 Data Compression<br \/>\n\u2022 Data Management in Mobile Peer-to-Peer Networks<br \/>\n\u2022 Data Mining<br \/>\n\u2022 Data Stream Processing in Mobile\/Sensor Networks<br \/>\n\u2022 Distributed and Parallel Applications<br \/>\n\u2022 E-Government<br \/>\n\u2022 E-Learning<br \/>\n\u2022 Embedded Systems and Software<br \/>\n\u2022 E-Technology<br \/>\n\u2022 Forensics, Recognition Technologies and Applications<br \/>\n\u2022 Fuzzy and Neural Network Systems<br \/>\n\u2022 Green Computing<br \/>\n\u2022 Grid Computing<br \/>\n\u2022 Image Processing<br \/>\n\u2022 Indexing and Query Processing for Moving Objects<br \/>\n\u2022 Information and Data Management<br \/>\n\u2022 Information Content Security<br \/>\n\u2022 Information Ethics<br \/>\n\u2022 Information Propagation on Social Networks<br \/>\n\u2022 Internet Modeling<br \/>\n\u2022 Mobile Networking, Mobility and Nomadicity<br \/>\n\u2022 Mobile Social Networks<br \/>\n\u2022 Mobile, Ad Hoc and Sensor Network Management<br \/>\n\u2022 Multimedia Computing<br \/>\n\u2022 Network Security<br \/>\n\u2022 Peer-to-Peer Social Networks<br \/>\n\u2022 Quality of Service, Scalability and Performance<br \/>\n\u2022 Real-Time Systems<br \/>\n\u2022 Resource and Knowledge Discovery Using Social Networks<br \/>\n\u2022 Self-Organizing Networks and Networked Systems<br \/>\n\u2022 Semantic Web, Ontologies<br \/>\n\u2022 Sensor Networks and Social Sensing<br \/>\n\u2022 Signal Processing, Pattern Recognition and Applications<br \/>\n\u2022 Social Networks<br \/>\n\u2022 Social Search<br \/>\n\u2022 Software Engineering<br \/>\n\u2022 Ubiquitous Computing, Services and Applications<br \/>\n\u2022 User Interfaces and Usability Issues form Mobile Applications<br \/>\n\u2022 User Interfaces, Visualization and Modeling<br \/>\n\u2022 Web Services Architecture, Modeling and Design<br \/>\n\u2022 Web Services Security<br \/>\n\u2022 Wireless Communications<br \/>\n\u2022 XML-Based Languages<br \/>\nFor more topics: <a href=\"http:\/\/www.iccip.org\/cfp.html\" rel=\"nofollow\">http:\/\/www.iccip.org\/cfp.html<\/a><\/p>\n<p>Publication:<br \/>\nAll accepted papers of ICCIP 2015 will be published in one of the following jouranls after being selected.<br \/>\n* Journal of Communications (JCM) ISSN: 1796-2021;<br \/>\nIndexed by EI Compendex; SCOPUS; ULRICH&#8217;s Periodicals Directory; Google Scholar; INSPEC; etc.<br \/>\n* International Journal of Signal Processing Systems (IJSPS) ISSN: 2315-4535;<br \/>\nIndexed by Ulrich&#8217;s Periodicals Directory, Google Scholar, EBSCO, Engineering &amp; Technology Digital Library, etc.<\/p>\n<p>Submission Method:<br \/>\nElectronic Submission System\uff1a<a href=\"http:\/\/www.easychair.org\/conferences\/?conf=iccip2015\" rel=\"nofollow\">http:\/\/www.easychair.org\/conferences\/?conf=iccip2015<a\/><br \/>\nE-mail: iccip@asr.org<\/p>\n<p>Contact Us:<br \/>\nJenny Y. Chow<br \/>\nE-mail: iccip@asr.org<br \/>\nTel: +86-28-86527868<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Topics: \u2022 Digital Information Processing and Communications \u2022 Access Controls \u2022 Anti-cyberterrorism \u2022 Assurance of Service \u2022 Biometrics Technologies \u2022 Cloud Computing \u2022 Computational Intelligence \u2022 Computer Crime Prevention and Detection \u2022 Computer Forensics \u2022 Computer Security \u2022 Confidentiality Protection \u2022 Critical Infrastructure Management \u2022 Data Compression \u2022 Data Management in Mobile Peer-to-Peer Networks \u2022 [&hellip;]<\/p>\n","protected":false},"author":351,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[86],"tags":[],"class_list":["post-14334","post","type-post","status-publish","format-standard","hentry","category-events"],"views":1576,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/14334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/users\/351"}],"replies":[{"embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14334"}],"version-history":[{"count":3,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/14334\/revisions"}],"predecessor-version":[{"id":14349,"href":"https:\/\/hgpu.org\/index.php?rest_route=\/wp\/v2\/posts\/14334\/revisions\/14349"}],"wp:attachment":[{"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hgpu.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}