ACSS 2017-2: Difference between revisions
m Veronika Bauer verschob die Seite ACSS'17 2017 nach ACSS 2017-2 |
Heike.Rohde (talk | contribs) No edit summary |
||
| (One intermediate revision by one other user not shown) | |||
| Line 3: | Line 3: | ||
|Title=4th International Doctoral Symposium on Applied Computation and Security Systems | |Title=4th International Doctoral Symposium on Applied Computation and Security Systems | ||
|Ordinal=4 | |Ordinal=4 | ||
|Type= | |Type=PhDSymposium | ||
|Start date=2017/03/17 | |Start date=2017/03/17 | ||
|End date=2017/03/19 | |End date=2017/03/19 | ||
| Line 11: | Line 11: | ||
|Country=India | |Country=India | ||
|Notification=2017/01/30 | |Notification=2017/01/30 | ||
|has general chair=Khalid Saeed, Nabendu Chaki | |||
|has program chair=Agostino Cortesi, Rituparna Chaki | |||
}} | }} | ||
==Topics== | |||
* Computer Vision & Signal Processing | |||
* Biometrics-based Authentication | |||
* Security for internet of things | |||
* Analysis and verification techniques | |||
* security in mobile and cloud scenarios | |||
* large scale Networking | |||
* Remote Healthcare | |||
* Distributed Systems | |||
* Musical Information Retrieval | |||
* Software Engineering | |||
* Cloud Computing | |||
* Human Computer Interaction | |||
* Privacy and Confidentiality | |||
* Access Control | |||
* Big Data and Data Mining | |||
* Android Security | |||
Latest revision as of 16:53, 2 March 2021
| ACSS 2017-2 | |
|---|---|
4th International Doctoral Symposium on Applied Computation and Security Systems
| |
| Ordinal | 4 |
| Dates | 2017/03/17 (iCal) - 2017/03/19 |
| Homepage: | http://acss.nitp.ac.in/ |
| Location | |
| Location: | Patna, India |
| Important dates | |
| Submissions: | 2016/11/18 |
| Notification: | 2017/01/30 |
| Committees | |
| General chairs: | Khalid Saeed, Nabendu Chaki |
| PC chairs: | Agostino Cortesi, Rituparna Chaki |
| Table of Contents | |
Topics
- Computer Vision & Signal Processing
- Biometrics-based Authentication
- Security for internet of things
- Analysis and verification techniques
- security in mobile and cloud scenarios
- large scale Networking
- Remote Healthcare
- Distributed Systems
- Musical Information Retrieval
- Software Engineering
- Cloud Computing
- Human Computer Interaction
- Privacy and Confidentiality
- Access Control
- Big Data and Data Mining
- Android Security