ACSS 2017-2: Difference between revisions

From Openresearch
Jump to navigation Jump to search
m Veronika Bauer verschob die Seite ACSS'17 2017 nach ACSS 2017-2
No edit summary
 
(One intermediate revision by one other user not shown)
Line 3: Line 3:
|Title=4th International Doctoral Symposium on Applied Computation and Security Systems
|Title=4th International Doctoral Symposium on Applied Computation and Security Systems
|Ordinal=4
|Ordinal=4
|Type=Conference
|Type=PhDSymposium
|Start date=2017/03/17
|Start date=2017/03/17
|End date=2017/03/19
|End date=2017/03/19
Line 11: Line 11:
|Country=India
|Country=India
|Notification=2017/01/30
|Notification=2017/01/30
|has general chair=Khalid Saeed, Nabendu Chaki
|has program chair=Agostino Cortesi, Rituparna Chaki
}}
}}
==Topics==
* Computer Vision & Signal Processing
* Biometrics-based Authentication
* Security for internet of things
* Analysis and verification techniques
* security in mobile and cloud scenarios
* large scale Networking
* Remote Healthcare
* Distributed Systems
* Musical Information Retrieval
* Software Engineering
* Cloud Computing
* Human Computer Interaction
* Privacy and Confidentiality
* Access Control
* Big Data and Data Mining
* Android Security

Latest revision as of 16:53, 2 March 2021

ACSS 2017-2
4th International Doctoral Symposium on Applied Computation and Security Systems
Ordinal 4
Dates 2017/03/17 (iCal) - 2017/03/19
Homepage: http://acss.nitp.ac.in/
Location
Location: Patna, India
Loading map...

Important dates
Submissions: 2016/11/18
Notification: 2017/01/30
Committees
General chairs: Khalid Saeed, Nabendu Chaki
PC chairs: Agostino Cortesi, Rituparna Chaki
Table of Contents


Topics

  • Computer Vision & Signal Processing
  • Biometrics-based Authentication
  • Security for internet of things
  • Analysis and verification techniques
  • security in mobile and cloud scenarios
  • large scale Networking
  • Remote Healthcare
  • Distributed Systems
  • Musical Information Retrieval
  • Software Engineering
  • Cloud Computing
  • Human Computer Interaction
  • Privacy and Confidentiality
  • Access Control
  • Big Data and Data Mining
  • Android Security