Description

ICITeS’ 2018 is running since 2012 with very good success. ICITeS’2018 is an international forum that aims to be one of the important meetings for researchers, professionals, industrials and practitioners to promote and exchange experiences and ideas on recent trends in Information Technology (IT), e-Services and related areas. These recent advances in IT are reshaping business activities towards the services sector that is increasingly delivered over the Internet. IT-enabled services have a great potential to create interesting opportunities for research and development in organizations and industries to the benefit of the end-user.

Call for paper

Important Dates

Draft paper submission deadline:2018-08-04

Topics of submission

ICITeS’ 2018 reports progress and development of methodologies, technologies, planning and implementation, tools and standards in Computers, the Internet, and related studies through its conference.

An important goal of the conference is to provide a solid platform for a diverse gathering of scholars, researchers, developers, educators, and practitioners where they can discuss ideas, innovations, applications and systems. This hub of scientific activity leads to more developments and research breakthroughs. The conference makes concerted effort to reach out to participants affiliated with diverse entities (such as: universities, institutions, corporations, government agencies, and research centers/labs) from all over the world. Topics of interest include, but are not limited to:

Agent-Oriented Programming
Agents for Internet Computing
B2B and B2C Applications
B2B e-Business Impacts
Biomedical Applications
Business & Management
Case studies on Electronic Commerce
Cellular Networking
Challenges in e-Services
Cloud Computing and Security
e-Business Applications
e-Business Policies & Regulation
e-Business Strategy and Behavioral Issues
e-Commerce
e-Government
e-Health
e-Learning
e-Learning and e-Teaching
Electronic Commerce,
Business Management
e-Marketing
Embedded Hardware Support
Embedded Software
Embedded System Architectures
Embedded Systems and Applications
Emerging New Topics
Emerging wireless technologies and platforms
Emerging Technologies and Applications
Encryption Technologies
E-Procurement and Web-based Supply chain management
e-Security
e-Service architectural framework
e-Service cost factor
e-Service intrusive characteristics
e-Service architectural framework
e-Services in the Developing World
e-Services quality measurements & management
e-Services scales of quality measurements
Expert and Knowledge Based Systems
Game Playing
Global e-Commerce Diffusion
Hardware/Software Co-Design
Human-Computer Interaction
IDS (Intrusion Detection System)
Industrial Practices & Benchmark Suites
Information Retrieval
Innovative Information Security
Intellectual Rights
Intelligent Embedded Systems
Internet and Collaborative Computing
Internet Fraud
Internet Services
Internet and Web-based Applications
Internet privacy management
Intranet and Extranet Business Applications
Issues in Social Networks
IT Management & Development
Market-spaces: market portals, hubs, auctions
Medical Image Analysis
Mobile Computing & Applications
Mobile Network Security
Mobility Management in Next Generation Network
Multi-agent Systems & Simulations
Multimedia & Real-time Communications
Natural Language Processing
Network algorithms and performance evaluation
Network environments and platforms
Network Management
Network Reliability, Privacy & Security
Network vulnerabilities, threats and defenses
Network, Wireless Technology &  Applications
Novel Biometric Methods
Open Source Technologies in e-Business.
Optical and peer-to-peer networks
Pattern Recognition
Pervasive Computing
Power-Aware Computing
Process Design and Organizational Issues in e-Commerce
Public sector applications of e-Commerce
Quality of Service (QoS) and Metrics
Real-Time Systems
Reconfigurable Computing
Remote Sensing
Services Offshoring
Secure Software Development Methodologies
Security and Privacy
Security holes in operating systems
Security Metrics and Measurement
Security of Information & Networks
Security Policies
Security Engineering and Protocols
Semantic Query & Search
Semantic Web Technologies
Semantic Web Applications & Ontology Sharing
Signal and Digital Image Processing
Social, Cultural & Ethical Implications of e-Services
Software Agents and Internet Computing
Steganography and covert channels
Surveillance Technologies
Testing Techniques
Tourism e-Business
Trust and Privacy
Virtual Organizations
VPN Technology and Services
Web and Information Systems
Web Data Visualization
Web Information Agents
Web Services
Web Personalization and Decision Making
Wireless and Mobile Computing
Wireless Network Security
Wireless Networks

Researchers from around the globe are interested in sharing their unpublished, fresh and in-depth ideas. Make sure you are part of this strong event!

Message

Leave a message

Refresh

Contact information

  • sammoudar@yahoo.com

Sponsored By

  • Future Technologies & Innovations
    IEEE Region 08 - Europe
    IEEE Middle East
    IEEE Africa