您现在的位置: 369会网 >> 学术交流会 >> 其他 >> 正文

2009年11月18日-20日2009年多媒体信息网络与安全国际会议

发布人:dengyp    更新时间:2009/2/11 15:27:54    点击数:1015

● 会议名称(中文): 2009年多媒体信息网络与安全国际会议

● 会议名称(英文): The 2009 International Conference on Multimedia Information NEtworking and Security (MINES 2009)

● 所属学科: 信息科学与系统科学  计算机科学技术  
 
● 会议类型: 国际会议 

● 会议论文集是否检索: SCI ISTP EI
 
● 开始日期: 2009-11-18

● 结束日期: 2009-11-20

● 所在国家: 中华人民共和国 

● 所在城市: 湖北省   武汉市 

● 主办单位: 武汉大学

● 协办单位: NSFC,IEEE

● 承办单位: 武汉大学

● 议题:

Multimedia computing and networking
Multimedia services
Multimedia security
Network security
Trusted computing

● 会议主席: Lina Wang, Wuhan University, China

● 组织委员会主席: Zhiyong Peng, Wuhan University, China

● 程序委员会主席: Chin-Chen Chang, Feng-Chia University, Taiwain

● 全文截稿日期: 2009-5-1
 
● 论文录用通知日期 2009-7-1

● 交修订版截止日期: 2008-8-1

● 会务组联系方式

联系人: Dengpan Ye 
联系电话: 027-68778048
E-mail: mines2009@gmail.com
通讯地址: 武汉大学计算机学院
邮政编码: 430072
 
● 会议网站: http://liss.whu.edu.cn/mines2009

● 会议背景介绍:

With the development of multimedia technology and network technology, multimedia services become more and more popular. In nowadays, multimedia information refers not only to text, image or video but also to flash, web, 3D data, etc. Multimedia information is networked in various modes, e.g., fixed network, wireless network, mobile network, etc. Multimedia information may be generated, processed, transmitted, retrievaled, consumed or shared in various environments. Additionally, security becomes an important issue for information networking. During the past decades, many works have been done in multimedia information networking and security.
MINES 2009 aims to provide a platform for worldwide researchers and engineers to exchange the latest research results on multimedia information services, with the focuses on networking and security. 

● 征文范围及要求:

The manuscripts covering the novel algorithms, architectures, implementations and experiences are welcome. Papers will be accepted based on peer review and should contain original, high quality work. The topics include but are not limited to:
Topic I: Multimedia computing and networking
Multimedia coding, Multimedia semantic analysis, Multimedia indexing and retrieval, Multimedia data mining, Multimedia interaction, Intelligent surveillance, Adaptive multimedia transmission, Multimedia broadcasting, Wireless multimedia communication, Ubiquitous multimedia computing, Multimedia sensor networks, Multimedia network convergence

Topic II: Multimedia services
Internet based services, TV services (Digital TV, Internet TV, Mobile TV), Mobile community, Short message service (SMS), Multimedia message service (MMS), Ringtones, E-health, Smart home, Location based services, User generated content, Media generation social networks, Content sharing in social networks, Intelligent interaction, Services based on network convergence, Broadband multimedia services

Topic III: Multimedia security
Copyright protection, Copyright surveillance, Forgery detection, Copy prevention, Conditional access, Digital rights management, Piracy detection and tracing, Secure interaction, Biometric authentication, Behavior analysis based on multimedia, Security for web services, Security in social networks

Topic IV: Network security
Intrusion detection and prevention, Crime detection based on digital forensics, Illegal content filtering, Privacy protection, Content analysis for credibility evaluation, Object identification on the Web, Forecasting Terrorism, Cryptography and security protocols, Authentication and Identification, Mobile System Security, Ubiquitous Computing Security, Sensor and Mobile Ad Hoc Network Security, Security for Grid Computing, Peer-to-Peer Security, Denial of Service and other attacks

Topic V: Trusted computing
Theory and Models of Trust, Trust Establishment, Trust Propagation and Management, Trusted Software and Database, Trusted Computing Platform, Trusted Operating System, Trusted Network Computing, Trusted Autonomic Computing, Trusted Services and Applications, Trust in E-commerce, Trust in E-government, Trust in Mobile Network, Trust in Wireless Network, Trust-related Security and Privacy, Reliable and dependable Systems


The papers will be published by IEEE computer society (pending), available in the conference, and indexed by some well-known citation databases, e.g., EI Compendex and ISTP. The best papers selected from the conference will be published by several special issues in SCI-indexed journals.

网友评论

Copyright © 2007-2013 369会网 上海今韦信息科技有限公司 版权所有
咨询热线:86-21-51001710 传真:86-21-51615922 地址:上海虹口区新市路
支持单位:上海顾客满意度评价中心 上海全球事件经济研究中心
法律顾问:上海市光明律师事务所 李佩芳律师
沪ICP备06051309号 上海市"专精特新”企业