Difference between revisions of "ACSS 2017-2"

From OPENRESEARCH fixed Wiki
Jump to navigation Jump to search
(modified through wikirestore by Th)
 
(modified through wikirestore by orapi)
 
(3 intermediate revisions by the same user not shown)
Line 5: Line 5:
 
|has program chair=Agostino Cortesi, Rituparna Chaki
 
|has program chair=Agostino Cortesi, Rituparna Chaki
 
|Acronym=ACSS 2017-2
 
|Acronym=ACSS 2017-2
|End date=2017/03/19
+
|End date=2017-03-19
 
|Type  =PhDSymposium
 
|Type  =PhDSymposium
 
|Country=IN
 
|Country=IN
 
|State  =IN/BR
 
|State  =IN/BR
 
|City  =IN/BR/Patna
 
|City  =IN/BR/Patna
 +
|Year  =2017
 
|Homepage=http://acss.nitp.ac.in/
 
|Homepage=http://acss.nitp.ac.in/
 
|Ordinal=4
 
|Ordinal=4
|Start date=2017/03/17
+
|Start date=2017-03-17
|Title  =4th International Doctoral Symposium on Applied Computation and Security Systems}}
+
|Title  =4th International Doctoral Symposium on Applied Computation and Security Systems
 +
}}
 
==Topics==
 
==Topics==
 
* Computer Vision & Signal Processing
 
* Computer Vision & Signal Processing

Latest revision as of 04:28, 6 December 2021


Event Rating

median worst
Pain2.svg Pain7.svg

List of all ratings can be found at ACSS 2017-2/rating

ACSS 2017-2
4th International Doctoral Symposium on Applied Computation and Security Systems
Ordinal 4
Dates 2017-03-17 (iCal) - 2017-03-19
Homepage: http://acss.nitp.ac.in/
Location
Location: IN/BR/Patna, IN/BR, IN
Loading map...

Important dates
Submissions: 2016/11/18
Notification: 2017/01/30
Committees
General chairs: Khalid Saeed, Nabendu Chaki
PC chairs: Agostino Cortesi, Rituparna Chaki
Table of Contents

Topics

  • Computer Vision & Signal Processing
  • Biometrics-based Authentication
  • Security for internet of things
  • Analysis and verification techniques
  • security in mobile and cloud scenarios
  • large scale Networking
  • Remote Healthcare
  • Distributed Systems
  • Musical Information Retrieval
  • Software Engineering
  • Cloud Computing
  • Human Computer Interaction
  • Privacy and Confidentiality
  • Access Control
  • Big Data and Data Mining
  • Android Security