Conferences In Information Security
Conference Name | Welcome to the 25th Symposium On Applied Computing |
---|---|
Venue | Switzerland |
URL | http://www.acm.org/conferences/sac/sac2010/ |
Submission Deadline | Sept. 8, 2009 |
Conference Date | March 22 - March 26, 2010 |
Sponsership/Publisher | ACM |
Aim/Scope/Research Area |
AOMP Agent-Oriented Software Engineering Methodologies and Processes
ASIIS Advances in Spatial and Image-based IS AT Agreement Technologies BIO Bioinformatics CAHC Computer Applications in Health Care CF Computer Forensics CIIA Comp Intelligence and Image Analysis CM Coordination Models, Lang. and Apps CN Computer Networks CS Computational Sciences CSP Constraint Solving and Programming DADS Dependable and Adaptive Distributed Systems DM Data Mining DS Data Streams DTTA Database Theory, Technology, and Applications EC Applications of Evolutionary Computation EIS Enterprise Information Systems EMBS Embedded Systems GCR Geometric Constraints and Reasoning HCI Human Computer Interaction IAR Information Access and Retrieval MCA Mobile Computing and Applications MMV Multimedia and Visualization OE Organizational Engineering OOPS Object-Oriented Programming Languages and Systems OS Operating Systems PL Programming Languages PSC Programming for Separation of Concerns RE Requirements Engineering ROBOT Intelligent Robotic Systems RTS Real-Time Systems SE Software Engineering SEC Computer Security SIM Advances in Computer Simulation SOAP Service-Oriented Arch and Programming SOPDS Self Organization in Pervasive Dist. Sys. SVT Software Verification and Testing SWA The Semantic Web and Applications TRECK Trust, Reputation, Evidence and other Collaboration Know-how UAS Universally-Accessible Systems WSN Wireless sensor networks WT Web Technologies |