Conferences In Information Security

Conference Name Welcome to the 25th Symposium On Applied Computing
Venue Switzerland
URL http://www.acm.org/conferences/sac/sac2010/
Submission Deadline Sept. 8, 2009
Conference Date March 22 - March 26, 2010
Sponsership/Publisher ACM
Aim/Scope/Research Area AOMP Agent-Oriented Software Engineering Methodologies and Processes
ASIIS Advances in Spatial and Image-based IS
AT Agreement Technologies
BIO Bioinformatics
CAHC Computer Applications in Health Care
CF Computer Forensics
CIIA Comp Intelligence and Image Analysis
CM Coordination Models, Lang. and Apps
CN Computer Networks
CS Computational Sciences
CSP Constraint Solving and Programming
DADS Dependable and Adaptive Distributed Systems
DM Data Mining
DS Data Streams
DTTA Database Theory, Technology, and Applications
EC Applications of Evolutionary Computation
EIS Enterprise Information Systems
EMBS Embedded Systems
GCR Geometric Constraints and Reasoning
HCI Human Computer Interaction
IAR Information Access and Retrieval
MCA Mobile Computing and Applications
MMV Multimedia and Visualization
OE Organizational Engineering
OOPS Object-Oriented Programming Languages and Systems
OS Operating Systems
PL Programming Languages
PSC Programming for Separation of Concerns
RE Requirements Engineering
ROBOT Intelligent Robotic Systems
RTS Real-Time Systems
SE Software Engineering
SEC Computer Security
SIM Advances in Computer Simulation
SOAP Service-Oriented Arch and Programming
SOPDS Self Organization in Pervasive Dist. Sys.
SVT Software Verification and Testing
SWA The Semantic Web and Applications
TRECK Trust, Reputation, Evidence and other Collaboration Know-how
UAS Universally-Accessible Systems
WSN Wireless sensor networks
WT Web Technologies

Back To Conferences List

Database Sections