Lodz University of Technology People Hotels Beautiful Places Skyline Platinum Bar and Manufaktura Agricultural Scenes in Poland Botanical Garden Day and Night in Market Square Easter Buffet and a Unique Cuisine Palace of Culture and Science and Ratucz Zamosc


You are invited to participate in The Second International Conference on Informatics & Applications (ICIA2013) that will be held in Lodz, Poland on Sept. 23-25, 2013. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

Topics are but not limited to below:

Information Ethics Information Content Security
Data Compression E-Technology
E-Government E-Learning
Cloud Computing Grid Computing
Green Computing Access Controls
Data Mining Social Search
Computer Forensics Computer Security
Peer-to-Peer Social Networks Information and Data Management
Network Security Social Networks
Real-Time Systems Internet Modeling
Assurance of Service Image Processing
Web Services Security Multimedia Computing
Software Engineering Biometrics Technologies
Wireless Communications Semantic Web, Ontologies
Mobile Social Networks Distributed and Parallel Applications
Embedded Systems and Software Critical Computing and Storage
Critical Infrastructure Management Soft Computing Techniques
Confidentiality Protection Mobile Networking, Mobility and Nomadicity
Anti-cyberterrorism Ubiquitous Computing, Services and Applications
Forensics, Recognition Technologies and Applications Fuzzy and Neural Network Systems
Signal Processing, Pattern Recognition and Applications User Interfaces,Visualization and Modeling
Mobile, Ad Hoc and Sensor Network Management Web Services Architecture, Modeling and Design
Quality of Service, Scalability and Performance Self-Organizing Networks and Networked Systems
Computational Intelligence Data Management in Mobile Peer-to-Peer Networks
Data Stream Processing in Mobile/Sensor Networks Indexing and Query Processing for Moving Objects
User Interfaces and Usability Issues form Mobile Applications Sensor Networks and Social Sensing
XML-Based Languages Cryptography and Data Protection
Information Propagation on Social Networks Resource and Knowledge Discovery Using Social Networks
Computer Crime Prevention and Detection

All the submitted papers will be reviewed by a minimum of two reviewers. All the registered papers will be submitted to IEEE for potential inclusion to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases. In addition, best selected papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor: