PURPOSE OF CONFERENCE
Artificial intelligence, software technologies, biometrics and IT security are established fields of computer science of both theoretical and practical significance.
The aim of ACS 2014 Multi-Conference is to bring artificial intelligence, software technologies, biometrics, IT security and open and distance learning researchers in contact with the ACS community, and to give ACS attendees an opportunity to exchange some significant knowledge according to this areas of interest. Industrial and systems presentations bearing new ideas and solution paradigms are welcome as well.
The topics of interest of the Conference Sections include, but are not limited to:
Artificial Intelligence
- Neural network theory and applications in technique, economic and medicine systems
- Hardware implementations
- Fuzzy logic theory and applications
- Fuzzy optimisation
- Fuzzy control
- Evolutionary algorithms, theory and applications
- Rough sets, theory and applications
- Intelligent agent systems
- Data mining – knowledge extraction
- Databases knowledge for e-distance learning systems
- Computing with words
- Artificial thinking
- Intelligent decision support
- Probabilistic methods in artificial intelligence
- Theory of information gaps
- Artificial intelligence with uncertainty
- All applications of artificial intelligence in prediction, identification, pattern recognition, image and signal processing, speech and computer vision, financial engineering and forecasting, medicine, industry
Software Technologies
- Methods and techniques for software development and maintenance: requirements engineering, object-oriented technologies, formal methods, re-engineering and reverse engineering, reuse, software management issues
- Software architectures: patterns for software design and composition, frameworks, architecture-centred development, component and class libraries, component-based design
- Enabling technology: CASE tools, software development environments and project browsers, compilers, debuggers and runtime libraries
- Software quality: quality management and assurance, risk analysis, program analysis, verification, validation, testing of software systems
- Critical systems: real-time, distribution, fault tolerance, information technology, safety, security
- Mainstream and emerging applications: multimedia and communications, manufacturing, robotics, avionics, space, health care, transportation
- Parallel and distributed application technologies: programming techniques, languages, open MP applications, performance, optimizing compilers
- Novel software technologies: programming paradigms, soft computing, software based on computational intelligence
Information Technology Security
- Access control
- Identification, authentication and digital signatures
- Security infrastructures: TTP, PKI, etc.
- Smartcards and security tokens
- Security models and languages for security policies specification
- Risk evaluation and management
- Security and cryptographic protocols and applied cryptography
- Security evaluation and confirmation (i.e. common criteria)
- Trust models and trust management
- Database security
- Information flow and language-based security, mobile code
- Intrusion detection system and firewalls
- Network and operating systems security
- Security in emerging network technologies: pervasive computing mobile, ad hoc and sensor networks
- Legal issues, computer crime and information warfare
Multimedia systems
- Multimedia Systems
- Multimedia Databases
- Real-Time Support For Multimedia
- Computer Games
- Virtual and Augmented Worlds
- Modeling of Multimedia Systems
- Multimedia Interfaces
- Cloud-based Multimedia Processing
- Hardware Support for Multimedia
- Mobile Multimedia Systems
- Computer Graphics
- Digital Imaging
- Computer Vision
- Image and Video Processing
Design of Information Systems
- Simulation for decision making
- Business process modelling
- Computer Integrated Manufacturing
- Decision support systems development
- Design for realization, operation and robustness for enterprise systems
- Information systems for ecommerce and e-business
- Multi-criteria decision support for enterprise systems
- Marketing information systems
- Social networks and information systems
- 10. Diffusion of information
The primary focus is on high-quality original unpublished research, case studies, and implementation experiences. Papers should have practical relevance to the construction, evaluation, application or operation of the systems. Theoretical papers must make convincing argument for the practical significance of the results.
Any other information details as committees, instructions for authors, invitation session (plenary papers) and payment details see the ACS web site: http://acs.wi.zut.edu.pl.