[Telecentres] telecentres Digest, Vol 53, Issue 4

Tara Dahal tmdahal at gmail.com
Fri Mar 12 15:49:13 GMT 2010


Dear Sir/Mm.,
समाचार, सूचना तथा जानकारीको सहयोगको लागि तपाईलाई धेरै धन्यवाद !  Thanks for
the latest development;  Information Science and Communication Technology
related resources;Nepal
     May I have your recent materials; printed and virtual resources; Cd's;
Demo's specially in the field of 'Knowledge Management' or in the areas of
STI resources which are highly useful to our references and related research
activities.
     Kindly please forward or circulate  our request to your Information and
/or knowledge management officers.Thnks for the latest development of your
Information and  STI  related communication related resources which are
highly informative to our conceptual knowledge  consortium in this country.


Tara Mani Dahal
धन्यवाद
------------------------------
ASIS&T  &  ALA Member,New Nepal Knowledge Consortium(NNKIC); former Database
& Information Officer RONAST(NAST);Kharibot_KumariMarg-63,BattishPutali,
Kathmandu, NEPAL नेपालTel.  977-1- 4495291/ Mob. 9841784173
-:Our services in Nepal-->.* *We R collecting the e-learning & WINISIS
user's interest profile; needs & demands...      Att..->I request to update
our mailing address?.
Vlibrary:
www.leydesdorff.net
www.mythsandmountains.com/
www.knowledge/languages/nepali/index.html  ->
www.enepalnews.com/   www.khabarnepal.com/
www.nayapatrika.com/www.cindoc.csic.es/cybermetrics/
www.leydesdorff.net/
www.unesco.org/isis/www.success.co.il/
www.online-educate.com/www.globalknowledge.org/----Information Knowledge
http://web.ffos.hr/lida/contribution/
http://www.try2say.com/

----UN Charter: All human beings R born of free and equal right...->
                  Pardon any duplication,please !


On Fri, Mar 12, 2010 at 3:41 AM, <telecentres-request at wsis-cs.org> wrote:

> Send telecentres mailing list submissions to
>        telecentres at wsis-cs.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
>        http://mailman-new.greennet.org.uk/mailman/listinfo/telecentres
> or, via email, send a message with subject or body 'help' to
>        telecentres-request at wsis-cs.org
>
> You can reach the person managing the list at
>        telecentres-owner at wsis-cs.org
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of telecentres digest..."
>
>
> Today's Topics:
>
>   1. 2nd CfP: INTERNET 2010 || September 20-25,        2010 - Valencia,
>      Spain (Sandra Sendra)
>   2. 2nd CfP: ICCGI 2010 || September 20-25,   2010 - Valencia,
>      Spain (Miguel.Garcia at upv.es)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Fri, 12 Mar 2010 12:17:54 +0100
> From: Sandra Sendra<sandra.sendra.upv at gmail.com>
> To: telecentres at wsis-cs.org
> Subject: [Telecentres] 2nd CfP: INTERNET 2010 || September 20-25,
> 2010
>        - Valencia, Spain
> Message-ID: <201003121117.o2CBHsbg014094 at smtp.upv.es>
> Content-Type: text/plain; charset=us-ascii
>
>
> INVITATION:
>
> =================
> Please consider to contribute to and/or forward to the appropriate groups
> the following opportunity to submit and publish original scientific results.
> =================
>
>
> ============== INTERNET 2010 | Call for Papers ===============
>
> CALL FOR PAPERS, TUTORIALS, PANELS
>
> INTERNET 2010: The Second International Conference on Evolving Internet
> September 20-25, 2010 - Valencia, Spain
>
> General page: http://www.iaria.org/conferences2010/INTERNET10.html
>
> Call for Papers: http://www.iaria.org/conferences2010/CfPINTERNET10.html
>
> Submission deadline: April 20, 2010
>
> Sponsored by IARIA, www.iaria.org
>
> Extended versions of selected papers will be published in IARIA Journals:
> http://www.iariajournals.org
> Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )
> Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore
> Submitted for indexing: Elsevier's EI Compendex Database, EI's Engineering
> Information Index
> Other indexes are being considered: INSPEC, DBLP, Thomson Reuters
> Conference Proceedings Citation Index
>
> Please note the Poster Forum and Work in Progress options.
>
> The topics suggested by the conference can be discussed in term of
> concepts, state of the art, research, standards, implementations, running
> experiments, applications, and industrial case studies. Authors are invited
> to submit complete unpublished papers, which are not under review in any
> other conference or journal in the following, but not limited to, topic
> areas.
>
> All tracks are open to both research and industry contributions, in terms
> of Regular papers, Posters, Work in progress, Technical/marketing/business
> presentations, Demos, Tutorials, and Panels.
>
> Before submission, please check and conform with the Editorial rules:
> http://www.iaria.org/editorialrules.html
>
>
> INTERNET 2010 Tracks (tracks' topics and submission details: see CfP on the
> site)
>
> Advanced Internet mechanisms
> Access: call admission control vs. QoE vs. structural QoS /
> capability-based access control vs. role-based access control vs.
> attribute-based access control; Routing and pricing models: BGP, pricing
> peering agreements using microeconomics, topological routing vs. table-based
> routing vs. network coding, power-efficient routing; Optimization in P2P/CDN
> networks: peer placement for streaming P2P, analysis of P2P networks;
> Traffic engineering: estimating traffic matrices, constrained routing,
> exponentially bounded burstness; Behavioral traffic recognition: identifying
> applications from traffic behavior; Traffic analysis: methods for analysis
> and visualization of multidimensional measurements, characterizing
> protocols; Software defined radio networks: low power signal processing
> methods, applications of machine learning; Cognitive radio: medium access,
> spatiotemporality, complexity, spectrum sharing and leasing, channel
> selection, multi-stage pricing, cyclostationary signatures, !
>  frame synchronization; Streaming vi
> deo: learning from video, techniques for in-network modulation; Location:
> statistical location, partial measurements, delay estimation
>
> Graph theory/topology/routing Internet support
> Information theory: distributed network coding, Shannon's entropy, Nash
> equilibrium; Optimization: LP, NLP, NeuroP, quadratic, convex programming,
> compressed sensing; Graph theory: random graphs, spectra graph theory,
> percolations and phase transitions, methods from statistical physics,
> geometric random graphs; Algebraic techniques: tensor analysis, matrix
> decomposition; Processing: signal processing techniques, equalization,
> point-process, source coding vs. network coding, recoverability; Statistical
> machine learning: probabilistic graphical models, classification,
> clustering, regression, classification, neural networks, support vector
> machines, decision forests; Game Theory/Microeconomic theory: social choice
> theory, equilibria, arbitrage and incentive oriented distributed mechanism
> design, cooperative games, and games on graphs; Stochastic network calculus;
> Fractal behavior and stability mechanisms; Kolmogorov complexity for
> performance evaluation; Complexity theory
>
> Internet security mechanisms
> Cryptography: design and analysis of cryptographic algorithms, applied
> cryptography, cryptographic protocols and functions; Specification,
> validation design of security and dependability: security and trust models,
> semantics and computational models for security and trust, business models
> in security management, security policies models, security architectures,
> formal methods for verification and certification, multi-level security
> specification; Vulnerabilities, attacks and risks: methods of detection,
> analysis, prevention, intrusion detection, tolerance, response and
> prevention, attacks and prevention of on-line fraud, denial of services
> attacks and prevention methods; Access Control: authentication and
> non-repudiation, accounting and audit, anonymity and pseudonymity; identity
> and trust management, biometric methods; Anti-malware techniques: detection,
> analysis, prevention; Cyber-crime response: anti-phishing, anti-spam,
> anti-fraud methods
>
> Internet trust, security, and dependability levels
> Network and transport level security; Network edge security controls:
> firewalls, packet filters, application gateways; Wireless and mobile network
> security: risks of wireless insecurity, wireless vulnerabilities and
> intrusion detection, WLAN and WMAN MAC layer security technologies, key
> management mechanisms and protocols, security in ad hoc, sensor, mesh and
> personal communication networks; Security of Internet protocols: routing
> security, naming, network management, signaling security, transport layer
> security; Network security policies: specification, implementation,
> deployment and management; Security of P2P and overlay/middleware systems;
> Security for multiple domains, large-scale systems and critical
> infrastructures; Applications and high level services security: Web-based
> applications and services, VoIP, multimedia streaming services, VoD and
> IPTV, collaborative applications (conferencing), electronic commerce and
> eBusiness, eVoting, grid computing, security of eGover!
>  nment; Intellectual property protec
> tion: digital rights management, licensing, metering, watermarking,
> information hiding, implementations; Security services integration in
> complex architectures; Tradeoffs between security and efficiency, usability,
> reliability and cost.
>
> Internet performance
> Performance degradation and anomaly detection mechanisms; User-oriented
> performance metrics; Network and service provider-oriented performance
> metrics; Hybrid (chip and network) performance calculi; Intrusive and
> non-intrusive performance measurement mechanisms; Mechanisms for performance
> degradation-tolerant applications; Mechanisms for application performance
> and network performance; Performance enhancement mechanisms; Performance and
> traffic entropy algorithms; Performance prediction algorithms
>
> Internet AQM/QoS
> Buffer sizing, majorization, QoS routing, finite buffer queue vs. infinite
> buffer queue and performance; Control theoretic framework for modeling of
> TCP and AQM schemes; Discrete mathematics to model buffer occupancy at
> queues of a network (given workloads); Game theoretic modeling of AQMs
> (mathematics to model selfish traffic); Fairness models (proportional
> fairness, max-min fairness, low state global fairness); Optimization
> framework for congestion control, fairness and utility maximization;
> Modeling and simulation of large network scenarios using queuing theory
>
> Internet monitoring and control
> Visualization mechanisms; Sub-network/device isolation mechanisms; Control
> feedback mechanisms (limited feedback, delay and disruption tolerance,
> optimal and adaptive feedback); Optimal control; Adaptive behavior control;
> Network resiliency; Self-adaptable and tunable performance; Mechanisms for
> anticipative measurements and control
>
> Internet and wireless
> Capacity of wireless networks; Potential based routing; Algebraic
> techniques to mine patterns from wireless networks; QoS/QoE translation;
> Wireless ad hoc / mesh networks: MAC protocols, routing, congestion control,
> P2P CDNs on wireless meshes
>
> Internet and data streaming/mining algorithms
> Mathematics for clustering massive data streams; Randomized algorithms etc
> and impossibility results; Dimension reduction in metric spaces; Tensor and
> multidimensional algebraic techniques; Non linear dimension reduction;
> Optimal collector positioning; Data fusion and correlation algorithms
>
> Internet and sensor-oriented networks/algorithms
> Optimal sensor placement; Inference models for sensing; Congestion control;
> Resource allocation; Mathematics to model different diffusion processes and
> applications to routing; Algorithms for data fusion; Algorithms for
> computing dormant/active sending periods; Energy-driven adaptive
> communication protocols
>
> Internet challenges
> Future Internet architecture and design; Next generation Internet
> infrastructure; Internet cross-layer design and optimization; Internet
> security enforcement and validation; Future cross-Internet computing;
> Configurable Internet protocols; Internet-scale overlay content hosting;
> Internet citizen-centric services; End-user customizable Internet; Mobile
> Internet; Internet imaging; Internet coding; Internet resilience; Internet
> QoS/QoE; Context-aware, ambient, and adaptive Internet; Virtualization and
> Internet; Privacy Enhancing Technologies - PETs
>
> ==========
> INTERNET GENERAL CHAIRS
> Jaime Lloret Mauri, Polytechnic University of Valencia, Spain
> Jesus Tomas, Polytechnic University of Valencia, Spain
>
> INTERNET Advisory Chairs
> Eugen Borcoci, University 'Politehnica' Bucharest, Romania
> Vicente Casares, Polytechnic University of Valencia, Spain
> Petre Dini, Concordia University, Canada / IARIA
>
> INTERNET 2010 Research Institute Liaison Chairs
> Jerome Galtier, Orange-FTgroup, France
> Yong Man Ro, KAIST (Korea Advanced Institute of Science and Technology) -
> Daejeon, Republic of Korea
> William W. Wu, Advanced Technology Mechanization Co. - Bethesda, USA /
> Nanjing University of Aeronautics and Astronautics, China
>
> INTERNET 2010 Industry/Research Chairs
> Olivier Audouin, Alcatel-Lucent Bell Labs, France
>
> Committee members: http://www.iaria.org/conferences2010/ComINTERNET10.html
> ===================
>
>
> ------------------------------
>
> Message: 2
> Date: Fri, 12 Mar 2010 12:41:18 +0100
> From: Miguel.Garcia at upv.es, Sandra Sendra<sandra.sendra.upv at gmail.com>
> To: telecentres at wsis-cs.org
> Subject: [Telecentres] 2nd CfP: ICCGI 2010 || September 20-25,  2010 -
>        Valencia, Spain
> Message-ID: <201003121141.o2CBfIub025669 at smtp.upv.es>
> Content-Type: text/plain; charset=us-ascii
>
>
> 2nd CfP: ICCGI 2010 || September 20-25, 2010 - Valencia, Spain
>
> INVITATION:
>
> =================
> Please consider to contribute to and/or forward to the appropriate
> groups the following opportunity to submit and publish original
> scientific results.
> =================
>
>
> ============== ICCGI 2010 | Call for Papers ===============
>
> CALL FOR PAPERS, TUTORIALS, PANELS
>
> ICCGI 2010: The Fifth International Multi-Conference on Computing in the
> Global Information Technology
> September 20-25, 2010 - Valencia, Spain
>
> General page: http://www.iaria.org/conferences2010/ICCGI10.html
> Call for Papers: http://www.iaria.org/conferences2010/CfPICCGI10.html
>
> Submission deadline: April 20, 2010
>
> Sponsored by IARIA, www.iaria.org
> Co-sponsored by IEEE Spain, Illinois State University, University
> Politehnica Bucharest, Universidad Politecnica de Valencia, La
> Machinista Valenciana, IGIC, Hydro-Quebec, Ruder Boskovic Institute,
> Orange, Universidad Complutense Madrid
>
> Extended versions of selected papers will be published in IARIA
> Journals: http://www.iariajournals.org
> Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )
> Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore
> Submitted for indexing: Elsevier's EI Compendex Database, EI's
> Engineering Information Index
> Other indexes are being considered: INSPEC, DBLP, Thomson Reuters
> Conference Proceedings Citation Index
>
> Please note the Poster Forum and Work in Progress options.
>
> The topics suggested by the conference can be discussed in term of
> concepts, state of the art, research, standards, implementations,
> running experiments, applications, and industrial case studies. Authors
> are invited to submit complete unpublished papers, which are not under
> review in any other conference or journal in the following, but not
> limited to, topic areas.
>
> All tracks are open to both research and industry contributions, in
> terms of Regular papers, Posters, Work in progress,
> Technical/marketing/business presentations, Demos, Tutorials, and Panels.
>
> Before submission, please check and conform with the Editorial rules:
> http://www.iaria.org/editorialrules.html
>
> ICCGI 2010 Tracks (tracks' topics and submission details: see CfP on the
> site)
>
> Industrial systems
> Control theory and systems; Fault-tolerance and reliability; Data
> engineering; Enterprise computing and evaluation; Electrical and
> electronics engineering; Economic decisions and information systems;
> Advanced robotics; Virtual reality systems; Industrial systems and
> applications; Industrial and financial systems; Industrial control
> electronics; Industrial IT solutions
>
> Evolutionary computation
> Algorithms, procedures, mechanisms and applications; Computer
> architecture and systems; Computational sciences; Computation in complex
> systems; Computer and communication systems; Computer networks; Computer
> science theory; Computation and computer security; Computer simulation;
> Digital telecommunications; Distributed and parallel computing;
> Computation in embedded and real-time systems; Soft computing;
> User-centric computation
>
> Autonomic and autonomous systems
> Automation and autonomous systems; Theory of Computing; Autonomic
> computing; Autonomic networking; Network computing; Protecting
> computing; Theories of agency and autonomy; Multi-agent evolution,
> adaptation and learning; Adjustable and self-adjustable autonomy;
> Pervasive systems and computation; Computing with locality principles;
> GRID networking and services; Pervasive computing; Cluster computing and
> performance; Artificial intelligence Computational linguistics;
> Cognitive technologies; Decision making; Evolutionary computation;
> Expert systems; Computational biology
>
> Bio-technologies
> Models and techniques for biometric technologies; Bioinformatics;
> Biometric security; Computer graphics and visualization; Computer vision
> and image processing; Computational biochemistry; Finger, facial, iris,
> voice, and skin biometrics; Signature recognition; Multimodal
> biometrics; Verification and identification techniques; Accuracy of
> biometric technologies; Authentication smart cards and biometric
> metrics; Performance and assurance testing; Limitations of biometric
> technologies; Biometric card technologies; Biometric wireless
> technologies; Biometric software and hardware; Biometric standards
>
> Knowledge data systems
> Data mining and Web mining; Knowledge databases and systems; Data
> warehouse and applications; Data warehousing and information systems;
> Database performance evaluation; Semantic and temporal databases;
> Database systems Databases and information retrieval; Digital library
> design; Meta-data modeling
>
> Mobile and distance education
> Human computer interaction; Educational technologies; Computer in
> education; Distance learning; E-learning; Mobile learning Cognitive
> support for learning; Internet-based education; Impact of ICT on
> education and society; Group decision making and software; Habitual
> domain and information technology; Computer-mediated communications;
> Immersing authoring; Contextual and cultural challenges in user mobility
>
> Intelligent techniques, logics, and systems
> Intelligent agent technologies; Intelligent and fuzzy information
> processing; Intelligent computing and knowledge management; Intelligent
> systems and robotics; Fault-tolerance and reliability; Fuzzy logic &
> systems; Genetic algorithms; Haptic phenomena; Graphic recognition;
> Neural networks; Symbolic and algebraic computation; Modeling,
> simulation and analysis of business processes and systems
>
> Knowledge processing
> Knowledge representation models; Knowledge languages; Cognitive science;
> Knowledge acquisition; Knowledge engineering; Knowledge processing under
> uncertainty; Machine intelligence; Machine learning; Making decision
> through Internet; Networking knowledge plan
>
> Information technologies
> Information technology and organizational behavior; Agents, data mining
> and ontologies; Information retrieval systems; Information and network
> security; Information ethics and legal evaluations; Optimization and
> information technology; Organizational information systems; Information
> fusion; Information management systems; Information overload;
> Information policy making; Information security; Information systems;
> Information discovery
>
> Internet and web technologies
> Internet and WWW-based computing; Web and Grid computing; Internet
> service and training; IT and society; IT in education and health;
> Management information systems; Visualization and group decision making;
> Web based language development; Web search and decision making; Web
> service ontologies; Scientific web intelligence; Online business and
> decision making; Business rule language; E-Business; E-Commerce; Online
> and collaborative work; Social eco-systems and social networking; Social
> decisions on Internet; Computer ethics
>
> Digital information processing
> Mechatronics; Natural language processing; Medical imaging; Image
> processing; Signal processing; Speech processing; Video processing;
> Pattern recognition; Pattern recognition models; Graphics & computer
> vision; Medical systems and computing
>
> Cognitive science and knowledge agent-based systems
> Cognitive support for e-learning and mobile learning; Agents and
> cognitive models; Agents & complex systems; computational ecosystems;
> Agent architectures, perception, action & planning in agents; Agent
> communication: languages, semantics, pragmatics & protocols; Agent-based
> electronic commerce and trading systems Multi-agent constraint
> satisfaction; Agent programming languages, development environments and
> testbeds; Computational complexity in autonomous agents; Multi-agent
> planning and cooperation; Logics and formal models of for agency
> verification; Nomadic agents; Negotiation, auctions, persuasion; Privacy
> and security issues in multi-agent systems
>
> Mobility and multimedia systems
> Mobile communications; Multimedia and visual programming; Multimedia and
> decision making; Multimedia systems; Mobile multimedia systems;
> User-centered mobile applications; Designing for the mobile devices;
> Contextual user mobility; Mobile strategies for global market;
> Interactive television and mobile commerce
>
> Systems performance
> Performance evaluation; Performance modeling; Performance of parallel
> computing; Reasoning under uncertainty; Reliability and fault-tolerance;
> Performance instrumentation; Performance monitoring and corrections;
> Performance in entity-dependable systems; Real-time performance and
> near-real time performance evaluation; Performance in software systems;
> Performance and hybrid systems; Measuring performance in embedded systems
>
> Networking and telecommunications
> Telecommunication and Networking; Telecommunication Systems and
> Evaluation; Multiple Criteria Decision Making in Information Technology;
> Network and Decision Making; Networks and Security; Communications
> protocols (SIP/H323/MPLS/IP); Specialized networks (GRID/P2P/Overlay/Ad
> hoc/Sensor); Advanced services (VoIP/IPTV/Video-on-Demand; Network and
> system monitoring and management; Feature interaction detection and
> resolution; Policy-based monitoring and managements systems; Traffic
> modeling and monitoring; Traffic engineering and management;
> Self-monitoring, self-healing and self-management systems;
> Man-in-the-loop management paradigm
>
> Software development and deployment
> Software requirements engineering; Software design, frameworks, and
> architectures; Software interactive design; Formal methods for software
> development, verification and validation; Neural networks and
> performance; Patterns/Anti-patterns/Artifacts/Frameworks;
> Agile/Generic/Agent-oriented programming; Empirical software evaluation
> metrics; Software vulnerabilities; Reverse engineering; Software reuse;
> Software security, reliability and safety; Software economics; Software
> testing and debugging; Tracking defects in the OO design; Distributed
> and parallel software; Programming languages; Declarative programming;
> Real-time and embedded software; Open source software development
> methodologies; Software tools and deployment environments; Software
> Intelligence; Software Performance and Evaluation
>
> Knowledge virtualization
> Modeling techniques, tools, methodologies, languages; Model-driven
> architectures (MDA); Service-oriented architectures (SOA); Utility
> computing frameworks and fundamentals; Enabled applications through
> virtualization; Small-scale virtualization methodologies and techniques;
> Resource containers, physical resource multiplexing, and segmentation;
> Large-scale virtualization methodologies and techniques; Management of
> virtualized systems; Platforms, tools, environments, and case studies;
> Making virtualization real; On-demand utilities Adaptive enterprise;
> Managing utility-based systems; Development environments, tools, prototypes
>
> Systems and networks on the chip
> Microtechnology and nanotechnology; Real-time embedded systems;
> Programming embedded systems; Controlling embedded systems; High speed
> embedded systems; Designing methodologies for embedded systems;
> Performance on embedded systems; Updating embedded systems;
> Wireless/wired design of systems-on-the-chip; Testing embedded systems;
> Technologies for systems processors; Migration to single-chip systems
>
> Context-aware systems
> Context-aware autonomous entities; Context-aware fundamental concepts,
> mechanisms, and applications; Modeling context-aware systems;
> Specification and implementation of awareness behavioral contexts;
> Development and deployment of large-scale context-aware systems and
> subsystems; User awareness requirements Design techniques for interfaces
> and systems; Methodologies, metrics, tools, and experiments for
> specifying context-aware systems; Tools evaluations, Experiment evaluations
>
> Networking technologies
> Next generation networking; Network, control and service architectures;
> Network signalling, pricing and billing; Network middleware;
> Telecommunication networks architectures; On-demand networks, utility
> computing architectures; Next generation networks [NGN] principles;
> Storage area networks [SAN]; Access and home networks; High-speed
> networks; Optical networks; Peer-to-peer and overlay networking; Mobile
> networking and systems; MPLS-VPN, IPSec-VPN networks; GRID networks;
> Broadband networks
>
> Security in network, systems, and applications
> IT in national and global security; Formal aspects of security; Systems
> and network security; Security and cryptography; Applied cryptography;
> Cryptographic protocols; Key management; Access control; Anonymity and
> pseudonymity management; Security management; Trust management;
> Protection management; Certification and accreditation; Virii, worms,
> attacks, spam; Intrusion prevention and detection; Information hiding;
> Legal and regulatory issues
>
> Knowledge for global defense
> Business continuity and availability; Risk assessment; Aerospace
> computing technologies; Systems and networks vulnerabilities; Developing
> trust in Internet commerce; Performance in networks, systems, and
> applications; Disaster prevention and recovery; IT for anti-terrorist
> technology innovations (ATTI); Networks and applications emergency
> services; Privacy and trust in pervasive communications; Digital rights
> management; User safety and protection
>
> Information Systems [IS]
> Management Information Systems; Decision Support Systems; Innovation and
> IS; Enterprise Application Integration; Enterprise Resource Planning;
> Business Process Change; Design and Development Methodologies and
> Frameworks; Iterative and Incremental Methodologies; Agile
> Methodologies; IS Standards and Compliance Issues; Risk Management in IS
> Design and Development; Research Core Theories; Conceptualisations and
> Paradigms in IS; Research Ontological Assumptions in IS Research; IS
> Research Constraints, Limitations and Opportunities; IS vs Computer
> Science Research; IS vs Business Studies
>
> IPv6 Today - Technology and deployment
> IP Upgrade - An Engineering Exercise or a Necessity?; Worldwide IPv6
> Adoption - Trends and Policies; IPv6 Programs, from Research to
> Knowledge Dissemination; IPv6 Technology - Practical Information;
> Advanced Topics and Latest Developments in IPv6; IPv6 Deployment
> Experiences and Case Studies; IPv6 Enabled Applications and Devices
>
> Modeling
> Continuous and Discrete Models; Optimal Models; Complex System Modeling;
> Individual-Based Models; Modeling Uncertainty; Compact Fuzzy Models;
> Modeling Languages; Real-time modeling; Peformance modeling
>
> Optimization
> Multicriteria Optimization; Multilervel Optimization; Goal Programming;
> Optimization and Efficiency; Optimization-based decisions; Evolutionary
> Optimization; Self-Optimization; Extreme Optimization; Combinatorial
> Optimization; Disccrete Optimization; Fuzzy Optimization; Lipschitzian
> Optimization; Non-Convex Optimization; Convexity; Continuous
> Optimization; Interior point methods; Semidefinite and Conic Programming
>
> Complexity
> Complexity Analysis; Computational Complexity; Complexity Reduction;
> Optimizing Model Complexity; Communication Complexity; Managing
> Complexity; Modeling Complexity in Social Systems; Low-complexity Global
> Optimization; Software Development for Modeling and Optimization;
> Industrial applications
>
> ==========
> ICCGI 2010 General Chair
> Jordi Bataller, Polytechnic University of Valencia, Spain
>
> ICCGI Advisory Chairs
> Mirela Danubianu, "Stefan cel Mare" University of Suceava, Romania
> Petre Dini, Concordia University, Canada / IARIA
> Tibor Gyires, Technology Illinois State University, USA
> José Valerdi, France Telecom R&D (Orange Labs), Spain
>
> ICCGI 2010 Research Institute Liaison Chairs
> Robert Chew, Lien Centre for Social Innovation, Singapore
> Matjaz Gams, Jozef Stefan Institute - Ljubljana, Slovenia
> Karolj Skala, Rudjer Bokovic Institute - Zagreb, Croatia
> Mauro Teófilo, Nokia Technology Institute, Brazil
>
> ICCGI 2010 Industry/Research Chairs
> Kemal A. Delic, Hewlett-Packard Co. France
> José García Escudero, La Maquinista Valenciana, Spain
> Jivesh Govil, Cisco Systems, Inc., USA
> Liviu Panait, Google Inc., USA
> Jean-Denis Mathias, CEMAGREF - Clermont-Ferrand, France
> Hoo Chong Wei, Motorola Inc., Malaysia
>
> Committee members: http://www.iaria.org/conferences2010/ComICCGI10.html
> =============
>
>
> ------------------------------
>
> _______________________________________________
> telecentres mailing list
> Info and options:
> http://mailman-new.greennet.org.uk/mailman/listinfo/telecentres
> To unsubscribe, email telecentres-unsubscribe at wsis-cs.org
>
>
> End of telecentres Digest, Vol 53, Issue 4
> ******************************************
>



-- 
Dear Sir/Mm.,
Director of Information & Communication,
धन्यवाद !
समाचार, सूचना तथा जानकारीको सहयोगको लागि तपाईलाई धेरै धन्यवाद !  Thanks for
the latest development;  Information Science and Communication Technology
related resources;Nepal
     May I have your recent materials; printed and virtual resources; Cd's;
Demo's specially in the field of 'Knowledge Management' or in the areas of
STI resources which are highly useful to our references and related research
activities.
     Kindly please forward or circulate  our request to your Information and
/or knowledge management officers.Thnks for the latest development of your
Information and  STI  related communication related resources which are
highly informative to our conceptual knowledge  consortium in this country.


Tara Mani Dahal
धन्यवाद
------------------------------
ASIS&T  &  ALA Member,New Nepal Knowledge Consortium(NNKIC); former Database
& Information Officer RONAST(NAST);Kharibot_KumariMarg-63,BattishPutali,
Kathmandu, NEPAL नेपालTel.  977-1- 4495291/ Mob. 9841784173
-:Our services in Nepal-->.* *We R collecting the e-learning & WINISIS
user's interest profile; needs & demands...      Att..->I request to update
our mailing address?.
Vlibrary:
www.leydesdorff.net
www.mythsandmountains.com/
www.knowledge/languages/nepali/index.html  ->
www.enepalnews.com/   www.khabarnepal.com/
www.nayapatrika.com/www.cindoc.csic.es/cybermetrics/
www.leydesdorff.net/
www.unesco.org/isis/www.success.co.il/
www.online-educate.com/www.globalknowledge.org/----Information Knowledge
http://web.ffos.hr/lida/contribution/
http://www.try2say.com/

----UN Charter: All human beings R born of free and equal right...->
                  Pardon any duplication,please !
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman-new.greennet.org.uk/pipermail/telecentres/attachments/20100312/8efe7f03/attachment-0001.htm>


More information about the telecentres mailing list