<div><font color="#6600cc">Dear Sir/Mm.,</font></div>
<div><font color="#6600cc">समाचार, सूचना तथा जानकारीको सहयोगको लागि तपाईलाई धेरै धन्यवाद ! Thanks for the latest development; Information Science and Communication Technology related resources;Nepal<br> May I have your recent materials; printed and virtual resources; Cd's; Demo's specially in the field of 'Knowledge Management' or in the areas of STI resources which are highly useful to our references and related research activities.<br>
Kindly please forward or circulate our request to your Information and /or knowledge management officers.Thnks for the latest development of your Information and STI related communication related resources which are highly informative to our conceptual knowledge consortium in this country. <br>
<br>Tara Mani Dahal<br>धन्यवाद <br>------------------------------<br>ASIS&T & ALA Member,New Nepal Knowledge Consortium(NNKIC); former Database & Information Officer RONAST(NAST);Kharibot_KumariMarg-63,BattishPutali, Kathmandu, NEPAL नेपालTel. 977-1- 4495291/ Mob. 9841784173<br>
-:Our services in Nepal-->.* *We R collecting the e-learning & WINISIS user's interest profile; needs & demands... Att..->I request to update our mailing address?.<br>Vlibrary: <br><a href="http://www.leydesdorff.net">www.leydesdorff.net</a> <br>
<a href="http://www.mythsandmountains.com/">www.mythsandmountains.com/</a><br>www.knowledge/languages/nepali/index.html -> <br><a href="http://www.enepalnews.com/">www.enepalnews.com/</a> <a href="http://www.khabarnepal.com/">www.khabarnepal.com/</a> <a href="http://www.nayapatrika.com/www.cindoc.csic.es/cybermetrics/">www.nayapatrika.com/www.cindoc.csic.es/cybermetrics/</a><br>
<a href="http://www.leydesdorff.net/">www.leydesdorff.net/</a> <br><a href="http://www.unesco.org/isis/www.success.co.il/">www.unesco.org/isis/www.success.co.il/</a><br><a href="http://www.online-educate.com/www.globalknowledge.org/----Information">www.online-educate.com/www.globalknowledge.org/----Information</a> Knowledge <br>
<a href="http://web.ffos.hr/lida/contribution/">http://web.ffos.hr/lida/contribution/</a><br><a href="http://www.try2say.com/">http://www.try2say.com/</a> <br><br>----UN Charter: All human beings R born of free and equal right...-><br>
Pardon any duplication,please ! <br><br><br></font></div>
<div class="gmail_quote"><font color="#6600cc">On Fri, Mar 12, 2010 at 3:41 AM, <span dir="ltr"><<a href="mailto:telecentres-request@wsis-cs.org">telecentres-request@wsis-cs.org</a>></span> wrote:<br></font>
<blockquote style="BORDER-LEFT: #ccc 1px solid; MARGIN: 0px 0px 0px 0.8ex; PADDING-LEFT: 1ex" class="gmail_quote"><font color="#6600cc">Send telecentres mailing list submissions to<br> </font><a href="mailto:telecentres@wsis-cs.org"><font color="#6600cc">telecentres@wsis-cs.org</font></a><br>
<br><font color="#6600cc">To subscribe or unsubscribe via the World Wide Web, visit<br> </font><a href="http://mailman-new.greennet.org.uk/mailman/listinfo/telecentres" target="_blank"><font color="#6600cc">http://mailman-new.greennet.org.uk/mailman/listinfo/telecentres</font></a><br>
<font color="#6600cc">or, via email, send a message with subject or body 'help' to<br> </font><a href="mailto:telecentres-request@wsis-cs.org"><font color="#6600cc">telecentres-request@wsis-cs.org</font></a><br>
<br><font color="#6600cc">You can reach the person managing the list at<br> </font><a href="mailto:telecentres-owner@wsis-cs.org"><font color="#6600cc">telecentres-owner@wsis-cs.org</font></a><br><br><font color="#6600cc">When replying, please edit your Subject line so it is more specific<br>
than "Re: Contents of telecentres digest..."<br><br><br>Today's Topics:<br><br> 1. 2nd CfP: INTERNET 2010 || September 20-25, 2010 - Valencia,<br> Spain (Sandra Sendra)<br> 2. 2nd CfP: ICCGI 2010 || September 20-25, 2010 - Valencia,<br>
Spain (</font><a href="mailto:Miguel.Garcia@upv.es"><font color="#6600cc">Miguel.Garcia@upv.es</font></a><font color="#6600cc">)<br><br><br>----------------------------------------------------------------------<br><br>
Message: 1<br>Date: Fri, 12 Mar 2010 12:17:54 +0100<br>From: Sandra Sendra<</font><a href="mailto:sandra.sendra.upv@gmail.com"><font color="#6600cc">sandra.sendra.upv@gmail.com</font></a><font color="#6600cc">><br>To: </font><a href="mailto:telecentres@wsis-cs.org"><font color="#6600cc">telecentres@wsis-cs.org</font></a><br>
<font color="#6600cc">Subject: [Telecentres] 2nd CfP: INTERNET 2010 || September 20-25, 2010<br> - Valencia, Spain<br>Message-ID: <</font><a href="mailto:201003121117.o2CBHsbg014094@smtp.upv.es"><font color="#6600cc">201003121117.o2CBHsbg014094@smtp.upv.es</font></a><font color="#6600cc">><br>
Content-Type: text/plain; charset=us-ascii<br><br><br>INVITATION:<br><br>=================<br>Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.<br>
=================<br><br><br>============== INTERNET 2010 | Call for Papers ===============<br><br>CALL FOR PAPERS, TUTORIALS, PANELS<br><br>INTERNET 2010: The Second International Conference on Evolving Internet<br>September 20-25, 2010 - Valencia, Spain<br>
<br>General page: </font><a href="http://www.iaria.org/conferences2010/INTERNET10.html" target="_blank"><font color="#6600cc">http://www.iaria.org/conferences2010/INTERNET10.html</font></a><br><br><font color="#6600cc">Call for Papers: </font><a href="http://www.iaria.org/conferences2010/CfPINTERNET10.html" target="_blank"><font color="#6600cc">http://www.iaria.org/conferences2010/CfPINTERNET10.html</font></a><br>
<br><font color="#6600cc">Submission deadline: April 20, 2010<br><br>Sponsored by IARIA, </font><a href="http://www.iaria.org/" target="_blank"><font color="#6600cc">www.iaria.org</font></a><br><br><font color="#6600cc">Extended versions of selected papers will be published in IARIA Journals: </font><a href="http://www.iariajournals.org/" target="_blank"><font color="#6600cc">http://www.iariajournals.org</font></a><br>
<font color="#6600cc">Publisher: CPS ( see: </font><a href="http://www2.computer.org/portal/web/cscps" target="_blank"><font color="#6600cc">http://www2.computer.org/portal/web/cscps</font></a><font color="#6600cc"> )<br>
Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore<br>Submitted for indexing: Elsevier's EI Compendex Database, EI's Engineering Information Index<br>Other indexes are being considered: INSPEC, DBLP, Thomson Reuters Conference Proceedings Citation Index<br>
<br>Please note the Poster Forum and Work in Progress options.<br><br>The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.<br>
<br>All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.<br><br>Before submission, please check and conform with the Editorial rules: </font><a href="http://www.iaria.org/editorialrules.html" target="_blank"><font color="#6600cc">http://www.iaria.org/editorialrules.html</font></a><br>
<br><br><font color="#6600cc">INTERNET 2010 Tracks (tracks' topics and submission details: see CfP on the site)<br><br>Advanced Internet mechanisms<br>Access: call admission control vs. QoE vs. structural QoS / capability-based access control vs. role-based access control vs. attribute-based access control; Routing and pricing models: BGP, pricing peering agreements using microeconomics, topological routing vs. table-based routing vs. network coding, power-efficient routing; Optimization in P2P/CDN networks: peer placement for streaming P2P, analysis of P2P networks; Traffic engineering: estimating traffic matrices, constrained routing, exponentially bounded burstness; Behavioral traffic recognition: identifying applications from traffic behavior; Traffic analysis: methods for analysis and visualization of multidimensional measurements, characterizing protocols; Software defined radio networks: low power signal processing methods, applications of machine learning; Cognitive radio: medium access, spatiotemporality, complexity, spectrum sharing and leasing, channel selection, multi-stage pricing, cyclostationary signatures, !<br>
frame synchronization; Streaming vi<br>deo: learning from video, techniques for in-network modulation; Location: statistical location, partial measurements, delay estimation<br><br>Graph theory/topology/routing Internet support<br>
Information theory: distributed network coding, Shannon's entropy, Nash equilibrium; Optimization: LP, NLP, NeuroP, quadratic, convex programming, compressed sensing; Graph theory: random graphs, spectra graph theory, percolations and phase transitions, methods from statistical physics, geometric random graphs; Algebraic techniques: tensor analysis, matrix decomposition; Processing: signal processing techniques, equalization, point-process, source coding vs. network coding, recoverability; Statistical machine learning: probabilistic graphical models, classification, clustering, regression, classification, neural networks, support vector machines, decision forests; Game Theory/Microeconomic theory: social choice theory, equilibria, arbitrage and incentive oriented distributed mechanism design, cooperative games, and games on graphs; Stochastic network calculus; Fractal behavior and stability mechanisms; Kolmogorov complexity for performance evaluation; Complexity theory<br>
<br>Internet security mechanisms<br>Cryptography: design and analysis of cryptographic algorithms, applied cryptography, cryptographic protocols and functions; Specification, validation design of security and dependability: security and trust models, semantics and computational models for security and trust, business models in security management, security policies models, security architectures, formal methods for verification and certification, multi-level security specification; Vulnerabilities, attacks and risks: methods of detection, analysis, prevention, intrusion detection, tolerance, response and prevention, attacks and prevention of on-line fraud, denial of services attacks and prevention methods; Access Control: authentication and non-repudiation, accounting and audit, anonymity and pseudonymity; identity and trust management, biometric methods; Anti-malware techniques: detection, analysis, prevention; Cyber-crime response: anti-phishing, anti-spam, anti-fraud methods<br>
<br>Internet trust, security, and dependability levels<br>Network and transport level security; Network edge security controls: firewalls, packet filters, application gateways; Wireless and mobile network security: risks of wireless insecurity, wireless vulnerabilities and intrusion detection, WLAN and WMAN MAC layer security technologies, key management mechanisms and protocols, security in ad hoc, sensor, mesh and personal communication networks; Security of Internet protocols: routing security, naming, network management, signaling security, transport layer security; Network security policies: specification, implementation, deployment and management; Security of P2P and overlay/middleware systems; Security for multiple domains, large-scale systems and critical infrastructures; Applications and high level services security: Web-based applications and services, VoIP, multimedia streaming services, VoD and IPTV, collaborative applications (conferencing), electronic commerce and eBusiness, eVoting, grid computing, security of eGover!<br>
nment; Intellectual property protec<br>tion: digital rights management, licensing, metering, watermarking, information hiding, implementations; Security services integration in complex architectures; Tradeoffs between security and efficiency, usability, reliability and cost.<br>
<br>Internet performance<br>Performance degradation and anomaly detection mechanisms; User-oriented performance metrics; Network and service provider-oriented performance metrics; Hybrid (chip and network) performance calculi; Intrusive and non-intrusive performance measurement mechanisms; Mechanisms for performance degradation-tolerant applications; Mechanisms for application performance and network performance; Performance enhancement mechanisms; Performance and traffic entropy algorithms; Performance prediction algorithms<br>
<br>Internet AQM/QoS<br>Buffer sizing, majorization, QoS routing, finite buffer queue vs. infinite buffer queue and performance; Control theoretic framework for modeling of TCP and AQM schemes; Discrete mathematics to model buffer occupancy at queues of a network (given workloads); Game theoretic modeling of AQMs (mathematics to model selfish traffic); Fairness models (proportional fairness, max-min fairness, low state global fairness); Optimization framework for congestion control, fairness and utility maximization; Modeling and simulation of large network scenarios using queuing theory<br>
<br>Internet monitoring and control<br>Visualization mechanisms; Sub-network/device isolation mechanisms; Control feedback mechanisms (limited feedback, delay and disruption tolerance, optimal and adaptive feedback); Optimal control; Adaptive behavior control; Network resiliency; Self-adaptable and tunable performance; Mechanisms for anticipative measurements and control<br>
<br>Internet and wireless<br>Capacity of wireless networks; Potential based routing; Algebraic techniques to mine patterns from wireless networks; QoS/QoE translation; Wireless ad hoc / mesh networks: MAC protocols, routing, congestion control, P2P CDNs on wireless meshes<br>
<br>Internet and data streaming/mining algorithms<br>Mathematics for clustering massive data streams; Randomized algorithms etc and impossibility results; Dimension reduction in metric spaces; Tensor and multidimensional algebraic techniques; Non linear dimension reduction; Optimal collector positioning; Data fusion and correlation algorithms<br>
<br>Internet and sensor-oriented networks/algorithms<br>Optimal sensor placement; Inference models for sensing; Congestion control; Resource allocation; Mathematics to model different diffusion processes and applications to routing; Algorithms for data fusion; Algorithms for computing dormant/active sending periods; Energy-driven adaptive communication protocols<br>
<br>Internet challenges<br>Future Internet architecture and design; Next generation Internet infrastructure; Internet cross-layer design and optimization; Internet security enforcement and validation; Future cross-Internet computing; Configurable Internet protocols; Internet-scale overlay content hosting; Internet citizen-centric services; End-user customizable Internet; Mobile Internet; Internet imaging; Internet coding; Internet resilience; Internet QoS/QoE; Context-aware, ambient, and adaptive Internet; Virtualization and Internet; Privacy Enhancing Technologies - PETs<br>
<br>==========<br>INTERNET GENERAL CHAIRS<br>Jaime Lloret Mauri, Polytechnic University of Valencia, Spain<br>Jesus Tomas, Polytechnic University of Valencia, Spain<br><br>INTERNET Advisory Chairs<br>Eugen Borcoci, University 'Politehnica' Bucharest, Romania<br>
Vicente Casares, Polytechnic University of Valencia, Spain<br>Petre Dini, Concordia University, Canada / IARIA<br><br>INTERNET 2010 Research Institute Liaison Chairs<br>Jerome Galtier, Orange-FTgroup, France<br>Yong Man Ro, KAIST (Korea Advanced Institute of Science and Technology) - Daejeon, Republic of Korea<br>
William W. Wu, Advanced Technology Mechanization Co. - Bethesda, USA / Nanjing University of Aeronautics and Astronautics, China<br><br>INTERNET 2010 Industry/Research Chairs<br>Olivier Audouin, Alcatel-Lucent Bell Labs, France<br>
<br>Committee members: </font><a href="http://www.iaria.org/conferences2010/ComINTERNET10.html" target="_blank"><font color="#6600cc">http://www.iaria.org/conferences2010/ComINTERNET10.html</font></a><br><font color="#6600cc">===================<br>
<br><br>------------------------------<br><br>Message: 2<br>Date: Fri, 12 Mar 2010 12:41:18 +0100<br>From: </font><a href="mailto:Miguel.Garcia@upv.es"><font color="#6600cc">Miguel.Garcia@upv.es</font></a><font color="#6600cc">, Sandra Sendra<</font><a href="mailto:sandra.sendra.upv@gmail.com"><font color="#6600cc">sandra.sendra.upv@gmail.com</font></a><font color="#6600cc">><br>
To: </font><a href="mailto:telecentres@wsis-cs.org"><font color="#6600cc">telecentres@wsis-cs.org</font></a><br><font color="#6600cc">Subject: [Telecentres] 2nd CfP: ICCGI 2010 || September 20-25, 2010 -<br> Valencia, Spain<br>
Message-ID: <</font><a href="mailto:201003121141.o2CBfIub025669@smtp.upv.es"><font color="#6600cc">201003121141.o2CBfIub025669@smtp.upv.es</font></a><font color="#6600cc">><br>Content-Type: text/plain; charset=us-ascii<br>
<br><br>2nd CfP: ICCGI 2010 || September 20-25, 2010 - Valencia, Spain<br><br>INVITATION:<br><br>=================<br>Please consider to contribute to and/or forward to the appropriate<br>groups the following opportunity to submit and publish original<br>
scientific results.<br>=================<br><br><br>============== ICCGI 2010 | Call for Papers ===============<br><br>CALL FOR PAPERS, TUTORIALS, PANELS<br><br>ICCGI 2010: The Fifth International Multi-Conference on Computing in the<br>
Global Information Technology<br>September 20-25, 2010 - Valencia, Spain<br><br>General page: </font><a href="http://www.iaria.org/conferences2010/ICCGI10.html" target="_blank"><font color="#6600cc">http://www.iaria.org/conferences2010/ICCGI10.html</font></a><br>
<font color="#6600cc">Call for Papers: </font><a href="http://www.iaria.org/conferences2010/CfPICCGI10.html" target="_blank"><font color="#6600cc">http://www.iaria.org/conferences2010/CfPICCGI10.html</font></a><br><br><font color="#6600cc">Submission deadline: April 20, 2010<br>
<br>Sponsored by IARIA, </font><a href="http://www.iaria.org/" target="_blank"><font color="#6600cc">www.iaria.org</font></a><br><font color="#6600cc">Co-sponsored by IEEE Spain, Illinois State University, University<br>Politehnica Bucharest, Universidad Politecnica de Valencia, La<br>
Machinista Valenciana, IGIC, Hydro-Quebec, Ruder Boskovic Institute,<br>Orange, Universidad Complutense Madrid<br><br>Extended versions of selected papers will be published in IARIA<br>Journals: </font><a href="http://www.iariajournals.org/" target="_blank"><font color="#6600cc">http://www.iariajournals.org</font></a><br>
<font color="#6600cc">Publisher: CPS ( see: </font><a href="http://www2.computer.org/portal/web/cscps" target="_blank"><font color="#6600cc">http://www2.computer.org/portal/web/cscps</font></a><font color="#6600cc"> )<br>
Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore<br>Submitted for indexing: Elsevier's EI Compendex Database, EI's<br>Engineering Information Index<br>Other indexes are being considered: INSPEC, DBLP, Thomson Reuters<br>
Conference Proceedings Citation Index<br><br>Please note the Poster Forum and Work in Progress options.<br><br>The topics suggested by the conference can be discussed in term of<br>concepts, state of the art, research, standards, implementations,<br>
running experiments, applications, and industrial case studies. Authors<br>are invited to submit complete unpublished papers, which are not under<br>review in any other conference or journal in the following, but not<br>limited to, topic areas.<br>
<br>All tracks are open to both research and industry contributions, in<br>terms of Regular papers, Posters, Work in progress,<br>Technical/marketing/business presentations, Demos, Tutorials, and Panels.<br><br>Before submission, please check and conform with the Editorial rules:<br>
</font><a href="http://www.iaria.org/editorialrules.html" target="_blank"><font color="#6600cc">http://www.iaria.org/editorialrules.html</font></a><br><br><font color="#6600cc">ICCGI 2010 Tracks (tracks' topics and submission details: see CfP on the<br>
site)<br><br>Industrial systems<br>Control theory and systems; Fault-tolerance and reliability; Data<br>engineering; Enterprise computing and evaluation; Electrical and<br>electronics engineering; Economic decisions and information systems;<br>
Advanced robotics; Virtual reality systems; Industrial systems and<br>applications; Industrial and financial systems; Industrial control<br>electronics; Industrial IT solutions<br><br>Evolutionary computation<br>Algorithms, procedures, mechanisms and applications; Computer<br>
architecture and systems; Computational sciences; Computation in complex<br>systems; Computer and communication systems; Computer networks; Computer<br>science theory; Computation and computer security; Computer simulation;<br>
Digital telecommunications; Distributed and parallel computing;<br>Computation in embedded and real-time systems; Soft computing;<br>User-centric computation<br><br>Autonomic and autonomous systems<br>Automation and autonomous systems; Theory of Computing; Autonomic<br>
computing; Autonomic networking; Network computing; Protecting<br>computing; Theories of agency and autonomy; Multi-agent evolution,<br>adaptation and learning; Adjustable and self-adjustable autonomy;<br>Pervasive systems and computation; Computing with locality principles;<br>
GRID networking and services; Pervasive computing; Cluster computing and<br>performance; Artificial intelligence Computational linguistics;<br>Cognitive technologies; Decision making; Evolutionary computation;<br>Expert systems; Computational biology<br>
<br>Bio-technologies<br>Models and techniques for biometric technologies; Bioinformatics;<br>Biometric security; Computer graphics and visualization; Computer vision<br>and image processing; Computational biochemistry; Finger, facial, iris,<br>
voice, and skin biometrics; Signature recognition; Multimodal<br>biometrics; Verification and identification techniques; Accuracy of<br>biometric technologies; Authentication smart cards and biometric<br>metrics; Performance and assurance testing; Limitations of biometric<br>
technologies; Biometric card technologies; Biometric wireless<br>technologies; Biometric software and hardware; Biometric standards<br><br>Knowledge data systems<br>Data mining and Web mining; Knowledge databases and systems; Data<br>
warehouse and applications; Data warehousing and information systems;<br>Database performance evaluation; Semantic and temporal databases;<br>Database systems Databases and information retrieval; Digital library<br>design; Meta-data modeling<br>
<br>Mobile and distance education<br>Human computer interaction; Educational technologies; Computer in<br>education; Distance learning; E-learning; Mobile learning Cognitive<br>support for learning; Internet-based education; Impact of ICT on<br>
education and society; Group decision making and software; Habitual<br>domain and information technology; Computer-mediated communications;<br>Immersing authoring; Contextual and cultural challenges in user mobility<br><br>
Intelligent techniques, logics, and systems<br>Intelligent agent technologies; Intelligent and fuzzy information<br>processing; Intelligent computing and knowledge management; Intelligent<br>systems and robotics; Fault-tolerance and reliability; Fuzzy logic &<br>
systems; Genetic algorithms; Haptic phenomena; Graphic recognition;<br>Neural networks; Symbolic and algebraic computation; Modeling,<br>simulation and analysis of business processes and systems<br><br>Knowledge processing<br>
Knowledge representation models; Knowledge languages; Cognitive science;<br>Knowledge acquisition; Knowledge engineering; Knowledge processing under<br>uncertainty; Machine intelligence; Machine learning; Making decision<br>
through Internet; Networking knowledge plan<br><br>Information technologies<br>Information technology and organizational behavior; Agents, data mining<br>and ontologies; Information retrieval systems; Information and network<br>
security; Information ethics and legal evaluations; Optimization and<br>information technology; Organizational information systems; Information<br>fusion; Information management systems; Information overload;<br>Information policy making; Information security; Information systems;<br>
Information discovery<br><br>Internet and web technologies<br>Internet and WWW-based computing; Web and Grid computing; Internet<br>service and training; IT and society; IT in education and health;<br>Management information systems; Visualization and group decision making;<br>
Web based language development; Web search and decision making; Web<br>service ontologies; Scientific web intelligence; Online business and<br>decision making; Business rule language; E-Business; E-Commerce; Online<br>and collaborative work; Social eco-systems and social networking; Social<br>
decisions on Internet; Computer ethics<br><br>Digital information processing<br>Mechatronics; Natural language processing; Medical imaging; Image<br>processing; Signal processing; Speech processing; Video processing;<br>Pattern recognition; Pattern recognition models; Graphics & computer<br>
vision; Medical systems and computing<br><br>Cognitive science and knowledge agent-based systems<br>Cognitive support for e-learning and mobile learning; Agents and<br>cognitive models; Agents & complex systems; computational ecosystems;<br>
Agent architectures, perception, action & planning in agents; Agent<br>communication: languages, semantics, pragmatics & protocols; Agent-based<br>electronic commerce and trading systems Multi-agent constraint<br>
satisfaction; Agent programming languages, development environments and<br>testbeds; Computational complexity in autonomous agents; Multi-agent<br>planning and cooperation; Logics and formal models of for agency<br>verification; Nomadic agents; Negotiation, auctions, persuasion; Privacy<br>
and security issues in multi-agent systems<br><br>Mobility and multimedia systems<br>Mobile communications; Multimedia and visual programming; Multimedia and<br>decision making; Multimedia systems; Mobile multimedia systems;<br>
User-centered mobile applications; Designing for the mobile devices;<br>Contextual user mobility; Mobile strategies for global market;<br>Interactive television and mobile commerce<br><br>Systems performance<br>Performance evaluation; Performance modeling; Performance of parallel<br>
computing; Reasoning under uncertainty; Reliability and fault-tolerance;<br>Performance instrumentation; Performance monitoring and corrections;<br>Performance in entity-dependable systems; Real-time performance and<br>near-real time performance evaluation; Performance in software systems;<br>
Performance and hybrid systems; Measuring performance in embedded systems<br><br>Networking and telecommunications<br>Telecommunication and Networking; Telecommunication Systems and<br>Evaluation; Multiple Criteria Decision Making in Information Technology;<br>
Network and Decision Making; Networks and Security; Communications<br>protocols (SIP/H323/MPLS/IP); Specialized networks (GRID/P2P/Overlay/Ad<br>hoc/Sensor); Advanced services (VoIP/IPTV/Video-on-Demand; Network and<br>system monitoring and management; Feature interaction detection and<br>
resolution; Policy-based monitoring and managements systems; Traffic<br>modeling and monitoring; Traffic engineering and management;<br>Self-monitoring, self-healing and self-management systems;<br>Man-in-the-loop management paradigm<br>
<br>Software development and deployment<br>Software requirements engineering; Software design, frameworks, and<br>architectures; Software interactive design; Formal methods for software<br>development, verification and validation; Neural networks and<br>
performance; Patterns/Anti-patterns/Artifacts/Frameworks;<br>Agile/Generic/Agent-oriented programming; Empirical software evaluation<br>metrics; Software vulnerabilities; Reverse engineering; Software reuse;<br>Software security, reliability and safety; Software economics; Software<br>
testing and debugging; Tracking defects in the OO design; Distributed<br>and parallel software; Programming languages; Declarative programming;<br>Real-time and embedded software; Open source software development<br>methodologies; Software tools and deployment environments; Software<br>
Intelligence; Software Performance and Evaluation<br><br>Knowledge virtualization<br>Modeling techniques, tools, methodologies, languages; Model-driven<br>architectures (MDA); Service-oriented architectures (SOA); Utility<br>
computing frameworks and fundamentals; Enabled applications through<br>virtualization; Small-scale virtualization methodologies and techniques;<br>Resource containers, physical resource multiplexing, and segmentation;<br>
Large-scale virtualization methodologies and techniques; Management of<br>virtualized systems; Platforms, tools, environments, and case studies;<br>Making virtualization real; On-demand utilities Adaptive enterprise;<br>Managing utility-based systems; Development environments, tools, prototypes<br>
<br>Systems and networks on the chip<br>Microtechnology and nanotechnology; Real-time embedded systems;<br>Programming embedded systems; Controlling embedded systems; High speed<br>embedded systems; Designing methodologies for embedded systems;<br>
Performance on embedded systems; Updating embedded systems;<br>Wireless/wired design of systems-on-the-chip; Testing embedded systems;<br>Technologies for systems processors; Migration to single-chip systems<br><br>Context-aware systems<br>
Context-aware autonomous entities; Context-aware fundamental concepts,<br>mechanisms, and applications; Modeling context-aware systems;<br>Specification and implementation of awareness behavioral contexts;<br>Development and deployment of large-scale context-aware systems and<br>
subsystems; User awareness requirements Design techniques for interfaces<br>and systems; Methodologies, metrics, tools, and experiments for<br>specifying context-aware systems; Tools evaluations, Experiment evaluations<br>
<br>Networking technologies<br>Next generation networking; Network, control and service architectures;<br>Network signalling, pricing and billing; Network middleware;<br>Telecommunication networks architectures; On-demand networks, utility<br>
computing architectures; Next generation networks [NGN] principles;<br>Storage area networks [SAN]; Access and home networks; High-speed<br>networks; Optical networks; Peer-to-peer and overlay networking; Mobile<br>networking and systems; MPLS-VPN, IPSec-VPN networks; GRID networks;<br>
Broadband networks<br><br>Security in network, systems, and applications<br>IT in national and global security; Formal aspects of security; Systems<br>and network security; Security and cryptography; Applied cryptography;<br>
Cryptographic protocols; Key management; Access control; Anonymity and<br>pseudonymity management; Security management; Trust management;<br>Protection management; Certification and accreditation; Virii, worms,<br>attacks, spam; Intrusion prevention and detection; Information hiding;<br>
Legal and regulatory issues<br><br>Knowledge for global defense<br>Business continuity and availability; Risk assessment; Aerospace<br>computing technologies; Systems and networks vulnerabilities; Developing<br>trust in Internet commerce; Performance in networks, systems, and<br>
applications; Disaster prevention and recovery; IT for anti-terrorist<br>technology innovations (ATTI); Networks and applications emergency<br>services; Privacy and trust in pervasive communications; Digital rights<br>management; User safety and protection<br>
<br>Information Systems [IS]<br>Management Information Systems; Decision Support Systems; Innovation and<br>IS; Enterprise Application Integration; Enterprise Resource Planning;<br>Business Process Change; Design and Development Methodologies and<br>
Frameworks; Iterative and Incremental Methodologies; Agile<br>Methodologies; IS Standards and Compliance Issues; Risk Management in IS<br>Design and Development; Research Core Theories; Conceptualisations and<br>Paradigms in IS; Research Ontological Assumptions in IS Research; IS<br>
Research Constraints, Limitations and Opportunities; IS vs Computer<br>Science Research; IS vs Business Studies<br><br>IPv6 Today - Technology and deployment<br>IP Upgrade - An Engineering Exercise or a Necessity?; Worldwide IPv6<br>
Adoption - Trends and Policies; IPv6 Programs, from Research to<br>Knowledge Dissemination; IPv6 Technology - Practical Information;<br>Advanced Topics and Latest Developments in IPv6; IPv6 Deployment<br>Experiences and Case Studies; IPv6 Enabled Applications and Devices<br>
<br>Modeling<br>Continuous and Discrete Models; Optimal Models; Complex System Modeling;<br>Individual-Based Models; Modeling Uncertainty; Compact Fuzzy Models;<br>Modeling Languages; Real-time modeling; Peformance modeling<br>
<br>Optimization<br>Multicriteria Optimization; Multilervel Optimization; Goal Programming;<br>Optimization and Efficiency; Optimization-based decisions; Evolutionary<br>Optimization; Self-Optimization; Extreme Optimization; Combinatorial<br>
Optimization; Disccrete Optimization; Fuzzy Optimization; Lipschitzian<br>Optimization; Non-Convex Optimization; Convexity; Continuous<br>Optimization; Interior point methods; Semidefinite and Conic Programming<br><br>Complexity<br>
Complexity Analysis; Computational Complexity; Complexity Reduction;<br>Optimizing Model Complexity; Communication Complexity; Managing<br>Complexity; Modeling Complexity in Social Systems; Low-complexity Global<br>Optimization; Software Development for Modeling and Optimization;<br>
Industrial applications<br><br>==========<br>ICCGI 2010 General Chair<br>Jordi Bataller, Polytechnic University of Valencia, Spain<br><br>ICCGI Advisory Chairs<br>Mirela Danubianu, "Stefan cel Mare" University of Suceava, Romania<br>
Petre Dini, Concordia University, Canada / IARIA<br>Tibor Gyires, Technology Illinois State University, USA<br>José Valerdi, France Telecom R&D (Orange Labs), Spain<br><br>ICCGI 2010 Research Institute Liaison Chairs<br>
Robert Chew, Lien Centre for Social Innovation, Singapore<br>Matjaz Gams, Jozef Stefan Institute - Ljubljana, Slovenia<br>Karolj Skala, Rudjer Bokovic Institute - Zagreb, Croatia<br>Mauro Teófilo, Nokia Technology Institute, Brazil<br>
<br>ICCGI 2010 Industry/Research Chairs<br>Kemal A. Delic, Hewlett-Packard Co. France<br>José García Escudero, La Maquinista Valenciana, Spain<br>Jivesh Govil, Cisco Systems, Inc., USA<br>Liviu Panait, Google Inc., USA<br>
Jean-Denis Mathias, CEMAGREF - Clermont-Ferrand, France<br>Hoo Chong Wei, Motorola Inc., Malaysia<br><br>Committee members: </font><a href="http://www.iaria.org/conferences2010/ComICCGI10.html" target="_blank"><font color="#6600cc">http://www.iaria.org/conferences2010/ComICCGI10.html</font></a><br>
<font color="#6600cc">=============<br><br><br>------------------------------<br><br>_______________________________________________<br>telecentres mailing list<br>Info and options: </font><a href="http://mailman-new.greennet.org.uk/mailman/listinfo/telecentres" target="_blank"><font color="#6600cc">http://mailman-new.greennet.org.uk/mailman/listinfo/telecentres</font></a><br>
<font color="#6600cc">To unsubscribe, email </font><a href="mailto:telecentres-unsubscribe@wsis-cs.org"><font color="#6600cc">telecentres-unsubscribe@wsis-cs.org</font></a><br><br><br><font color="#6600cc">End of telecentres Digest, Vol 53, Issue 4<br>
******************************************<br></font></blockquote></div><br><br clear="all"><br><font color="#6600cc">-- <br>Dear Sir/Mm., <br>Director of Information & Communication,<br>धन्यवाद ! <br>समाचार, सूचना तथा जानकारीको सहयोगको लागि तपाईलाई धेरै धन्यवाद ! Thanks for the latest development; Information Science and Communication Technology related resources;Nepal<br>
May I have your recent materials; printed and virtual resources; Cd's; Demo's specially in the field of 'Knowledge Management' or in the areas of STI resources which are highly useful to our references and related research activities.<br>
Kindly please forward or circulate our request to your Information and /or knowledge management officers.Thnks for the latest development of your Information and STI related communication related resources which are highly informative to our conceptual knowledge consortium in this country. <br>
<br>Tara Mani Dahal<br>धन्यवाद <br>------------------------------<br>ASIS&T & ALA Member,New Nepal Knowledge Consortium(NNKIC); former Database & Information Officer RONAST(NAST);Kharibot_KumariMarg-63,BattishPutali, Kathmandu, NEPAL नेपालTel. 977-1- 4495291/ Mob. 9841784173<br>
-:Our services in Nepal-->.* *We R collecting the e-learning & WINISIS user's interest profile; needs & demands... Att..->I request to update our mailing address?.<br>Vlibrary: <br><a href="http://www.leydesdorff.net">www.leydesdorff.net</a> <br>
<a href="http://www.mythsandmountains.com/">www.mythsandmountains.com/</a><br>www.knowledge/languages/nepali/index.html -> <br><a href="http://www.enepalnews.com/">www.enepalnews.com/</a> <a href="http://www.khabarnepal.com/">www.khabarnepal.com/</a> <a href="http://www.nayapatrika.com/www.cindoc.csic.es/cybermetrics/">www.nayapatrika.com/www.cindoc.csic.es/cybermetrics/</a><br>
<a href="http://www.leydesdorff.net/">www.leydesdorff.net/</a> <br><a href="http://www.unesco.org/isis/www.success.co.il/">www.unesco.org/isis/www.success.co.il/</a><br><a href="http://www.online-educate.com/www.globalknowledge.org/----Information">www.online-educate.com/www.globalknowledge.org/----Information</a> Knowledge <br>
<a href="http://web.ffos.hr/lida/contribution/">http://web.ffos.hr/lida/contribution/</a><br><a href="http://www.try2say.com/">http://www.try2say.com/</a> <br><br>----UN Charter: All human beings R born of free and equal right...-><br>
Pardon any duplication,please ! <br><br></font>