Skip to main content

Międzyzdroje, Poland, October 19-21, 2016

ORGANIZED BY

West Pomeranian University of Technology, Faculty of Computer Science, Poland

IN COOPERATION WITH

Warsaw University of Technology, Faculty of Mathematics and Information Science

AGH University of Science and Technology, Faculty of Physics and Applied Computer Science, Poland

Ehime University, Japan

Polish Academy of Sciences IPIPAN, Poland

Polish Academy of Sciences IPIPAN, Poland

Kuban State University of Technology, Institute of Information Technology and Safety, Russia

ACS

PURPOSE OF CONFERENCE

Artificial intelligence, software technologies, biometrics and IT security are established fields of computer science of both theoretical and practical significance.

The aim of ACS 2016 Multi-Conference is to bring artificial intelligence, software technologies, biometrics, IT security and open and distance learning researchers in contact with the ACS community, and to give ACS attendees an opportunity to exchange some significant knowledge according to this areas of interest. Industrial and systems presentations bearing new ideas and solution paradigms are welcome as well.


The topics of interest of the Conference Sections include, but are not limited to:

Artificial Intelligence

  1. Neural network theory and applications in technique, economic and medicine systems 
  2. Hardware implementations 
  3. Fuzzy logic theory and applications 
  4. Fuzzy optimisation
  5. Fuzzy control 
  6. Evolutionary algorithms, theory and applications 
  7. Rough sets, theory and applications 
  8. Intelligent agent systems 
  9. Data mining and knowledge extraction
  10. Databases knowledge for e-distance learning systems
  11. Computing with words
  12. Artificial thinking
  13. Intelligent decision support
  14. Probabilistic methods in artificial intelligence
  15. Theory of information gaps
  16. Artificial intelligence with uncertainty
  17. All applications of artificial intelligence in prediction, identification, pattern recognition, image and signal processing, speech and computer vision, financial engineering and forecasting, medicine, industry

Software Technologies

  1. Methods and techniques for software development and maintenance: requirements engineering, object-oriented technologies, formal methods, re-engineering and reverse engineering, reuse, software management issues 
  2. Software architectures: patterns for software design and composition, frameworks, architecture-centred development, component and class libraries, component-based design 
  3. Enabling technology: CASE tools, software development environments and project browsers, compilers, debuggers and runtime libraries 
  4. Software quality: quality management and assurance, risk analysis, program analysis, verification, validation, testing of software systems 
  5. Critical systems: real-time, distribution, fault tolerance, information technology, safety, security 
  6. Mainstream and emerging applications: multimedia and communications, manufacturing, robotics, avionics, space, health care, transportation 
  7. Parallel and distributed application technologies: programming techniques, languages, open MP applications, performance, optimizing compilers 
  8. Novel software technologies: programming paradigms, soft computing, software based on computational intelligence

Information Technology Security

  1. Access control
  2. Identification, authentication and digital signatures 
  3. Security infrastructures: TTP, PKI, etc. 
  4. Smartcards and security tokens 
  5. Security models and languages for security policies specification 
  6. Risk evaluation and management 
  7. Security and cryptographic protocols and applied cryptography 
  8. Security evaluation and confirmation (i.e. common criteria) 
  9. Trust models and trust management 
  10. Database security 
  11. Information flow and language-based security, mobile code 
  12. Intrusion detection system and firewalls 
  13. Network and operating systems security 
  14. Security in emerging network technologies: pervasive computing mobile, ad hoc and sensor networks
  15. Legal issues, computer crime and information warfare

Multimedia systems 

  1. Multimedia Systems
  2. Multimedia Databases
  3. Real-Time Support For Multimedia
  4. Computer Games
  5. Virtual and Augmented Worlds
  6. Modeling of Multimedia Systems
  7. Multimedia Interfaces
  8. Cloud-based Multimedia Processing
  9. Hardware Support for Multimedia
  10. Mobile Multimedia Systems
  11. Computer Graphics
  12. Digital Imaging
  13. Computer Vision
  14. Image and Video Processing

Design of Information Systems    

  1. Simulation for decision making
  2. Business process modelling
  3. Computer Integrated Manufacturing
  4. Decision support systems development
  5. Design for realization, operation and robustness for enterprise systems
  6. Information systems for ecommerce and e-business
  7. Multi-criteria decision support for enterprise systems
  8. Marketing information systems
  9. Social networks and information systems
  10. Diffusion of information

The primary focus is on high-quality original unpublished research, case studies, and implementation experiences. Papers should have practical relevance to the construction, evaluation, application or operation of the systems. Theoretical papers must make convincing argument for the practical significance of the results.

Any other information details as committees, instructions for authors, invitation session (plenary papers) and payment details see the ACS web site: http://acs.zut.edu.pl.