Abbrevation
ICIST
City
Istanbul
Country
Turkey
Deadline Paper
Start Date
End Date
Abstract

ICIST&#8242;2015 Submissions are invited broadly in all aspects of Information Systems and Technologies, including but not limited to, to the following main topic areas:<br>Method and Model&#8211;based Software Engineering<br>&#8211; Models of software behavior<br>&#8211; Model&#8211;based requirements analysis<br>&#8211; Model&#8211;based evolution of software systems<br>&#8211; Knowledge&#8211; and semantic&#8211;preserving transformations between models and metamodels<br>&#8211; Case studies and empirical studies showing success or failure of MBSE usage<br>&#8211; Model driven Software Engineering<br>&#8211; Distributed software development<br>&#8211; Software Architecture and Design<br>&#8211; Agile software development methods<br>&#8211; Defining and documenting software processes<br>Dynamic Service Composition, Semantics, Methods and Tools<br>&#8211; Service oriented IS engineering<br>&#8211; integrating dynamic composition into process descriptions<br>&#8211; Component Based IS Engineering<br>&#8211; adequate specification of services for dynamic composition<br>&#8211; Semantics web and dynamic service compositions<br>&#8211; service provisioning for dynamic composition<br>&#8211; SOA standards for dynamic service composition<br>&#8211; adaptive and autonomous services<br>&#8211; Knowledge based Software Engineering<br>&#8211; environments and platforms to support<br>&#8211; tools to support service engineering<br>&#8211; Web and Data Mining<br>&#8211; Ontologies and Methodologies<br>IS Testing, Maintenance and Practice<br>&#8211; Issues, challenges, and needs in software test automation and practice (such as installation testing, and configuration testing)<br>&#8211; Automatic software regression test techniques and tools<br>&#8211; Language&#8211;based software test automation techniques and tools<br>&#8211; Test&#8211;Driven&#8211;Development techniques and project experience<br>&#8211; Software simulation and tools for software auto&#8211;testing<br>&#8211; software validation and integration<br>&#8211; test languages and test specifications<br>&#8211; software maintenance tools and marketplaces<br>&#8211; Specification and Verification<br>&#8211; Maintenance and Evolution<br>&#8211; Software maintenance metrics in cost, complexity, &#046;&#046;&#046;<br>Enterprise Architecture, SOA and E&#8211;Commerce<br>&#8211; E&#8211;Commerce Solutions and Applications &#8211; SOA&#8211;based application integration and legacy applications<br>&#8211; Case studies from implementing SOA<br>&#8211; Methods, frameworks and tools to assess the value and risks of SOA for companies<br>&#8211; Empirical (qualitative and quantitative) insights on the Business Value of SOA<br>&#8211; Impact of SOA on IT Business Alignment<br>&#8211; SOA in a B2B context and SOA cases from particular industries (finance, logistics, &#046;&#046;&#046;)<br>&#8211; SOA governance<br>&#8211; Business Intelligence<br>&#8211; Enterprise Software, Middleware, and Tools<br>&#8211; IS project management and planning &#8211; Effective risk management techniques<br>IS, Grid Computing Systems and Applications<br>&#8211; Grid architectures to support self&#8211;management<br>&#8211; Architectural designs of grid applications with self&#8211;management capabilities<br>&#8211; Self&#8211;management for resource scheduling<br>&#8211; Verification and validation of grid computing systems<br>&#8211; Self&#8211;management policies for grid systems and applications<br>Decision Making and Sustainability IS<br>&#8211; Software Engineering Decision Support<br>&#8211; Decision&#8211;support Systems<br>&#8211; issues and standards for SLAs<br>&#8211; implementation of SLAs<br>&#8211; organizational support for SLA establishment and monitoring<br>&#8211; protocols and standards for SLA negotiations<br>&#8211; frameworks for negotiation protocols<br>&#8211; experience with SLA negotiation approaches in practice<br>Security Technology and Network Systems<br>&#8211; Design Software Security<br>&#8211; Network vulnerabilities, threats, and defenses<br>&#8211; Intrusion detection systems (IDS) and intrusion prevention systems (IPS)<br>&#8211; Steganography and covert channels<br>&#8211; Legal, policy and social aspects of security and privacy<br>&#8211; Digital rights management (DRM)<br>&#8211; Software&#8211;based attack mitigation (buffer overflow, race conditions, etc&#046;)<br>&#8211; Trusted systems, Availability, authentication and authorization<br>&#8211; Software obfuscation, Phishing, pharming and Botnets<br>Agent and IS Engineering<br>&#8211; Agent oriented IS Engineering<br>&#8211; Development practices and Processes<br>&#8211; Artificial Intelligence<br>IS and New Technologies<br>&#8211; Middleware for service based systems<br>&#8211; Mobile Systems and Web Technologies<br>&#8211; Multimedia and Hypermedia Software Engineering<br>&#8211; Process, Workflow, Patterns and Frameworks<br>&#8211; Software Quality Management<br>&#8211; Real&#8211;time Systems<br>&#8211; Open source tools in software engineering<br>&#8211; Scheduling and Optimization Techniques<br>&#8211; Embedded and Ubiquitous Software Engineering<br>&#8211; Formal Methods and Software Reuse<br>&#8211; Web&#8211;Based Tools, Systems, and Environments<br>E&#8211;learning and training<br>&#8211; Developing, Integrating and Delivering E&#8211;learning Solutions<br>&#8211; Academic affairs leadership<br>&#8211; TPACK: Technological, Pedagogical and Content Knowledge<br>&#8211; Professional Development for Faculty for online teaching<br>