- Sponsor:
- sigapp
Welcome to the 23rd Annual ACM Symposium on Applied Computing (SAC 2008). This international event is dedicated to computer scientists, engineers, and practitioners seeking innovative ideas in various areas of computer applications. This year, the conference is hosted by the University of Fortaleza and the Federal University of Ceara, Brazil. The organizing committee is grateful to your participation in this exciting international gathering.
The ACM Special Interest Group on Applied Computing is dedicated to further the interests of computing professionals engaged in the design and development of new computing applications, interdisciplinary applications areas, and applied research. The conference provides a forum for discussion and exchange of new ideas addressing computational algorithms and complex applications. This goal is reflected in the wide spectrum of application areas and tutorials designed to provide a variety of discussion topics during this event.
Cited By
-
Seth M, Jalo H, Högstedt Å, Medin O, Sjöqvist B and Candefjord S (2023). Technologies for Interoperable Internet of Medical Things Platforms to Manage Medical Emergencies in Home and Prehospital Care: A Scoping Review (Preprint), Journal of Medical Internet Research, 10.2196/54470
-
Salle I, Sénégas M and Yıldızoğlu M (2018). How transparent about its inflation target should a central bank be?, Journal of Evolutionary Economics, 10.1007/s00191-018-0558-4, 29:1, (391-427), Online publication date: 1-Mar-2019.
-
Dageförde J and Kuchen H (2018). An Operational Semantics for Constraint-Logic Imperative Programming Declarative Programming and Knowledge Management, 10.1007/978-3-030-00801-7_5, (64-80),
-
FALASCHI M, OLARTE C and PALAMIDESSI C (2014). Abstract interpretation of temporal concurrent constraint programs, Theory and Practice of Logic Programming, 10.1017/S1471068413000641, 15:03, (312-357), Online publication date: 1-May-2015.
- Zhu Y and Fu H (2011). Traffic analysis attacks on Skype VoIP calls, Computer Communications, 34:10, (1202-1212), Online publication date: 1-Jul-2011.
- Khan L, Baig M and Youssef A (2010). Speaker recognition from encrypted VoIP communications, Digital Investigation: The International Journal of Digital Forensics & Incident Response, 7:1-2, (65-73), Online publication date: 1-Oct-2010.
-
Ralha C (2009). Towards the Integration of Multiagent Applications and Data Mining Data Mining and Multi-agent Integration, 10.1007/978-1-4419-0522-2_2, (37-46),