Main tracks
PAIS’2025 solicits papers dealing with Smart Communications in (not limited to):
Track 1 : Artificial Intelligence and Data Sciences
- Artificial Intelligence
- Neural Networks
- Machine learning
- Deep learning
- Reinforcement Learning
- Agents and Multi-agent Systems
- Robotics
- Computer Vision
- Algorithmic Game Theory
- Large scale Machine Learning
- AI-optimized Hardware
- Decision Management
- Fuzzy Logic
- Expert Systems
- Natural Language Processing
- Data Mining
- Computational Optimization
- Sentiment Analysis
- Biometrics
Track 2 : Ambient Intelligence
• Smart Cities
• Smart Grids and Energy Networks
• Sensing and Sensor Networks
• Ambient Assisted Living
• Smart Healthcare
• Intelligent Transportation
• Affective computing
• Agents and Multi-agent Systems
• Context-aware pervasive systems
• Human-Computer Interaction
• Computer Vision
• Geographic Information Systems (GIS)
• Video Analysis
• Medical Diagnosis
• Segmentation Techniques
• Augmented Reality
• Virtual Reality
• Pattern Recognition
• Image Processing and Artificial Vision Application
• Pattern Recognition: Fuzzy Clustering and Classifiers
• Fuzzy Image, Speech and Signal Processing
• Vision and Multimedia
Track 3 : Technology Trends
• Blockchain
• Big Data
• Deep learning
• Datamining
• Data Analytics
• Digital Transformation
• Social Computing
• Cloud Computing
• Grid Computing
• E-Learning
• Quantum Computing
• High-Performance Computing
• Distributed and parallel systems
• Cognitive Computing
• Optimization
• Embedded Computing
• Scalable Computing
• Human-centered Computing
• Mobile computing
• Distributed Testing
• Test Software
• Fault-Tolerant Control
• Adaptive Control
• Control Applications
• Control Design Methods
• Control Theory
• Diagnosis
• Discrete Event Systems
• Intelligent Control
• Predictive Control
• Process Control
• Robotics
Track 4. Networks and Security
- Access control and authorization
- Accountability
- Anonymity
- Application security
- Attacks and defenses
- Authentication
- Blockchain technologies
- Censorship resistance
- Cloud security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Forensics
- Hardware security
- Intrusion detection and prevention
- Malware and unwanted software
- Mobile and Web security and privacy
- Language-based security
- Network and systems security
- Privacy technologies and mechanisms
- Protocol security
- Secure information flow
- Security and privacy for the Internet of Things
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Usable Security and privacy
- Steganography
- Cryptography