CITS 2025: The 2025 International Conference on Computer, Information and Telecommunication Systems

July 16-18, 2025, Colmar, France

About the Conference đź”—

The 2025 International Conference on Computer, Information, and Telecommunication Systems, CITS 2025, is an international forum for scientists, engineers, and practitioners to present their latest research and development results in all areas of Computer, Information, and Telecommunication Systems, CITS.

The conference will feature tutorials, technical paper presentations, and distinguished keynote speeches. Accepted papers will be submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore’s scope and quality requirements.

Extended versions of selected accepted papers from the conference will be published in special issue(s)/Section(s) of International Journal of Communication Systems (SCI indexed) and Security and Privacy Journal (Wiley).

Technical co-sponsor

IEEE logo ComSoc logo

Important Dates

  • Invited sessions, workshops, tutorials proposals:
  • Paper submission:
  • Author notification:
  • Camera-ready paper submission:

You can download a one-page Call For Papers (CFP)

Final Paper Submission đź”—

Please, follow instructions given in the detailed final paper preparation and submission instructions available for authors (also in PDF format).

Papers should be written in English with a maximum paper length of 8 printed pages (10-point font, A4 size paper) including figures. For your submission you can use the standard IEEE Transactions templates for Microsoft Word or LaTeX formats found at:

https://www.ieee.org/conferences_events/conferences/publishing/templates.html (Remember: A4 size)

Papers must be submitted in Portable Document Format (PDF) format, using the following EDAS link:

https://edas.info/N33103

Important Notice:

Papers are reviewed on the basis that they do not contain plagiarized material and have not been submitted to any other conference at the same time (multiple submission). To learn more about this matter; visit:

Conference Registration đź”—

CITS 2025 Conference Registration

CITS 2025 will be held as a hybrid conference in the period July 16-18, 2025, Colmar, France. Those authors who will not be allowed to travel abroad by strict national rules in force at the time of the conference or have other serious reasons accepted by the organizers will be given an opportunity to present their accepted work remotely.

Authors can only register with two payment options: credit card and bank wire (through EDAS). Registration covers: Access to all technical sessions, keynote speeches, e-program, e-proceedings, and coffee breaks.

Please read CANCELLATION POLICY first before you pay for the registration.

CITS 2025 Registration (IN PERSON Author/Delegate) IEEE Member2 Non-member2
Author Registration (for Student or Non-Student until June 25th, 20251) €590 €690
No-paper Early Registration (until June 25th, 20251) €590 €690
No-paper Late (from June 26th, 20251)/On Site Registration €690 €790
No-paper Student Registration (from June 26th, 20251) €250 €250
Extra Page Charge (for each page beyond 8 pages/paper) €60 €60

FOR AUTHORS:

All attendees at CITS 2025 should make the registration. To be published in the CITS 2025 Conference Proceedings and to be eligible for publication in IEEE Xplore, at least one author of an accepted paper is required to register for the conference at the FULL registration rate.

One FULL REGISTRATION allows the author to upload ONE paper (up to 8 pages) and the Non-refundable registration fees must be paid by June 26th, 2025.

CANCELLATION POLICY:

  • For Author Refunds: Authors who have registered their accepted paper are not eligible for refund if decided to withdraw their paper.
  • For Non-authors, from June 26th, 2025 onwards, there will be No Refund for cancellation.

1 Until/from 12am (midnight) EDT

2 IEEE members must keep updated their society memberships in EDAS.

How to register for CITS 2025

  1. Go to the CITS 2025 Registration at EDAS (sign in or, if you do not have an EDAS account, sign up)
    • Members of IEEE must keep updated their society membership in EDAS (check the "update your society memberships" link) in order to register with reduced charges
  2. Click "Icon" of Payment by Credit Cards or Bank Wire
  3. Enter necessary card details as well as VAT numbers or other details for your invoice; then click the button of "PAY"
    • For Bank Wire, it takes a while for the EDAS system to update your payment status (Important Reminder: please pay "All Bank's Charges If Any Are To Be Born" by yourself!)
  4. After successful payment (via credit card or bank wire), the official receipt will be available to be downloaded from EDAS. We don’t offer the manual/customized receipt.
  5. Any problem occurs in EDAS, please Click "Request help" (on the bottom line of the page) and EDAS staff will reply to you ASAP.

Organizing Committee đź”—

General Chairs

  1. Mohammad S. Obaidat,
    Univ. of Jordan, Jordan
  2. Pascal Lorenz, Univ. of Haute Alsace, France

Executive General Chair

  1. Kuei-Fang (Leila) Hsiao,
    Univ. of Texas-Permian Basin, USA

Senior Program Chair

  1. Petros Nicopolitidis,
    Aristotle Univ., Greece

Program Chairs

  1. Abdelhafid Abouaissa,
    Univ. of Haute Alsace, France
  2. Chi Lin,
    Dalian Univ. of Technology, China
  3. Mohammad Wazid,
    Graphic Era, India
  4. Khalid Mahmood,
    National Yunlin Univ. of Science & Technology, Taiwan

Publication Chair

  1. Yu Guo,
    Univ. of Science and Technology Beijing, China

Tutorials and Special Sessions Chair

  1. Jose Luis Sevillano,
    Univ. of Seville, Spain

Local Arrangement Chairs

  1. Marc Gilg,
    Univ. of Haute Alsace
  2. Abdelhafid Abouaissa,
    Univ. of Haute Alsace
  3. Ismail Bennis,
    Univ. of Haute Alsace

Publicity Chairs

  1. Nitin Gupta,
    National Institute of Technology, Hamirpur, India
  2. Eirini Eleni Tsiropoulou,
    Arizona State Univ., USA
  3. Ismail Bennis,
    Univ. of Haute Alsace
  4. Seungmin (Charlie) Rho,
    Sungkyul Univ., Korea
  5. Pankaj Pal,
    Univ. of Missouri Columbia, USA

International Liaisons

  1. Sang-Soo (Martin) Yeo,
    Mokwon Univ., Korea
  2. Balqies Sadoun,
    Univ. of Sharjah, UAE
  3. Helen Karatza,
    Aristotle Univ., Greece
  4. Pankaj Kumar,
    Central Univ. of Himachal Pradesh, India
  5. Aparna Kumari,
    Nirma Univ., India

Registration Chair

  1. Kuei-Fang (Leila) Hsiao,
    Univ. of Texas, USA

Finance Chairs

  1. Kasim Al-Aubidy,
    Philadelphia Univ., Jordan
  2. Kuei-Fang (Leila) Hsiao,
    Univ. of Texas, USA

Webmaster

  1. Antonio Bueno,
    Univ. of Colmar, France

Steering Committee đź”—

  • Franco Davoli, Univ. of Genoa, Italy
  • Pascal Lorenz, Univ. of Haute Alsace, France
  • Mohammad S. Obaidat, Univ. of Texas, USA & Univ. of Jordan, Jordan (Chair)
  • Jose L. Sevillano, Univ. of Seville, Spain
  • George A. Tsihrintzis, Univ. of Piraeus, Greece
  • Laurence T. Yang, St. Francis Xavier Univ., Canada

Program Committee (tentative)đź”—

  • Hamid Arabnia, Univ. of Georgia, USA
  • Jalel Ben-Othman, Univ. Sorbonne Paris Nord, France
  • Luca Caviglione, National Research Council (CNR), Italy
  • Ashok Kumar Das, IIIT, Hyderabad, India
  • Franco Davoli, Univ. of Genoa, Italy
  • Stefano Giordano, Univ. of Pisa, Italy
  • Fabrizio Granelli, Univ. of Trento, Italy
  • Konstantinos Kantelis, Aristotle Univ. of Thessaloniki, Greece
  • Helen Karatza, Aristotle Univ. of Thessaloniki, Greece
  • Georgios Keramidas, Aristotle Univ. of Thessaloniki, Greece
  • Aparna Kumari, Nirma Univ., India
  • Pascal Lorenz, Univ. of Haute Alsace, France
  • Jingxiao Ma, Tongji Univ., China
  • Zhaolong Ning, Chongqing Univ. of Posts and Telecommunications, China
  • Farid Nait-Abdesselam, Univ.Ă© Paris CitĂ©, France
  • Pankaj Pal, Univ. of Missouri, India
  • Jun Peng, UTRGV - Edinburg, TX, USA
  • Sophia Petridou, Univ. of Macedonia, Greece
  • Joel Rodrigues, Senac Fac of Ceará, Brazil
  • Angel-Antonio San-Blas, Univ. of Elche, Spain
  • Rashmi Priya Sharma, Univ. of Missouri Columbia, USA
  • Georgios Stavrinides, KIOS CoE, Univ. of Cyprus, Cyprus
  • Sudeep Tanwar, Nirma Univ., India
  • Eleftherios Tiakas, International Hellenic Univ., Greece
  • Demosthenes Vouyioukas, Univ. of the Aegean, Greece
  • Gang Wang, MaxLinear Inc., USA
  • Pengfei Wang, Dalian Univ. of Technology, China
  • Bernd E. Wolfinger, Univ. of Hamburg, Germany
  • Laurence T. Yang, St. Francis Xavier Univ., Canada ,
  • Sherali Zeadally, Univ. of Kentucky, USA
  • Xinyu Zhang, Northwestern Polytechnical Univ., China

Keynote Speakers đź”—

Resource Allocation and Scheduling in the Mist-Fog-Cloud Continuum

Bio

Photo of Helen Karatza

Helen Karatza (senior member of IEEE, ACM, SCS) is a Professor Emeritus in the Department of Informatics at the Aristotle University of Thessaloniki, Greece. Dr. Karatza's research interests include cloud, fog and mist computing, energy efficiency, fault tolerance, resource allocation, scheduling algorithms and real-time distributed systems. Dr. Karatza has authored or co-authored over 260 technical papers and book chapters including seven papers that earned best paper awards at international conferences. She served as an elected member of the Board of Directors at Large of the Society for Modeling and Simulation International. She served as chair and keynote speaker in international conferences. Dr. Karatza is Senior Associate Editor of the Elsevier journal “Simulation Modelling Practice and Theory”, an Editor of “Future Generation Computer Systems” of Elsevier, an Associate Editor of IEEE Transactions on Services Computing and an Editorial Board member of Cluster Computing of Springer. She was Editor-in-Chief of the Elsevier journal “Simulation Modelling Practice and Theory”, Editor-in-Chief of “Simulation Transactions of The Society for Modeling and Simulation International”, Associate Editor of “ACM Transactions on Modeling and Computer Simulation” and Senior Associate Editor of the “Journal of Systems and Software” of Elsevier. She served as Guest Editor of multiple Special Issues in international journals. More info about her activities and publications can be found at: https://karatza.webpages.auth.gr/

Abstract

The rapid growth of Internet of Things (IoT) applications has exposed the limitations of traditional cloud computing in managing the vast volumes of data generated by IoT devices and sensors. To address this issue, Fog and Mist computing models have emerged to reduce transmission latency. Fog computing extends cloud capabilities to the network edge, bringing computational resources closer to data sources, thus meeting the strict low-latency requirements. Mist computing, a variation of fog computing, further minimizes latency by placing computational resources even closer to the IoT layer. Due to the inherently time-dependent nature of most IoT applications and their stringent deadline constraints, the implementation of efficient scheduling algorithms is crucial for ensuring the timely execution of tasks and optimizing performance within the mist-fog-cloud continuum. This talk will delve into advanced strategies for tackling the challenges associated with resource allocation and task scheduling in real-time IoT applications across cloud, fog, and mist computing environments, while also exploring emerging trends in this field.

Federated Unlearning and Its Applications

Bio

Photo of Pengfei Wang

Pengfei Wang is currently a tenured Associate Professor at the School of Computer Science and Technology, Dalian University of Technology (DUT), China. He has authored over 70 papers published in top-tier journals and conferences, including TMC, TON, JSAC, TSC, TWC, TITS, TOSN, TNNLS, INFOCOM, and IJCAI. His research focuses on distributed artificial intelligence, federated unlearning, and the Internet of Things (IoT). He is a member of IEEE and ACM, and senior member of CCF. He joined the Dalian University of Technology after receiving a Ph.D. in Software Engineering from Northeastern University, Shenyang, China. From 2016 to 2018, he was a visiting Ph.D. student in Networks Group at Northwestern University, Evanston, IL.

Abstract

Federated Unlearning Technology is a key development in the field of federated learning. Its main goal is to remove the influence of a specific user's data from a trained model without retraining it from scratch. This supports data privacy and complies with regulations such as the "right to be forgotten." While current federated unlearning methods often assume cooperative users and controlled environments, real-world deployments are far more complex. They may involve uncooperative participants, adversarial behaviors, or simultaneous unlearning requests from multiple users—challenges that are insufficiently addressed in existing literature. I will begin with a brief introduction to federated unlearning, followed by an explanation of algorithms designed for real-world scenarios. I will also discuss practical applications of federated unlearning. Related work has been published in top-tier journals and conferences, including IEEE Transactions on Mobile Computing (TMC), IEEE Journal on Selected Areas in Communications (JSAC), and IEEE Transactions on Services Computing (TSC), and etc.

Robust and Secure Authenticated Solutions for Contemporary and Critical Infrastructures

Bio

Photo of Khalid Mahmood

Dr. Khalid Mahmood is an accomplished academic and researcher specializing in cybersecurity, cryptographic protocols, and secure communication systems. Currently serving as an Assistant Professor in the Future College at the National Yunlin University of Science and Technology in Taiwan, Dr. Mahmood brings over a decade of experience in both academia and industry, with a strong focus on developing secure, innovative solutions for critical infrastructure systems, such as IoT, smart grids, and healthcare networks.

Abstract

As digital transformation accelerates across industries, the need for robust and secure authenticated solutions becomes paramount—especially for contemporary and critical infrastructures such as IoT ecosystems, healthcare systems, and smart grids. In this keynote, Dr. Khalid Mahmood will explore the latest advances in designing lightweight, scalable authentication protocols and secure communication frameworks tailored to the needs of these complex environments. Highlighting real-world threat scenarios, including ransomware, APTs, and IoT-targeted attacks, the talk will delve into the application of cryptographic techniques, AI-powered anomaly detection, and blockchain-based security models that ensure both resilience and responsiveness. Attendees will gain insight into emerging trends, common vulnerabilities, and practical strategies for protecting next-generation digital infrastructure. Through case studies and recent research, this session aims to equip participants with actionable knowledge to enhance security posture and operational continuity in an increasingly interconnected world.

Geo-Distributed Microservice Execution: Opportunities and Challenges

Bio

Photo of Habib Mostafaei

Habib Mostafaei received the Ph.D. degree in computer science and engineering from Roma Tre University, Italy, in 2019. From 2009 to 2015, he was a full-time Faculty Member at the Computer Engineering Department, Azad University. He is currently an Assistant Professor of computer science at Eindhoven University of Technology. Before, he was a Post-Doctoral Researcher at Technical University Berlin (TU Berlin), Germany, where he was involved in the BIFOLD-BBDC project from 2019 to 2022. He has been actively involved in the research community as a member of the Technical Program Committee (TPC) for several prestigious international conferences and also serves on the Editorial Board of various journals. His current research focuses on networked systems, network management, and distributed systems, and is funded by EU ChipsJU and Intel.

Abstract

Microservice architectures and service meshes have become foundational to modern cloud-native systems, yet they now face unprecedented demands for scalability, resilience, and responsiveness. As applications grow increasingly global, service providers are moving beyond single-region deployments, pushing microservices closer to users across the globe through multi-cluster service mesh environments. This evolution promises dramatic performance gains—but also introduces complex challenges, from inter-cluster latency to the need for intelligent, dynamic coordination across replicas.

In this talk, I will present our innovative adaptive, latency-aware load-balancing mechanism that paves the way for the multi-cluster service meshes. Beyond this mechanism, we will explore a broader landscape of emerging technologies and approaches that pave the way toward fully autonomous, geo-distributed microservice platforms—systems capable of making real-time decisions to meet application-level goals, minimize latency, and ensure dependable performance at planetary scale.

Beyond the Algorithm: Symbolic Reasoning and Programmable Matter for the Next Generation of Intelligent Systems

Bio

Photo of Jaafar Gaber

Jaafar Gaber received his Ph.D. degree in 1998 from University of Lille I, France in Computer Science and engineering. He is currently researcher at the FEMTO-ST institute (UMR CNRS 6174) and associate Professor HDR of computer science and computer engineering at Université Marie et Louis Pasteur-UTBM, France. Prior to joining UTBM, he was a research scientist at CSI Institute at George Mason University in Fairfax, Virginia, USA. His research interests include modern distributed systems, high-performance computing, reconfigurable computing, AI and programmable matter. He has served as an external expert for research and technology evaluation outside the EU or as an expert for different EU calls and actions. His research has been frequently supported by European grants within EU FP6, EU FP7, EU EACEA agency, and industry. He is a member of the IEEE and ACM.

Abstract

As computing moves beyond traditional algorithmic boundaries, new paradigms are emerging that integrate logic, structure, and physical embodiment. This keynote explores the convergence between symbolic reasoning and programmable matter as a foundation for the next generation of secure and intelligent systems. We discuss how combining interpretable AI with reconfigurable substrates, such as modular robotics, shape memory alloys, and adaptive materials, can enable systems capable of autonomous reconfiguration, embodied decision-making, and explainable behavior. By bridging computation and physical transformation, this talk offers a vision for systems that are not only smart in code, but also intelligent in form. This keynote explores how symbolic reasoning, and programmable matter can jointly support the next generation of intelligent systems. By bridging logic-based AI with reconfigurable physical substrates, we envision secure, adaptive, and explainable architectures. Examples include modular robotics and shape memory materials enabling embodied intelligence.

Heterogeneous Real-Time & Secure Networks: Integrating Ethernet, WiFi, and Campus-B5G Networks

Bio

Photo of Axel Sikora

Dr. Axel Sikora is an associate professor at Offenburg University, Germany, where he serves as Scientific Director of the Institute of Reliable Embedded Systems and Communication Electronics, a leading R&D institute for IIoT connectivity solutions. He is also deputy director of Hahn-Schickard Association of Applied Research, where he manages the division “Software Solutions”, including several research groups around AI.

Dr. Sikora is also engaging in several standardization activities around secure and efficient IIoT connectivity. Since many years, he is serving as chairman of the embedded world Conference, the world's largest event on the topic. In parallel, he is engaged in some deep-tech spinoff companies.

Abstract

In these days, industrial communication comes with manifold requirements: (1) the different wired and wireless network types need to be much more integrated and managed in a unified way, (2) they need to be real-time, i.e. following the vendor independant Time-Sensitive Networking (TSN) approach, and (3) they must be secure, i.e. following the state-of-the-art technologies, like Transport Layer Security (TLS) protocols. A lot of research is currently executed on these three directions. However, the real challenge begins, if all these objectives have to be followed in a combined approach.

The keynote presentation gives an overview on the current state of the art and discusses open research questions. In addition, it discusses the trade-off between the different objectives and presents some approaches to combine the different research directions.

Topics of Interest đź”—

Track I: Computer Systems

  • Cloud computing
  • Cloud management
  • Cloud services
  • Computer architectures
  • Computer hardware technology
  • Computer-aided designs and technology
  • Display technology
  • Digital circuits, systems and logic design
  • Embedded systems
  • Evolutionary algorithms and computing
  • Fuzzy systems and fuzzy logic
  • Green computing
  • Grid computing and architectures
  • Hardware and software co-design
  • High-performance computing
  • Input/Output systems
  • Low-power computer technology
  • Memory systems
  • Mobile computing
  • Modeling and simulation
  • Object Oriented Languages
  • Operating system and middleware for mobile computing and networking
  • Performance evaluation
  • Pervasive computing
  • Real-time systems and simulations
  • Reconfigurable computing
  • System integration
  • Systems on chip (SoC)
  • Scientific computing algorithms
  • Soft computing
  • Software design, verification and validation
  • Software performance and engineering
  • Social networking and computing
  • VLSI design

Track II: Information Technology

  • Agents and multi-agents systems
  • Artificial intelligence and expert systems
  • Adaptive learning automata
  • Bioinformatics and biological computing and engineering
  • Database and data warehouses
  • Data mining
  • Future web
  • e-Government
  • e-Commerce
  • e-Health
  • e-Learning and adaptive learning
  • Geographical information systems (GIS)
  • Global positioning systems (GPS)
  • Human-computer interaction (HCI)
  • Network systems, proxies and servers
  • Neural networks
  • Protocols and standards
  • RF technology and control error correction
  • Signal and image processing
  • System engineering
  • Telematics
  • Web-Based Simulation Applications

Track III: Web Technologies

  • Accessibility issues and Technology
  • Data Fusion
  • Digital Libraries
  • Content transformation and adaptation in proxy server
  • Metadata and metamodeling
  • Multimedia
  • Ontology and semantic web
  • Personalized web sites/Web site classification and optimization
  • Portal strategies
  • Quality recommendation for software service provisioning
  • Service oriented architecture
  • System integration
  • User modeling
  • Usability and ergonomics
  • Web analytics
  • Web services and engineering
  • Web interfaces and applications
  • Web searching, browsing and ranking
  • Web information retrieval
  • Web intelligence
  • Web performance measurement, modeling and caching
  • XML and data management

Track IV: Networking Systems

  • Bio-inspired and nature-inspired solutions in wireless ad hoc and sensor networks
  • Broadband access technologies
  • Cognitive radio
  • Cross-layer design for mobile and wireless networks
  • Dynamic spectrum management
  • Disruption tolerant networks
  • Energy-efficient networks
  • Future Internet
  • Hybrid networks
  • Medium access control protocols
  • Network management
  • Network services and protocols
  • Optical networks
  • Opportunistic networks
  • Personal area networks
  • Performance-oriented design and evaluation focused on networks and mobile applications
  • Quality of service provisioning
  • Routing protocols
  • Sensor networks
  • Smart grids
  • Testbed design and implementation
  • Traffic Eng. & measurements
  • Under water networks
  • 60 GHz networking
  • Wireless networks

Track V: Telecommunication Systems

  • Adaptive communications
  • Channel estimation
  • Cognitive vehicular ad hoc networks
  • Cooperative communications
  • Channel coding
  • Interference management
  • Massive MIMO systems
  • Modulation techniques
  • MIMO systems
  • Novel applications enabled by telecommunication networking systems
  • OFDM communications
  • Power line communication
  • Satellite communication
  • Spread-spectrum communications
  • UWB communications
  • Wireless broadcasting
  • Wireless communication

Track VI: Security Systems

  • Authentication and access control
  • Biometrics systems
  • Computer and communication security
  • Cryptography and cryptanalysis
  • Digital watermarking, fingerprinting, and traitor tracing schemes
  • Detection analysis and prevention of malware
  • Denial of service issues
  • Intrusion detection systems
  • Information systems security
  • Keystroke dynamic systems
  • Multimedia security
  • Network security
  • Network systems forensics
  • Operating systems security
  • Program security
  • Physical security
  • Privacy enhancing technologies
  • Public-key infrastructure systems
  • Quantum cryptography
  • Security of e-Systems and applications
  • Security modeling, tools & simulation
  • Security of personal area networks
  • Security of WiFi and WiMax systems
  • Security of web systems
  • Secure PHY and MAC protocols
  • User & location privacy
  • Virtual Private Network systems
  • Vulnerability and Virus analysis
  • Vulnerability and attack modeling
  • Web security and privacy
  • Web-based application security

Location and Venue đź”—

CITS 2018 will take place in the Institut Universitaire de Technologie de Colmar (IUT), Universitè de Haute Alsace (left side of the map): 34, Grillenbreit Street, 68008 Colmar, France

Colmar is a lovely town in the eastern part of France, near the German and Swiss border. Capital of Alsatian wines, Colmar is also the birthplace of the sculptor Bartholi, who created the Statue of Liberty in New York. The old "quartier des Tanneurs" (Tanners district) and the fishmarket dating back to the 17th century, open onto what is known as the "Petite Venise" (Little Venice). These parts of the town are perfect illustrations of renovation in the typical Alsatian style. The city of Colmar has been working on its own Metropolitan Area Network (MAN) project, called OASICE, including LAN interconnection, PBX interconnection and interactive video.

Travel and Accommodation đź”—

Travel Information

By Train

Regular trains depart from Paris (Gare de l'Est station) to Colmar. Transfer time is about four hours (see https://www.sncf-connect.com/en-en/).

By Plane (I)

From Strasbourg airport (SXB) to Colmar (60 kms/40 miles)

Every 20 min, there is a train to Strasbourg railway station. Regular trains are departing from downtown Strasbourg station to Colmar. Transfer time is about 40 minutes.

Colmar is connected to the European motorway network and can also be easily reached by car from Strasbourg airport (A35).

By Plane (II)

From Basel-Mulhouse airport (BSL) to Colmar (60 kms/40 miles)

Every 20 min, there is a bus to Saint Louis railway station (see https://www.distribus.com/se-deplacer/horaires/ligne-11-saint-louis-gare-saint-louis-euroairport). Regular trains are departing from Saint Louis railway station to Colmar. Transfer time is about 40 minutes.

Accommodation Information

Conference attendees should contact the selected hotel directly in order to make reservation.

  1. Hotel Primo

    5 rue des AncĂŞtres 68008 Colmar
    hotel-primo.fr/en/

  2. Hotel Ibis

    10, rue Saint Eloi 68000 Colmar
    accorhotels.com/gb/hotel-1377-ibis-colmar-centre/index.shtml

  3. Hotel Mercure - Unterlinden

    15, rue Golbery 68008 Colmar
    accorhotels.com/gb/hotel-0978-mercure-colmar-centre-unterlinden/index.shtml

Attendees can also check the Tourism Office of Colmar and the Visit Alsace websites.

Promote CITS 2025 đź”—

Help to promote CITS 2025

Help us make CITS 2025 a success!

More attendees means better discussions and a richer experience for everyone.

  • Pass the word about CITS 2025 to your colleagues and friends and encourage them to participate or simply attend
  • Announce CITS 2025 through your contacts, mailing lists, blogs, newsgroups and online forums

Linking to the conference website

You can use the following code to link to us from your site:

<a href="https://cits.udg.edu/" title="2025 International Conference on Computer, Information and Telecommunication Systems - July 16-18, 2025, Colmar, France">CITS 2025</a>

CITS 2025

Mentioning CITS 2025 in social media

Please use "CITS2025" (one word) if you refer the conference (e.g. use the hashtag #CITS2025) and link to the main webpage: https://cits.udg.edu/

Thank you so much for your help!

Previous CITS Conferences đź”—