QQ登录

只需要一步,快速开始

 注册地址  找回密码
查看: 6472|回复: 0
打印 上一主题 下一主题

[其他资源] call for paper

[复制链接]
字体大小: 正常 放大
hustepic        

2

主题

7

听众

10

积分

升级  5.26%

  • TA的每日心情
    奋斗
    2013-8-20 15:23
  • 签到天数: 1 天

    [LV.1]初来乍到

    自我介绍
    希望能和大家多多学习,多多交流。
    跳转到指定楼层
    1#
    发表于 2013-3-21 14:50 |只看该作者 |倒序浏览
    |招呼Ta 关注Ta
    本帖最后由 hustepic 于 2013-3-21 14:54 编辑
    , G3 k& N5 L  v; V6 F9 |; i& D  u& D" w8 y" J# _. U, `  a0 c
    Call for Paper
    8 L4 B( y7 f4 p" s
    # {: \9 T5 K$ ]  H. x/ rCyberC 2013: The 5th International Conference on Cyber-EnabledDistributed Computing and Knowledge Discovery
    . i! u5 V7 C* s+ w  yBeijing, China, October 10 - 12, 20136 W$ Q! t9 G& ?4 r) h; O
    CyberC isco-sponsored by:
    ( J4 ]# `: ]8 M4 U6 X& y  p0 Y' \5 O/ r+ b  {6 K% V8 z
    , P6 A: A" h' A2 n
    IEEE     Computer Society (Technically Co-Sponsored)% p3 ]4 E, t' Y: Y( D
    IEEE     Technical Committee on Simulation/ U+ M3 N, l" y
    IEEE     CS Task Force on Networked Mobile Systems+ j' s' ?" j; K
    Beijing     Jiaotong University, China8 p6 Q4 B3 w' \/ H3 _8 z
    University     of Louisville, USA2 L3 b, ~$ r) U# M8 d
    Embedded     Pervasive Computing Lab, HUST, China
    , h& T( u- y# c: E# P; l4 {5 v3 I* ]& ]
    Sponsors:2 @, k/ A4 z+ J+ Q6 Y/ a( N

    * f) ~1 N- M4 D# Y4 ^4 RAT&T, USA,
    ( @* Q9 U* T, t' y" I! b4 OTeradata, USA,& Z5 e, i- s: y
    InfoBeyond, USA,     $ e: `0 S# W+ w/ K, |) ~0 w/ f
    Comrise, USA,: w% N1 ?4 {+ i
    Huawei, China,
    3 P! i4 C9 d! o* tRainstor, USA* o  _5 ~, x& @: _9 A

    ' t4 x  d/ Y/ N9 Y' e7 UCyberC promotes research and development ofthe cyber-related technology and it is unique and significant that spansthrough cyber-enabled data mining and knowledge discovery, distributed andparallel computing, cyber security, cloud computing, pervasive computing,mobile computing, Internet, wireless networks, cognitive systems, cyberinformation process, information discovery, e-health via cyber network,e-science, web technology, and network performance and tools. The research anddevelopment in these areas have received extensive attention in both theacademia and industry to provide ubiquitous services for users. Varioushardware and software designs, algorithms, protocols, simulations, andtest-bed, and implementations are developed for distributed computing in aninterconnected and distributed network environment. The purpose of CyberC is toprovide a forum for presentation and discussion of innovative ideas, researchresults, applications and experience from around the world as well as highlightactivities in the related areas.  1 p) _" c/ N% r2 Q' s. w+ c9 ]# J

    4 [* O. w: A. M+ K4 V5 ECyberC 2013 (The fifthCyberC) continues the aim to provide a forum for presentation and discussion ofinnovative ideas, research results, applications, and experience from aroundthe world as well as highlight activities in the related areas. The conferencefocuses on all aspects of distributed computing and knowledge mining and theirscientific, engineering, and commercial applications. The topics of interestsinclude, but not limited to:7 t# T5 A; i# t. h; S# Y
    Data Mining and Information Discovery9 Z2 Y8 J9 g5 K% a) e
    Agent-baseddistributed data mining algorithms5 n# M" ]5 q/ a& O
    Datastreaming, multimedia, stream, or web mining
    : r7 e' ?. {$ S6 w' j/ uInformationdiscovery in data mining: g% L" j6 V! `+ _2 S- j
    Datamining applications for bioinformations and biometrics
    8 {4 c( A" n: w# K/ L  h% G- u# ]Databaseapplications and data mining
    . k& E0 U9 f( p6 H( ySecurityand information assurance in data mining$ L) M- G1 ^: a# t2 F0 `6 T
    / e6 D+ R3 n, |- i" z
    Parallel and Distributed Computing
      s2 s* L( u0 u. b  fParalleland distributed algorithms
    4 `$ W; f& v, O5 p1 C6 ^Resourceallocation, load-balance, and management in distributed computing
    $ E+ h, R- l1 w. D+ R0 y5 D; xGrid andcluster computing
    ! }& A' \/ r2 T( t- Z+ aCloudingcomputing
    $ V+ m: o! x- f7 z; TSOA, Webservices, and mobile services
    4 ~: K: `; X5 ~4 v' h5 M" m4 z0 wWeb-caching,content delivery systems and data distribution systems
    % M; Q' p) S/ e; A: D8 tWebservices and internet computing8 w: O3 c$ J# e* @( p
    Distributedsystems and applications, modeling language, and software engineering for
    ! W1 i( K$ u9 n* s8 v6 s$ j* @distributedapplications                          $ {, Q4 W5 ]7 u
    Pervasive/ubiquitouscomputing and intelligence% n4 n6 N% l  C/ E  O$ _
    Biological/molecularcomputing% P, R$ w2 M: q3 e) f4 ~+ z
    ( O, T& ]1 ~' P7 I) F/ q
    Mobile andInternet Computing
    ' O% F0 `0 [+ z7 `9 T# s  aWirelessad hoc networks, wireless mesh networks, networking theory and algorithms# h. G3 B! h( b! a* o
    Wirelessembedded sensor systems, body sensor, new sensing capabilities, and security
    % F7 e1 b# X- Y  nCognitiveradio and SDR
    " G" _, ]* I5 o* U, ?) v: @Futuregeneration communications for 4G or beyond (WiMAX, LTE)
    . G1 M1 o* z+ C  dPeer-to-peernetwork computing and overlaying networks
    5 I+ |1 M9 W+ P0 [9 _+ sDirectionalantenna and networking
    " w% r1 z" N" P* zFDMA/OFDMAmodulations, synchronization, and power optimization
    ; _. V; D5 T0 |Mobile IPand Internet technology
    2 l8 `6 d! n1 c4 }9 q+ oKey,attacking models, privacy, confidentiality, and security in Mobile WirelessNetworks. t, {9 A& m, A6 |
    Communication,services, middleware, and multimedia on wireless networks
    ' P2 ^& E( H4 i. l8 ZQoS,reliability, performance, and communication theory$ Y% ?0 e# b' j# p* e$ [" t
    Wirelessnetwork simulations, implementation, and applications
    5 H; l: a3 m. \. K- W* u5 _4 e3 O
    Cloud Computing
      W2 N, B' b; E7 h5 H4 a* X  |Autonomic, Real-Time and Self-Organizing Clouds
    ( x) ~# g5 b. J8 ]Architectural models for public and privatecloud computing
    2 F: ~. b* q' D6 N) UCloud resource management and allocation" o7 |- b5 F& P
    Utility models and service pricing4 i, }; p( O: N- x6 P: O( g, f
    New parallel / concurrent programming modelsfor cloud computing+ p- _+ T9 v, o- d
    Scientific computation and other applicationsin the cloud
    ! k" ~# R2 C5 w+ B  t+ s2 WWorkflows for cloud computing
    3 q9 a+ h8 T. f- y) k! C: ]Content Delivery Networks using StorageClouds; \2 T. m& g" p
    Escience and Grid applications) t2 L4 ]; o' u) n: ~1 k# P
    Escience workflow management* w5 S4 w2 t0 B' H0 E% H
    Web semantics for Escience
    9 S3 L  @5 A3 a0 vOntologies and databases for Escience
    ; V* \9 H4 Y7 C9 X' h" Z3 EData and process provenance
    0 e9 L6 l# \6 _1 f1 O5 {4 X4 W6 F' K' A$ Y* q" A) F* c
    Performance and User Experience7 ^, m; o# z% S9 @( }
    Performanceevaluation, measurement and optimization
    # g) }; [* t5 x9 P' FTools,test-bed, simulations, and experimental environments for user experiencemeasurement$ r& T* }2 X* x6 V1 v+ j8 S. O
    Collaborativeand cooperative environments
    . Y# X3 B! N! m' a6 U" L. {1 NAutonomic,reliability, and fault-tolerance
    2 X$ L  n% _0 w4 `" G, K2 SAuthentication,trust, privacy and other security issues. N, E7 E( m! Y" u! B$ b
    QoS forimprove user experience
    7 N% N  a2 h, F, j; j! Q; Z% Z
    / ~7 O% @& c) KImportant Days" c5 N) A* Q& w0 H

    0 L+ @' O2 I4 h2 RMay 15, 2013 - Conference PaperSubmission Deadline, `7 y$ S# {* f- u4 ^
    June 15, 2013 - Notification ofAcceptance/Rejection & Registration Starts  _7 U& M( u* r* V  Z
    August 1, 2013 - Camera-Ready PaperSubmission Due & Registration Due
    & z3 ?; x7 E, ], C9 d/ Y$ P& I
    ) \1 z" k; V2 M( j: B/ ySubmitted manuscripts have to present the original unpublished research that isnot currently under review for any other conference or journal. Papers notfollowing these guidelines will be rejected without review and further actionmay be taken, including (but not limited to) notifications sent to the heads ofthe institutions of the authors and sponsors of the conference. Submissionsreceived after the due date, exceeding length limit, or not appropriately structuredmay also not be considered.+ F2 B1 \- W* d$ O1 J

    9 ^) Q# a  \- S
    & {; {& O; S. B4 iPaper Acceptance         " S& ~% j7 z* X# S/ y+ z' l+ Z6 I/ o
    Manuscripts shouldpresent the current research in the areas identified in the call for papers.All submitted manuscripts will be reviewed by experts in the fields and will bejudged from the aspects of problem significance, contributions, originality,correctness, technical strength, quality of presentation, and relevance to theconference attendees. Papers will be accepted with Regular Papers and Short Paperswith maximal 8 pages and 4 pages in the final version respectively.  
    8 J) l$ e& f  n- q
    6 z! O+ m- z# X" aPublications
    9 V; t8 ^7 i& M8 L# V0 V/ m4 LAll accepted and presented papers, including theworkshops’ papers, will be published by IEEE Computer Society's ConferencePublishing Services (CPS) and are included in the IEEE Xplore database. Theywill be further arranged for indexing through IEE INSPEC, EI (Compendex), andThomson ISI. Authors of accepted papers, or at least one of them, shouldregister and present their work at the conference, otherwise their papers willbe removed from the digital libraries of IEEE Xplore and EI after theconference.
    # O2 A  A  E+ a1 r/ u6 n& z
    * K1 d9 y# m' N7 q6 L/ M6 k

    call for paper.jpg (253.15 KB, 下载次数: 76)

    论文投稿

    论文投稿

    zan
    转播转播0 分享淘帖0 分享分享1 收藏收藏0 支持支持0 反对反对0 微信微信
    您需要登录后才可以回帖 登录 | 注册地址

    qq
    收缩
    • 电话咨询

    • 04714969085
    fastpost

    关于我们| 联系我们| 诚征英才| 对外合作| 产品服务| QQ

    手机版|Archiver| |繁體中文 手机客户端  

    蒙公网安备 15010502000194号

    Powered by Discuz! X2.5   © 2001-2013 数学建模网-数学中国 ( 蒙ICP备14002410号-3 蒙BBS备-0002号 )     论坛法律顾问:王兆丰

    GMT+8, 2026-4-14 14:59 , Processed in 0.428386 second(s), 64 queries .

    回顶部