本帖最后由 hustepic 于 2013-3-21 14:54 编辑 ; w% ?0 n! [/ K( _, F) N$ x0 Q# l0 a5 V4 N4 f
Call for Paper ) Z- M. E& @- y+ i' D" q+ e* F % ~+ i2 y6 k6 M3 A$ DCyberC 2013: The 5th International Conference on Cyber-EnabledDistributed Computing and Knowledge Discovery+ Y3 R7 S, I; U# K: r8 `
Beijing, China, October 10 - 12, 2013; q1 ?. C2 ]! R& D1 _6 V, d7 ` R
CyberC isco-sponsored by:9 A9 z7 v! a% ^' i& t5 K$ n
3 ? w2 M) P) k: Q2 W& n2 u 2 j. _& o& K: \7 i4 Q* AIEEE Computer Society (Technically Co-Sponsored) 4 U3 R" B8 [( ^, XIEEE Technical Committee on Simulation9 o( R$ N7 ? s5 W( a# \
IEEE CS Task Force on Networked Mobile Systems# K* R& W2 `8 \( E5 q- C( s# r4 i% ^
Beijing Jiaotong University, China + o$ e# t" B3 L- C! O) A4 cUniversity of Louisville, USA 3 f% G9 K% a) _1 b; `Embedded Pervasive Computing Lab, HUST, China 5 o8 f+ s# O- y: J: c: { 7 m* D/ K) [# ISponsors:! K1 @! @9 }! Z+ T* I
7 L1 ^! B; ^# z% X/ p
AT&T, USA,# B( W* C1 h3 ]" L
Teradata, USA,! o7 W% n# r0 U* o, N
InfoBeyond, USA, & b8 q" x+ o* z/ ^: Y7 B6 }# f
Comrise, USA,' I6 ^. \. P! n, X
Huawei, China, ! L. d, u/ X7 i) D9 G# CRainstor, USA) ]! _3 }( ?. `& \( _) w7 t4 p+ _
% l3 C! b4 Z* ]/ r# g3 k' X7 h- RCyberC promotes research and development ofthe cyber-related technology and it is unique and significant that spansthrough cyber-enabled data mining and knowledge discovery, distributed andparallel computing, cyber security, cloud computing, pervasive computing,mobile computing, Internet, wireless networks, cognitive systems, cyberinformation process, information discovery, e-health via cyber network,e-science, web technology, and network performance and tools. The research anddevelopment in these areas have received extensive attention in both theacademia and industry to provide ubiquitous services for users. Varioushardware and software designs, algorithms, protocols, simulations, andtest-bed, and implementations are developed for distributed computing in aninterconnected and distributed network environment. The purpose of CyberC is toprovide a forum for presentation and discussion of innovative ideas, researchresults, applications and experience from around the world as well as highlightactivities in the related areas. , d8 i0 i; x8 u- u( C0 j6 h! v0 {4 y7 L( N, M O1 s5 ~+ G
CyberC 2013 (The fifthCyberC) continues the aim to provide a forum for presentation and discussion ofinnovative ideas, research results, applications, and experience from aroundthe world as well as highlight activities in the related areas. The conferencefocuses on all aspects of distributed computing and knowledge mining and theirscientific, engineering, and commercial applications. The topics of interestsinclude, but not limited to:- z V9 _4 N+ V$ d8 G
Data Mining and Information Discovery9 f) b' z" ?2 [; E# e8 y
Agent-baseddistributed data mining algorithms3 J i; c: y' M$ s6 S8 }
Datastreaming, multimedia, stream, or web mining 2 }) E* P' j2 a: m# ^4 R$ N3 u2 CInformationdiscovery in data mining ; l7 V% j; o' F0 r1 Y/ i0 {, ]Datamining applications for bioinformations and biometrics : M: v0 r, W: g, e, fDatabaseapplications and data mining 2 l$ X8 x" I! GSecurityand information assurance in data mining + G( [6 N/ w% J3 o' X 4 V1 C# x' Z" u( V) x1 x8 AParallel and Distributed Computing & f7 X# \! s# b* u/ G) UParalleland distributed algorithms ; Y9 k9 |; `( f( b$ e9 u# k! NResourceallocation, load-balance, and management in distributed computing7 ~4 a" w( J, ^) d* m4 ]' e0 N
Grid andcluster computing 0 M' L8 v/ m2 z* t( oCloudingcomputing " @+ ?! T1 ?' |# z kSOA, Webservices, and mobile services ! I8 [. Y. t5 }; M+ zWeb-caching,content delivery systems and data distribution systems$ m/ [9 Y5 ^! F8 P- _* ?9 {
Webservices and internet computing' b3 e! h# v( m: M1 q
Distributedsystems and applications, modeling language, and software engineering for 2 K+ v, a& o4 r- R- T, ]/ pdistributedapplications , l2 Z2 I) L4 q! u2 JPervasive/ubiquitouscomputing and intelligence 6 R8 i( s8 X4 |- mBiological/molecularcomputing & H: M! w4 }- ^; ^ q4 o4 S$ s; {0 W7 X$ g. R
Mobile andInternet Computing$ T' d5 T9 R9 z3 l$ b( J, _
Wirelessad hoc networks, wireless mesh networks, networking theory and algorithms & ]$ T. e, C; T5 oWirelessembedded sensor systems, body sensor, new sensing capabilities, and security* y3 m: g4 \+ g
Cognitiveradio and SDR, X. w% Z1 [, \! R& [: u! @
Futuregeneration communications for 4G or beyond (WiMAX, LTE) + x4 v4 R: t- @/ c* [0 s7 R, MPeer-to-peernetwork computing and overlaying networks # d. ?+ f6 v0 e9 D, U( c2 F: a+ l4 T+ tDirectionalantenna and networking ) y) r8 T4 Z, aFDMA/OFDMAmodulations, synchronization, and power optimization+ F) k. j7 ^) U# Z" p% @ Y
Mobile IPand Internet technology & s- u' i" S& |; hKey,attacking models, privacy, confidentiality, and security in Mobile WirelessNetworks0 n8 i7 z0 M1 f. Z1 H5 d6 k: u
Communication,services, middleware, and multimedia on wireless networks 1 p' ?/ M0 Z# Y- QQoS,reliability, performance, and communication theory9 b9 w+ e; d9 Y" m% s
Wirelessnetwork simulations, implementation, and applications7 L( A: `8 s: i/ I: Z
8 T( ?- D4 m0 U6 O) C# a' l4 \
Cloud Computing 5 e5 I# g$ O( u, R0 a4 v* T' h" IAutonomic, Real-Time and Self-Organizing Clouds 4 {+ P- N; J! y3 L' F( [" `- \1 fArchitectural models for public and privatecloud computing/ ~, e; G/ | @, k
Cloud resource management and allocation 5 |" i, z3 C1 J8 I. y4 D$ L, O- r, rUtility models and service pricing. r: N0 j4 ^6 g+ u1 X' L
New parallel / concurrent programming modelsfor cloud computing ) [# ~. C) E6 k- U! [Scientific computation and other applicationsin the cloud1 d) {: ]# G- R z: n3 L* I4 r8 X+ X
Workflows for cloud computing ( P9 L( w" _3 y, T* bContent Delivery Networks using StorageClouds % V8 R0 R9 Y( D% V+ IEscience and Grid applications: A4 f6 T6 A7 v# f5 N5 I
Escience workflow management) j+ r. b+ b e* g) A
Web semantics for Escience1 x5 Y9 `9 y3 A# O5 p7 k
Ontologies and databases for Escience b% R( ]% e$ ^# [1 LData and process provenance" r+ w$ A% I0 _6 A$ X
5 w5 I9 h( X: i$ b/ G1 L' T- G( T
Performance and User Experience % j& L8 c$ U; z4 M% e$ v0 ~. HPerformanceevaluation, measurement and optimization& K% ?7 F% v% H
Tools,test-bed, simulations, and experimental environments for user experiencemeasurement& {+ s, v- v. u a9 J& C* u$ f
Collaborativeand cooperative environments 0 O; A: N9 H1 u9 t/ U6 ^3 ?) r8 VAutonomic,reliability, and fault-tolerance ! Z5 x% n$ U2 R+ L3 kAuthentication,trust, privacy and other security issues0 _9 v1 w: z5 r6 c3 A7 X' Q2 t
QoS forimprove user experience7 ]6 E( u d; ?/ h; Q2 C
+ \% L8 K( G* W) @" _% a& Z
Important Days- c! v5 x9 u2 y& z C
( @3 o0 s, M7 O5 bMay 15, 2013 - Conference PaperSubmission Deadline ( @2 K$ W) a- ~) }3 bJune 15, 2013 - Notification ofAcceptance/Rejection & Registration Starts# c" [6 l4 ^: A
August 1, 2013 - Camera-Ready PaperSubmission Due & Registration Due g8 c4 i8 ^1 z' F; e' }8 [7 F/ y, I7 h/ D% Z9 t
Submitted manuscripts have to present the original unpublished research that isnot currently under review for any other conference or journal. Papers notfollowing these guidelines will be rejected without review and further actionmay be taken, including (but not limited to) notifications sent to the heads ofthe institutions of the authors and sponsors of the conference. Submissionsreceived after the due date, exceeding length limit, or not appropriately structuredmay also not be considered.* U+ u' p" L7 n& j4 ~4 a; o
( l5 I$ \5 Z0 _6 d4 A
1 j3 D0 \7 w+ q+ P4 `8 k7 b) YPaper Acceptance , f0 n" E s/ c* U$ A+ a% |Manuscripts shouldpresent the current research in the areas identified in the call for papers.All submitted manuscripts will be reviewed by experts in the fields and will bejudged from the aspects of problem significance, contributions, originality,correctness, technical strength, quality of presentation, and relevance to theconference attendees. Papers will be accepted with Regular Papers and Short Paperswith maximal 8 pages and 4 pages in the final version respectively. . @, X$ \5 c. d2 U; B; t+ ]+ a 1 t% V. j* n( g# W7 Z6 gPublications # J, X- i9 a. R, s* @All accepted and presented papers, including theworkshops’ papers, will be published by IEEE Computer Society's ConferencePublishing Services (CPS) and are included in the IEEE Xplore database. Theywill be further arranged for indexing through IEE INSPEC, EI (Compendex), andThomson ISI. Authors of accepted papers, or at least one of them, shouldregister and present their work at the conference, otherwise their papers willbe removed from the digital libraries of IEEE Xplore and EI after theconference. 7 _6 x) P) n4 f# D# y. `! w# k2 |7 H" x3 X. x& s! F