ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CANDAR 2016 - Fourth International Symposium on Computing and Networking

Date2016-11-22 - 2016-11-25

Deadline2016-06-24

VenueHiroshima, Japan Japan

Keywords

Websitehttp://is-candar.org

Topics/Call fo Papers

Following the success of past ICNC conferences, 2010 in Hiroshima, 2011 in Osaka, and 2012 in Okinawa, and CANDAR symposiums 2013 in Matsuyama, 2014 in Shizuoka, 2015 in Sapporo, CANDAR 2016 will be held in Hiroshima, Japan. CANDAR 2016 will serve as a forum for exchanging the latest findings and experiences ranging from theoretical research to practical system development in all aspects of computing and networking including parallel and distributed systems, algorithms, architectures, and applications. In addition to technical sessions consisting of contributed papers, the symposium will include invited presentations, a poster session, tutorials, and workshops. We believe that participants will get new ideas and insight of computing and networking. CANDAR'16 will be held in Hiroshima, Japan, from November 22-25, 2016. Hiroshima has two world heritage sites, Itsukushima Shrine and Atomic Bomb Dorm. It is the best season to visit Itsukushima Shrine in November. The visitors can enjoy autumn leaves and autumn colors around the Shrine.
Publication
The symposium and workshop proceedings will be published by Conference Publishing Service and submitted to IEEE Xplore and CSDL digital libraries. Also they are submitted for indexing through INSPEC, EI (Compendex), Thomson ISI, and other indexing services.
http://www.computer.org/portal/web/cscps/home
Scope and Interests
The symposium invites papers on all aspects of parallel and distributed computing and networking, and their applications. Topics of interest include, but are not limited to:
Track1: Algorithms and Applications
Randomized algorithms and probabilistic methods
Scientific computing and numeric algorithms
Approximation and optimization algorithms
Image processing and computer graphics
Dependable computing and reliability
Data mining and information retrieval
Real-time systems and applications
Parallel and distributed algorithms
Intelligent systems and computing
Green computing and networking
Stochastic modeling and analysis
Software and system verification
Wired and wireless networking
Performance evaluation
Multicore and multithreaded computing
Scheduling and load balancing
Theoretical foundations for big data
Track 2:Architecture and Computer System
Processor architectures
Instruction, thread, and data-level parallelism
Multi/Many-core architectures
Power efficient architectures
Accelerators
Reconfigurable architectures
CUDA/GPGPU
Network-on-chip
Emerging devices and their effect
Embedded systems
Dependable systems
Parallel/High-performance systems
Application specific systems
Storage systems
Architectures/systems for emerging applications
Track 3: Networking and Grid
Interconnection networks
Ubiquitous computing systems
Grid computing systems
Resource allocation and management
Cloud computing
P2P networks
Content delivery networks
Wireless networks and mobile computing
Ad-hoc and sensor networks
Optical networks
Access control and authorization
Security protocols
Cognitive Computing and Networking
Opportunist Spectrum Allocation and Sensing
QoS and Multimedia Computing
Green Communications and Networking
Vehicle Communications
Network Architecture
Network Algorithms and Performance Evaluation
Future Internet and Internet of Things
Self-Organizing Networks
Track 4: Software and Middleware
Software System Architecture
Web Services and SOA
REST
Internet/Distributed Computing
Information Fusion
Middleware Architecture
Internet Middleware
Access Control Technologies
Information Filtering and Recommendation
Component based Technologies
Agent Technologies
BYOD Technologies
System Software
Programming Language Processors
Runtime Environment
Operating Systems
VM Technologies
Software Tools
Distributed Data and Knowledge based Systems
Geographic Information Systems
Simulation and Visualization
Track 5: Information and Communication Security
Authentication
Block and Stream Ciphers
Biometrics
Cryptanalysis
Cryptographic Protocols
Digital Signatures
Efficient Implementations
Hash Functions
Network Security
Privacy Enhancement
Public Key Cryptosystems
System Security
Inquiry
Please do not hesitate to write to organizer16-AT-is-candar.org

Last modified: 2016-03-05 12:44:04