ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ADCONS'13 2013 - ADCONS'13, NITK Surathkal 2nd International Conference on ADvanced COmputing, Networking and Security, December 15th - 17th, 2013

Date2013-12-15 - 2013-12-17

Deadline2013-07-31

VenueNITK Surathkal, MANG, India India

KeywordsSecurity Networking SOFTWARE

Websitehttp://www.adcons.nitk.ac.in/

Topics/Call fo Papers

The specific topic areas of interest include, but are not limited to the following:
Advanced Computing Track: Multi-core Architectures and Algorithms, GPU Programming, Parallel & Distributed Operating Systems, Parallel & Distributed Algorithms, Agent-Based Systems, Models and Formal Verification, Compiler Technologies for High-Performance Computing, Autonomic Computing, Peer-to-peer Computing, Mobile and Ubiquitous Computing, Grids, Clouds, Clusters, Service-oriented Architectures, Service-Oriented Computing, Networks Storage Systems, Evolutionary Methods, Image Processing, Speech Processing,Computer Vision, Pattern Recognition, Medical Imaging, Data Mining, Databases technologies, Data Management,Bioinformatics, Social Network Analysis, Scalable Servers and Systems, High Performance/Scalable Storage Systems.
Networking Track: Network and communication algorithms and protocols, Emerging Network Communications and Technologies, Network Control and Management, Network Performance, Analysis and Evaluation, Quality of Services (QoS), Emergency Services and Disaster Recovery of Networks and Applications, Adaptive Networking, Intelligent Networks , Wireless Networks, Sensor Networks, Ad Hoc Networks and Mesh Networks, Internetworking Protocols and Internet Applications, Network Reliability, Security and Privacy, Next Generation Network Architectures, Innovative Networking and Applications.
Security Track: Cryptography Information Security and Cyber Security, Security Protocols and Applications, Security Architectures, Models for computer security, Security and mobility, Privacy and Trust, Key management and key recovery, Security for mobile computing, Software and Systems Security, Web, E-commerce, M-commerce, and E-mail security, Network Security, Database security, Secure Mobile Agents and Mobile Code, Trusted computing, Information Hiding, Steganography, Watermarking, XML, Web Services and Cloud Security.
Software Engineering Track: Requirements engineering,Specification and verification, Configuration management and deployment, Software Development Paradigms and Processes,Software metrics, Empirical studies of software engineering,Knowledge-based software engineering,Mining Software Repositories, Patterns and frameworks , Processes and workflows, Program comprehension and visualization,Software quality Management,Software aging, Testing and analysis, Process mining, software model conformance, Process analysis/design/enhancement.

Last modified: 2013-07-20 23:36:35