ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

NCACNS 2013 - 2013 National Conference on Advances in Computing, Networking and Security

Date2013-12-23 - 2013-12-25

Deadline2013-10-15

VenueMaharashtra, India India

Keywords

Websitehttps://sites.google.com/site/ncacns13

Topics/Call fo Papers

The National Conference on Advances in Computing aims to provide a forum to disseminate, to all branches of industries, information on the most recent and relevant research, theories and practices in Networking and security, sensors and computations.
NCACNS ? 2013 invites papers on (but not limited to) the following topics:
Computing Track
Multi-core Architectures and Algorithms, GPU Programming, Parallel & Distributed Operating Systems, Agent-Based Systems, Models and Formal Verification, Compiler Technologies for High-Performance Computing, Autonomic Computing, Peer-to-peer Computing, Mobile and Ubiquitous Computing, Service-oriented Architecture, Networks Storage Systems, Data Mining, Databases technologies, , Social Network Analysis, Scalable Servers and Systems, High Performance/Scalable Storage Systems, Artificial Intelligence and Machine Learning, Simulation and Modelling, Incremental Compilers, Systems and Software Engineering, Quantum Computation and Quantum Communication, Reconfigurable Computing, Cloud, Cluster, Grid and P2P Computing, Digital Rights Management
Networking Track
Network Architectures and Protocols, Next-generation Communication Networks, Multi-modal Communications Networks, Methodologies for Network Management, Routing and Flow Control in LANs, WANs and PANs, Internet Technologies, Traffic Measurement, Analysis, Modelling and Visualization, Performance Evaluation, Quality of Service (QoS), Network Platforms and Virtualization, Sensor Nets and Embedded Systems, Implementation and Experimental Test-Beds, Collaborative networking, Modelling & Simulation of communication networks and Systems, Nano networking, Network applications
Security Track
Access Control, Applied Cryptography, Biometrics Security and Privacy, Critical Infrastructure Protection, Data Integrity, Data Protection, Database Security and Privacy, Digital Forensics, Digital Rights Management, Ethical and Legal Implications of Security and Privacy, Identity Management, Information Hiding, Information Systems Auditing, Insider Threats and Countermeasures, Intrusion Detection & Prevention, Security Policies, Peer-to-Peer Security, Personal Data Protection for Information Systems, Reliability and Dependability, Risk Assessment, Secure Software Development Methodologies, Security Deployment, Security Engineering, Security Metrics and Measurement, Security Protocols, Security requirements, Security Verification and Validation, Service and Systems Design and QoS Network Security, Software Security, Trust management and Reputation Systems, Wireless Network Security

Last modified: 2013-08-05 22:34:26