cdc 2010 - the Fourth Conference on Dependable Computing
Topics/Call fo Papers
We cordially invite you to attend the Fourth Conference on Dependable Computing which will be hosted by the Fault Tolerant Committee of China Computer Federation is to be held in Yichang, China during November 20-22, 2010. This conference aims to provide a platform for worldwide researchers and engineers to exchange research experience,show the latest research results and promote the development of technology in the field of the Dependable Computing. We will invite many famous scholars at home and abroad to do invited academic reports and warmly welcome researchers in this field to contribute actively.
Conference papers will be published by TSI, and the papers' electronic version will be included in the IEEE Xplore database and retrieved by EI. We will select about 30 excellent papers and publish them in Intelligent Automation and Soft Computing Special Issue (SCI Source Journal).
The topics of the CDC include but are not limited to:
(1) Dependable Computing Theory: Dependable Computing Model, Dependable Root and Dependable Chain Transmission Theory, Credibility Measurement Theory, Dependable Management;
(2) Dependable Software: Security Code Design, Operating System Security, Database Security, Malware Protection, Embedded Software Security, Software Fault Tolerance;
(3) Dependable Computing Architecture: Dependable Computing Platform, Dependable Platform Module, Dependable Store, Virtual Machine, Security Chip, Embedded Security, Hardware Fault Tolerance;
(4) Safety Testing: Dependable Computing Systems and Components Testing, Safety Testing Theory and Model, Safety Testing Technology;
(5) Network and Communication Security: Network Security, Dependable Network Link, Dependable Network, Communication Network Security;
(6) Cryptography: Cryptography Theory, Cryptography Technology, Cryptographic Applications;
(7) Information Hiding: Digital Watermarking, Digital Rights Management;
(8) Application of Dependable Computing and Information Security:E-government Security, E-Commerce Security;
(9) Pattern Recognition:Neural Network,Kernel Method Model Selection,Feature Extraction and Selection,Integrated Learning,Unsupervised Learning,Manifold Learning;
(10) Agriculture Informatization:3S Thehnology,Remote Sensing Image Analysis.
(11) Image Processing:Image Enhancement,Image Segmentation, Content-based Image/Video Retrieval,Graphics and Visualization.
Requirement of Papers
1.Papers must be unpublished in any publications.
2.The submitted papers must be in English and normally do not exceed six pages.You can submit your papers by the contribution system of conference website http://cdc2010.ctgusec.com .
Conference papers will be published by TSI, and the papers' electronic version will be included in the IEEE Xplore database and retrieved by EI. We will select about 30 excellent papers and publish them in Intelligent Automation and Soft Computing Special Issue (SCI Source Journal).
The topics of the CDC include but are not limited to:
(1) Dependable Computing Theory: Dependable Computing Model, Dependable Root and Dependable Chain Transmission Theory, Credibility Measurement Theory, Dependable Management;
(2) Dependable Software: Security Code Design, Operating System Security, Database Security, Malware Protection, Embedded Software Security, Software Fault Tolerance;
(3) Dependable Computing Architecture: Dependable Computing Platform, Dependable Platform Module, Dependable Store, Virtual Machine, Security Chip, Embedded Security, Hardware Fault Tolerance;
(4) Safety Testing: Dependable Computing Systems and Components Testing, Safety Testing Theory and Model, Safety Testing Technology;
(5) Network and Communication Security: Network Security, Dependable Network Link, Dependable Network, Communication Network Security;
(6) Cryptography: Cryptography Theory, Cryptography Technology, Cryptographic Applications;
(7) Information Hiding: Digital Watermarking, Digital Rights Management;
(8) Application of Dependable Computing and Information Security:E-government Security, E-Commerce Security;
(9) Pattern Recognition:Neural Network,Kernel Method Model Selection,Feature Extraction and Selection,Integrated Learning,Unsupervised Learning,Manifold Learning;
(10) Agriculture Informatization:3S Thehnology,Remote Sensing Image Analysis.
(11) Image Processing:Image Enhancement,Image Segmentation, Content-based Image/Video Retrieval,Graphics and Visualization.
Requirement of Papers
1.Papers must be unpublished in any publications.
2.The submitted papers must be in English and normally do not exceed six pages.You can submit your papers by the contribution system of conference website http://cdc2010.ctgusec.com .
Other CFPs
- The 13th International Conference on Fracture ICF13
- デジタルTV放送方式の研究開発と海外展開 - 電子情報通信学会
- The 2011 International Conference on Telecom Technology and Applications (ICTTA 2011)
- The 5th International Conference on Cooperation and Promotion of Information Resources in Science and Technology
- Fray International Symposium
Last modified: 2010-06-15 19:32:28