Rabu, 28 Maret 2012

The 4th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery

CyberC 2012 Submission Due Day is extended to April 30, 2012. Please check the Workshops also.
· CyberC 2012: The 4th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
· IWSSN: The 1st International Workshop on Smart Sensor Networks
· CSP Workshop: The first International Workshop on Cyber Security and Privacy
· Cognitive Workshop: The second workshop on Cognitive-Inspired Networks, Systems and Applications
· E-Health Workshop: The 2nd International Workshop on Cyber Applications in Healthcare and Public Health Protection
Location: Sanya, China, October 10 - 12, 2012
Co-Sponsored by:
IEEE Computer Society (Technically Co-sponsored),
IEEE Technical Committee on Simulation,
IEEE CS Task Force on Networked Mobile Systems,
Beijing Jiaotong University, and
University of Louisville.
Patrons: AT&T, Huawei, InfoBeyond and Tech Mahindra
CyberC Facebook
CyberC Weibo
Important Days
Please check www.cyberc.org for latest days
CyberC 2012:The topics of interests include, but not limited to:
Data Mining and Information Discovery
Agent-based distributed data mining algorithms
Data streaming, multimedia, stream, or web mining
Information discovery in data mining
Data mining applications for bioinformations and biometrics
Database applications and data mining
Security and information assurance in data mining
Parallel and Distributed Computing
Parallel and distributed algorithms
Resource allocation, load-balance, and management in distributed computing
Grid and cluster computing
Clouding computing
SOA, Web services, and mobile services
Web-caching, content delivery systems and data distribution systems
Web services and internet computing
Distributed systems and applications, modeling language, and software engineering for distributed applications
Pervasive/ubiquitous computing and intelligence
Biological/molecular computing
Mobile and Internet Computing
Wireless ad hoc networks, wireless mesh networks, networking theory and algorithms
Wireless embedded sensor systems, body sensor, new sensing capabilities, and security
Cognitive radio and SDR
Future generation communications for 4G or beyond (WiMAX, LTE)
Peer-to-peer network computing and overlaying networks
Directional antenna and networking
FDMA/OFDMA modulations, synchronization, and power optimization
Mobile IP and Internet technology
Key, attacking models, privacy, confidentiality, and security in Mobile Wireless Networks
Communication, services, middleware, and multimedia on wireless networks
QoS, reliability, performance, and communication theory
Wireless network simulations, implementation, and applications
Cloud Computing
Autonomic, Real-Time and Self-Organizing Clouds
Architectural models for public and private cloud computing
Cloud resource management and allocation
Utility models and service pricing
New parallel / concurrent programming models for cloud computing
Scientific computation and other applications in the cloud
Workflows for cloud computing
Content Delivery Networks using Storage Clouds
Escience and Grid applications
Escience workflow management
Web semantics for Escience
Ontologies and databases for Escience
Data and process provenance
Performance and User Experience
Performance evaluation, measurement and optimization
Tools, test-bed, simulations, and experimental environments for user experience measurement
Collaborative and cooperative environments
Autonomic, reliability, and fault-tolerance
Authentication, trust, privacy and other security issues
QoS for improve user experience
IWSSN:The topics of interests include, but not limited to:
Actuation Methods
Bio-Inspired Computing
Cognitive Radio
Control Mechanisms
Cross-layer System Designs
Data Fusion
Detection, Estimation, and Tracking
Human-Sensor Interactions
Information Processing
Internet of Things
MAC Protocols
Multi-objective Optimization
Network Security
Network Topology
Performance Analysis
Quality of Service
• Reasoning and Inference
• Resource Management
• Routing and Clustering Algorithms
• Sensing and Sampling Techniques
• Sensor Selection
• Smart Grids
• Smart Home Applications
• Wireless Video Networks
CSP Workshop:The topics of interests include, but not limited to:
Cryptography and key algorithms
Security modeling and vulnerability analysis
Intrusion detection, traffic analysis and decision making of security
Information integrity, assurance, trustworthy, authentication, and access control
Distributed data storage and secure data management outsourcing (e.g., database as a service)
Protocol security and privacy policies
Distributed systems security
Embedded systems security and forensics
Network security and malware
Networking protocols and security trace back
Accountability and anonymity
Security architectures, policy, and regulatory
Hardware, application, and system security
Censorship and censorship-resistance
Language-based security
Privacy-preserving systems
Usability/energy/cost/efficiency of security in the network
Security protocols and strategies in clouds, sensor, cognitive, ad hoc, mesh, and satellite networks
Cognitive Workshop:The topics of interests include, but not limited to:
• Cognitive modeling and architecture
• Dynamic radio resource management / interference coordination
• Learning/training algorithms
• Distributed algorithms for spectrum detection and cooperative spectrum sensing/fusion
• Interoperability and coexisting of wireless networks
• Cross-layer design for cognitive networking
• Self-organized networks, cognitive MAC, multicast, and routing optimization
• Cooperative radio resource management, spectrum policy, standardizations
• Multi-antenna / multi-link transmission
• Wideband, cooperative, and compressed spectrum sensing
• OFDM/FFT/Modulation
• Directional antenna design and networks
• Coding theory/data fusion/data aggregation
• Asynchronous signal sensing
• Cognitive channel / interference modeling
• Hardware prototypes for cognitive radio
• LPD/LPI/resiliency/routing/data security
• Policy based cognitive radio control
• Dynamic systems and Bayesian modeling
• Machine & human behavior recognitions and network data analysis
• Cognitive computational modeling and theory
• Expert systems
E-Health Workshop:The topics of interests include, but not limited to:
• e-Health Systems for the Management of Infectious diseases
• e-Health Systems for Public Health
• e-Health Systems for Critical Care Management
• e-Health Decision Support Systems
• e-Health Management Dashboards
• e-Health Systems to improve Healthcare Quality and Patient Safety
• e-Health System Architectures
• e-Pharmacy Management Systems
• e-Health Portals
• Confidentiality and Data Security for e-Health
• Cloud Computing for e-Health Systems
• Scalable e-Health Applications & Technologies
• Mobile e-Health Systems
• Home e-Health Monitoring
• Remote monitoring, sensing, and messaging technologies for e-health
• Benefits of e-Health for developing world
• Collaborative Strategies and Techniques for e-Health
• Innovations in e-health systems integration, interoperability, and information exchange
• Clinical Data Management Systems
• Data Mining and Clinical Studies
• Social Networks in Healthcare contexts
• Intelligent Medical Systems
• RFID and localization techniques in medical environments
• Electronic health records and standards
• Online medical applications
• Pattern Recognition and Machine Learning for e-Health
• Wearable Health Informatics
Manuscript Guidelines
Paper Submission Web: http://edas.info/ by clicking on CyberC 2012 or workshop titles
Paper Submission Email: Papers@cyberc.org
Paper Acceptance
Manuscripts should present the current research in the areas identified in the call for papers. All submitted manuscripts will be reviewed by experts in the fields and will be judged from the aspects of problem significance, contributions, originality, correctness, technical strength, quality of presentation, and relevance to the conference attendees. Papers will be accepted with Regular Papers and Short Papers with maximal 8 pages and 4 pages in the final version respectively.
Publications
All accepted and presented papers, including the workshops’ papers, will be published by IEEE Computer Society-s Conference Publishing Services (CPS) and are included in the IEEE Xplore database. They will be further arranged for indexing through IEE INSPEC, EI (Compendex), and Thomson ISI. All outstanding papers will recommend to the International Journal of Cloud Computing (IJCC).

Tidak ada komentar:

Posting Komentar