Conference Information
CANDAR 2017 : International Symposium on Computing and Networking
http://is-candar.org/
Submission Date:
2017-07-22 Extended
Notification Date:
2017-09-01
Conference Date:
2017-11-19
Location:
Aomori, Japan
Years:
5
Viewed: 5953   Tracked: 2   Attend: 0

Conference Location
Advertisment
Call For Papers
Following the success of past ICNC conferences 2010 in Hiroshima, 2011 in Osaka, and 2012 in Okinawa, and CANDAR symposiums 2013 in Matsuyama, 2014 in Shizuoka, 2015 in Sapporo, 2016 in Hiroshima, CANDAR 2017 will be held in Aomori, Japan. CANDAR 2017 will serve as a forum for exchanging the latest findings and experiences ranging from theoretical research to practical system development in all aspects of computing and networking including parallel and distributed systems, algorithms, architectures, and applications. In addition to technical sessions consisting of contributed papers, the symposium will include invited presentations, a poster session, tutorials, and workshops. We believe that participants will get new ideas and insight of computing and networking. CANDAR'17 will be held in Aomori, Japan, from November 19-22, 2017.

Scope and Interests

The symposium invites papers on all aspects of parallel and distributed computing and networking, and their applications. Topics of interest include, but are not limited to:

Track1: Algorithms and Applications

    Randomized algorithms and probabilistic methods
    Scientific computing and numeric algorithms
    Approximation and optimization algorithms
    Image processing and computer graphics
    Dependable computing and reliability
    Data mining and information retrieval
    Real-time systems and applications
    Parallel and distributed algorithms
    Intelligent systems and computing
    Green computing and networking
    Stochastic modeling and analysis
    Software and system verification
    Wired and wireless networking
    Performance evaluation
    Multicore and multithreaded computing
    Scheduling and load balancing
    Theoretical foundations for big data

Track 2:Architecture and Computer System

    Processor architectures
    Instruction, thread, and data-level parallelism
    Multi/Many-core architectures
    Power efficient architectures
    Accelerators
    Reconfigurable architectures
    CUDA/GPGPU
    Network-on-chip
    Emerging devices and their effect
    Embedded systems
    Dependable systems
    Parallel/High-performance systems
    Application specific systems
    Storage systems
    Architectures/systems for emerging applications

Track 3: Networking and Grid

    Interconnection networks
    Ubiquitous computing systems
    Grid computing systems
    Resource allocation and management
    Cloud computing
    P2P networks
    Content delivery networks
    Wireless networks and mobile computing
    Ad-hoc and sensor networks
    Optical networks
    Access control and authorization
    Security protocols
    Cognitive Computing and Networking
    Opportunist Spectrum Allocation and Sensing
    QoS and Multimedia Computing
    Green Communications and Networking
    Vehicle Communications
    Network Architecture
    Network Algorithms and Performance Evaluation
    Future Internet and Internet of Things
    Self-Organizing Networks

Track 4: Software and Middleware

    Software System Architecture
    Web Services and SOA
    REST
    Internet/Distributed Computing
    Information Fusion
    Middleware Architecture
    Internet Middleware
    Access Control Technologies
    Information Filtering and Recommendation
    Component based Technologies
    Agent Technologies
    BYOD Technologies
    System Software
    Programming Language Processors
    Runtime Environment
    Operating Systems
    VM Technologies
    Software Tools
    Distributed Data and Knowledge based Systems
    Geographic Information Systems
    Simulation and Visualization

Track 5: Information and Communication Security

    Authentication
    Block and Stream Ciphers
    Biometrics
    Cryptanalysis
    Cryptographic Protocols
    Digital Signatures
    Efficient Implementations
    Hash Functions
    Network Security
    Privacy Enhancement
    Public Key Cryptosystems
    System Security
Last updated by Dou Sun in 2017-07-08
Related Publications
Advertisment
Related Conferences
Recommendation