Conference Information
WPMC 2016: International Symposium on Wireless Personal Multimedia Communications
Submission Date:
Notification Date:
Conference Date:
Shenzhen, China
CORE: c   Viewed: 17811   Tracked: 4   Attend: 1

Call For Papers
Prospective authors are invited to submit high-quality original technical papers reporting original research of theoretical or applied nature for presentation at the conference and publication in the WPMC 2016 Proceedings.

All papers for the WPMC 2016 Main Track should be submitted via EDAS using Please also make sure to follow the Submission Guidelines.

Main Topics of interest include, but are not limited to:

Wireless Communications and PHY

    Advanced modulation schemes
    Cognitive radio
    Cooperative communications
    Information and coding theory
    Interference characterization
    MIMO/Massive MIMO channel models and channels
    Smart/ Reconfigurable antennas
    Ultra wideband, mmWave and sub-THz communications
    Visible Light Communications

Wireless Networks

    Ad-hoc networks
    Cognitive radio networks
    Cross-layer design
    Interference management
    IoT and M2M communications devices
    Localization for wireless networks
    Mobility, location and handoff management
    Multimedia QoS and traffic management
    Spectrum sharing and coexistence
    Vehicular networks
    Wireless multicast and streaming

Communications Services and Multimedia Applications

    Big data and data mining
    Cloud computing
    Emerging wireless and mobile applications
    Experimental trials and deployment
    Mobile multimedia services
    Mobile social networks
    QoS and QoE for multimedia applications
    Service oriented architectures
    User interfaces, user-machine interactions
    Wireless health applications

Security and Privacy in Communications

    PHY-layer Security
    Communication privacy and anonymity
    Network intrusion detection and prevention, firewalls, packet filters
    Malware, botnets and distributed denial of service
    Public key infrastructures, key management, credential management
    Secure routing, naming/addressing, network management
    Security and privacy in pervasive and ubiquitous computing, e.g., RFIDs
    Security and privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems
    Security and privacy in networks
    Security and privacy in applications
Last updated by Xin Yao in 2016-06-23
Acceptance Ratio
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
SustainITIFIP Conference on Sustainable Internet and ICT for Sustainability2014-12-232015-02-272015-04-14
PAAMSInternational Conference on Practical Applications of Agents and Multi-Agent Systems2019-01-282019-03-112019-06-26
ICIMTInternational Conference on Information and Multimedia Technology2021-07-102021-07-302021-12-04
COMCOMSInternational Conference on Computer and Computing Science2015-09-252015-10-052015-10-22
cab1MobiquitousInternational Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services2023-07-152023-09-182023-11-14
ICISEInternational Conference on Information Science and Engineering2011-08-30 2011-09-29
ICACT'International Conference on Advanced Communication Technology2022-11-302022-12-102023-02-19
CSSSInternational Conference on Computer Science and Service System2014-04-30 2014-06-13
cChinaGridChinaGrid Annual Conference2013-04-212013-05-142013-08-22
AC4MInternational Conference on Mechanical Manufacturing, Modeling and Materials2015-01-092015-01-132015-01-10