Conference Information
WPMC 2016: International Symposium on Wireless Personal Multimedia Communications
http://wpmc2016.org/
Submission Date:
2016-06-26
Notification Date:
2016-08-28
Conference Date:
2016-11-13
Location:
Shenzhen, China
Years:
19
CORE: c   Viewed: 12398   Tracked: 4   Attend: 1

Conference Location
Advertisment
Call For Papers
Prospective authors are invited to submit high-quality original technical papers reporting original research of theoretical or applied nature for presentation at the conference and publication in the WPMC 2016 Proceedings.

All papers for the WPMC 2016 Main Track should be submitted via EDAS using https://edas.info/newPaper.php?c=22389. Please also make sure to follow the Submission Guidelines.

Main Topics of interest include, but are not limited to:

Wireless Communications and PHY

    Advanced modulation schemes
    Cognitive radio
    Cooperative communications
    Information and coding theory
    Interference characterization
    MIMO/Massive MIMO channel models and channels
    Smart/ Reconfigurable antennas
    Ultra wideband, mmWave and sub-THz communications
    Visible Light Communications

Wireless Networks

    Ad-hoc networks
    Cognitive radio networks
    Cross-layer design
    Interference management
    IoT and M2M communications devices
    Localization for wireless networks
    Mobility, location and handoff management
    Multimedia QoS and traffic management
    Spectrum sharing and coexistence
    Vehicular networks
    Wireless multicast and streaming

Communications Services and Multimedia Applications

    Big data and data mining
    Cloud computing
    Emerging wireless and mobile applications
    Experimental trials and deployment
    Mobile multimedia services
    Mobile social networks
    QoS and QoE for multimedia applications
    Service oriented architectures
    User interfaces, user-machine interactions
    Wireless health applications

Security and Privacy in Communications

    PHY-layer Security
    Communication privacy and anonymity
    Network intrusion detection and prevention, firewalls, packet filters
    Malware, botnets and distributed denial of service
    Public key infrastructures, key management, credential management
    Secure routing, naming/addressing, network management
    Security and privacy in pervasive and ubiquitous computing, e.g., RFIDs
    Security and privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems
    Security and privacy in networks
    Security and privacy in applications
Last updated by Xin Yao in 2016-06-23
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
201120414973%
Related Conferences
Recommendation