The International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT) is a major forum for scientists, engineers, and practitioners throughout the world to present the latest research, results, ideas, developments and applications in all areas of parallel and distributed computing. Following PDCAT’00 in Hong Kong, PDCAT’01 in Taipei, PDCAT’02 in Kanazawa, Japan, PDCAT’03 in Chengdu, China, PDCAT’04 in Singapore, PDCAT’05 in Dalian, China, PDCAT’06 in Taipei, Taiwan, PDCAT’07 in Adelaide, Australia, PDCAT’08 in Dunedin, New Zealand, PDCAT’09 in Hiroshima, Japan, PDCAT’10 in Wuhan, China, PDCAT’11 in Gwangju, Korea, PDCAT’12 in Beijing, China, PDCAT’13Taipei, Taiwan, PDCAT’15 in Jeju, Korea, PDCAT 2016 will take place in Guangzhou, China.
1.Networking and Architectures:
Interconnection networks
Parallel/distributed architectures
Heterogeneous and multimedia Systems
ATM networks
Reliability, and fault-tolerance
Ubiquitous computing systems
Computer networks
Communication and telecommunication
Wireless networks and mobile computing
Optical networks
Cloud/Grid computing systems
Reconfigurable architecture
2.Software Systems and Technologies:
Formal methods and programming languages
Internet computing
Image processing and computer vision
Agent technologies
Operating systems
Software tools and environments
Parallelizing compilers
Web services
Component-based and OO Technology
Simulation and Visualization
3. Algorithms and Applications:
Parallel/distributed algorithms
Task mapping and job scheduling
Distributed data and knowledge based systems
Image processing and computer graphics
High-performance scientific computing
Reconfigurable high-performance computing
Resource allocation and management
Network routing and communication algorithms Bioinformatics
Database applications and data mining
Intelligent computing and neural networks
4.Security and Privacy:
Access control and authorization
Authentication, biometrics, smartcards
Distributed systems security
Mobile code and mobile agent security
RFID applications
Privacy preserving computation
Applied cryptography
Database security
Intrusion detection and survivability
P2P & ad hoc networks
Cloud security
Security protocols
12月16日
2016
12月18日
2016
初稿截稿日期
终稿截稿日期
注册截止日期
留言