Abbrevation
PDCAT
City
Dunedin
Country
New Zealand
Deadline Paper
Start Date
End Date
Abstract

<P>The PDCAT08 Organizing Committee invites workshop/tutorial proposals for PDCAT08 to be held in Dunedin, New Zealand, in December 2008&#046;<BR></P> <P><B>Keywords:</B> 1&#046; Networking and Architectures<BR>1&#8211;01 Interconnection networks<BR>1&#8211;02 Parallel/distributed architectures<BR>1&#8211;03 Heterogeneous and multimedia Systems<BR>1&#8211;04 Multi&#8211;core related technologies<BR>1&#8211;05 Reliability, and fault&#8211;tolerance<BR>1&#8211;06 Ubiquitous computing systems<BR>1&#8211;07 Computer networks<BR>1&#8211;08 Communication and telecommunication<BR>1&#8211;09 Wireless networks and mobile<BR>1&#8211;10 Optical networks<BR>1&#8211;11 Grid computing systems<BR>1&#8211;12 Reconfigurable architecture<BR><BR>2&#046; Software Systems and Technologies<BR>2&#8211;01 Formal methods and programming languages<BR>2&#8211;02 Internet computing<BR>2&#8211;03 Image processing and computer vision<BR>2&#8211;04 Agent technologies<BR>2&#8211;05 Operating systems<BR>2&#8211;06 Software tools and environments<BR>2&#8211;07 Parallelizing compilers<BR>2&#8211;08 Web services<BR>2&#8211;09 Component&#8211;based and OO Technology<BR>2&#8211;10 Simulation and Visualization<BR><BR>3&#046; Algorithms and Applications<BR>3&#8211;01 Parallel/distributed algorithms<BR>3&#8211;02 Task mapping and job scheduling<BR>3&#8211;03 Distributed data and knowledge based systems<BR>3&#8211;04 Image processing and computer graphics<BR>3&#8211;05 High&#8211;performance scientific computing<BR>3&#8211;06 Reconfigurable high&#8211;performance computing<BR>3&#8211;07 Resource allocation and management<BR>3&#8211;08 Network routing and communication algorithms<BR>3&#8211;09 Bioinformatics<BR>3&#8211;10 Database applications and data mining<BR>3&#8211;11 Intelligent computing and neural networks<BR><BR>4&#046; Security and Privacy<BR>4&#8211;01 Access control and authorization<BR>4&#8211;02 Authentication, biometrics, smartcards<BR>4&#8211;03 Distributed systems security<BR>4&#8211;04 Mobile code and mobile agent security<BR>4&#8211;05 RFID applications<BR>4&#8211;06 Privacy preserving computation<BR>4&#8211;07 Applied cryptography<BR>4&#8211;08 Database security<BR>4&#8211;09 Intrusion detection and survivability<BR>4&#8211;10 P2P and ad&#8211;hoc networks<BR>4&#8211;11 Security protocols<BR></P>