Abbrevation
PDCAT
City
Beijing
Country
China
Deadline Paper
Start Date
End Date
Abstract

We are inviting new and unpublished papers on, but not limited to, the following topics:<br>Track 1&#046; Networking and Architectures<br>&#8211; Interconnection networks<br>&#8211; Parallel/distributed architectures<br>&#8211; Heterogeneous and multimedia Systems<br>&#8211; ATM networks<br>&#8211; Reliability, and fault&#8211;tolerance<br>&#8211; Ubiquitous computing systems<br>&#8211; Computer networks<br>&#8211; Communication and telecommunication<br>&#8211; Wireless networks and mobile computing<br>&#8211; Optical networks<br>&#8211; Cloud/Grid computing systems<br>&#8211; Reconfigurable architecture<br>Track 2&#046; Software Systems and Technologies<br>&#8211; Formal methods and programming languages<br>&#8211; Internet computing<br>&#8211; Image processing and computer vision<br>&#8211; Agent technologies<br>&#8211; Operating systems<br>&#8211; Software tools and environments<br>&#8211; Parallelizing compilers<br>&#8211; Web services<br>&#8211; Component&#8211;based and OO Technology<br>&#8211; Simulation and Visualization<br>Track 3&#046; Algorithms and Applications<br>&#8211; Parallel/distributed algorithms<br>&#8211; Task mapping and job scheduling<br>&#8211; Distributed data and knowledge based systems<br>&#8211; Image processing and computer graphics<br>&#8211; High&#8211;performance scientific computing<br>&#8211; Reconfigurable high&#8211;performance computing<br>&#8211; Resource allocation and management<br>&#8211; Network routing and communication algorithms<br>&#8211; Bioinformatics<br>&#8211; Database applications and data mining<br>&#8211; Intelligent computing and neural networks<br>Track 4&#046; Security and Privacy<br>&#8211; Access control and authorization<br>&#8211; Authentication, biometrics, smartcards<br>&#8211; Distributed systems security<br>&#8211; Mobile code and mobile agent security<br>&#8211; RFID applications<br>&#8211; Privacy preserving computation<br>&#8211; Applied cryptography<br>&#8211; Database security<br>&#8211; Intrusion detection and survivability<br>&#8211; P2P &amp; ad hoc networks<br>&#8211; Cloud security<br>&#8211; Security protocols<br>