Abbrevation
NCACNS
City
Nanded
Country
India
Deadline Paper
Start Date
End Date
Abstract

The National Conference on Advances in Computing aims to provide a forum to disseminate, to all branches of industries, information on the most recent and relevant research, theories and practices in Networking and security, sensors and computations&#046;<br>NCACNS – 2013 invites papers on (but not limited to) the following topics:<br>Computing Track<br>Multi&#8211;core Architectures and Algorithms, GPU Programming, Parallel &amp; Distributed Operating Systems, Agent&#8211;Based Systems, Models and Formal Verification, Compiler Technologies for High&#8211;Performance Computing, Autonomic Computing, Peer&#8211;to&#8211;peer Computing, Mobile and Ubiquitous Computing, Service&#8211;oriented Architecture, Networks Storage Systems, Data Mining, Databases technologies, , Social Network Analysis, Scalable Servers and Systems, High Performance/Scalable Storage Systems, Artificial Intelligence and Machine Learning, Simulation and Modelling, Incremental Compilers, Systems and Software Engineering, Quantum Computation and Quantum Communication, Reconfigurable Computing, Cloud, Cluster, Grid and P2P Computing, Digital Rights Management<br>Networking Track<br>Network Architectures and Protocols, Next&#8211;generation Communication Networks, Multi&#8211;modal Communications Networks, Methodologies for Network Management, Routing and Flow Control in LANs, WANs and PANs, Internet Technologies, Traffic Measurement, Analysis, Modelling and Visualization, Performance Evaluation, Quality of Service (QoS), Network Platforms and Virtualization, Sensor Nets and Embedded Systems, Implementation and Experimental Test&#8211;Beds, Collaborative networking, Modelling &amp; Simulation of communication networks and Systems, Nano networking, Network applications<br>Security Track<br>Access Control, Applied Cryptography, Biometrics Security and Privacy, Critical Infrastructure Protection, Data Integrity, Data Protection, Database Security and Privacy, Digital Forensics, Digital Rights Management, Ethical and Legal Implications of Security and Privacy, Identity Management, Information Hiding, Information Systems Auditing, Insider Threats and Countermeasures, Intrusion Detection &amp; Prevention, Security Policies, Peer&#8211;to&#8211;Peer Security, Personal Data Protection for Information Systems, Reliability and Dependability, Risk Assessment, Secure Software Development Methodologies, Security Deployment, Security Engineering, Security Metrics and Measurement, Security Protocols, Security requirements, Security Verification and Validation, Service and Systems Design and QoS Network Security, Software Security, Trust management and Reputation Systems, Wireless Network Security<br>