Abbrevation
DASC
City
Dalian
Country
China
Deadline Paper
Start Date
End Date
Abstract

DASC 2014 is the conference event following DSAC 2013 (December 2013, Chengdu, China ) after the merger of the successful DASC symposium series previously held as RAMPDS 2005 (July 2005, Fukuoka, Japan), DASC 2006 (September 2006, Indianapolis, USA), DASC 2007 (September, 2007, Columbia, MD, USA), and the successful SecUbiq symposium series, previously held as SecUbiq 2005 (December 2005, Nagasaki, Japan), SecUbiq 2006 (August 2006, Seoul, Korea), SecUbiq 2007 (December 2007, Taipei, Chinese Taipei) and SecUbiq 2008 (December 2008, Shanghai, Shanghai), DASC 2009 (December 2009, Chengdu, China)&#046;<br>DASC 2014 is to bring together computer scientists, industrial engineers, and researchers to discuss and exchange experimental and theoretical results, novel designs, work&#8211;in&#8211;progress, experience, case studies, and trend&#8211;setting ideas in the areas of dependability, security, trust and/or autonomic computing systems&#046;<br>Topics of particular interest include (but not limited to):<br>* Autonomic Computing Theory, Models, Architectures and Communications<br>* Cloud Computing with Autonomic and Trusted Environment<br>* Dependable Automatic Control Techniques and Systems<br>* Dependability Models and Evaluation Algorithms<br>* Dependable Sensors, Devices, Electronic&#8211;Mechanical Systems, Optic&#8211;Electronic Systems, Embedded Systems, etc&#046;<br>* Self&#8211;improvement in Dependable Systems<br>* Self&#8211;healing, Self&#8211;protection and Fault&#8211;tolerant Systems<br>* Hardware and Software Reliability, Verification and Testing<br>* Software Engineering for Dependable Systems<br>* vSafety&#8211;critical Systems in Transportation, Power System, etc&#046;<br>* Security Models and Quantifications<br>* Trusted P2P, Web Service, SoA, SaaS, EaaS, PaaS, etc&#046;<br>* Self&#8211;protection and Intrusion&#8211;detection in Security<br>* DRM, Watermarking Technology, IP Protection<br>* Context&#8211;aware Access Control<br>* Virus Detections and Anti&#8211;virus Techniques/Software<br>* Cyber Attack, Crime and Cyber War<br>* Human Interaction with Trusted and Autonomic Computing Systems<br>* Security, Dependability and Autonomic Issues in Ubiquitous Computing<br>* QoS in Communications and Services<br>* Information and System Security<br>* Reliable Computing and Trusted Computing<br>* Wireless Emergency and Security Systems<br>* Information Technology in Biomedicine<br>* Multimedia Security Issues over Mobile and Wireless Networks<br>* Multimedia in Mobile Computing: Issues, System Design, and Performance Evaluation<br>* Software Architectures and Design for Emerging Systems<br>* Software Engineering for Emerging Networks, Systems, and Mobile Systems<br>* Service Oriented Architectures<br>