Abbrevation
PDCAT
City
Hong Kong
Country
Hong Kong SAR China
Deadline Paper
Start Date
End Date
Abstract

The International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT) is a major forum for scientists, engineers, and practitioners throughout the world to present their latest research, results, ideas, developments and applications in all areas of parallel and distributed computing&#046; Beginning in Hong Kong in 2000, PDCAT will come back to Hong Kong in 2014 after 14 years of successful journey through various countries/regions including Taiwan, Japan, China, Singapore, Australia, New Zealand, and Korea across Asia&#8211;Oceania&#046;<br>Topics<br>Networking and Architectures:<br>Interconnection networks<br>Parallel/distributed architectures<br>Heterogeneous and multimedia Systems<br>ATM networks<br>Reliability, and fault&#8211;tolerance<br>Ubiquitous computing systems<br>Computer networks<br>Communication and telecommunication<br>Wireless networks and mobile computing<br>Optical networks<br>Cloud/Grid computing systems<br>Reconfigurable architecture<br>Software Systems and Technologies:<br>Formal methods and programming languages<br>Internet computing<br>Image processing and computer vision<br>Agent technologies<br>Operating systems<br>Software tools and environments<br>Parallelizing compilers<br>Web services<br>Component&#8211;based and OO Technology<br>Simulation and Visualization<br>Algorithms and Applications:<br>Parallel/distributed algorithms<br>Task mapping and job scheduling<br>Distributed data and knowledge based systems<br>Image processing and computer graphics<br>High&#8211;performance scientific computing<br>Reconfigurable high&#8211;performance computing<br>Resource allocation and management<br>Network routing and communication algorithms<br>Bioinformatics<br>Database applications and data mining<br>Intelligent computing and neural networks<br>Security and Privacy:<br>Access control and authorization<br>Authentication, biometrics, smartcards<br>Distributed systems security<br>Mobile code and mobile agent security<br>RFID applications<br>Privacy preserving computation<br>Applied cryptography<br>Database security<br>Intrusion detection and survivability<br>P2P &amp; ad hoc networks<br>Cloud security<br>Security protocols<br>