Abbrevation
PDCAT
City
Hong Kong
Country
Hong Kong SAR China
Deadline Paper
Start Date
End Date
Abstract

The International Conference on Parallel and Distributed Computing,<br>Applications and Technologies (PDCAT) is a major forum for scientists,<br>engineers, and practitioners throughout the world to present their<br>latest research, results, ideas, developments and applications in all<br>areas of parallel and distributed computing&#046; Beginning in Hong Kong in<br>2000, PDCAT will come back to Hong Kong in 2014 after 14 years of<br>successful journey through various countries/regions including Taiwan,<br>Japan, China, Singapore, Australia, New Zealand, and Korea across<br>Asia&#8211;Oceania&#046; We are inviting new and unpublished papers on, but not<br>limited to, the following topics:<br>[NETWORKING AND ARCHITECTURES] Interconnection networks,<br>Parallel/distributed architectures, Heterogeneous and multimedia<br>Systems, ATM networks, Reliability and fault&#8211;tolerance Ubiquitous<br>computing systems, Computer networks, Communication and<br>telecommunication, Wireless networks and mobile computing, Optical<br>networks, Cloud/Grid computing systems, Reconfigurable architecture&#046;<br>[SOFTWARE SYSTEMS AND TECHNOLOGIES] Formal methods and programming<br>languages, Internet computing, Image processing and computer vision,<br>Agent technologies, Operating systems, Software tools and<br>environments, Parallelizing compilers, Web services, Component&#8211;based<br>and OO Technology, Simulation and Visualization&#046;<br>[ALGORITHMS AND APPLICATIONS] Parallel/distributed algorithms, Task<br>mapping and job scheduling, Distributed data and knowledge based<br>systems, Image processing and computer graphics, High&#8211;performance<br>scientific computing, Reconfigurable high&#8211;performance computing,<br>Resource allocation and management, Network routing and communication<br>algorithms, Bioinformatics, Database applications and data mining,<br>Intelligent computing and neural networks&#046;<br>[SECURITY AND PRIVACY] Access control and authorization,<br>Authentication/biometrics/smartcards, Distributed systems security,<br>Mobile code and mobile agent security, RFID applications, Privacy<br>preserving computation, Applied cryptography, Database security,<br>Intrusion detection and survivability, P2P &amp; ad hoc networks, Cloud<br>security, Security protocols&#046;<br>