Abbrevation
CGAT
City
Singapore
Country
Singapore
Deadline Paper
Start Date
End Date
Abstract

Key areas of focus (but not limited to):<br>&#8211;Computer Games,Multimedia<br>&#8211;Cloud Computing and Virtualization<br>&#8211; Web Technologies and Internet Applications<br>&#8211; Social Computing and Behavioural Modeling<br>&#8211; Enterprise Resource Planning &amp; Supply Chain Management<br>&#8211; Mobile Communications, Networking and Applications<br>&#8211; Network Technologies &amp; Communications<br>A) Computer Games, Multimedia<br>Optoelectronic instrumentation, measurement and metrology<br>Gaming &#8211; Mobile, PC, Online, Console<br>Aesthetic Approaches to Game Design &amp; Development<br>Storytelling and Narrative Landscapes<br>Design Documentation<br>Games Simulations and Dynamic Models<br>Interactive Simulations<br>Tools and Systems for Games and Virtual Reality<br>Intelligent Agents and Gamebots<br>Gaming – Hardware and Accessories<br>Graphics &amp; Visualisation<br>Texture and Shader Programming<br>Stereographics in Real Time<br>Cinematography<br>Sound Design and Music Systems<br>Multichanel Audio<br>Audio Techniques for Racing Games<br>Media Theory<br>Interactive Dynamic Response for Games<br>Mapping the Mental Space of Game Genres<br>Cultural and Media Studies on Computer Games<br>Experiential Spatiality in Games<br>Player Behavior and Consumer Demographics<br>Game Development Contract Outsourcing<br>Project Funding and Financing<br>Social/Humanities Aspects of Games<br>Cheat Codes &#8211;To Cheat or Not to Cheat<br>Mobile and Multiuser Games<br>IPTV and Service Convergence<br>Pay&#8211;As&#8211;You&#8211;Play and IPTV<br>Academic Courses for Game Design &amp; Development<br>Multiuser Virtual Environments (Muves) in Education<br>Learning to Play or Learning through Play<br>Game Security<br>Games and Intellectual Property Rights<br>Laws, Regulations, Certifications and Policies for Gaming<br>Censorship of Video Games Content<br>Artificial Intelligence in the Context of Gaming<br>Art, Design and New Media<br>Education, Training, and Edutainment Technologies<br>Human Factors of Games<br>Sound and Music<br>3D Geometric models<br>Storytelling and Narrative Landscapes<br>Design Documentation<br>Games Simulations and Dynamic Models<br>Interactive Simulations<br>Tools and Systems for Games and Virtual Reality<br>Intelligent Agents and Gamebots<br>Gaming – Hardware and Accessories<br>Graphics &amp; Visualisation<br>Texture and Shader Programming<br>Stereographics in Real Time<br>Cinematography<br>Sound Design and Music Systems<br>Multichanel Audio<br>Audio Techniques for Racing Games<br>Media Theory<br>Interactive Dynamic Response for Games<br>Mapping the Mental Space of Game Genres<br>Cultural and Media Studies on Computer Games<br>Experiential Spatiality in Games<br>Player Behavior and Consumer Demographics<br>Game Development Contract Outsourcing<br>Project Funding and Financing<br>Social/Humanities Aspects of Games<br>Cheat Codes &#8211;To Cheat or Not to Cheat<br>Mobile and Multiuser Games<br>IPTV and Service Convergence<br>Pay&#8211;As&#8211;You&#8211;Play and IPTV<br>Academic Courses for Game Design &amp; Development<br>Multiuser Virtual Environments (Muves) in Education<br>Learning to Play or Learning through Play<br>Game Security<br>Games and Intellectual Property Rights<br>Laws, Regulations, Certifications and Policies for Gaming<br>Censorship of Video Games Content<br>Artificial Intelligence in the Context of Gaming<br>Art, Design and New Media<br>Education, Training, and Edutainment Technologies<br>Human Factors of Games<br>Sound and Music<br>3D Geometric models<br>B) Cloud Computing and Virtualization<br>Understanding the Cloud<br>The Dark Side of Clouds<br>Building Great Companies on the Cloud<br>Operating Systems<br>Kernel&#8211;Exchange Modules<br>Control Services<br>Distributed Composite Services<br>Basic Services<br>Application Exchange Modules<br>Cloud Enterprise<br>IT Security Delivered from the Cloud<br>Ahead in the cloud &#8211; The power of Infrastructure as a Service<br>Dynamic Deployment &amp; Scalability for the Cloud<br>A Novel Approach to Cloud Networking<br>Cloud Architecture<br>The Benefits of Cloud Storage<br>Cloud Computing Applications<br>Distributed Infrastructure<br>Getting Ready for Cloud Computing &#8211; IT Strategy, Architecture and Security Perspective<br>The Business Value of Cloud Computing &amp; Virtualization<br>Leveraging Endpoint Virtualization<br>Compliance in the New Age of Virtualization and Securing the Benefits of Virtualization 2&#046;0<br>Enabling Disaster Recovery for any size business<br>The impact of IT Virtualization on Applications and Networks<br>Virtual Desktop Delivery<br>Potential of Virtualization<br>Managing Virtualization with IT Process Automation<br>Troubleshooting your virtual Infrastructure<br>Controlling Virtual server sprawl<br>Virtualization Management Futures<br>Agent&#8211;based Cloud Computing and Cloud Economy<br>Cloud Business Models<br>C) Web Technologies and Internet Applications<br>Web Technologies and Applications<br>Web Services based Systems and Applications<br>P2P Systems and Applications<br>Virtual Environments and Web Applications for eLearning<br>D) Social Computing and Behavioural Modeling<br>Theories of Social Computing<br>Psycho&#8211;cultural situation awareness<br>Social Network Analysis and Mining, Semantic web<br>Group formation and evolution<br>Social Behavior Modeling<br>Cultural patterns and representation<br>Human machine Interactions<br>Social conventions and social contexts<br>Social Intelligence, Social Cognition<br>Causal, and non&#8211;linear relationships<br>Social Computing Applications<br>Modeling, projection, and forecasting<br>Analytic approaches<br>Social network analysis and mining<br>Group interaction and collaboration<br>Machine Learning, Information Retrieval, Artificial Intelligence in Social Contexts<br>Group representation and profiling<br>Trust, Privacy, Risk and Security in Social Contexts<br>Cultural modeling and dynamics<br>Social Engineering, Tools, and Case Studies<br>Influence process and recognition<br>Services Science, Quality, Architecture, Management, and Tools<br>Public opinion representation<br>Social System Design and Architectures<br>Search, data, and inference<br>E) Enterprise Resource Planning &amp; Supply Chain Management<br>ERP performance measurement and optimization<br>Business case quantification and solution implementation<br>Obstacle identification and solution implementation<br>Supply Chain Management&#8211;Decision intelligence<br>The life cycle of ERP &amp; SCM<br>ERP Security and Control<br>ERP embedded Controls<br>Process ERP<br>Problems in planning for an ERP project<br>ERP Implementation&#8211; a challenge to succeed<br>ERP Readiness and Relevance Assessment<br>Lean International Supply Management<br>Procurement Tactics for Managing through Crisis<br>Supply Chain Risk Management and Mitigation<br>Supply Chain Organization Structure and Strategy<br>Supply Chain Information Systems<br>Supply Chain planning<br>Analyzing Supply Chain Information Flow<br>Supplier Network Collaboration<br>Global Sourcing Operations<br>Strategic Supply Chain Management<br>Six Sigma Techniques<br>Economics of multi&#8211;node/multi&#8211;national supply chain<br>Supply Chain Performance Management<br>Business Process management &amp; improvement<br>F) Mobile Communications, Networking and Applications<br>Mobile computing and wireless networking<br>Solutions to low power and energy limitations<br>Design, implementation, and evaluation of wireless systems and mobile applications<br>Algorithms / models for wireless networks and mobile applications<br>Measurements and performance evaluation of mobile and wireless networks<br>Cross&#8211;Layer Optimized Wireless Networks<br>Multimedia over Wireless<br>Next Generation Mobile Networks<br>Wireless LANs and Wireless PANs<br>Wireless mesh networks<br>Cellular data networks<br>Delay&#8211;tolerant networks<br>Mobile ad hoc networks<br>Personal area networks<br>Vehicular networks<br>Wireless Sensor Networks<br>Smart Wireless Sensors<br>Ad hoc Networks<br>Wireless Security<br>Wireless IP networks<br>Seamless Mobility in Cellular Networks<br>Satellite&#8211;based Systems<br>Wireless QOS<br>Coding and Modulation<br>Wireless and Mobile applications<br>Wireless sensor network architectures<br>Semantic wireless sensor networks<br>Security and privacy in wireless sensor actuator networks<br>Wireless Emergency and Security Systems<br>Broadband mobile communication systems<br>Wireless technologies for sensors<br>Transmitters and receiver components<br>Bluetooth technologies<br>Developments in RF<br>Home networks<br>Mobile intelligent networks<br>Security aspects<br>Mobile intelligent networks<br>Mobile Computing Devices<br>Peer to Peer Tuning<br>Communications Software and Services<br>Mobile Computing Systems<br>Social networking applications<br>Vehicular Networks<br>QOS in Networks<br>Localization in Ad&#8211;hoc Networks<br>Convergence issues<br>3G/4G Networks<br>Wireless Communications<br>Space&#8211;Time, UWB, MIMO and Adaptive Antennas<br>OFDM, CDMA and Spread Spectrum<br>Modulation, Coding and Diversity<br>Signal Processing for Wireless Communications<br>Channel Model and Characterization<br>Multi&#8211;Hop and Cooperative Communications<br>Interference Cancellation and MUD<br>Radio Resource Management and Allocation<br>Cognitive Radio and Software Defined Radio<br>Satellite &amp; Space Communications<br>Multimedia Communications<br>Multiple Access Techniques<br>Optical Communications Network Technologies<br>Wireless &amp; Mobile Networking<br>Wireless Sensor Networks<br>Cognitive Radio Networks<br>Ad Hoc, Sensor and Mesh Networking<br>Networking and Information Security<br>Network Protocol and Congestion Control QoS<br>Mobility, Location and Handoff Management<br>Capacity, Throughput, Outage and Coverage<br>Multimedia in Wireless Networks<br>Optical Networks and Systems Services and Application<br>Emerging Wireless/Mobile Applications<br>Context and Location&#8211;Aware Wireless Services<br>Wireless Telemedicine and E&#8211;Health Services<br>Intelligent Transportation Systems<br>RFID Technology and Application<br>Cognitive Radio and Sensor&#8211;Based Applications<br>Content Distribution in Wireless Home Environment<br>Service Oriented Architectures, Service Portability<br>SIP Based Services, Multimedia and Middleware<br>Innovative User Interfaces for Multimedia Services<br>G) Network Technologies &amp; Communications<br>Ad hoc mobile networks<br>Addressing and location management<br>Broadband access technologies<br>Capacity planning<br>Cellular and broadband wireless nets<br>Cognitive radio networking<br>Congestion control<br>Content&#8211;based network service<br>Cross layer design and optimization<br>Cyber‐physical systems and networks<br>Data center and cloud networks<br>Denial of service mitigation and prevention<br>Delay/disruption tolerant networks<br>Dynamic spectrum management<br>Energy‐efficient networks<br>Future Internet design<br>Grid networks<br>Implementation and experimental testbeds<br>Medium Access Control (MAC) protocols<br>Middleware support for networking<br>Mobility models and mobile networks<br>Multicast, broadcast and anycast<br>Multimedia protocols and networking<br>Network applications and services<br>Network architectures<br>Network coding<br>Network control<br>Network management<br>Network measurement, simulation and emulation<br>Online social networking<br>Optical networks<br>Peer‐to‐peer networks<br>Power control and management<br>Pricing and billing<br>Quality of service<br>Resource allocation and management<br>RFID networks and protocols<br>Routing protocols<br>Scheduling and buffer management<br>Security, trust and privacy<br>Self&#8211;organizing networks<br>Sensor networks and embedded systems<br>Switches and switching<br>Topology characterization and inference<br>Traffic measurement and analysis<br>Traffic engineering and control<br>Vehicular, underground and underwater networks<br>Virtual and overlay networks<br>Web services and performance<br>Wireless mesh networks and protocols<br>