CGAT 2014 - 7th Annual International Conference on Computer Games, Multimedia and Allied Technologies (CGAT 2014)
View: 536
Website http://www.cgames.com.sg |
Edit Freely
Category Computer Games; Multimedia; Allied Technologies; GSTF; 2014 Conference; Singapore
Deadline: January 20, 2014 | Date: March 24, 2014-March 25, 2014
Venue/Country: Singapore, Singapore
Updated: 2013-12-30 20:36:12 (GMT+9)
Call For Papers - CFP
CONFERENCE THEME - SPECIAL TRACKS1. Computer Games, Multimedia ? A discussion not only about the components and designs (software and hardware) of computer games and multimedia but also on its’ social implications such as censorships and regulations, education, and training. This would also be a platform to gather future trends and visions on multimedia games, strategies and troubleshooting.2. Cloud Computing and Virtualization ? Discussions on the value of cloud computing, theoretical and historical analyses and comparisons of different cloud business models and applications. This will also include discussions about the incubation process of IT Virtualization, security and future trends.3. Web Technologies and Internet Applications ? Discussions on the emerging and future trends on web technologies and internet applications. Education and training are also one of the key areas to be emphasized on this topic. 4. Social Computing and Behavioural Modelling ? Discussions on evolution and historical influences of social computing, applications and behavioural modelling and all its implications. Public may also present their opinions on trending topics and case studies. 5. Enterprise Resource Planning & Supply Chain Management ? Discussions on ERP and Supply Chain Management performance, security, and maintenance. Topics would also include processes and implementations, tactics and strategies to adapt. 6. Mobile Communications, Networking and Applications ? -Discussions on soft components of mobile networking and applications together with its systems, networks, mobile computing and network security. Major innovations and future trends would be one of the most trending topics for this area in which all mobile users can easily relate to.Key areas of focus (but not limited to):-Computer Games,Multimedia-Cloud Computing and Virtualization- Web Technologies and Internet Applications- Social Computing and Behavioural Modeling- Enterprise Resource Planning & Supply Chain Management- Mobile Communications, Networking and Applications - Network Technologies & CommunicationsA) Computer Games, MultimediaOptoelectronic instrumentation, measurement and metrologyGaming - Mobile, PC, Online, ConsoleAesthetic Approaches to Game Design & DevelopmentStorytelling and Narrative LandscapesDesign DocumentationGames Simulations and Dynamic ModelsInteractive SimulationsTools and Systems for Games and Virtual RealityIntelligent Agents and GamebotsGaming ? Hardware and AccessoriesGraphics & VisualisationTexture and Shader ProgrammingStereographics in Real TimeCinematographySound Design and Music SystemsMultichanel AudioAudio Techniques for Racing GamesMedia TheoryInteractive Dynamic Response for GamesMapping the Mental Space of Game GenresCultural and Media Studies on Computer GamesExperiential Spatiality in GamesPlayer Behavior and Consumer DemographicsGame Development Contract OutsourcingProject Funding and FinancingSocial/Humanities Aspects of GamesCheat Codes -To Cheat or Not to CheatMobile and Multiuser GamesIPTV and Service ConvergencePay-As-You-Play and IPTVAcademic Courses for Game Design & DevelopmentMultiuser Virtual Environments (Muves) in EducationLearning to Play or Learning through PlayGame SecurityGames and Intellectual Property RightsLaws, Regulations, Certifications and Policies for GamingCensorship of Video Games ContentArtificial Intelligence in the Context of GamingArt, Design and New MediaEducation, Training, and Edutainment TechnologiesHuman Factors of GamesSound and Music3D Geometric modelsB) Cloud Computing and VirtualizationUnderstanding the CloudThe Dark Side of CloudsBuilding Great Companies on the CloudOperating SystemsKernel-Exchange ModulesControl ServicesDistributed Composite ServicesBasic ServicesApplication Exchange ModulesCloud EnterpriseIT Security Delivered from the CloudAhead in the cloud - The power of Infrastructure as a ServiceDynamic Deployment & Scalability for the CloudA Novel Approach to Cloud NetworkingCloud ArchitectureThe Benefits of Cloud StorageCloud Computing ApplicationsDistributed InfrastructureGetting Ready for Cloud Computing - IT Strategy, Architecture and Security PerspectiveThe Business Value of Cloud Computing & VirtualizationLeveraging Endpoint VirtualizationCompliance in the New Age of Virtualization and Securing the Benefits of Virtualization 2.0Enabling Disaster Recovery for any size businessThe impact of IT Virtualization on Applications and NetworksVirtual Desktop DeliveryPotential of VirtualizationManaging Virtualization with IT Process AutomationTroubleshooting your virtual InfrastructureControlling Virtual server sprawlVirtualization Management FuturesAgent-based Cloud Computing and Cloud EconomyCloud Business ModelsC) Web Technologies and Internet ApplicationsWeb Technologies and ApplicationsWeb Services based Systems and ApplicationsP2P Systems and ApplicationsVirtual Environments and Web Applications for eLearningD) Social Computing and Behavioural ModelingTheories of Social ComputingPsycho-cultural situation awarenessSocial Network Analysis and Mining, Semantic webGroup formation and evolutionSocial Behavior ModelingCultural patterns and representationHuman machine InteractionsSocial conventions and social contextsSocial Intelligence, Social CognitionCausal, and non-linear relationshipsSocial Computing ApplicationsModeling, projection, and forecastingAnalytic approachesSocial network analysis and miningGroup interaction and collaborationMachine Learning, Information Retrieval, Artificial Intelligence in Social ContextsGroup representation and profilingTrust, Privacy, Risk and Security in Social ContextsCultural modeling and dynamicsSocial Engineering, Tools, and Case StudiesInfluence process and recognitionServices Science, Quality, Architecture, Management, and ToolsPublic opinion representationSocial System Design and ArchitecturesSearch, data, and inferenceE) Enterprise Resource Planning & Supply Chain ManagementERP performance measurement and optimizationBusiness case quantification and solution implementationObstacle identification and solution implementationSupply Chain Management-Decision intelligenceThe life cycle of ERP & SCMERP Security and ControlERP embedded ControlsProcess ERPProblems in planning for an ERP projectERP Implementation- a challenge to succeedERP Readiness and Relevance AssessmentLean International Supply ManagementProcurement Tactics for Managing through CrisisSupply Chain Risk Management and MitigationSupply Chain Organization Structure and StrategySupply Chain Information SystemsSupply Chain planningAnalyzing Supply Chain Information FlowSupplier Network CollaborationGlobal Sourcing OperationsStrategic Supply Chain ManagementSix Sigma TechniquesEconomics of multi-node/multi-national supply chainSupply Chain Performance ManagementBusiness Process management & improvementF) Mobile Communications, Networking and ApplicationsMobile computing and wireless networkingSolutions to low power and energy limitationsDesign, implementation, and evaluation of wireless systems and mobile applicationsAlgorithms / models for wireless networks and mobile applicationsMeasurements and performance evaluation of mobile and wireless networksCross-Layer Optimized Wireless NetworksMultimedia over WirelessNext Generation Mobile NetworksWireless LANs and Wireless PANsWireless mesh networksCellular data networksDelay-tolerant networksMobile ad hoc networksPersonal area networksVehicular networksWireless Sensor NetworksSmart Wireless SensorsAd hoc NetworksWireless SecurityWireless IP networksSeamless Mobility in Cellular NetworksSatellite-based SystemsWireless QOSCoding and ModulationWireless and Mobile applicationsWireless sensor network architecturesSemantic wireless sensor networksSecurity and privacy in wireless sensor actuator networksWireless Emergency and Security SystemsBroadband mobile communication systemsWireless technologies for sensorsTransmitters and receiver componentsBluetooth technologiesDevelopments in RFHome networksMobile intelligent networksSecurity aspectsMobile intelligent networksMobile Computing DevicesPeer to Peer TuningCommunications Software and ServicesMobile Computing SystemsSocial networking applicationsVehicular NetworksQOS in NetworksLocalization in Ad-hoc NetworksConvergence issues3G/4G NetworksWireless CommunicationsSpace-Time, UWB, MIMO and Adaptive AntennasOFDM, CDMA and Spread SpectrumModulation, Coding and DiversitySignal Processing for Wireless CommunicationsChannel Model and CharacterizationMulti-Hop and Cooperative CommunicationsInterference Cancellation and MUDRadio Resource Management and AllocationCognitive Radio and Software Defined RadioSatellite & Space CommunicationsMultimedia CommunicationsMultiple Access TechniquesOptical Communications Network TechnologiesWireless & Mobile NetworkingWireless Sensor NetworksCognitive Radio NetworksAd Hoc, Sensor and Mesh NetworkingNetworking and Information SecurityNetwork Protocol and Congestion Control QoSMobility, Location and Handoff ManagementCapacity, Throughput, Outage and CoverageMultimedia in Wireless NetworksOptical Networks and Systems Services and ApplicationEmerging Wireless/Mobile ApplicationsContext and Location-Aware Wireless ServicesWireless Telemedicine and E-Health ServicesIntelligent Transportation SystemsRFID Technology and ApplicationCognitive Radio and Sensor-Based ApplicationsContent Distribution in Wireless Home EnvironmentService Oriented Architectures, Service PortabilitySIP Based Services, Multimedia and MiddlewareInnovative User Interfaces for Multimedia ServicesG) Network Technologies & CommunicationsAd hoc mobile networksAddressing and location managementBroadband access technologiesCapacity planningCellular and broadband wireless netsCognitive radio networkingCongestion controlContent-based network serviceCross layer design and optimizationCyber‐physical systems and networksData center and cloud networksDenial of service mitigation and preventionDelay/disruption tolerant networksDynamic spectrum managementEnergy‐efficient networksFuture Internet designGrid networksImplementation and experimental testbedsMedium Access Control (MAC) protocolsMiddleware support for networkingMobility models and mobile networksMulticast, broadcast and anycastMultimedia protocols and networkingNetwork applications and servicesNetwork architecturesNetwork codingNetwork controlNetwork managementNetwork measurement, simulation and emulationOnline social networkingOptical networksPeer‐to‐peer networksPower control and managementPricing and billingQuality of serviceResource allocation and managementRFID networks and protocolsRouting protocolsScheduling and buffer managementSecurity, trust and privacySelf-organizing networksSensor networks and embedded systemsSwitches and switchingTopology characterization and inferenceTraffic measurement and analysisTraffic engineering and controlVehicular, underground and underwater networksVirtual and overlay networksWeb services and performanceWireless mesh networks and protocols
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.