CDC 2010 - the Fourth Conference on Dependable Computing
View: 1466
Website cdc2010.ctgusec.com |
Edit Freely
Category CDC 2010
Deadline: August 15, 2010 | Date: November 20, 2010-November 22, 2010
Venue/Country: Yichang, China
Updated: 2010-06-15 19:32:28 (GMT+9)
Call For Papers - CFP
We cordially invite you to attend the Fourth Conference on Dependable Computing which will be hosted by the Fault Tolerant Committee of China Computer Federation is to be held in Yichang, China during November 20-22, 2010. This conference aims to provide a platform for worldwide researchers and engineers to exchange research experience,show the latest research results and promote the development of technology in the field of the Dependable Computing. We will invite many famous scholars at home and abroad to do invited academic reports and warmly welcome researchers in this field to contribute actively.Conference papers will be published by TSI, and the papers' electronic version will be included in the IEEE Xplore database and retrieved by EI. We will select about 30 excellent papers and publish them in Intelligent Automation and Soft Computing Special Issue (SCI Source Journal).The topics of the CDC include but are not limited to:(1) Dependable Computing Theory: Dependable Computing Model, Dependable Root and Dependable Chain Transmission Theory, Credibility Measurement Theory, Dependable Management;(2) Dependable Software: Security Code Design, Operating System Security, Database Security, Malware Protection, Embedded Software Security, Software Fault Tolerance;(3) Dependable Computing Architecture: Dependable Computing Platform, Dependable Platform Module, Dependable Store, Virtual Machine, Security Chip, Embedded Security, Hardware Fault Tolerance;(4) Safety Testing: Dependable Computing Systems and Components Testing, Safety Testing Theory and Model, Safety Testing Technology;(5) Network and Communication Security: Network Security, Dependable Network Link, Dependable Network, Communication Network Security;(6) Cryptography: Cryptography Theory, Cryptography Technology, Cryptographic Applications;(7) Information Hiding: Digital Watermarking, Digital Rights Management;(8) Application of Dependable Computing and Information Security:E-government Security, E-Commerce Security;(9) Pattern Recognition:Neural Network,Kernel Method Model Selection,Feature Extraction and Selection,Integrated Learning,Unsupervised Learning,Manifold Learning;(10) Agriculture Informatization:3S Thehnology,Remote Sensing Image Analysis.(11) Image Processing:Image Enhancement,Image Segmentation, Content-based Image/Video Retrieval,Graphics and Visualization.Requirement of Papers1.Papers must be unpublished in any publications.2.The submitted papers must be in English and normally do not exceed six pages.You can submit your papers by the contribution system of conference website http://cdc2010.ctgusec.com
.
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.