CEA 2012 - 6th WSEAS Int. Conf. on COMPUTER ENGINEERING and APPLICATIONS (CEA '12)
View: 1551
Website www.wseas.us |
Edit Freely
Category CEA 2012
Deadline: November 25, 2011 | Date: January 25, 2012-January 27, 2012
Venue/Country: Cambridge, U.S.A
Updated: 2011-11-13 16:34:09 (GMT+9)
Call For Papers - CFP
TOPICS OF THE CONFERENCE:Network Architecture,Network Design,Synchronous Networks,Parallel/Distributed architectures,Networks and interconnection networks,Optical Network Multi-layer DesignFiber Design and FabricationNetwork Design SoftwareDesign, and InfrastructureModelling and Simulation of Networks,Clusters and parallel systems,Data for supercomputers,Network architecture and convergence,Traffic,Switching,Routing network access,Interworking,Narrow band and broad band networks,ATM,Traffic control,Mobile networks and mobile services,Network management,Wireless networks,Multicast,Digital broadcasting,Flow and congestion control,Multimedia transport protocols,Protocols and applicationsE-commerce,Interoperability,Internetworking,Home computing and networking,QoS and service differentiation,Tariffs and bandwidth allocation,End to end traffic control,Network measurements,Peer to peer communication protocols,Shared memory, DDistributed memory,Optical networksSecurity Architectures and InfrastructuresHacking, Trojian Horses, Viruses, Worms, SpamDenial of service.Passive attacks, Active attacks,Data MiningEvaluation of InformationIntelligent NetworksIntelligent AgentsReliability and fault-tolerancePerformance analysisData EngineeringKnowledge EngineeringSoftware EngineeringInformation Security,Threat and attacks to informationInformation security services: authentication, access control, confidentiality, integrity,Non-repudiation, Secret sharing,Database security,Operating systems security. Modeling and analysis for information security:Protocols and its logical analysis,Performance analysis,Risk analysis. Standards of information security: AES, IPSec,Common Criteria.Infrastructure for information security:Public Key Infrastructure, Certification Authority.Tools for information security:Smart cards, biometrics, watermarking,intrusion detection, scanners, mobile agents.Applications of information security:E-commerce, health information systems, mobile telephony, E-banking,E-voting, entertainment industry. Cryptography: algorithms,performance analysis. Advanced topics in security: quantum cryptography. Multilateral Security: Relationship between privacy and security,Privacy enhancing technologies,Anonymity techniques,High-tech crime prevention,Information hiding.Internet,Programming Techniques in Communications Networks,Simulation Techniques in Telecommunications,Software for CommunicationsDevelopment and Simulation,Social Implications of Modern Communications,Soft Computing and Communications,Smart Interfaces, Computer/Communications Integration,Multiservice networksMonitoringSsupervisionInternetWweb methodologiesInternet based knowledge engineeringDistributed computing environmentsArchitectures for internet and intranetsSecurity AspectsSoftware maintenanceSoftware metricsReusabilityReliabilityIntelligent agentsData miningObject-oriented methodologiesData warehousingComputer-aided co-design techniques:specification and modelingDesign representationSynthesis, partitioning, estimationCo-design architectures: hardware/software interfacesDistributed and multiprocessor architecturesRe-configurable platforms.Software for co-design: software development environmentsReal-time operating systemsProcess schedulingSoftware synthesisSystem integrationRetargetable compilation.System development processes: designmethodologyConcurrent engineeringDesign reuseProcess managementIntellectual propertySystem integration.Verification and test of hardware/software systems: co-simulationformal verificationTest strategiesEmulation and debuggingRapid prototypingProgramming LanguagesHigh Performance LanguagesOperating SystemsHardware EngineeringSupercomputingParallel Computing Systems ArchitecturesSupercomputingReusabilityProtocols, Routing, SchedulingFault ToleranceSoftware Evaluation StandardsDistributed MultimediaPerformance EvaluationIntelligent SystemsDigital Speech ProcessingStatistical Methods for Signal ProcessingTele-automatic controlE-commerceTele-medicine and medical informatics, Tele-healthcareTele-manufacturing systemsTele-artificial intelligenceTele-roboticsArtificial intelligenceComputational linguisticsComputer networksInterconnection NetworksOptical Interconnection NetworksBroadband Networks, Mobile Networks, Network ApplicationsComputational BiophysicsComputers and Biomedical EngineeringComputers and AutomationDigital Signal Processing and Pattern RecognitionDigital Systems and Computer ArchitectureComputational GeometryAlgorithms and MultiplexityMultimediaMicroprocessors, MicrocomputersMicroelectronicsMobile ComputingNETwork Management and Optimal DesignSoftware EngineeringComputation and Reasoning LaboratoryKnowledge and Data-Base SystemsSoftware EngineeringEducational SoftwareKnowledge EngineeringSecuritySoftware MethodologiesSoftware RequirementsSoftware Design and DevelopmentSoftware Maintenance, Software MetricsSoftware TestingFault ToleranceProject ManagementMicrowave Theory and techniquesCAD design for Microwave SystemsAntennas and RadarsLightwave technologySubmillimeter-Wave techniquesMicrowave High-Power techniquesMicrowave and millimeter-Wave Integrated CircuitsMicrowave and millimeter-Wave Integrated Solid State DevicesMicrowave AcousticsFilter and Passive ComponentsMicrowave and Antennas MeasurementsMicrowave SuperconductivityRFIC'sWave-guidesMicrowave propagationFerrites devices. Cavities. Microwave CircuitsPeriodic Structures and FiltersTubesMasersAmplifiersHF-VHF-UHF EngineeringAntennasReflectors and Lens AntennasArraysScatteringPropagationDiffractionElectromagnetic Compatibility ProblemsApplied ElectromagneticsElectromagnetic FieldNumerical Methods for ElectromagneticsMathematical Methods and Computational techniues for MicrowavesMathematical Methods and Computational techniues for Antennas and RadarsRadio Engineering applications in AstronomyNavigationAerospace SystemsLow noise techniquesOptical Fiber SystemsCommunication ElectronicsSignal Processing for Wireless CommunicationCommunications Switching and RoutingPhysical LayerISDNComputer NetworksArchitectural AspectsATM NetworksProtocolsCommunication Systems IntegrationCryptologyMilitary CommunicationsVideo systemsVideo technologiesVLSISignal processing systemsMultimedia networks. Artificial intelligenceComputational linguisticsCyber-Science and Cyber-SpaceObject-Oriented Analysis and DesignSoftware for Parallel and Distributed SystemsDatabases, Data MiningData WarehousingMathematical Logic and ComputersImage, Video and Internet TechnologiesWeb-Based EducationDistributed Real Time SystemsDistributed Data BaseDistributed Knowledge-base SystemsComputer Applications in ScienceComputer Applications in EngineeringComputer Applications in Business, Commerce and EconomicsComputer Applications in Earth Sciences, Aerospace and Transportation ScienceComputer Applications in Biology, Chemistry, Medicine, Healthcare and BioengineeringComputer Applications in Acoustics, Music, Speech ProcessingComputer Applications in Signal and Image ProcessingComputer Applications in CommunicationComputer Applications in Arts, Archaeology, Education and AnimationModelling and SimulationLaw Aspects related to informatics
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.