Difference between revisions of "ICPADS 2020"
Jump to navigation
Jump to search
Natalia.Radu (talk | contribs) (Created page with "{{Event |Acronym=ICPADS 2020 |Title=26th IEEE International Conference on Parallel and Distributed Systems |Series=ICPADS |Type=Conference |Start date=2020/12/02 |End date=202...") |
Natalia.Radu (talk | contribs) |
||
| Line 6: | Line 6: | ||
|Start date=2020/12/02 | |Start date=2020/12/02 | ||
|End date=2020/12/04 | |End date=2020/12/04 | ||
| − | |City= | + | |City=Hong Kong |
| + | |Country=China | ||
}} | }} | ||
| − | + | Also known as: International Conference on Parallel and Distributed Systems | |
| + | |||
| + | ==Tracks and Topics== | ||
| + | |||
| + | '''''Algorithm Track''''' | ||
| + | |||
| + | * Algorithms for resource allocation | ||
| + | * Algorithms for network optimization | ||
| + | * Algorithms for parallel and distributed computing systems | ||
| + | * Algorithms for distributed control systems | ||
| + | * Algorithms for information security and privacy | ||
| + | * Algorithms for artificial intelligence | ||
| + | * Algorithms for energy efficient computing and communications | ||
| + | * Algorithms for big data | ||
| + | * Algorithms for cloud computing | ||
| + | * Algorithms for databases and information retrieval | ||
| + | * Algorithms for quantum computing | ||
| + | * Algorithm analysis | ||
| + | * Experimental algorithmics | ||
| + | * Distributed/parallel algorithms and applicatio | ||
| + | * High-performance Computing | ||
| + | |||
| + | '''''Application Track''''' | ||
| + | |||
| + | * Edge Intelligence Applications | ||
| + | * Big Data Applications | ||
| + | * Smart City Applications | ||
| + | * High Performance Computational Biology and Bioinformatics | ||
| + | * Collective intelligence emerged from distributed systems | ||
| + | * Internet of Things Applications | ||
| + | * Distributed human-cyber-physical applications | ||
| + | * Distributed and Federated Machine Learning | ||
| + | * Blockchain applications | ||
| + | * Data Analytics | ||
| + | * Large-scale complex software systems | ||
| + | * Distributed Autonomous Robotic Systems | ||
| + | * Multi-agent learning algorithms and applications | ||
| + | |||
| + | '''''Architecture Track''''' | ||
| + | |||
| + | * Multi-core and Massively Parallel Computing Architectures | ||
| + | * Data Intensive Computing Architectures | ||
| + | * IoT, Mobile and Embedded Architectures | ||
| + | * Accelerator-based and Application-specific Architectures | ||
| + | * Architecture Support for Dependability, Reliability and Security | ||
| + | |||
| + | '''''Performance Track''''' | ||
| + | |||
| + | * Performance Modeling and analysis of Parallel or Distributed Computing | ||
| + | * Design and experimental evaluation of Parallel or Distributed Systems | ||
| + | * Simulation Models | ||
| + | * Analytical Models | ||
| + | * Measurement based Evaluation | ||
| + | * Experimental Study of Large-scale Infrastructure | ||
| + | * Innovations made in support of Performance Modeling and Evaluation | ||
| + | |||
| + | '''''Security Track''''' | ||
| + | * | ||
| + | * Access control | ||
| + | * Accounting and audit | ||
| + | * Applied cryptography | ||
| + | * Authentication | ||
| + | * Big data security and privacy | ||
| + | * Biometrics security | ||
| + | * Blockchain security and privacy | ||
| + | * Cloud computing security | ||
| + | * Computer forensics | ||
| + | * Cyber-physical system security | ||
| + | * Data and application security | ||
| + | * Embedded systems security | ||
| + | * Formal methods for security | ||
| + | * Hardware-based security and applications | ||
| + | * IoT security and privacy | ||
| + | * Key management | ||
| + | * Malware and botnets | ||
| + | * Mobile computing security | ||
| + | * Network security | ||
| + | * Operating system security | ||
| + | * Practical post-quantum security | ||
| + | * Privacy-enhancing technology | ||
| + | * Runtime attacks and defenses | ||
| + | * Secure computation | ||
| + | * Security architectures | ||
| + | * Security of critical infrastructures | ||
| + | * Security metrics | ||
| + | * Software security | ||
| + | * Threat modeling | ||
| + | * Trusted computing | ||
| + | * Usable security and privacy | ||
| + | * Web security | ||
| + | * Wireless security and privacy | ||
| + | |||
| + | '''''System Track''''' | ||
| + | |||
| + | * Distributed operating systems and middleware | ||
| + | * Distributed fault tolerance and dependability | ||
| + | * Cloud computing systems and data centers | ||
| + | * Edge computing systems | ||
| + | * Distributed big data systems and analytics | ||
| + | * Parallel and distributed file and storage systems | ||
| + | * Algorithms and theory for parallel and distributed systems | ||
| + | * Formal verification of distributed systems | ||
| + | * Blockchain systems | ||
| + | * Distributed and federated machine learning systems | ||
| + | |||
| + | |||
| + | |||
| − | |||
| − | |||
==Important Dates== | ==Important Dates== | ||
| + | |||
| + | |||
| + | {| class="wikitable" | ||
| + | |- | ||
| + | | Jul 15, 2020 || Deadline for full paper submissions | ||
| + | |- | ||
| + | | Sep 15, 2020 || Notification of paper acceptance | ||
| + | |- | ||
| + | | Oct 1, 2020 || Deadline for camera-ready papers | ||
| + | |} | ||
| + | |||
| + | |||
==Committees== | ==Committees== | ||
Revision as of 11:02, 25 August 2020
| ICPADS 2020 | |
|---|---|
26th IEEE International Conference on Parallel and Distributed Systems
| |
| Event in series | ICPADS |
| Dates | 2020/12/02 (iCal) - 2020/12/04 |
| Location | |
| Location: | Hong Kong, China |
| Table of Contents | |
Also known as: International Conference on Parallel and Distributed Systems
Tracks and Topics
Algorithm Track
- Algorithms for resource allocation
- Algorithms for network optimization
- Algorithms for parallel and distributed computing systems
- Algorithms for distributed control systems
- Algorithms for information security and privacy
- Algorithms for artificial intelligence
- Algorithms for energy efficient computing and communications
- Algorithms for big data
- Algorithms for cloud computing
- Algorithms for databases and information retrieval
- Algorithms for quantum computing
- Algorithm analysis
- Experimental algorithmics
- Distributed/parallel algorithms and applicatio
- High-performance Computing
Application Track
- Edge Intelligence Applications
- Big Data Applications
- Smart City Applications
- High Performance Computational Biology and Bioinformatics
- Collective intelligence emerged from distributed systems
- Internet of Things Applications
- Distributed human-cyber-physical applications
- Distributed and Federated Machine Learning
- Blockchain applications
- Data Analytics
- Large-scale complex software systems
- Distributed Autonomous Robotic Systems
- Multi-agent learning algorithms and applications
Architecture Track
- Multi-core and Massively Parallel Computing Architectures
- Data Intensive Computing Architectures
- IoT, Mobile and Embedded Architectures
- Accelerator-based and Application-specific Architectures
- Architecture Support for Dependability, Reliability and Security
Performance Track
- Performance Modeling and analysis of Parallel or Distributed Computing
- Design and experimental evaluation of Parallel or Distributed Systems
- Simulation Models
- Analytical Models
- Measurement based Evaluation
- Experimental Study of Large-scale Infrastructure
- Innovations made in support of Performance Modeling and Evaluation
Security Track
- Access control
- Accounting and audit
- Applied cryptography
- Authentication
- Big data security and privacy
- Biometrics security
- Blockchain security and privacy
- Cloud computing security
- Computer forensics
- Cyber-physical system security
- Data and application security
- Embedded systems security
- Formal methods for security
- Hardware-based security and applications
- IoT security and privacy
- Key management
- Malware and botnets
- Mobile computing security
- Network security
- Operating system security
- Practical post-quantum security
- Privacy-enhancing technology
- Runtime attacks and defenses
- Secure computation
- Security architectures
- Security of critical infrastructures
- Security metrics
- Software security
- Threat modeling
- Trusted computing
- Usable security and privacy
- Web security
- Wireless security and privacy
System Track
- Distributed operating systems and middleware
- Distributed fault tolerance and dependability
- Cloud computing systems and data centers
- Edge computing systems
- Distributed big data systems and analytics
- Parallel and distributed file and storage systems
- Algorithms and theory for parallel and distributed systems
- Formal verification of distributed systems
- Blockchain systems
- Distributed and federated machine learning systems
Important Dates
| Jul 15, 2020 | Deadline for full paper submissions |
| Sep 15, 2020 | Notification of paper acceptance |
| Oct 1, 2020 | Deadline for camera-ready papers |
Committees
- Co-Organizers
- General Co-Chairs
- some person, some affiliation, country
- PC Co-Chairs
- some person, some affiliation, country
- Workshop Chair
- some person, some affiliation, country
- Panel Chair
- some person, some affiliation, country
- Seminars Chair
- some person, some affiliation, country
- Demonstration Co-Chairs
- some person, some affiliation, country
- some person, some affiliation, country
- Local Organizing Co-Chairs
- some person, some affiliation, country
- Program Committee Members
- some person, some affiliation, country
-->