Difference between revisions of "Event:ICPADS 2020"

From ConfIDent
m (Text replacement - "[ \s]User:Curator 83" to " Ch")
 
(4 intermediate revisions by 2 users not shown)
Line 2: Line 2:
 
|Acronym=ICPADS 2020
 
|Acronym=ICPADS 2020
 
|Title=26th IEEE International Conference on Parallel and Distributed Systems
 
|Title=26th IEEE International Conference on Parallel and Distributed Systems
 +
|Ordinal=26
 +
|In Event Series=Event Series:ICPADS
 +
|Single Day Event=no
 +
|Start Date=2020/12/02
 +
|End Date=2020/12/04
 +
|Event Status=as scheduled
 +
|Event Mode=online
 +
|Academic Field=Computer Science; Distributed Systems; Parallel Systems
 +
|Official Website=https://icpads2020.comp.polyu.edu.hk/
 +
|DOI=10.25798/7nqv-rq77
 
|Type=Conference
 
|Type=Conference
|City=Hong Kong
 
|Country=User:Curator 83ina
 
 
|pageCreator=User:Curator 44
 
|pageCreator=User:Curator 44
 
|pageEditor=User:Curator 44
 
|pageEditor=User:Curator 44
 
|contributionType=1
 
|contributionType=1
|In Event Series=Event Series:ICPADS
 
|Single Day Event=no
 
|Start Date=2020/12/02
 
|End Date=2020/12/04
 
 
}}
 
}}
 +
{{Event Deadline}}
 +
{{Organizer
 +
|Contributor Type=organization
 +
|Organization=IEEE Computer Society, Institute of Electrical and Electronics Engineers
 +
}}
 +
{{Event Metric}}
 +
{{S Event}}
 
Also known as: IEEE ICPADS, International Conference on Parallel and Distributed Systems
 
Also known as: IEEE ICPADS, International Conference on Parallel and Distributed Systems
  
Line 19: Line 30:
 
'''''Algorithm Track'''''
 
'''''Algorithm Track'''''
  
* Algorithms for resource allocation
+
*Algorithms for resource allocation
* Algorithms for network optimization
+
*Algorithms for network optimization
* Algorithms for parallel and distributed computing systems
+
*Algorithms for parallel and distributed computing systems
* Algorithms for distributed control systems
+
*Algorithms for distributed control systems
* Algorithms for information security and privacy
+
*Algorithms for information security and privacy
* Algorithms for artificial intelligence
+
*Algorithms for artificial intelligence
* Algorithms for energy efficient computing and communications
+
*Algorithms for energy efficient computing and communications
* Algorithms for big data
+
*Algorithms for big data
* Algorithms for cloud computing
+
*Algorithms for cloud computing
* Algorithms for databases and information retrieval
+
*Algorithms for databases and information retrieval
* Algorithms for quantum computing
+
*Algorithms for quantum computing
* Algorithm analysis
+
*Algorithm analysis
* Experimental algorithmics
+
*Experimental algorithmics
* Distributed/parallel algorithms and applicatio
+
*Distributed/parallel algorithms and applicatio
* High-performance Computing
+
*High-performance Computing
  
 
'''''Application Track'''''
 
'''''Application Track'''''
  
* Edge Intelligence Applications
+
*Edge Intelligence Applications
* Big Data Applications
+
*Big Data Applications
* Smart City Applications
+
*Smart City Applications
* High Performance Computational Biology and Bioinformatics
+
*High Performance Computational Biology and Bioinformatics
* Collective intelligence emerged from distributed systems
+
*Collective intelligence emerged from distributed systems
* Internet of Things Applications
+
*Internet of Things Applications
* Distributed human-cyber-physical applications
+
*Distributed human-cyber-physical applications
* Distributed and Federated Machine Learning
+
*Distributed and Federated Machine Learning
* Blockchain applications
+
*Blockchain applications
* Data Analytics
+
*Data Analytics
* Large-scale complex software systems
+
*Large-scale complex software systems
* Distributed Autonomous Robotic Systems
+
*Distributed Autonomous Robotic Systems
* Multi-agent learning algorithms and applications
+
*Multi-agent learning algorithms and applications
  
 
'''''Architecture Track'''''
 
'''''Architecture Track'''''
  
* Multi-core and Massively Parallel Computing Architectures
+
*Multi-core and Massively Parallel Computing Architectures
* Data Intensive Computing Architectures
+
*Data Intensive Computing Architectures
* IoT, Mobile and Embedded Architectures
+
*IoT, Mobile and Embedded Architectures
* Accelerator-based and Application-specific Architectures
+
*Accelerator-based and Application-specific Architectures
* Architecture Support for Dependability, Reliability and Security
+
*Architecture Support for Dependability, Reliability and Security
  
 
'''''Performance Track'''''
 
'''''Performance Track'''''
  
* Performance Modeling and analysis of Parallel or Distributed Computing
+
*Performance Modeling and analysis of Parallel or Distributed Computing
* Design and experimental evaluation of Parallel or Distributed Systems
+
*Design and experimental evaluation of Parallel or Distributed Systems
* Simulation Models
+
*Simulation Models
* Analytical Models
+
*Analytical Models
* Measurement based Evaluation
+
*Measurement based Evaluation
* Experimental Study of Large-scale Infrastructure
+
*Experimental Study of Large-scale Infrastructure
* Innovations made in support of Performance Modeling and Evaluation
+
*Innovations made in support of Performance Modeling and Evaluation
  
 
'''''Security Track'''''
 
'''''Security Track'''''
*  
+
*
* Access control
+
*Access control
* Accounting and audit
+
*Accounting and audit
* Applied cryptography
+
*Applied cryptography
* Authentication
+
*Authentication
* Big data security and privacy
+
*Big data security and privacy
* Biometrics security
+
*Biometrics security
* Blockchain security and privacy
+
*Blockchain security and privacy
* Cloud computing security
+
*Cloud computing security
* Computer forensics
+
*Computer forensics
* Cyber-physical system security
+
*Cyber-physical system security
* Data and application security
+
*Data and application security
* Embedded systems security
+
*Embedded systems security
* Formal methods for security
+
*Formal methods for security
* Hardware-based security and applications
+
*Hardware-based security and applications
* IoT security and privacy
+
*IoT security and privacy
* Key management
+
*Key management
* Malware and botnets
+
*Malware and botnets
* Mobile computing security
+
*Mobile computing security
* Network security
+
*Network security
* Operating system security
+
*Operating system security
* Practical post-quantum security
+
*Practical post-quantum security
* Privacy-enhancing technology
+
*Privacy-enhancing technology
* Runtime attacks and defenses
+
*Runtime attacks and defenses
* Secure computation
+
*Secure computation
* Security architectures
+
*Security architectures
* Security of critical infrastructures
+
*Security of critical infrastructures
* Security metrics
+
*Security metrics
* Software security
+
*Software security
* Threat modeling
+
*Threat modeling
* Trusted computing
+
*Trusted computing
* Usable security and privacy
+
*Usable security and privacy
* Web security
+
*Web security
* Wireless security and privacy
+
*Wireless security and privacy
  
 
'''''System Track'''''
 
'''''System Track'''''
  
* Distributed operating systems and middleware
+
*Distributed operating systems and middleware
* Distributed fault tolerance and dependability
+
*Distributed fault tolerance and dependability
* Cloud computing systems and data centers
+
*Cloud computing systems and data centers
* Edge computing systems  
+
*Edge computing systems
* Distributed big data systems and analytics
+
*Distributed big data systems and analytics
* Parallel and distributed file and storage systems
+
*Parallel and distributed file and storage systems
* Algorithms and theory for parallel and distributed systems
+
*Algorithms and theory for parallel and distributed systems
* Formal verification of distributed systems
+
*Formal verification of distributed systems
* Blockchain systems
+
*Blockchain systems
* Distributed and federated machine learning systems
+
*Distributed and federated machine learning systems
  
 
==Important Dates==
 
==Important Dates==
Line 122: Line 133:
 
{| class="wikitable"
 
{| class="wikitable"
 
|-
 
|-
| Jul 15, 2020 || Deadline for full paper submissions
+
|Jul 15, 2020||Deadline for full paper submissions
 
|-
 
|-
| Sep 15, 2020 || Notification of paper acceptance
+
|Sep 15, 2020||Notification of paper acceptance
 
|-
 
|-
| Oct 1, 2020 || Deadline for camera-ready papers
+
|Oct 1, 2020||Deadline for camera-ready papers
 
|}
 
|}
  

Latest revision as of 09:56, 17 October 2023

Deadlines
organization
Metrics
Venue
Loading map...

Also known as: IEEE ICPADS, International Conference on Parallel and Distributed Systems

Tracks and Topics

Algorithm Track

  • Algorithms for resource allocation
  • Algorithms for network optimization
  • Algorithms for parallel and distributed computing systems
  • Algorithms for distributed control systems
  • Algorithms for information security and privacy
  • Algorithms for artificial intelligence
  • Algorithms for energy efficient computing and communications
  • Algorithms for big data
  • Algorithms for cloud computing
  • Algorithms for databases and information retrieval
  • Algorithms for quantum computing
  • Algorithm analysis
  • Experimental algorithmics
  • Distributed/parallel algorithms and applicatio
  • High-performance Computing

Application Track

  • Edge Intelligence Applications
  • Big Data Applications
  • Smart City Applications
  • High Performance Computational Biology and Bioinformatics
  • Collective intelligence emerged from distributed systems
  • Internet of Things Applications
  • Distributed human-cyber-physical applications
  • Distributed and Federated Machine Learning
  • Blockchain applications
  • Data Analytics
  • Large-scale complex software systems
  • Distributed Autonomous Robotic Systems
  • Multi-agent learning algorithms and applications

Architecture Track

  • Multi-core and Massively Parallel Computing Architectures
  • Data Intensive Computing Architectures
  • IoT, Mobile and Embedded Architectures
  • Accelerator-based and Application-specific Architectures
  • Architecture Support for Dependability, Reliability and Security

Performance Track

  • Performance Modeling and analysis of Parallel or Distributed Computing
  • Design and experimental evaluation of Parallel or Distributed Systems
  • Simulation Models
  • Analytical Models
  • Measurement based Evaluation
  • Experimental Study of Large-scale Infrastructure
  • Innovations made in support of Performance Modeling and Evaluation

Security Track

  • Access control
  • Accounting and audit
  • Applied cryptography
  • Authentication
  • Big data security and privacy
  • Biometrics security
  • Blockchain security and privacy
  • Cloud computing security
  • Computer forensics
  • Cyber-physical system security
  • Data and application security
  • Embedded systems security
  • Formal methods for security
  • Hardware-based security and applications
  • IoT security and privacy
  • Key management
  • Malware and botnets
  • Mobile computing security
  • Network security
  • Operating system security
  • Practical post-quantum security
  • Privacy-enhancing technology
  • Runtime attacks and defenses
  • Secure computation
  • Security architectures
  • Security of critical infrastructures
  • Security metrics
  • Software security
  • Threat modeling
  • Trusted computing
  • Usable security and privacy
  • Web security
  • Wireless security and privacy

System Track

  • Distributed operating systems and middleware
  • Distributed fault tolerance and dependability
  • Cloud computing systems and data centers
  • Edge computing systems
  • Distributed big data systems and analytics
  • Parallel and distributed file and storage systems
  • Algorithms and theory for parallel and distributed systems
  • Formal verification of distributed systems
  • Blockchain systems
  • Distributed and federated machine learning systems

Important Dates

Jul 15, 2020 Deadline for full paper submissions
Sep 15, 2020 Notification of paper acceptance
Oct 1, 2020 Deadline for camera-ready papers


Committees

Steering Committee Chair

Lionel M. Ni, Hong Kong University of Science and Technology

General Chair

Jiannong Cao, The Hong Kong Polytechnic University

Peogram Chair

Song Guo, The Hong Kong Polytechnic University

Cookies help us deliver our services. By using our services, you agree to our use of cookies.