CANDAR'16
The Fourth International Symposium on Computing and Networking
Hiroshima, Japan, November 22-25, 2016
Technically Cosponsored by
Venue
Introduction
Following the success of past ICNC conferences, 2010 in Hiroshima, 2011 in Osaka, and 2012 in Okinawa, and CANDAR symposiums 2013 in Matsuyama, 2014 in Shizuoka, 2015 in Sapporo, CANDAR 2016 will be held in Hiroshima, Japan. CANDAR 2016 will serve as a forum for exchanging the latest findings and experiences ranging from theoretical research to practical system development in all aspects of computing and networking including parallel and distributed systems, algorithms, architectures, and applications. In addition to technical sessions consisting of contributed papers, the symposium will include invited presentations, a poster session, tutorials, and workshops. We believe that participants will get new ideas and insight of computing and networking. CANDAR'16 will be held in Hiroshima, Japan, from November 22-25, 2016. Hiroshima has two world heritage sites, Itsukushima Shrine and Atomic Bomb Dorm. It is the best season to visit Itsukushima Shrine in November for autumn leaves and colors around the Shrine.
Publication
The symposium and workshop proceedings will be published by Conference Publishing Service and submitted to IEEE Xplore and CSDL digital libraries. Also they are submitted for indexing through INSPEC, EI (Compendex), Thomson ISI, and other indexing services.
Scope and Interests
The symposium invites papers on all aspects of parallel and distributed computing and networking, and their applications. Topics of interest include, but are not limited to:
Track1: Algorithms and Applications
- Randomized algorithms and probabilistic methods
- Scientific computing and numeric algorithms
- Approximation and optimization algorithms
- Image processing and computer graphics
- Dependable computing and reliability
- Data mining and information retrieval
- Real-time systems and applications
- Parallel and distributed algorithms
- Intelligent systems and computing
- Green computing and networking
- Stochastic modeling and analysis
- Software and system verification
- Wired and wireless networking
- Performance evaluation
- Multicore and multithreaded computing
- Scheduling and load balancing
- Theoretical foundations for big data
Track 2:Architecture and Computer System
- Processor architectures
- Instruction, thread, and data-level parallelism
- Multi/Many-core architectures
- Power efficient architectures
- Accelerators
- Reconfigurable architectures
- CUDA/GPGPU
- Network-on-chip
- Emerging devices and their effect
- Embedded systems
- Dependable systems
- Parallel/High-performance systems
- Application specific systems
- Storage systems
- Architectures/systems for emerging applications
Track 3: Networking and Grid
- Interconnection networks
- Ubiquitous computing systems
- Grid computing systems
- Resource allocation and management
- Cloud computing
- P2P networks
- Content delivery networks
- Wireless networks and mobile computing
- Ad-hoc and sensor networks
- Optical networks
- Access control and authorization
- Security protocols
- Cognitive Computing and Networking
- Opportunist Spectrum Allocation and Sensing
- QoS and Multimedia Computing
- Green Communications and Networking
- Vehicle Communications
- Network Architecture
- Network Algorithms and Performance Evaluation
- Future Internet and Internet of Things
- Self-Organizing Networks
Track 4: Software and Middleware
- Software System Architecture
- Web Services and SOA
- REST
- Internet/Distributed Computing
- Information Fusion
- Middleware Architecture
- Internet Middleware
- Access Control Technologies
- Information Filtering and Recommendation
- Component based Technologies
- Agent Technologies
- BYOD Technologies
- System Software
- Programming Language Processors
- Runtime Environment
- Operating Systems
- VM Technologies
- Software Tools
- Distributed Data and Knowledge based Systems
- Geographic Information Systems
- Simulation and Visualization
Track 5: Information and Communication Security
- Authentication
- Block and Stream Ciphers
- Biometrics
- Cryptanalysis
- Cryptographic Protocols
- Digital Signatures
- Efficient Implementations
- Hash Functions
- Network Security
- Privacy Enhancement
- Public Key Cryptosystems
- System Security
Inquiry
Please do not hesitate to write to organizer16@is-candar.org