(mobo import Concept___Events-migrated) |
Curator 91 (talk | contribs) |
||
Line 2: | Line 2: | ||
|Acronym=ICPADS 2020 | |Acronym=ICPADS 2020 | ||
|Title=26th IEEE International Conference on Parallel and Distributed Systems | |Title=26th IEEE International Conference on Parallel and Distributed Systems | ||
− | | | + | |Ordinal=26 |
− | |||
− | |||
− | |||
− | |||
− | |||
|In Event Series=Event Series:ICPADS | |In Event Series=Event Series:ICPADS | ||
|Single Day Event=no | |Single Day Event=no | ||
Line 13: | Line 8: | ||
|End Date=2020/12/04 | |End Date=2020/12/04 | ||
|Event Status=as scheduled | |Event Status=as scheduled | ||
− | |Event Mode= | + | |Event Mode=online |
+ | |Academic Field=Parallel Systems; Distributed Systems; Computer Science | ||
+ | |Official Website=https://icpads2020.comp.polyu.edu.hk/ | ||
+ | |Type=Conference | ||
+ | |pageCreator=User:Curator 44 | ||
+ | |pageEditor=User:Curator 44 | ||
+ | |contributionType=1 | ||
}} | }} | ||
{{Event Deadline}} | {{Event Deadline}} | ||
+ | {{Organizer | ||
+ | |Contributor Type=organization | ||
+ | |Organization=IEEE Computer Society, Institute of Electrical and Electronics Engineers | ||
+ | }} | ||
+ | {{Event Metric}} | ||
{{S Event}} | {{S Event}} | ||
Also known as: IEEE ICPADS, International Conference on Parallel and Distributed Systems | Also known as: IEEE ICPADS, International Conference on Parallel and Distributed Systems | ||
Line 23: | Line 29: | ||
'''''Algorithm Track''''' | '''''Algorithm Track''''' | ||
− | * Algorithms for resource allocation | + | *Algorithms for resource allocation |
− | * Algorithms for network optimization | + | *Algorithms for network optimization |
− | * Algorithms for parallel and distributed computing systems | + | *Algorithms for parallel and distributed computing systems |
− | * Algorithms for distributed control systems | + | *Algorithms for distributed control systems |
− | * Algorithms for information security and privacy | + | *Algorithms for information security and privacy |
− | * Algorithms for artificial intelligence | + | *Algorithms for artificial intelligence |
− | * Algorithms for energy efficient computing and communications | + | *Algorithms for energy efficient computing and communications |
− | * Algorithms for big data | + | *Algorithms for big data |
− | * Algorithms for cloud computing | + | *Algorithms for cloud computing |
− | * Algorithms for databases and information retrieval | + | *Algorithms for databases and information retrieval |
− | * Algorithms for quantum computing | + | *Algorithms for quantum computing |
− | * Algorithm analysis | + | *Algorithm analysis |
− | * Experimental algorithmics | + | *Experimental algorithmics |
− | * Distributed/parallel algorithms and applicatio | + | *Distributed/parallel algorithms and applicatio |
− | * High-performance Computing | + | *High-performance Computing |
'''''Application Track''''' | '''''Application Track''''' | ||
− | * Edge Intelligence Applications | + | *Edge Intelligence Applications |
− | * Big Data Applications | + | *Big Data Applications |
− | * Smart City Applications | + | *Smart City Applications |
− | * High Performance Computational Biology and Bioinformatics | + | *High Performance Computational Biology and Bioinformatics |
− | * Collective intelligence emerged from distributed systems | + | *Collective intelligence emerged from distributed systems |
− | * Internet of Things Applications | + | *Internet of Things Applications |
− | * Distributed human-cyber-physical applications | + | *Distributed human-cyber-physical applications |
− | * Distributed and Federated Machine Learning | + | *Distributed and Federated Machine Learning |
− | * Blockchain applications | + | *Blockchain applications |
− | * Data Analytics | + | *Data Analytics |
− | * Large-scale complex software systems | + | *Large-scale complex software systems |
− | * Distributed Autonomous Robotic Systems | + | *Distributed Autonomous Robotic Systems |
− | * Multi-agent learning algorithms and applications | + | *Multi-agent learning algorithms and applications |
'''''Architecture Track''''' | '''''Architecture Track''''' | ||
− | * Multi-core and Massively Parallel Computing Architectures | + | *Multi-core and Massively Parallel Computing Architectures |
− | * Data Intensive Computing Architectures | + | *Data Intensive Computing Architectures |
− | * IoT, Mobile and Embedded Architectures | + | *IoT, Mobile and Embedded Architectures |
− | * Accelerator-based and Application-specific Architectures | + | *Accelerator-based and Application-specific Architectures |
− | * Architecture Support for Dependability, Reliability and Security | + | *Architecture Support for Dependability, Reliability and Security |
'''''Performance Track''''' | '''''Performance Track''''' | ||
− | * Performance Modeling and analysis of Parallel or Distributed Computing | + | *Performance Modeling and analysis of Parallel or Distributed Computing |
− | * Design and experimental evaluation of Parallel or Distributed Systems | + | *Design and experimental evaluation of Parallel or Distributed Systems |
− | * Simulation Models | + | *Simulation Models |
− | * Analytical Models | + | *Analytical Models |
− | * Measurement based Evaluation | + | *Measurement based Evaluation |
− | * Experimental Study of Large-scale Infrastructure | + | *Experimental Study of Large-scale Infrastructure |
− | * Innovations made in support of Performance Modeling and Evaluation | + | *Innovations made in support of Performance Modeling and Evaluation |
'''''Security Track''''' | '''''Security Track''''' | ||
− | * | + | * |
− | * Access control | + | *Access control |
− | * Accounting and audit | + | *Accounting and audit |
− | * Applied cryptography | + | *Applied cryptography |
− | * Authentication | + | *Authentication |
− | * Big data security and privacy | + | *Big data security and privacy |
− | * Biometrics security | + | *Biometrics security |
− | * Blockchain security and privacy | + | *Blockchain security and privacy |
− | * Cloud computing security | + | *Cloud computing security |
− | * Computer forensics | + | *Computer forensics |
− | * Cyber-physical system security | + | *Cyber-physical system security |
− | * Data and application security | + | *Data and application security |
− | * Embedded systems security | + | *Embedded systems security |
− | * Formal methods for security | + | *Formal methods for security |
− | * Hardware-based security and applications | + | *Hardware-based security and applications |
− | * IoT security and privacy | + | *IoT security and privacy |
− | * Key management | + | *Key management |
− | * Malware and botnets | + | *Malware and botnets |
− | * Mobile computing security | + | *Mobile computing security |
− | * Network security | + | *Network security |
− | * Operating system security | + | *Operating system security |
− | * Practical post-quantum security | + | *Practical post-quantum security |
− | * Privacy-enhancing technology | + | *Privacy-enhancing technology |
− | * Runtime attacks and defenses | + | *Runtime attacks and defenses |
− | * Secure computation | + | *Secure computation |
− | * Security architectures | + | *Security architectures |
− | * Security of critical infrastructures | + | *Security of critical infrastructures |
− | * Security metrics | + | *Security metrics |
− | * Software security | + | *Software security |
− | * Threat modeling | + | *Threat modeling |
− | * Trusted computing | + | *Trusted computing |
− | * Usable security and privacy | + | *Usable security and privacy |
− | * Web security | + | *Web security |
− | * Wireless security and privacy | + | *Wireless security and privacy |
'''''System Track''''' | '''''System Track''''' | ||
− | * Distributed operating systems and middleware | + | *Distributed operating systems and middleware |
− | * Distributed fault tolerance and dependability | + | *Distributed fault tolerance and dependability |
− | * Cloud computing systems and data centers | + | *Cloud computing systems and data centers |
− | * Edge computing systems | + | *Edge computing systems |
− | * Distributed big data systems and analytics | + | *Distributed big data systems and analytics |
− | * Parallel and distributed file and storage systems | + | *Parallel and distributed file and storage systems |
− | * Algorithms and theory for parallel and distributed systems | + | *Algorithms and theory for parallel and distributed systems |
− | * Formal verification of distributed systems | + | *Formal verification of distributed systems |
− | * Blockchain systems | + | *Blockchain systems |
− | * Distributed and federated machine learning systems | + | *Distributed and federated machine learning systems |
==Important Dates== | ==Important Dates== | ||
Line 126: | Line 132: | ||
{| class="wikitable" | {| class="wikitable" | ||
|- | |- | ||
− | | Jul 15, 2020 || Deadline for full paper submissions | + | |Jul 15, 2020||Deadline for full paper submissions |
|- | |- | ||
− | | Sep 15, 2020 || Notification of paper acceptance | + | |Sep 15, 2020||Notification of paper acceptance |
|- | |- | ||
− | | Oct 1, 2020 || Deadline for camera-ready papers | + | |Oct 1, 2020||Deadline for camera-ready papers |
|} | |} | ||
Revision as of 12:05, 16 October 2023
The document "ICPADS 2020" was published on "2023-10-17T09:56:15" on the website "ConfIDent" under the URL https://confident-conference.org/index.php/Event:ICPADS 2020.
The document "ICPADS 2020" describes an event in the sense of a conference.
The document "ICPADS 2020" contains information about the event "ICPADS 2020" with start date "2020/12/02" and end date "2020/12/04".
The event "ICPADS 2020" is part of the event series identified by [[Event Series:ICPADS]]
Deadlines
Metrics
Venue
Warning: Venue is missing. The map might not show the exact location.
Also known as: IEEE ICPADS, International Conference on Parallel and Distributed Systems
Tracks and Topics
Algorithm Track
- Algorithms for resource allocation
- Algorithms for network optimization
- Algorithms for parallel and distributed computing systems
- Algorithms for distributed control systems
- Algorithms for information security and privacy
- Algorithms for artificial intelligence
- Algorithms for energy efficient computing and communications
- Algorithms for big data
- Algorithms for cloud computing
- Algorithms for databases and information retrieval
- Algorithms for quantum computing
- Algorithm analysis
- Experimental algorithmics
- Distributed/parallel algorithms and applicatio
- High-performance Computing
Application Track
- Edge Intelligence Applications
- Big Data Applications
- Smart City Applications
- High Performance Computational Biology and Bioinformatics
- Collective intelligence emerged from distributed systems
- Internet of Things Applications
- Distributed human-cyber-physical applications
- Distributed and Federated Machine Learning
- Blockchain applications
- Data Analytics
- Large-scale complex software systems
- Distributed Autonomous Robotic Systems
- Multi-agent learning algorithms and applications
Architecture Track
- Multi-core and Massively Parallel Computing Architectures
- Data Intensive Computing Architectures
- IoT, Mobile and Embedded Architectures
- Accelerator-based and Application-specific Architectures
- Architecture Support for Dependability, Reliability and Security
Performance Track
- Performance Modeling and analysis of Parallel or Distributed Computing
- Design and experimental evaluation of Parallel or Distributed Systems
- Simulation Models
- Analytical Models
- Measurement based Evaluation
- Experimental Study of Large-scale Infrastructure
- Innovations made in support of Performance Modeling and Evaluation
Security Track
- Access control
- Accounting and audit
- Applied cryptography
- Authentication
- Big data security and privacy
- Biometrics security
- Blockchain security and privacy
- Cloud computing security
- Computer forensics
- Cyber-physical system security
- Data and application security
- Embedded systems security
- Formal methods for security
- Hardware-based security and applications
- IoT security and privacy
- Key management
- Malware and botnets
- Mobile computing security
- Network security
- Operating system security
- Practical post-quantum security
- Privacy-enhancing technology
- Runtime attacks and defenses
- Secure computation
- Security architectures
- Security of critical infrastructures
- Security metrics
- Software security
- Threat modeling
- Trusted computing
- Usable security and privacy
- Web security
- Wireless security and privacy
System Track
- Distributed operating systems and middleware
- Distributed fault tolerance and dependability
- Cloud computing systems and data centers
- Edge computing systems
- Distributed big data systems and analytics
- Parallel and distributed file and storage systems
- Algorithms and theory for parallel and distributed systems
- Formal verification of distributed systems
- Blockchain systems
- Distributed and federated machine learning systems
Important Dates
Jul 15, 2020 | Deadline for full paper submissions |
Sep 15, 2020 | Notification of paper acceptance |
Oct 1, 2020 | Deadline for camera-ready papers |
Committees
Steering Committee Chair
Lionel M. Ni, Hong Kong University of Science and Technology
General Chair
Jiannong Cao, The Hong Kong Polytechnic University
Peogram Chair
Song Guo, The Hong Kong Polytechnic University