Call for Paper

anisesecretaryMobile - Wireless

Dec 12, 2013 (3 years and 11 months ago)

118 views


1

Call for Paper


CyberC
2012
:

The
4
th

International Conference on Cyber
-
Enabled
Distributed Computing and Knowledge Discovery


Sanya
,

Hainan,

China, October 10

-

12
,
2012


(
www.cyberc.org
)


CyberC promotes research and

development of
the cyber
-
related technology and it

is unique and
significant that spans through cyber
-
enabled data mining and knowledge discovery, distributed and
parallel computing, cyber security, cloud computing, pervasive computing, mobile computing,
Internet,
wireless networks, cognitive systems, cyber information process, information discovery, e
-
health via cyber
network, e
-
science, web technology, and network performance and tools. The research and development
in these areas have received extensive
attention in both the academia and industry to provide ubiquitous
services for users. Various hardware and software designs, algorithms, protocols, simulations, and test
-
bed, and implementations are developed for distributed computing in an interconnected
and distributed
network environment. The purpose of CyberC is to provide a forum for presentation and discussion of
innovative ideas, research results, applications and experience from around the world as well as highlight
activities in the related areas.



CyberC has been held
since

2009 and CyberC 2012 (the fourth CyberC) continues the aim to provide a
forum for presentation and discussion of innovative ideas, research results, applications, and experience
from around the world as well as highlight activ
ities in the related areas. The conference focuses on all
aspects of distributed computing and knowledge mining and their scientific, engineering, and commercial
applications.

The topics of interests include, but not limited to:

Data Mining and Informatio
n Discovery

Agent
-
based

distributed data mining algorithms

Data

streaming, multimedia, stream,
or web mining

Information discovery in data mining

Data mining applications for bioinformations and biometrics

Database applications and data mining

Security and

information assurance in data mining



Parallel and Distributed Computing

Parallel and distributed algorithms

Resource allocation, load
-
balance, and management in distributed computing

Grid and cluster computing

Clouding computing

SOA, Web services, and m
obile services

Web
-
caching
, content delivery systems

and data distribution systems

Web services and internet computing

Distributed systems and applications, modeling language, and software engineeri
ng for

distributed applications

Pervasive/ubiquitous computing and intelligence

Biological/molecular computing



Mobile and Internet Computing

Wireless ad hoc networks, wireless mesh networks, networking theory and algorithms

Wireless embedded sensor systems and security

Cognitive radio

and SDR

Future generation communications for 4G or beyond (WiMAX, LTE)

Peer
-
to
-
peer network computing and overlaying networks


2

Mobile IP and Internet technology

Key, attacking models, privacy, confidentiality, and security in Mobile Wireless Networks

Commu
nication, services, middleware, and multimedia on wireless networks

QoS, reliability, performance, and communication theory

Wireless network simulations, implementation, and applications


Cloud Computing

Autonomic, Real
-
Time and Self
-
Organizing
Cloud
s

Arc
hitectural models for

public and private

cloud computing

Cloud resource management and allocation

Utility models and service pricing

New parallel / concurrent programming models for cloud computing

Scientific computation and other applications in the cloud

Workflows for cloud computing

Content Delivery Networks using Storage Clouds

Es
cience and Grid applications

Es
cience workflow management

Web semantics for Es
cience

Ontologies and databases for Es
cience

Data and process provenance



Performance and
User E
xperience

Performance evaluation, measurement and optimization

Tools, test
-
bed, simulations, and

experimental

environments

for user experience measurement

Collaborative and cooperative environments

Autonomic, reliability, and fault
-
tolerance

Authentication
, trust, privacy and other security issues

QoS for improve

user experience


Important Days


March

15
,
2012

-

Conference Paper Submission Deadline

June 15
,
2012

-

Notification of Acceptance/Rejection & Registration Starts

August 1
,
2012

-

Camera
-
Ready Paper

Submission Due & Registration Due


Program Committee


Honor
able

General Chair

David Lu,
AT&T
Enterprise IT
, USA


General Co
-
Chairs

Mahmoud Daneshmand, AT&T Labs, USA

Ratan Ghosh, Indian Institute of Technology, Kanpur, India


Program Co
-
Chairs

Bin Xie, In
foBeyond Technology LLC, USA

Charlie Yang
,
AT&T Labs, USA


Finance Chair

Yingbing Yu, Austin Peay State University, USA

Sanjuli Agrawal, Indiana University Southeast, USA


Publicity Co
-
Chairs

Na Bai, Southeast University, China

J.Octavio Gutierrez
-
Garcia,
Gwangju Institute of Science and Technology, Republic of Korea

Ezziyyani Mostafa
,

University abdelmalk Essaâdi
,
Morocco


3

Shyan
-
mi
ng Yuan, Providence University,
Taiwan


Workshop Co
-
Chairs

Charlie Yang, AT&T Labs, USA

Chi
-
Tsun Cheng
,
University of Calgary
,
Canada

Bin Xie, InfoBeyond Technology LLC, USA


Local Coordination Co
-
Chairs

Dongmei Sun, Beijing Jiaotong University, China

Qingwen Han, Congqing University, China


Steering Committee

Anup Kumar, (Chair) University of Louisville, USA

Ratan Ghosh, Indian
Institute of Technology, Kanpur, India

Qing
-
An Zheng, North Carolina A&T University, USA

Chi
-
Ming Chen, AT&T, USA

Liang
-
Jie Zhang,
IBM Thomas J. Watson Research Center, USA


Program Committee

Abraham George, Keyocera, India

Alok Srivastava, Microsoft Resea
rch, USA

Arturo Gonzalez
-
Escribano, University of Valladolid, Spain

Ash Mohammad Abbas, Aligarh Muslim University, India

Baoqiang Yan, Missouri Western State University, USA

Berk Canberk, Istanbul Technical University, Turkey

Bin Zhou, National University
of Defense Technology, China

Chin
-
Ling Chen, National Pingtung Institute of Commerce, Taiwan

Chung
-
Hua Chu, National Taichung Institute of Technology, Taiwan

Dexing Zhong, Xi’an Jiaotong University
, China

Diego R. Llanos, University of Valladolid, Spain

Er
ic Chen, NTT Corporation
,

Japan

Fernando Zacarias
-
Flores, Benemerita Universidad Autonoma de Puebla, MX

Fouad Chedid, Notre Dame University


Louaize, Lebanon

Guey
-
Yun Chang
,

National Central University
, Taiwan

Hao Zhang, Central South University, China

H
end Al
-
Khalifa, King Saud University, Saudi Arabia

Jaeho Choi, Chonbuk National University, Korea

Jan
-
Jan Wu, Institute of Information Science, Taiwan

Jen
-
Jee Chen, National University of Taiwan, Taiwan

Jens
-
Matthias Bohli, NEC Laboratories Europe, Germany

Jinfang Sheng, Central South University, China

Lanxiang Chen, Fujian Normal University, China

Li

Zeng, University of Texas at Arlington, USA

Li Zhao,

Microsoft Corporation
, USA

Liyu Xu, Excel Directional Technologies, USA

Maiga Chang, Athabasca University
, Canada

Maximilien Gadouleau
,
Queen Mary, University of London
, UK

Min Zhu, SiChuan University, China

Mohamed Farouk Abdel Hady, University of Ulm, Germany

Mohammed Abdala
,
AL
-
Nahrain University
, Iraq

Narendra Chaudhari, Indian Institute of Technology Ind
ore, India

Narisa Chu, CWLab International, Ltd., USA

Nedal Ababneh, Telecom Pairs, France

Patrick Hung, University of Ontario Institute of Technology, Canada

Raju Gottumukkala, University of Louisiana at Lafayette, USA

Rasha Osman,
Imperial College of Lon
don
, UK


4

Rich Lee, IBM, Taiwan

Rosalina Abd. Salam, Universiti Sains Islam Malaysia, Malaysia

Rossana Maria de Castro, Andrade Federal University of Ceará, Brazil

Ruhani Ab. Rahman
,

Universiti Teknologi MARA,
Malaysia

Rui Tan, Michigan State University, USA

Sameh Abdel
-
Naby,

University College Dublin
,
Ireland


SK Basu, Banaras Hindu University, India

Stefano Berretti, University of Florence, Italy

Subin Shen, Nanjing University of Posts & Telecommunications, China

Sun
-
Yuan Hsieh, National Cheng Kung Universi
ty, Tainan

Tao Ma, Beijing University of Posts and Telecommunications, China

Taoi Hsu, Shih Hsin University, Taiwan

Visvasuresh Victor Govindaswamy
,
Texas A&M University
-
Texarkana
, USA

Wei Guo, Nanjing University of Information Science and Technology, Chin
a

Wei Wei, Xi'an Jiaotong University, China

Weixing Wang, South China Agricultural University, China

Xiaoyan Zhu
,
Xidian University
, China

Y. Tanaka, Hokkaido University, Japan

Yang Liu, University of Louisville, USA

Yangjun Chen, Winnipeg University, Cana
da

Yili Gong
, Wuhan University, China

Yong Zhao, University of Electronic and Science Technology of China, China

Yun Huoy Choo, Universiti Teknikal Malaysia Melaka, Malaysia

Zhengbao Li, Shandong Academy of Sciences, China



Manuscript Guidelines


P
aper Su
bmission W
eb:
http://edas.info/

by clicking on CyberC 2012

Paper S
ubmission Email:
Papers@cyberc.org


All submitted manuscripts should be prepared as technical papers and may not ex
ceed 8 letter size (8.5 x
11) pages including figures, tables and references using the IEEE format for conference proceedings
(print area of 6
-
1/2 inches (16.51 cm) wide by 8
-
7/8 inches (22.51 cm) high, two
-
column format with
columns 3
-
1/16 inches (7.85 cm
) wide with a 3/8 inch (0.81 cm) space between them, single
-
spaced 10
-
point Times fully justified text). For more information please see
ftp://pubftp.computer.org/Press/
Outgoing/proceedi
ngs/
. Submissions not conforming to these guidelines may be returned without review.
The submitted manuscripts can be prepared in Word, or Latex using the IEEE templates, but authors
should finally submit the manuscript in PDF format and make sure that th
e file will print on a printer that
uses letter size (8.5 x 11) paper. The official language of the meeting is English.


Manuscript submission procedure is available over the Web at

http://edas.info/
. We encourage you to

use
edas online submission by selecting “CyberC
2012
”. If you have troubles in using the Web submission,
you can also submit your paper to
papers@cyberc.org

or contact us. Electronic submissions must be in
the form

of a readable PDF file.


Submitted manuscripts have to present the original unpublished research that is not currently under
review for any other conference or journal. Papers not following these guidelines will be rejected without
review and further ac
tion may be taken, including (but not limited to) notifications sent to the heads of the
institutions of the authors and sponsors of the conference. Submissions received after the due date,
exceeding length limit, or not appropriately structured may also n
ot be considered.


Paper Acceptance


Manuscripts should present the current research in the areas identified in the call for papers. All
submitted manuscripts will be reviewed by experts in the fields and will be judged from the aspects of

5

problem signifi
cance, contributions, originality, correctness, technical strength, quality of presentation,
and relevance to the conference attendees. Papers will be accepted with Regular Papers and Short
Pa
pers with maximal 8 pages and 4

pages in the final version respe
ctively.


Publications

All accepted and presented papers, including the workshops’ papers, will be published by IEEE Computer
Society's Conference Publishing Services (CPS) and are included in the IEEE Xplore database. They will
be further arranged for i
ndexing through IEE INSPEC, EI (Compendex), and Thomson ISI. Authors of
accepted papers, or at least one of them, should register and present their work at the conference,
otherwise their papers will be removed from the digital libraries of IEEE Xplore and

EI after the
conference.


CyberC Facebook




http://www.facebook.com/groups/nasirsyed.utp/



CyberC Weibo


http://weibo.com/u/2500282610



Contac
t:

For more information about the conference, please visit
www.CyberC.org

or contact
us

at
Papers@CyberC.org
.