Conference Information
ICACES 2021: International Conference on Advanced Computing and Endogenous Security
http://ices.xintongconference.com/en/web/pageSubmission Date: |
2021-09-10 Extended |
Notification Date: |
2021-10-10 |
Conference Date: |
2021-10-30 |
Location: |
Nanjing, China |
Viewed: 6099 Tracked: 2 Attend: 1
Call For Papers
1. The scope of papers including but not limited to the following scopes: Ø Advanced Computing l Z-level computing architecture and key technologies l Mimi computing, memory computing, graph computing, cloud computing, quantum computing, brain-like computing, superconducting computing and other new computing architectures and application systems l Software and hardware collaborative computing platform and innovative application system based on new architecture l New operating systems, runtime systems, data management systems, compilation and programming languages, programming environments, etc l Software/hardware co-design technology and ecological environment based on new computing architectures l New large-scale scientific and engineering software l Instruction sets for new processors and accelerators, microstructure, memory structure, interconnection and transmission technologies, programming mode,etc l RISC-V-based architecture design, hardware accelerator design l Soft and hard collaborative computing chip design based on Chiplet and wafer scale integration l Artificial intelligence chip brain, software defined chip, architecture for open source field, a heterogeneous system on a chip, saving calculation integration chip, perception fusion, lightweight edge intelligent chip, etc l Full-process EDA/IP tools, logic manufacturing technology, memory-specific manufacturing technology, power and analog chip technology, etc l Innovative technologies such as non Von Neumann computing architecture, software-defined chips, and AI-supported design automation (EDA), etc l New application technologies and systems such as photoelectric sensing and communication, photoelectric computing and storage, photoelectric imaging and display, etc l Intelligent computing systems and applications based on technologies such as software and hardware collaborative processing, dynamic resource combination, and network component reconstruction, etc Ø Endogenous Security l Mimic defense technology, moving target defense technology, design security technology, customized trusted space l Software defined security technology, AI-driven security technology, zero-trust security technology, secure multi-party computation technology l Next-generation network endogenous security technology, 5G endogenous security technology, Space-Ground Integrated Network endogenous security technology, artificial intelligence endogenous security technology, industrial Internet endogenous security technology, etc l Chip endogenous security technology, information system endogenous security technology, cloud computing and data center endogenous security technology l Application endogenous security design and implementation technology, network service endogenous security technology implementation technology l Design and implementation technology for industry specific applications and services endogenous security, such as telecommunications, IDC, finance, medical, special trade, etc l Key software and hardware components of endogenous security technology, such as I / O proxy, arbiter and scheduler that used mimic technology to enhance security, also include mimic acceleration and performance optimization technology and endogenous security co-design method of software and hardware l Endogenous security supported technology, endogenous security programming language, endogenous security tool chains and tool libraries, endogenous security compiler and development environment l Endogenous security open sources and platform construction technology l Measurement and evaluation model, performance quantitative design method, and test evaluation method of endogenous security technology l Endogenous security white box injection test and black box confrontation test method, endogenous security technology test site construction technology, etc
Last updated by Dou Sun in 2021-08-19
Related Conferences
Short | Full Name | Submission | Conference |
---|---|---|---|
ICC' | International Conference on Intelligent Cloud Computing | 2016-09-14 | 2016-12-17 |
ICDMEC | International Conference on Disaster Management and E-Commerce | 2022-04-09 | 2022-05-13 |
Artificial Intelligence | International Conference on Automation and Artificial Intelligence | 2022-06-01 | 2020-05-21 |
REFSQ | Requirements Engineering: Foundation for Software Quality | 2024-11-01 | 2025-04-07 |
CSEI | International Conference on Computer Science and Educational Informatization | 2023-05-01 | 2023-08-11 |
AIBT | International Conference on Artificial Intelligence and Blockchain Technology | 2020-03-15 | 2020-07-31 |
ICITNE | International Conference on Information Technology and Network Engineering | 2017-10-20 | 2017-12-16 |
RAM | International Conference on Robotics, Automation and Mechatronics | 2015-01-31 | 2015-07-15 |
ICTIR | ACM SIGIR International Conference on the Theory of Information Retrieval | 2020-05-11 | 2020-09-14 |
WCECS | World Congress on Engineering and Computer Science | 2015-07-23 | 2015-10-21 |
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
c | Neural Processing Letters | 2.600 | Springer | 1370-4621 |
a | Information and Computation | 0.800 | Elsevier | 0890-5401 |
International Journal of Health Geographics | 3.000 | Springer | 1476-072X | |
b | IEEE Transactions on VLSI Systems | 2.800 | IEEE | 1063-8210 |
c | Artificial Intelligence in Medicine | 6.100 | Elsevier | 0933-3657 |
b | ACM Transactions on Autonomous and Adaptive Systems | 2.200 | ACM | 1556-4665 |
IEEE Control Systems Letters | 2.400 | IEEE | 2475-1456 | |
Computer Science - Research and Development | Springer | 1865-2034 | ||
b | Algorithmica | 0.900 | Springer | 0178-4617 |
Journal on Computing and Cultural Heritage | 2.400 | ACM | 1556-4673 |
Full Name | Impact Factor | Publisher |
---|---|---|
Neural Processing Letters | 2.600 | Springer |
Information and Computation | 0.800 | Elsevier |
International Journal of Health Geographics | 3.000 | Springer |
IEEE Transactions on VLSI Systems | 2.800 | IEEE |
Artificial Intelligence in Medicine | 6.100 | Elsevier |
ACM Transactions on Autonomous and Adaptive Systems | 2.200 | ACM |
IEEE Control Systems Letters | 2.400 | IEEE |
Computer Science - Research and Development | Springer | |
Algorithmica | 0.900 | Springer |
Journal on Computing and Cultural Heritage | 2.400 | ACM |
Recommendation