Conference Information
ICACES 2021: International Conference on Advanced Computing and Endogenous Security
http://ices.xintongconference.com/en/web/page
Submission Date:
2021-09-10 Extended
Notification Date:
2021-10-10
Conference Date:
2021-10-30
Location:
Nanjing, China
Viewed: 6099   Tracked: 2   Attend: 1

Call For Papers
1. The scope of papers including but not limited to the following scopes:

Ø  Advanced Computing

l  Z-level computing architecture and key technologies
l  Mimi computing, memory computing, graph computing, cloud computing, quantum computing, brain-like computing, superconducting computing and other new computing architectures and application systems
l  Software and hardware collaborative computing platform and innovative application system based on new architecture
l  New operating systems, runtime systems, data management systems, compilation and programming languages, programming environments, etc
l  Software/hardware co-design technology and ecological environment based on new computing architectures
l  New large-scale scientific and engineering software
l  Instruction sets for new processors and accelerators, microstructure, memory structure, interconnection and transmission technologies, programming mode,etc
l  RISC-V-based architecture design, hardware accelerator design
l  Soft and hard collaborative computing chip design based on Chiplet and wafer scale integration
l  Artificial intelligence chip brain, software defined chip, architecture for open source field, a heterogeneous system on a chip, saving calculation integration chip, perception fusion, lightweight edge intelligent chip, etc
l  Full-process EDA/IP tools, logic manufacturing technology, memory-specific manufacturing technology, power and analog chip technology, etc
l  Innovative technologies such as non Von Neumann computing architecture, software-defined chips, and AI-supported design automation (EDA), etc
l  New application technologies and systems such as photoelectric sensing and communication, photoelectric computing and storage, photoelectric imaging and display, etc
l  Intelligent computing systems and applications based on technologies such as software and hardware collaborative processing, dynamic resource combination, and network component reconstruction, etc

Ø Endogenous Security

l  Mimic defense technology, moving target defense technology, design security technology, customized trusted space
l  Software defined security technology, AI-driven security technology, zero-trust security technology, secure multi-party computation technology
l  Next-generation network endogenous security technology, 5G endogenous security technology, Space-Ground Integrated Network endogenous security technology, artificial intelligence endogenous security technology, industrial Internet endogenous security technology, etc
l  Chip endogenous security technology, information system endogenous security technology, cloud computing and data center endogenous security technology
l  Application endogenous security design and implementation technology, network service endogenous security technology implementation technology
l  Design and implementation technology for industry specific applications and services endogenous security, such as telecommunications, IDC, finance, medical, special trade, etc
l  Key software and hardware components of endogenous security technology, such as I / O proxy, arbiter and scheduler that used mimic technology to enhance security, also include mimic acceleration and performance optimization technology and endogenous security co-design method of software and hardware
l  Endogenous security supported technology, endogenous security programming language, endogenous security tool chains and tool libraries, endogenous security compiler and development environment
l  Endogenous security open sources and platform construction technology
l  Measurement and evaluation model, performance quantitative design method, and test evaluation method of endogenous security technology
l  Endogenous security white box injection test and black box confrontation test method, endogenous security technology test site construction technology, etc
Last updated by Dou Sun in 2021-08-19
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ICC'International Conference on Intelligent Cloud Computing2016-09-14 2016-12-17
ICDMECInternational Conference on Disaster Management and E-Commerce2022-04-092022-04-102022-05-13
Artificial IntelligenceInternational Conference on Automation and Artificial Intelligence2022-06-012021-11-302020-05-21
cREFSQRequirements Engineering: Foundation for Software Quality2024-11-012025-01-132025-04-07
CSEIInternational Conference on Computer Science and Educational Informatization2023-05-012023-05-202023-08-11
AIBTInternational Conference on Artificial Intelligence and Blockchain Technology2020-03-152020-04-152020-07-31
ICITNEInternational Conference on Information Technology and Network Engineering2017-10-20 2017-12-16
RAMInternational Conference on Robotics, Automation and Mechatronics2015-01-312015-03-312015-07-15
ICTIRACM SIGIR International Conference on the Theory of Information Retrieval2020-05-112020-06-302020-09-14
WCECSWorld Congress on Engineering and Computer Science2015-07-23 2015-10-21
Related Journals
CCFFull NameImpact FactorPublisherISSN
cNeural Processing Letters2.600Springer1370-4621
aInformation and Computation0.800Elsevier0890-5401
International Journal of Health Geographics3.000Springer1476-072X
bIEEE Transactions on VLSI Systems2.800IEEE1063-8210
cArtificial Intelligence in Medicine6.100Elsevier0933-3657
bACM Transactions on Autonomous and Adaptive Systems2.200ACM1556-4665
IEEE Control Systems Letters2.400IEEE2475-1456
Computer Science - Research and DevelopmentSpringer1865-2034
bAlgorithmica0.900Springer0178-4617
Journal on Computing and Cultural Heritage2.400ACM1556-4673
Recommendation