您现在的位置: 369会网 >> 学术交流会 >> 北京 >> 正文

2010年6月25日-27日北京·2010IEEE无线通信,网络技术与信息安全国际会议(WCNIS2010)

发布人:icis09    更新时间:2009/10/22 18:15:26    点击数:2742

会议英文名称:2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS2010)

IEEE北京分会、上海交通大学、北京邮电大学、厦门大学等单位共同组织的“2010IEEE无线通信,网络技术与信息安全国际会议(WCNIS2010)”将于2010625-27日在中国首都北京召开,会期将征收一批优秀论文,所有被本次会议录用的论文都会被IEEE XploreEIISTP收录。

征文领域如下,但不限如此:

 

Wireless Communication Systems Symposium
● Cooperative Communications
● Cognitive Radio and Software Defined Radio
● Coding, Modulation and Diversity Techniques
● Channel Measurement and Modelling
● Cross-Layer Design and Optimization
● Distributed Space-Time Techniques
● Joint Source-channel Coding for Wireless Communications
● Multi-cell Cooperation
● Multi-hop transmission
● Wireless Multicasting
● MIMO and Space-Time Coding
● Multi-user Detection, Signal Separation and Interference Rejection
● Mobility and Localization Techniques
● Network Coding
● OFDM and Multi-Carrier Systems
● Opportunistic Scheduling
● Resource Allocation and Interference Management
● Synchronization
● Satellite Communications
● Short range communications
● Ultra-wideband Communications

Communications Theory and Signal Processing Symposium
● Adaptive Antenna Arrays
● Adaptive Modulation and Coding
● Channel Estimation, Modeling and Equalization
● Coding for OFDM and Multi-carrier Systems
● Channel Capacity and Channel Coding
● CDMA and Spread Spectrum
● Diversity and Fading Countermeasures
● Hardware and Implementation
● Information Theory
● Iterative Techniques, Detection and Decoding
● Interference Management, Cancellation, Avoidance
● Network Information Theory and Coding
● Network Coding
● Performance Analysis for wireless channels
● Space-time Coding and Processing
● Source Coding and Data Compression
● SP for Software Defined Radio
● Signal Detection, and Synchronization
● Spectrum Sensing for Cognitive Radios
● Speech, Image and Video Signal Processing for communications
● Turbo, LDPC and Other Channel Codes

Wireless Network Symposium
● Architectural design and operation models
● Body-area wireless networks
● Cellular systems (2G/2.5G/3G/4G and beyond)
● Cross-layer design and optimization
● Deep space communications
● Delay/Disruption tolerant wireless networks
● End-to-end protocol, flow and congestion control
● Fault-tolerance and traffic reliability issues
● Inter-networking of wireless heterogeneous and multi-tier networks
● Satellite systems, proxy and gateways
● Multimode wireless networks
● MAC schemes
● Mobile Routing/Switching and multicasting protocols
● Network planning, capacity analysis, and topology control
● WMAN, and other broadband wireless access technologies
● WLAN, WPAN, and other home/personal network technologies
● Pervasive and wearable computing
● Power management and control, and energy conservation techniques
● Resource management, mobility management, and admission control
● Service-centric and overlay networks
● Test-beds and deployment
● User cooperation and incentive schemes
● Validation and verification schemes
● Wireless wide area networks
● Wireless networks for vehicle, underwater, UAVs communications
● Wireless mesh networks
● Wireless Internet
● Wireless Network Performance
● Wireless network monitoring

Communications and Information Security Symposium
● Access Control
● Accounting and Audit
● Anonymity and Pseudonymity
● Applied Cryptography
● Attacks and Prevention of Online Fraud
● Authentication and Non-repudiation
● Biometrics
● Cryptographic Protocols and Functions
● Database and System Security
● Design and Analysis of Cryptographic Algorithms
● Digital Rights Management
● Economics of Security and Privacy
● Formal Methods in Security
● Foundations of Computer Security
● Identity and Trust Management
● Information Hiding and Watermarking
● Infrastructure Security
● Intrusion Detection, Tolerance and Prevention
● Mobile, Ad Hoc and Sensor Network Security
● Network and Wireless Network Security
● Peer-to-Peer Network Security
● PKI and PMI
● Private Searches
● Security and Privacy in Pervasive/Ubiquitous Computing
● Security in Information Flow
● Security for Mobile Code
● Security of Grid Computing
● Security of eCommerce, eBusiness and eGovernment
● Security Modeling and Architectures
● Security Models for Ambient Intelligence environments
● Trusted Computing

Prospective authors are encouraged to submit a full paper for review before January 25, 2010, in PDF or Word format, Only original papers that have not been published or submitted for publication elsewhere will be considered, All accepted papers will be presented in oral sessions or poster sessions.

详情请参阅 会议网站:http://www.ieee-wcnis.org

The secretary of WCNIS2010

Mr: Xi Tian     Tel:+86-15800594266

http://www.ieee-wcnis.org

E-mail: wcnis@ieee-wcnis.org

网友评论

Copyright © 2007-2013 369会网 上海今韦信息科技有限公司 版权所有
咨询热线:86-21-51001710 传真:86-21-51615922 地址:上海虹口区新市路
支持单位:上海顾客满意度评价中心 上海全球事件经济研究中心
法律顾问:上海市光明律师事务所 李佩芳律师
沪ICP备06051309号 上海市"专精特新”企业