Call for Paper

 

  • How to submission

  • 1. Before you submit your paper, make sure your have account in this conference or aconf.org, Otherwise, you need sign up first. Click here to sign up.

    2. After you log in, please click my Info . Then click the link New Submission to submit you paper.

    Any problem, please contact

    Ms Scarlett

  • E-mail: Scarlett@aconf.org

  • Tel: +86-027-8887 5258

  •  

  • Topics of Submission

Green Computing

Application-specific ASICs and FPGAs

Carbon metering and user feedback

Characterization, metrics, and modeling

Climate and ecosystem monitoring

Energy aware middleware, framework for MCC

Energy efficiency and prediction of energy consumption in MCC

Energy harvesting, storage, and recycling

Energy saving solutions and tradeoffs

Energy-aware design and programming models in MCC systems

Energy-aware high performance computing

Interdisciplinary green technologies and issues

Life-cycle analysis of IT equipment

Low-power electronics and systems

Modeling and Performance Evaluation in MCC systems

Power-aware algorithms and protocols

Power-efficient computing, delivery and cooling

QoS on green mobile clouds and applications

Renewable energy based algorithms, systems, models, and architecture

Smart buildings and urban development

Smart grid and microgrids

Smart transportation and manufacturing

Sustainable solutions in large-scale MCC systems

Using IT to reduce carbon emissions & reduce computing waste

Green architectures and frameworks

Broadband access networks

Context-based power management

Cross-layer optimizations

Eco-friendly computing & communication resources

Energy (green) aware software, hardware, device and middleware

Energy aware control, monitoring and HCI design

Energy aware resource usage and consumption

Energy awareness for network users

Energy cost models for network operators

Energy efficiency in the Internet of Things

Energy policy, social behaviour and government management

Energy-aware design and programming

Green clustering and computing

Green cognitive communications and computing

Green communications

Green computing strategies and challenges

Green design of VLSI and micro-architecture

Green engineering, agenda, supply chains, logistics, and audit

Green in specific networks

Green Internet of Things

Green IT architecture

Green MCC models, infrastructures, and approaches

Green measurement, profiling, test-beds, and results

Green Mobile, embedded computing and networking

Green networking, operation and management

Green networks for MCC systems

Green peer-to-peer networking and overlays

Green protocols and protocol extensions

Green resource scheduling and optimisation

Green security strategies and designs

Green sensor networks

Green signal processing

Green smart grids

Green switch and base station architectures

Green technology and solutions for networks

Green transmission technologies

Green visualization techniques

Hierarchical and distributed techniques

Instrumentation for energy consumption measurement

Intelligent energy management

Large-scale energy aware data storage and computation

Low power electronics and energy recycling

Management Frameworks Standards and metrics for green computing

Management of home and office networks

Measurement and profiling of energy consumption

Middleware Support for green computing

Mobile (lower power) computing

Mobile and wireless/wired access networks

Operator experiences

Power/Energy/Thermal-aware computing

Remote power management for terminals

Teleworking, tele-conferences and virtual meeting

Tools for monitoring

Reduce Computing Waste

Cloud Computing

Access control to cloud computing

Amazon Web Services cloud

Architectural cloud models

Big Data use cases on clouds

Building scalable websites in the cloud

Cloud APIs and frameworks

Cloud applications

Cloud architecture design

Cloud computing and virtualization

Cloud computing pricing and economics

Cloud computing standards and compliance

Cloud Costs and management

Cloud desktop and application delivery

Cloud Developmens platforms

Cloud development and testing

Cloud disaster recovery

Cloud governance

Cloud management and monitoring

Cloud models enhance security, potential of Internet of Things

Cloud use case studies

Data security in the cloud

Data storage and computation in cloud computing

Distributed file storage of Big Data in clouds

Enterprise application integration with cloud providers

Fault tolerance and reliability in cloud computing

Fundamentals of cloud computing

High-performance computing in the cloud

Hybrid cloud

IaaS cloud deployment strategies

Innovative HCI and touch-screen models and technologies to cloud

Intelligent/agent-based cloud computing

Large-scale scientific workflow in support of Big Data processing on Cloud

MapReduce for processing Big Data

Migration of business applications to cloud

Mobile cloud applications

Mobile commerce and e-markets on cloud

Monitoring and auditing in cloud

Negotiating service-level agreements and billing with cloud providers

Network and application performance in the cloud

Open source cloud computing

Opportunties for Solution Providers

Platform as a Service and cloud computing

Private cloud providers

Programming cloud models

Provisioning/pricing cloud models

Public cloud providers

Resource and large-scale job scheduling in cloud computing

Resource scheduling and SLA for Big Data on Cloud

Resource virtualisation

Scalable and elastic cloud services

Security, privacy, trust, risk in cloud computing

Social computing and impacts on the cloud

Software as a Service and cloud computing

Storage and computation management of Big Data on Cloud

Visualisation of Big Data on Cloud

Volume, Velocity and Variety of Big Data on Cloud

Internet of Things

Applications and interaction for social networking

Business models and processes for the Internet of Things

Case studies in areas of Healthcare, Agriculture, Logistics and Transport

Communication systems and architectures for the Internet of Things

Context-awareness and Location-awareness

Future technologies bridging the physical and virtual worlds

Green Internet of Things

Impacts on the security, privacy and risks on the physical world

Internet of Services

IoT architectures, platforms and applications

IoT services

Location and discovery of things on the Internet

Machine to Machine Communication

Mobile Internet of Things

Mobile Services

Network Design and Architecture

Networking and Communication Protocols

Performance Evaluation and Modelling

Robustness of environmental management with the Internet of Things

Security, Privacy and Trust

Semantic Web of Things

Sensor Webs

Smart Environment

Smart Objects

Smarter Sensors

Software Architecture and Middleware

The Connected Home

The Smart City

Web of Things

Wearable Technology

Big Data and Analytics

Algorithms and Programming Techniques for Big Data Processing

Algorithms and Systems for Big Data Search

Algorithms for Data visualization

Anomaly Detection in Very Large Scale Systems

Big Data Analytics, Tools and Metrics

Big Data Architectures

Big Data as a Service

Big Data Classification Techniques

Big Data Clustering Algorithms

Big Data Economics

Big Data Encryption

Big Data for Business Model Innovation

Big Data for Enterprise Transformation

Big Data for Enterprise, Government and Society

Big Data for Vertical Industries (including Government, Healthcare, and Environment)

Big Data in Business Performance Management

Big Data in Enterprise Management Models and Practices

Big Data in Mobile and Pervasive Computing

Big Data in Smart Planet Solutions

Big Data Infrastructure

Big Data Management

Big Data Mining and Security Intelligence

Big Data Mining in the Cloud

Big Data Models and Algorithms

Big Data Open Platforms

Big Data Persistence and Preservation

Big Data Protection, Integrity and Privacy

Big Data Quality and Provenance Control

Big Data Search and Mining

Big Data Search Architectures

Big Data Search Scalability and Efficiency

Big Data tools and deployment platforms

Cloud Computing Techniques for Big Data

Collaborative Threat Detection using Big Data Analytics

Compression and Sampling

Data Integration, Aggregation, and Representation

Data interpretation

Data Mining, Security for Big Data

Distributed and Peer-To-Peer Search

Dynamic Predictive Models

Evaluation Technologies

Experiences with Big Data Project Deployments

Foundational Models for Big Data

Large-Scale Analytical Query Processing

Large-Scale Recommendation Systems and Social Media Systems

Large-scale Social Media and Recommendation Systems

Link and Graph Mining

Machine learning based on Big Data

Management Issues of Social Network Big Data

Methods to improve Data analytic techniques

Mining Big Data in Real Time

Mining Social-Network Graphs

Mobility and Big Data

Models and Languages for Big Data Protection

Multimedia and Multi-Structured Data

Natural Language Processing methods

Optimizing Big Data with Search

Parallel and Distributed Algorithms for Frequent Pattern Mining

Predictive analytics

Privacy in Big Data Mining

Privacy Preserving Big Data Analytics

Query Processing, Data Modeling, and Analysis

Real-life Case Studies of Value Creation through Big Data Analytics

Representation Formats for Multimedia Big Data

Scalable Mining of Heterogeneous Social and Information Networks

Scientific Applications of Big Data

Security Applications of Big Data

Semantic-Based Data Mining and Data Pre-Processing

SME-centric Big Data Analytics

Social Web Search and Mining

Streaming Data Processing

Text Analysis techniques

Visualization Analytics for Big Data

Visualization and communication of Big Data

Author guidelines

Papers for presentations should conform to the IEEE format and specifications. All submissions must be in English only. Authors are invited to submit full paper (Maximum 6 pages, double-column US letter size) as PDF using the IEEE templates. 

ICGCIoT takes plagiarism very seriously and regard plagiarism as a professional misconduct. Papers will be screened for plagiarism and when identified the paper will be rejected. When paper accepted, ICGCIoT don't encourage with-drawals meaning it should not be submitted with the intention to get the reviews by the TPC.

All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email.

The authors of the accepted papers will be allowed to make corrections in accordance with the suggestions of the reviewers and submit final camera-ready papers within the stipulated deadline. The conference proceedings will be distributed amongst the participants during the conference.

Log in

News

Important Dates

 

  • Date of Conference:  2017-11-16 ~ 18
  •  
  • Draft paper submission deadline: 2017-06-01
  •  
  • Final Paper Deadline: 2017-10-05
  •  
  • Draft Paper Acceptance Notification:
  • 2017-09-01

 


 

Contact

 

Registration & Submission

 

    • Scarlett
    •  
      • Email: Scarlett@aconf.org

 

  • Telephone:+86-27-88875258