Conferences related to Emulation

Back to Top

2018 International Conference on Signal Processing and Communications (SPCOM)

SPCOM 2018 will provide a forum for researchers from academia, research laboratories, and industries to come together to share and learn about current developments in emerging areas within the broad fields of signal processing, communications and networking. SPCOM 2018 will be the twelfth in the series of the biennial events that have been organized since 1990 at the Indian Institute of Science (IISc), Bangalore, India.


2017 11th European Conference on Antennas and Propagation (EUCAP)

The conference addresses all scientific and application topics in the area of electromagnetic antennas and radio propagation whatever the frequency.


2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)

* Wearable Electronics and Health & Leisure* Micro/Nano-sensor and BioMEMS* IC Design and System Integration* Multi-core Processor and Reconfigurable Computing* Cloud Computing & Internet of Things (IoT)* Cryptographic Algorithm and Security Management* Next Generation Networking and IPv6* Wireless Communication and Networking Engineering* Cognitive Radio and Software Defined Radio* EMC Theory and RFID Techniques* Pattern Recognition and Applications

  • 2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)

    ¿ Wearable Electronics and Health & Leisure¿ Micro/Nano-sensor and BioMEMS¿ IC Design and System Integration¿ Multi-core Processor and Reconfigurable Computing¿ Cloud Computing & Internet of Things (IoT)¿ Cryptographic Algorithm and Security Management¿ Next Generation Networking and IPv6¿ Wireless Communication and Networking Engineering¿ Cognitive Radio and Software Defined Radio¿ EMC Theory and RFID Techniques¿ Pattern Recognition and Applications

  • 2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)

    ¿ Wearable Electronics and Health & Leisure¿ Micro/Nano-sensor and BioMEMS¿ IC Design and System Integration¿ Multi-core Processor and Reconfigurable Computing¿ Cloud Computing & Internet of Things (IoT)¿ Cryptographic Algorithm and Security Management¿ Next Generation Networking and IPv6¿ Wireless Communication and Networking Engineering¿ Cognitive Radio and Software Defined Radio¿ EMC Theory and RFID Techniques¿ Pattern Recognition and Applications

  • 2014 International Conference on Anti-counterfeiting, Security, and Identification (ASID)

    Wearable Electronics and Health & LeisureMicro/Nano-sensor and BioMEMSIC Design and System IntegrationMulti-core Processor and Reconfigurable ComputingCloud Computing & Internet of Things (IoT)Cryptographic Algorithm and Security ManagementNext Generation Networking and IPv6Wireless Communication and Networking EngineeringCognitive Radio and Software Defined RadioEMC Theory and RFID TechniquesPattern Recognition and Applications

  • 2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID)

    Micro/Nano-sensor and BioMEMSIC Design and System IntegrationMulti-core Processor and Reconfigurable ComputingCloud Computing & Internet of Things (IoT)Cryptographic Algorithm and Security ManagementNext Generation Networking and IPv6Wireless Communication and Networking EngineeringCognitive Radio and Software Defined RadioEMC Theory and RFID TechniquesPattern Recognition and Applications

  • 2012 International Conference on Anti-Counterfeiting, Security and Identification (2012 ASID)

    Cloud Computing, RFID Techniques and applications, IC Design and System Integration, Pattern recognition and applications, Cryptographic algorithm and security Management, Cognitive Radio and Software Defined Radio, Next Generation Networking and IPv6, Wireless communication and Networking engineering, EMC Theory and applications, Internet of Things (IoT).

  • 2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification (2011 ASID)

    Internet of Things (IoT) RFID Techniques and applications IC Design and System Integration EMC Theory and applications Pattern recognition and applications Cryptograph standards and management Wireless communication and Networking engineering Next Generation Networking and IPv6 Information Management and polices Conference Keywords: anti-counterfeiting, security, identification, asid, rfid, and antenna, network security,internet of things, rfid techniques and applications, wireless com

  • 2010 International Conference on Anti-Counterfeiting, Security and Identification (2010 ASID)

    Live demonstrations describing novel work on systems, applications and services of the Internet reaching out into the real world of physical objects, problems related to RFID and Antenna, IC Design and System Integration, Wireless Communication and Network Security, Cryptographic Algorithm and Hardware Implementation, Anti-counterfeiting and Identification, Information Management and Industries Polices.

  • 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication (2009 ASID)

    RFID and Antenna, Wireless Comm and Network Security, Cryptographical Algorithm and realization on hardward, Anti-counterfeiting and Identification, Information management and industries polices

  • 2008 2nd International Conference on Anti-counterfeiting, Security, and Identification (2008 ASID)

    RFID and Antenna, Wireless communication and Network security, Cryptographical algorithm and realization on hardware, Anti-counterfeiting and Identification, Information management and Industries polices

  • 2007 International Workshop on Anti-counterfeiting, Security and Identification (ASID)


2017 12th International Conference on Computer Science and Education (ICCSE)

Annual Topics• Big Data • Cloud Computing • Robotics• Internet of Things • Recommendation System• Web Applications• Telemedicine• Massive Open Online CoursesComputer Science• Artificial Intelligence• Software Engineering• Database Technology • Computer Graphics• Computer Application • Control Technology• Systems Engineering • Communication TechnologyEngineering Education• Education Reform and Innovation• Engineering Education Mode• Curricula and Courseware Design • Engineering Training• Life-long Education• Computer Education for Special GroupCross Disciplinary• Mechatronics• Automation• Bio-inspired Engineering

  • 2016 11th International Conference on Computer Science & Education (ICCSE)

    Since 2006, the International Conference on Computer Science and Education (ICCSE) has been held in Xiamen, Wuhan, Kaifeng, Nanning, Hefei, Singapore, Melbourne, Colombo, Vancouver, and Cambridge for ten sessions.The 11th International Conference on Computer Science & Education (ICCSE 2016) will be held in Nagoya University, Nagoya, Japan at August 23-26, 2016, and organized by National Research Council of Computer Education in Colleges & Universities, China (CRC-CE), and technically co-sponsored by the IEEE Nagoya Section.Many internationally renowned experts and IEEE Fellows from the fields of computer, education and control have made brilliant speeches. The visitants and participants include many experts, academics, scientists, technicians and engineers from many well-known domestic and foreign institutions of higher learning, researches and enterprises. These make the conference become a good platform for internationally academic communication.

  • 2015 10th International Conference on Computer Science & Education (ICCSE)

    IEEE CCSE 2015 Topics of interest include:Annual Selected Topics-- Big Data-- Cloud Computing-- Robotics-- Internet of Things-- Recommendation System-- Web Applications-- Telemedicine-- Massive Open Online CoursesComputer Science-- Artificial Intelligence-- Software Engineering-- Database Technology-- Computer Graphics-- Computer Application-- Control Technology-- Systems Engineering-- Communication TechnologyEngineering Education-- Education Reform and Innovation-- Engineering Education Mode-- Curricula and Courseware Design-- Engineering Training-- Life-long Education-- Computer Education for Special GroupInterdisciplinary-- Mechatronics-- Automation-- Bio-inspired Engineering-- Energy Efficiency-- Uncertainty Quantification

  • 2014 9th International Conference on Computer Science & Education (ICCSE)

    ICCSE is an annual conference, to provide more chances for communication of researchers and educators.

  • 2013 8th International Conference on Computer Science & Education (ICCSE)

    Annual selected topics including cloud computing, internet of things, big data, recommendation system, green communication and web application etc. It also covers the topics of interaction between engineering education and computer science.

  • 2012 7th International Conference on Computer Science & Education (ICCSE 2012)

    Annual selected topics including cloud computing, internet of things, recommendation system, green communication and web application etc. It also covers the topics of interaction between engineering education and computer science.

  • 2011 6th International Conference on Computer Science & Education (ICCSE 2011)

    Computer Science: Database Technology, Artificial Intelligence, Computer Architecture, Software Engineering, Computer Graphics, Computer Application, Control Technology, Systems Engineering, Network Technology, Communication Technology, Web Applications. Computer Education.

  • 2010 5th International Conference on Computer Science & Education (ICCSE 2010)

    The main areas addressed by the conference included: (1)Computer Science: Database Technology, Artificial Intelligence, Computer architecture, Software engineering, Computer Graphics, Computer Application , Control Technology, Systems Engineering, Network Technology, Communication Technology 2) Computer Education.

  • 2009 4th International Conference on Computer Science & Education (ICCSE 2009)

    The main areas addressed by the conference included: (1)Computer Science: Database Technology, Artificial Intelligence, Computer architecture, Software engineering, Computer Graphics, Computer Application , Control Technology, Systems Engineering, Network Technology, Communication Technology 2) Computer Education.


2017 12th International Conference on Malicious and Unwanted Software (MALWARE)

The Focus of the conference this year is twofold - (1) Evolving threat landscape, and (2) innovative system defense approaches. The topics are described in the paragraphs below.Evolving threat landscape: The Malware Criminal EcoSystem has become a vibrant sector of the dark economy in recent years. Innovation in this ecosystem is rampant at all levels - from the discovery of new vulnerabilities, to the introduction of new deployment mechanisms. This division of labor in the Malware Ecosystem has accelerated the deployment of new threats which often are deployed by multiple entities across platforms (often sloppily), but which certainly meet the business objectives. Current security approaches are often ineffective, since attackers quickly field test prototype attacks that dodge current defenses.

  • 2016 11th International Conference on Malicious and Unwanted Software (MALWARE)

    The Focus of the conference this year is twofold - (1) Security architectures & reformulated solutions, and (2) The demise of traditional end-point protection. The topics are described in the paragraphs below.In the past, the security protection model that most organizations applied to protect their infrastructure was simply the "Everything but the Kitchen Sink" model—meaning, add devices that protect the enterprise network perimeter (Trusted Zone), add devices that protect your mobile device, add devices that protect your data base., and on, and on.... In essence, this model simply amounted to the accumulation of security devices. Given the increased number, scope, and frequency of breaches in the last few years, it is clear that this model has failed.Security products are no longer about single or even multiple independent security devices each providing close-as-we-can-get-to-perfect standalone protection. MALCON will explore alternative architectures and solutions.

  • 2015 10th International Conference on Malicious and Unwanted Software (MALWARE)

    The Malware 2015 conference has adopted as its main theme "The Fabric of Security: A billion Sensors but no serious threat analysis and decision support" in recognition of a major paradigm shift that will transformed the security industry in the next 10 years. The fundamental premise to be addressed at the conference is the difference between point security solutions, their contribution to the overall protection of an organization, and the lack of integration amongst many solutions. Manuscripts addressing both new architectural solutions to build a "Fabric of Security", reference implementations, as well as effectiveness measurement methodologies are welcomed.

  • 2014 9th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE)

    The Malware 2014 conference has adopted as its main theme "The Malware Threat in the era of Unlimited Computing Power" in recognition of a major paradigm shift that has transformed the computer industry as a whole, and created major challenges to the Security Community in particular. Specifically, the scope of attacks being delivered in 2014 takes on a completely new magnitude when the attacker has at its disposal unlimited computing resources through the use of Cloud Based Services. Given such a threat, we in the Security industry have a pressing needs for solutions that can handle such a threat.

  • 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE)

    The Malware 2013 conference has adopted as its main theme "Malware in the Era of Cloud Services and Mobile Endpoints" in recognition of a major paradigm shift that has transformed the computer industry as a whole, and created major challenges to the Security Community in particular.

  • 2012 7th International Conference on Malicious and Unwanted Software (MALWARE)

    This years conference will pay particular attention to (and will also be extensively discussed in several panel sessions) the pressing topic of Defending the Extended Network What happened to the walls As Smartphones become the preferred access device, while applications and data reside at multiple locations in the Cloud, the idea of protecting the network and the end-point (a Windows device) is no longer practical. A paradigm shift is upon us, and protecting both application and data in a world of billions of Smartphone devices is intriguing and challenging. Clearly, there is no longer a network to protect. Further, the concept of an extended network has significant limitations. In the new paradigm what is emerging is the concept a Trusted Domains with no physical boundaries. Thus, the organizers of Malware 2012 Asia Pacific solicit original written contributions addressing these issues and research questions. Manuscripts focusing on the security properties of Trusted Domains, Cloud Computing.

  • 2011 6th International Conference on Malicious and Unwanted Software (MALWARE)

    Malware 2011 is designed to bring together experts from industry, academia, and government to present and discuss, in an open environment, the latest advances and discoveries in the field of malicious and unwanted software. Techniques, economics and legal issues surrounding the topic of Malware, and the methods to detect and control them will be discussed.

  • 2010 5th International Conference on Malicious and Unwanted Software (MALWARE)

    The 5th IEEE International Conference on Malicious and Unwanted Software is designed to bring together experts from industry, academia, and government to present and discuss, in an open environment, the latest advances and discoveries in the field of malicious and unwanted software. Techniques, economics and legal issues surrounding the topic of Malware, and the methods to detect and control them will be discussed.

  • 2009 4th International Conference on Malicious and Unwanted Software (MALWARE)

    An ounce of prevention is worth a pound of cure . Arguably, many of the current solutions for fighting Malware fall within the cure category. However, efficacy of current solutions are in question. Malware 2009 will focus on preventative measures such as software white listing and tighter models of access control at the O/S level.

  • 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE)

    The conference is designed to bring together experts from industry, academia, and government to present and discuss, in an open environment, the latest advances and discoveries in the field malicious and unwanted software, the techniques, economics and legal issues behind their use, and the methods to detect and control them.


More Conferences

Periodicals related to Emulation

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals


Xplore Articles related to Emulation

Back to Top

Scalable Capacity Bounding Models for Wireless Networks

Jinfeng Du; Muriel Médard; Ming Xiao; Mikael Skoglund IEEE Transactions on Information Theory, 2016

The framework of network equivalence theory developed by Koetter et al. introduces a notion of channel emulation to construct noiseless networks as upper (respectively, lower) bounding models, which can be used to calculate the outer (respectively, inner) bounds for the capacity region of the original noisy network. Based on the network equivalence framework, this paper presents scalable upper and lower ...


Long-range monitoring system of irrigated area water-use based on Multi-Agent

Tinghong Zhao; Rui Ding; Zibin Man 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC), 2011

China is a large agricultural country, but the water resource amount can not meet the demand of irrigation, Through setting up the long-range monitoring system of irrigated area water that is operated very good, can improve the utilization efficiency of irrigating water resources, to economize irrigate water consumption greatly. This paper introduces Multi Agent theories in the long-range monitoring system ...


Seamlessly Interconnecting Legacy IEEE 1394 Devices over UWB Network: The Mirroring Bridge

Jonghun Yoo; Jiyong Park; Seongsoo Hong; Yeongbae Yeo; Hyunchin Kim 2008 Digest of Technical Papers - International Conference on Consumer Electronics, 2008

Bridging IEEE 1394 buses is becoming important since it enables wireless connectivity. Unfortunately, existing bridging mechanisms, such as the IEEE 1394.1 bridge and the transparent bridge, have practical limitations. The former does not support interoperability with legacy 1394 devices and the latter requires a new hardware chipset for bridge implementation. We thus propose a mirroring bridging mechanism to overcome these ...


Stability of CIOQ switches with finite buffers and non-negligible round-trip time

M. Gusat; F. Abel; F. Gramsamer; R. Luijten; C. Minkenberg; M. Verhappen Proceedings. Eleventh International Conference on Computer Communications and Networks, 2002

We propose a systematic method to determine the lower bound for internal buffering of practical CIOQ (combined input-output queued) switching systems. We introduce a deterministic traffic scenario that stresses the global stability of finite output queues. We demonstrate its usefulness by dimensioning the buffer capacity of the CIOQ under such traffic patterns. Compliance with this property maximizes the performance achievable ...


Evidences of SEU tolerance for digital implementations of artificial neural networks: one year MPTB flight results

R. Velazco; P. Cheynet; A. Tissot; J. Haussy; J. Lambert; R. Ecoffet 1999 Fifth European Conference on Radiation and Its Effects on Components and Systems. RADECS 99 (Cat. No.99TH8471), 1999

The Microelectronics and Photonics Testbed (MPTB) carrying twenty-four experiments on-board a scientific satellite has been in a high radiation orbit since November 1997. This paper presents one year flight results of two of these experiments programmed to emulate an Artificial Neural Network (ANN) devoted to texture analysis. Telemetred data provide evidences of the ANN intrinsic fault tolerance properties


More Xplore Articles

Educational Resources on Emulation

Back to Top

eLearning

Scalable Capacity Bounding Models for Wireless Networks

Jinfeng Du; Muriel Médard; Ming Xiao; Mikael Skoglund IEEE Transactions on Information Theory, 2016

The framework of network equivalence theory developed by Koetter et al. introduces a notion of channel emulation to construct noiseless networks as upper (respectively, lower) bounding models, which can be used to calculate the outer (respectively, inner) bounds for the capacity region of the original noisy network. Based on the network equivalence framework, this paper presents scalable upper and lower ...


Long-range monitoring system of irrigated area water-use based on Multi-Agent

Tinghong Zhao; Rui Ding; Zibin Man 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC), 2011

China is a large agricultural country, but the water resource amount can not meet the demand of irrigation, Through setting up the long-range monitoring system of irrigated area water that is operated very good, can improve the utilization efficiency of irrigating water resources, to economize irrigate water consumption greatly. This paper introduces Multi Agent theories in the long-range monitoring system ...


Seamlessly Interconnecting Legacy IEEE 1394 Devices over UWB Network: The Mirroring Bridge

Jonghun Yoo; Jiyong Park; Seongsoo Hong; Yeongbae Yeo; Hyunchin Kim 2008 Digest of Technical Papers - International Conference on Consumer Electronics, 2008

Bridging IEEE 1394 buses is becoming important since it enables wireless connectivity. Unfortunately, existing bridging mechanisms, such as the IEEE 1394.1 bridge and the transparent bridge, have practical limitations. The former does not support interoperability with legacy 1394 devices and the latter requires a new hardware chipset for bridge implementation. We thus propose a mirroring bridging mechanism to overcome these ...


Stability of CIOQ switches with finite buffers and non-negligible round-trip time

M. Gusat; F. Abel; F. Gramsamer; R. Luijten; C. Minkenberg; M. Verhappen Proceedings. Eleventh International Conference on Computer Communications and Networks, 2002

We propose a systematic method to determine the lower bound for internal buffering of practical CIOQ (combined input-output queued) switching systems. We introduce a deterministic traffic scenario that stresses the global stability of finite output queues. We demonstrate its usefulness by dimensioning the buffer capacity of the CIOQ under such traffic patterns. Compliance with this property maximizes the performance achievable ...


Evidences of SEU tolerance for digital implementations of artificial neural networks: one year MPTB flight results

R. Velazco; P. Cheynet; A. Tissot; J. Haussy; J. Lambert; R. Ecoffet 1999 Fifth European Conference on Radiation and Its Effects on Components and Systems. RADECS 99 (Cat. No.99TH8471), 1999

The Microelectronics and Photonics Testbed (MPTB) carrying twenty-four experiments on-board a scientific satellite has been in a high radiation orbit since November 1997. This paper presents one year flight results of two of these experiments programmed to emulate an Artificial Neural Network (ANN) devoted to texture analysis. Telemetred data provide evidences of the ANN intrinsic fault tolerance properties


More eLearning Resources

IEEE-USA E-Books

  • Transition to NGN and Future Evolution

    Transition to NGN from traditional PSTN/ISDN is inevitable process. Hence, this chapter covers the transition to NGN from PSTN/ISDN by using emulation and simulation. On the other side, the chapter includes migration of best‐effort Internet to NGN, including best‐effort access to Internet as well as QoS‐enabled services. Further, it describes the NGN standardized approach for building Carrier Grade Open Environments (CGOE) by using standardized Commercial‐Off‐The‐Shelf (COTS) components. However, to provide the full functionality the NGN shall evolve to IPv6 based network, due to bigger and new addressing schemes as well as enhanced features regarding QoS, security, reliability, multihoming, and mobility support, hence IPv6‐based NGN gets deserved attention in this chapter, which then focuses on emerging trends in networking, including network virtualization and future networks developments such as cloud computing and Software‐Defined Networking (SDN). The chapters concludes with business challenges and opportunities brought by NGN and future networks.

  • Host‐Level Solutions

    This chapter contains sections titled: Background Sandboxing Virtualization Resource Management Proof‐Carrying Code Memory Firewall Antimalware Conclusion References



Standards related to Emulation

Back to Top

No standards are currently tagged "Emulation"