ACEC-26
Computational Linguistics Computer Graphics Computer Hardware Design Computer Networks & Wireless Communication Computer Security & Cryptography Computer Vision & Pattern Recognition Computing Systems Engineering & Computer Science (General) Bioinformatics & Computational Biology
Topics of interest for submission include any topics related to:
Here is a comprehensive list of Call for Papers (CFP) topics and subtopics related to this domain, organized by the three core pillars:
This pillar focuses on the innovation of algorithms, hardware, and computational models.
Deep Learning (DL) & Neural Networks: CNNs, RNNs, Transformer models, Generative AI (GenAI).
Explainable AI (XAI): Feature importance, LIME, SHAP, and ensuring transparency in complex models.
AI Ethics and Governance: Bias, fairness, accountability, and the societal impact of AI.
Computational Methods: Fuzzy logic, evolutionary computation, genetic algorithms, and multi-objective optimization.
HPC Architectures: Exascale computing, post-exascale architectures, and heterogeneous computing (CPU-GPU, FPGA).
Parallel and Distributed Systems: Grid, cluster, and parallel computing algorithms.
Cloud, Edge, and Fog Computing: Serverless computing (FaaS), containerization (Docker, Kubernetes), hybrid cloud strategies, and real-time edge intelligence.
Big Data & Data Analytics: Real-time stream processing, predictive/prescriptive analytics, and data visualization for large-scale systems.
Quantum Computing: Quantum algorithms (e.g., optimization, materials design), quantum hardware, and quantum error correction.
Trusted Computing: Secure hardware, secure enclaves, and trusted execution environments.
Computational Biology/Bioinformatics: Algorithms for sequence analysis, structure prediction, and computational medicine.
This pillar focuses on the design, development, integration, and reliability of complex systems.
Secure Software Development Lifecycle (SSDLC): DevSecOps, secure coding practices, and vulnerability detection.
Software Architecture: Microservices, cloud-native applications, and resilient system design.
Quality Assurance: Automated testing, formal methods, and software reliability/reengineering.
Programming Languages and Theory: Type systems, formal specification, and verification of programs.
Computer Architecture: Embedded systems, System-on-Chip (SoC) design, FPGA/ASIC, and approximate computing.
Networking and Communications (5G/6G): Software-Defined Networking (SDN), Network Function Virtualization (NFV), and vehicular networks (V2X).
Mobile and Pervasive Computing: Wearable devices, wireless sensor networks, and mobile security.
Industrial IoT (IIoT) & Smart Cities: Design, control, and real-time processing for connected infrastructure.
Autonomous Systems: Software for drones (sUAS), autonomous vehicles, and robotics.
Engineering Reliability: Predictive maintenance, fault tolerance, and resilience in integrated systems.
This pillar focuses on securing assets, managing threats, and ensuring privacy across digital and physical domains.
Cryptography & Cryptanalysis: Cryptographic algorithms, post-quantum cryptography, and cryptographic protocols.
Access and Usage Control: Zero-Trust architectures, Identity and Access Management (IAM), and micro-segmentation.
Hardware Security: Side-channel attacks, secure computer architectures, and physical security for embedded systems.
Security Models and Architectures: Security frameworks (NIST, ISO), and security architecture analysis.
Network Security: Advanced network defense mechanisms, intrusion detection and response systems (IDS/IPS).
Malware Analysis & Detection: Advanced persistent threats (APTs), threat hunting, and reverse engineering.
Vulnerability Management: Ethical hacking, penetration testing, and vulnerability analysis.
Cyber Resilience: Incident response, disaster recovery, and strengthening an organization's ability to withstand disruptions.
Privacy-Enhancing Technologies (PETs): Homomorphic encryption, differential privacy, and secure multi-party computation.
Data Protection: Compliance with regulations (GDPR, CCPA), data leakage prevention, and digital forensics.
Legal and Ethical Aspects: Cybersecurity policy, governance, compliance, and the legal implications of cybercrime and electronic evidence.