Conference Information
WPMC 2016 : International Symposium on Wireless Personal Multimedia Communications
http://wpmc2016.org/
Submission Date:
2016-06-26
Notification Date:
2016-08-28
Conference Date:
2016-11-13
Location:
Shenzhen, China
Years:
19
CORE: c   Viewed: 8327   Tracked: 3   Attend: 1

Conference Location
Advertisment
Call For Papers
Prospective authors are invited to submit high-quality original technical papers reporting original research of theoretical or applied nature for presentation at the conference and publication in the WPMC 2016 Proceedings.

All papers for the WPMC 2016 Main Track should be submitted via EDAS using https://edas.info/newPaper.php?c=22389. Please also make sure to follow the Submission Guidelines.

Main Topics of interest include, but are not limited to:

Wireless Communications and PHY

    Advanced modulation schemes
    Cognitive radio
    Cooperative communications
    Information and coding theory
    Interference characterization
    MIMO/Massive MIMO channel models and channels
    Smart/ Reconfigurable antennas
    Ultra wideband, mmWave and sub-THz communications
    Visible Light Communications

Wireless Networks

    Ad-hoc networks
    Cognitive radio networks
    Cross-layer design
    Interference management
    IoT and M2M communications devices
    Localization for wireless networks
    Mobility, location and handoff management
    Multimedia QoS and traffic management
    Spectrum sharing and coexistence
    Vehicular networks
    Wireless multicast and streaming

Communications Services and Multimedia Applications

    Big data and data mining
    Cloud computing
    Emerging wireless and mobile applications
    Experimental trials and deployment
    Mobile multimedia services
    Mobile social networks
    QoS and QoE for multimedia applications
    Service oriented architectures
    User interfaces, user-machine interactions
    Wireless health applications

Security and Privacy in Communications

    PHY-layer Security
    Communication privacy and anonymity
    Network intrusion detection and prevention, firewalls, packet filters
    Malware, botnets and distributed denial of service
    Public key infrastructures, key management, credential management
    Secure routing, naming/addressing, network management
    Security and privacy in pervasive and ubiquitous computing, e.g., RFIDs
    Security and privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems
    Security and privacy in networks
    Security and privacy in applications
Last updated by Xin Yao in 2016-06-23
Related Publications
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
201120414973%
Advertisment
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
BigDataServiceInternational Conference on Big Data Computing Service and Applications2016-12-012016-12-222017-04-06
ICACT'International Conference on Advanced Communications Technology2016-12-082016-12-182017-02-19
SCVTIEEE Symposium on Communications and Vehicular Technology in the Benelux2014-09-212014-10-142014-11-10
UCMAInternational Conference Ubiquitous Computing and Multimedia Applications2015-05-102015-05-302015-06-21
EBCCSPInternational Conference on Event-Based Control, Communication and Signal Processing2016-03-202016-04-102016-06-13
b3MOBIWACInternational Symposium on Mobility Management and Wireless Access2017-06-302017-07-302017-11-21
ICDSCInternational Conference on Distributed Smart Cameras2017-05-072017-06-022017-09-05
ACM-BCBACM Conference on Bioinformatics, Computational Biology and Biomedicine2017-04-242017-06-072017-08-21
b2IRIInternational Conference on Information Reuse & Integration2017-05-182017-06-162017-08-04
cICIS'International Conference on Interaction Sciences: IT, Human and Digital Content2013-08-072013-09-072013-10-08
Recommendation