Please check Program Schedule.       Click Here to Download Program Schedule       Note: If you don't find your paper in list, please contact us at +919464810380 immediately.
Call For Papers

The conference SCESM, 2016 will feature original research and industrial papers on the theory, design and implementation of the technologies in Networking, Intelligent and computing techniques, as well as demonstrations, tutorials, workshops and industrial presentations. Also it will enable the researchers in the various domains such as High Performance Computing, Bio-inspired Computing, Green Computing, Distributed Computing, Grid Computing, Networking, Image and Pattern Recognition to foster the exchange of concepts, prototypes, research ideas and the results of research work which could contribute to the academic arena and also benefit business, industrial community and in turn to the society. This will also help in improving decision making in organizations.

International Journal of Control Theory and Applications(SCOPUS Indexed)

Indian Journal of Science and Technology (SCOPUS Indexed)

Biological Forum - An International Journal (Thomson Reuters Indexed)

International Journal of Computer Science and Information Security (Thomson Reuters Indexed)

SCESM, 2016 invites original contributions on all topics related to Computational Science, including, but not limited to:
Track 1: Sustainable Computing
  • Power-aware algorithms and protocols
  • Power-aware software and hardware
  • Low-power electronics and systems
  • Application-specific ASICs and FPGAs
  • Sensing and monitoring
  • Characterization, metrics, and modeling
  • Reliability, thermal behavior and control
  • Power-efficient delivery and cooling
  • Life-cycle analysis of IT equipment
Track 2: Computing for Sustainability
  • Renewable energy models and prediction
  • Matching energy supply and demand
  • Smart grid and micro grids
  • Smart transportation and manufacturing
  • Smart buildings and urban development
  • Energy harvesting, storage, and recycling
  • Climate and ecosystem monitoring
  • Using IT to reduce carbon emissions
  • Carbon metering and user feedback
  • Energy efficient / Green CLOUD COMPUTING
Track 3: Cloud Computing
  • Virtualization in Cloud
  • Cloud based Services and Protocols
  • Scalability and Performance issues in Cloud
  • Hypervisor Security
  • Cloud Integrity and Binding Issues
  • Security and Privacy in cloud
  • Load Balancing in cloud
  • Programming Models in Cloud
  • Scheduling in Cloud
  • Resource Monitoring in Cloud
  • Application workflows in Cloud
Track 4: Management of Data including Big Data and Analytics
  • Big Data Modeling
  • Big Data Processing Techniques
  • Big Data Mining
  • Big Data Infrastructure
  • Big Data Organization and Management
  • Decision Support and Automation
  • Big Data Analysis and Discovery
  • Big Data Applications
  • Big Data Privacy and Security
  • Big Data as a Service
  • Big Data Quality and Provenance Control
Track 5: Information and Knowledge Management
  • Information Retrieval
  • Information Processing
  • Information Infrastructure Development
  • Distributed Information Infrastructure Development
  • Data and Knowledge Sharing
  • Data and Knowledge Acquisition
  • Information Storage
  • Data and Knowledge Discovery
  • Data and Knowledge Organization
  • High Performance OLTP Systems
  • Data and Knowledge Evaluation
  • Domain Modeling
  • Information Retrieval Interfaces
Track 6: Social Networks and Social aspects of Sustainable Development
  • Sustainable Modeling of Social Systems
  • Data mining in Social Systems
  • Sustainable Social Network Data Management
  • Sustainable Workload Characterization in Social Networking Systems
  • Information propagation in Social Systems and Sustainability
  • Effects of Social Networking on Society
  • Social Network Applications
  • Privacy and Security in Social Systems
  • Trust in Social Systems
  • Sustainable Streaming Algorithm for Social Networks
Track 7: Information and Cyber Security
  • Network Security
  • Operating System Security
  • Cyber Warfare
  • Computer Forensics
  • Secure Architecture
  • Database Security
  • Privacy and Anonymity
  • Biometric Security
  • Security Modeling and Analysis
  • Cloud Security
  • Peer- to-Peer Security
  • Security in E-Commerce
  • Smart Cards
  • Application Security
  • Security in Mobile Networks
This is a blind peer-reviewed conference. Authors are cordially invited to submit paper through on line paper submission process (Easy Chair submission system) before 25th July 2016.
  • Download Call For Papers in DOC Click Here

  • Instructions For Authors
    • Original papers based on theoretical or experimental works related to the above mentioned sub themes are solicited for presentation in the conference. The paper should begin with title, short abstract and a list of keywords. Simultaneous submissions (papers already submitted to other conferences/journals) are not allowed.
    • All papers must follow strict Springer formatting instructions
    • Please do not submit plagiarized papers.
    • The total length of the paper must not exceed six A4 size pages including bibliography and appendices. Paper must be in .PDF
    • All the papers will be submitted through on-line paper submission process (Easy chair submission system). Authors are requested to follow paper submission link on website.
    • Download Paper Format in DOC Click Here
    • Download Registration form in DOC Click Here
    Copy Right Form:

    In order to publish paper in the conference proceeding, the authors are required to submit a signed copyright form for each accepted paper during registration.
    Download Copyright form in DOC Click Here

    Important Dates
    • Final Extended Paper Submission deadline : 25th July 2016
    • Notification of Acceptance : 30th July 2016
    • Camera ready Paper Submission Deadline : 5th August 2016
    • Last Date of Registration : 9th August 2016

    We look forward to a mutually rewarding and long lasting association with you and your esteemed organization.