Sunday, December 17, 2017
   
Text Size
Login

Scope

The scope of the journal is broad and it includes but not limited to the following topics:

  • General and Reference                                                                                                                                                    

Document types, Cross-computing tools and techniques.

  • Hardware                             

Printed circuit boards, Communication hardware, interfaces and storage, Integrated circuits, Very large scale integration design, Power and energy, Electronic design automation, Hardware validation, Hardware test, Robustness, Emerging technologies.

  • Computer Systems Organization                             

Architectures, Embedded and cyber-physical systems, Real-time systems, Dependable and fault-tolerant systems and networks.

  • Networks                             

Network architectures, Network protocols, Network components, Network algorithms, Network performance evaluation, Network properties, Network services, Network types.

  • Software and its  Engineering                             

Software organization and properties, Software notations and tools, Software creation and management.

  • Theory of Computation                             

Models of computation, Formal languages and automata theory, Computational complexity and cryptography, Logic, Design and analysis of algorithms, Randomness, geometry and discrete structures, Theory and algorithms for application domains, Semantics and reasoning.

  • Mathematics  of Computing                             

Probability and statistics, Mathematical software, Information theory, Mathematical analysis.

  • Information Systems                             

Data management systems, Information storage systems, Information systems applications, World Wide Web, Information retrieval.

  • Security and Privacy                             

Cryptography, Formal methods and theory of security, Security services, Intrusion/anomaly detection and malware mitigation, Security in hardware.

Systems security, Network security, Database and storage security, Software and application security, Human and societal aspects of security and privacy.

  • Human-centered  Computing                             

Human computer interaction (HCI), Interaction design, Collaborative and social computing, Ubiquitous and mobile computing, Visualization, Accessibility.

  • Computing Methodologies                             

Symbolic and algebraic manipulation, Parallel computing methodologies, Artificial intelligence, Machine learning, Modeling and simulation, Computer graphics, Distributed computing methodologies, Concurrent computing methodologies.

  • Applied Computing                             

Electronic commerce, Enterprise computing, Physical sciences and engineering, Life and medical sciences, Law, social and behavioral sciences, Arts and humanities, Computers in other domains, Operations research, Education, Document management and text processing.

  • Social and Professional Topics                             

Professional topics, Computing / technology policy, User characteristics.

Universiti Utara Malaysia Press
 Universiti Utara Malaysia, 06010 UUM Sintok
Kedah Darul Aman, MALAYSIA
Phone: +604-928 4816, Fax : +604-928 4792

All Right Reserved. Copyright © 2010, Universiti Utara Malaysia Press