<div dir="ltr"><span style="font-size:12.8000001907349px">[Apologies if you get multiple copies of this email.]</span><div style="font-size:12.8000001907349px"><br></div><div style="font-size:12.8000001907349px">The 1st International Conference on <span class="">Big</span> Data Computing and Communications, TaiYuan, ShanXi, China. August 1-3, 2015.</div><div style="font-size:12.8000001907349px"><br></div><div style="font-size:12.8000001907349px"><b><font color="#ff0000">This conference is EI indexed.</font></b></div><div style="font-size:12.8000001907349px"><br></div><div style="font-size:12.8000001907349px"><u style="font-size:12.8000001907349px;line-height:16px;text-align:center"><span lang="EN-US" style="font-size:11pt;color:blue"><a href="http://bigcom.tyut.edu.cn/" target="_blank">http://<span class="">bigcom</span>.tyut.edu.cn/</a></span></u></div><div style="font-size:12.8000001907349px"><br></div><div style="font-size:12.8000001907349px"><table width="700" border="0" cellspacing="0" cellpadding="0" style="font-family:Calibri,sans-serif"><tbody><tr><td width="1" style="font-family:Calibri,sans-serif;font-size:14px;border:1px solid rgb(111,175,255)"><p><font size="3"><strong> Call for Papers </strong></font></p></td><td bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"><p> </p></td></tr><tr><td height="15" colspan="3" style="font-family:Calibri,sans-serif;font-size:14px"></td></tr></tbody></table><table width="700" border="0" cellspacing="0" cellpadding="0" style="font-family:Calibri,sans-serif"><tbody><tr><td width="700" style="font-family:Calibri,sans-serif;font-size:14px"><div align="justify"><p align="justify"><span class="">Big</span> Data is at the centre of the future knowledge society and economy. The techniques in which <span class="">Big</span> Data is generated, collected, processed, computed and communicated are developed quickly. Such a rapid technological evolution inevitably poses a number of <span class="">Big</span> challenges. The International Conference on <span class="">Big</span> Data Computing and Communications (<span class="">BIGCOM</span>) aims to establish itself as the world's premier research conference in <span class="">Big</span> Data. The conference is targeted for researchers and practitioners interested in <span class="">Big</span> Data analytics, management, security and privacy, communication and high performance computing in its broadest sense. Both theoreticians as well as practitioners, including system builders and individuals applying <span class="">Big</span> Data in application domains will be benefited from this conference. We welcome original unpublished research papers emphasizing theoretical foundations, novel modeling, algorithmic methodologies, and data-driven applications. Visionary papers on new and emerging topics are also strongly encouraged.The topics are related but not limited to the following: <br><br><font face="calibri">D</font>ownload Final Call for Papers as PDF or Word <a href="http://bigcom.tyut.edu.cn/images/CFP_BigCom2015.zip" target="_blank">CFP_BigCom2015 ( PDF)</a><a href="http://bigcom.tyut.edu.cn/images/CFP_BigCom%202015.zip" target="_blank"></a> or<a href="http://bigcom.tyut.edu.cn/images/CFP_BigCom%202015.zip" target="_blank"> CFP_BigCom2015 (word)</a><a href="http://bigcom.tyut.edu.cn/images/CFP_BigCom2015.zip" target="_blank"></a> .<br></p></div></td></tr></tbody></table><img src="http://bigcom.tyut.edu.cn/images/blank.gif" height="25" alt="" class="" style="color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-size: 14px; text-align: -webkit-center;"><span style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"></span><table width="700" border="0" cellspacing="0" cellpadding="0" style="font-family:Calibri,sans-serif"><tbody><tr><td width="9" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="1" style="font-family:Calibri,sans-serif;font-size:14px;border:1px solid rgb(111,175,255)"> <font size="3"><strong>Computing </strong></font> </td><td width="650" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="17" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"><a style="color:rgb(34,34,34)"><img src="http://bigcom.tyut.edu.cn/images/title_arrow.jpg" border="0" name="14be533ae919826b_14b93a567e195db3_14b76bdbd902c986_cfp" alt="" class=""></a></td></tr></tbody></table><div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"><ul><li style="margin-left:15px"><div align="left">Data-intensive Parallel and Distributed Computing (Clouds, Clusters, Grids, P2P, etc)</div></li><li style="margin-left:15px"><div align="left">Sampling and Pre-processing for <span class="">Big</span> Data</div></li><li style="margin-left:15px"><div align="left">Data Streams Computing Techniques</div></li><li style="margin-left:15px"><div align="left">Heterogeneous Source Computing</div></li><li style="margin-left:15px"><div align="left">Scalability and Elasticity in <span class="">Big</span> Data Environments</div></li><li style="margin-left:15px"><div align="left">Performance Analysis of <span class="">Big</span> Data Tools and Applications</div></li></ul></div><img src="http://bigcom.tyut.edu.cn/images/blank.gif" height="25" alt="" class="" style="color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-size: 14px; text-align: -webkit-center;"><span style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"></span><table width="700" border="0" cellspacing="0" cellpadding="0" style="font-family:Calibri,sans-serif"><tbody><tr><td width="9" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="1" style="font-family:Calibri,sans-serif;font-size:14px;border:1px solid rgb(111,175,255)"> <font size="3"><strong>Mining </strong></font> </td><td width="650" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="17" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"><a style="color:rgb(34,34,34)"><img src="http://bigcom.tyut.edu.cn/images/title_arrow.jpg" border="0" name="14be533ae919826b_14b93a567e195db3_14b76bdbd902c986_cfp1" alt="" class=""></a></td></tr></tbody></table><div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"><ul><li style="margin-left:15px"><div align="left">Modeling and Algorithms for <span class="">Big</span> Data Analytics and Data Mining</div></li><li style="margin-left:15px"><div align="left">Knowledge Mining from <span class="">Big</span> data</div></li><li style="margin-left:15px"><div align="left">Network and Graph Mining</div></li><li style="margin-left:15px"><div align="left">High Dimensional Data Mining</div></li><li style="margin-left:15px"><div align="left">Data Mining Techniques for Sensor Data</div></li><li style="margin-left:15px"><div align="left">Data Mining Techniques for Social Networks</div></li><li style="margin-left:15px"><div align="left"><span class="">Big</span> Data Visualization</div></li></ul></div><img src="http://bigcom.tyut.edu.cn/images/blank.gif" height="25" alt="" class="" style="color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-size: 14px; text-align: -webkit-center;"><span style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"></span><table width="700" border="0" cellspacing="0" cellpadding="0" style="font-family:Calibri,sans-serif"><tbody><tr><td width="9" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="1" style="font-family:Calibri,sans-serif;font-size:14px;border:1px solid rgb(111,175,255)"> <font size="3"><strong>Communication</strong></font> </td><td width="650" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="17" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"><a style="color:rgb(34,34,34)"><img src="http://bigcom.tyut.edu.cn/images/title_arrow.jpg" border="0" name="14be533ae919826b_14b93a567e195db3_14b76bdbd902c986_cfp2" alt="" class=""></a></td></tr></tbody></table><div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"><ul><li style="margin-left:15px"><div align="left">Next Generation Mobile Network</div></li><li style="margin-left:15px"><div align="left">Heterogeneous Wireless Networks</div></li><li style="margin-left:15px"><div align="left">Pervasive/Ubiquitous Networks</div></li><li style="margin-left:15px"><div align="left">Cooperative and Cognitive Networks</div></li><li style="margin-left:15px"><div align="left">Communications Patterns and User Experiences Analysis</div></li><li style="margin-left:15px"><div align="left"><span class="">Big</span> Data Analytics for Communication Service Providers</div></li><li style="margin-left:15px"><div align="left">Fault-tolerance and Reliability in <span class="">Big</span> Data Environments</div></li></ul></div><img src="http://bigcom.tyut.edu.cn/images/blank.gif" height="25" alt="" class="" style="color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-size: 14px; text-align: -webkit-center;"><span style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"></span><table width="700" border="0" cellspacing="0" cellpadding="0" style="font-family:Calibri,sans-serif"><tbody><tr><td width="9" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="1" style="font-family:Calibri,sans-serif;font-size:14px;border:1px solid rgb(111,175,255)"> <font size="3"><strong> Security</strong></font> </td><td width="650" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="17" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"><a style="color:rgb(34,34,34)"><img src="http://bigcom.tyut.edu.cn/images/title_arrow.jpg" border="0" name="14be533ae919826b_14b93a567e195db3_14b76bdbd902c986_cfp3" alt="" class=""></a></td></tr></tbody></table><div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"><ul><li style="margin-left:15px"><div align="left">Security and Legal Issue in Mobile Applications/Apps</div></li><li style="margin-left:15px"><div align="left">Privacy of Open Data</div></li><li style="margin-left:15px"><div align="left">Access Control and Authentication</div></li><li style="margin-left:15px"><div align="left">Pricing modeling and policy</div></li><li style="margin-left:15px"><div align="left">Reliability and Security of Content and Data</div></li><li style="margin-left:15px"><div align="left">Usability of Security Technologies and Services</div></li><li style="margin-left:15px"><div align="left">Trust and Privacy Issues in Mobile Commerce Environment</div></li><li style="margin-left:15px"><div align="left">Cryptographic Protocols</div></li></ul></div><img src="http://bigcom.tyut.edu.cn/images/blank.gif" height="25" alt="" class="" style="color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-size: 14px; text-align: -webkit-center;"><span style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"></span><table width="700" border="0" cellspacing="0" cellpadding="0" style="font-family:Calibri,sans-serif"><tbody><tr><td width="9" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="1" style="font-family:Calibri,sans-serif;font-size:14px;border:1px solid rgb(111,175,255)"> <font size="3"><strong>Management</strong></font> </td><td width="650" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="17" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"><a style="color:rgb(34,34,34)"><img src="http://bigcom.tyut.edu.cn/images/title_arrow.jpg" border="0" name="14be533ae919826b_14b93a567e195db3_14b76bdbd902c986_cfp4" alt="" class=""></a></td></tr></tbody></table><div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"><ul><li style="margin-left:15px"><div align="left"><span class="">Big</span> Data Storage, Indexing, Searching and Querying</div></li><li style="margin-left:15px"><div align="left"><span class="">Big</span> Data Quality Management</div></li><li style="margin-left:15px"><div align="left">Heterogeneous Data Management</div></li><li style="margin-left:15px"><div align="left">Knowledge Management and Ontology Engineering</div></li><li style="margin-left:15px"><div align="left">Unstructured Data Modeling</div></li><li style="margin-left:15px"><div align="left">Scheduling and Resource Management in <span class="">Big</span> Data Environments</div></li><li style="margin-left:15px"><div align="left">Spatial, Temporal, Multimedia and Scientific Databases</div></li><li style="margin-left:15px"><div align="left">Database and Data Warehouse Technologies for <span class="">Big</span> data</div></li></ul></div><img src="http://bigcom.tyut.edu.cn/images/blank.gif" height="25" alt="" class="" style="color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-size: 14px; text-align: -webkit-center;"><span style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"></span><table width="700" border="0" cellspacing="0" cellpadding="0" style="font-family:Calibri,sans-serif"><tbody><tr><td width="9" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="1" style="font-family:Calibri,sans-serif;font-size:14px;border:1px solid rgb(111,175,255)"> <font size="3"><strong>Applications</strong></font> </td><td width="650" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="17" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"><a style="color:rgb(34,34,34)"><img src="http://bigcom.tyut.edu.cn/images/title_arrow.jpg" border="0" name="14be533ae919826b_14b93a567e195db3_14b76bdbd902c986_cfp5" alt="" class=""></a></td></tr></tbody></table><div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"><ul><li style="margin-left:15px"><div align="left">Infrastructures and Frameworks of Data- driven Applications</div></li><li style="margin-left:15px"><div align="left">Mobile Device Apps based on <span class="">Big</span> Data</div></li><li style="margin-left:15px"><div align="left"><span class="">Big</span> Data for Crowd-sourcing</div></li><li style="margin-left:15px"><div align="left"><span class="">Big</span> Data for Advanced Manufacturing</div></li><li style="margin-left:15px"><div align="left"><span class="">Big</span> Data for Open Government</div></li><li style="margin-left:15px"><div align="left"><span class="">Big</span> Data for Healthcare</div></li><li style="margin-left:15px"><div align="left"><span class="">Big</span> Data for Bioinformatics</div></li><li style="margin-left:15px"><div align="left"><span class="">Big</span> Data for Intelligence Transportation</div></li><li style="margin-left:15px"><div align="left"><span class="">Big</span> Data for Smart City</div></li><li style="margin-left:15px"><div align="left"><span class="">Big</span> Data for Business Intelligence</div></li><li style="margin-left:15px"><div align="left"><span class="">Big</span> Data for Geo Intelligence</div></li><li style="margin-left:15px"><div align="left"><span class="">Big</span> Data for Logistics</div></li><li style="margin-left:15px"><div align="left"><span class="">Big</span> Data for Virtual Metrology</div></li></ul></div><img src="http://bigcom.tyut.edu.cn/images/blank.gif" height="25" alt="" class="" style="color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-size: 14px; text-align: -webkit-center;"><span style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"></span><table width="700" border="0" cellspacing="0" cellpadding="0" style="font-family:Calibri,sans-serif"><tbody><tr><td width="9" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="1" style="font-family:Calibri,sans-serif;font-size:14px;border:1px solid rgb(111,175,255)"> <font size="3"><strong>Paper Submission</strong></font> </td><td width="650" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="17" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"><a style="color:rgb(34,34,34)"><img src="http://bigcom.tyut.edu.cn/images/title_arrow.jpg" border="0" name="14be533ae919826b_14b93a567e195db3_14b76bdbd902c986_cfp6" alt="" class=""></a></td></tr></tbody></table><div style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"><table cellspacing="20" cellpadding="0" border="0"><tbody><tr><td style="font-family:Calibri,sans-serif"><div align="justify"><strong>Our proceeding will be published by Springer(pending approval). The selected papers will be published at SCI or SCIE journals.</strong><br>All paper submissions will be handled electronically at the <a href="https://easychair.org/conferences/?conf=bigcom2015" target="_blank">submission site</a>. Authors should prepare a PDF version of their full paper. Any papers that do not adhere to the following guidelines will be immediately rejected:</div></td></tr></tbody></table><table width="680" border="0" cellpadding="0" cellspacing="5"><tbody><tr><td width="670" style="font-family:Calibri,sans-serif"><ul><li style="margin-left:15px"><div align="left">Maximum of 10 pages</div></li><li style="margin-left:15px"><div align="left">Font size no smaller than 10 points</div></li><li style="margin-left:15px"><div align="left">Fit properly on US letter-sized paper (8.5 inches x 11 inches)</div></li></ul></td></tr></tbody></table><table cellspacing="20" cellpadding="0" border="0"><tbody><tr><td style="font-family:Calibri,sans-serif"><div align="justify">Submitted papers must be original work, and a paper with substantial similarity must neither be already published, nor be currently under review for publication in any other venue. If your paper does not meet the specified formatting instructions, it will be rejected without review.</div></td></tr></tbody></table></div><img src="http://bigcom.tyut.edu.cn/images/blank.gif" height="25" alt="" class="" style="color: rgb(0, 0, 0); font-family: Calibri, sans-serif; font-size: 14px; text-align: -webkit-center;"><span style="color:rgb(0,0,0);font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"></span><table width="700" border="0" cellspacing="0" cellpadding="0" style="font-family:Calibri,sans-serif"><tbody><tr><td width="8" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="128" style="font-family:Calibri,sans-serif;font-size:14px;border:1px solid rgb(111,175,255)"> <strong>Important Dates</strong> </td><td width="546" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"></td><td width="18" bgcolor="#6FAFFF" style="font-family:Calibri,sans-serif;font-size:14px"><a style="color:rgb(34,34,34)"><img src="http://bigcom.tyut.edu.cn/images/title_arrow.jpg" border="0" name="14be533ae919826b_14b93a567e195db3_14b76bdbd902c986_cfp7" alt="" class=""></a></td></tr></tbody></table><div style="font-family:Calibri,sans-serif;font-size:14px;text-align:-webkit-center"><ul><li style="color:rgb(0,0,0);margin-left:15px"><div align="left"><strong>All deadlines are at 11:59 PM Pacific Standard Time.</strong></div></li><li style="margin-left:15px"><div align="left"><b><font color="#ff0000">Abstracts submission (extended): April 10,2015</font></b></div></li><li style="margin-left:15px"><div align="left"><b><font color="#ff0000">Paper submission (extended): April 10, 2015</font></b></div></li><li style="color:rgb(0,0,0);margin-left:15px"><div align="left">Paper notification: May 25, 2015</div></li><li style="color:rgb(0,0,0);margin-left:15px"><div align="left">Camera Ready Submission: June 5, 2015</div></li><li style="color:rgb(0,0,0);margin-left:15px"><div align="left">Conference date: August 1-3, 2015</div></li></ul></div><div><div dir="ltr"><div style="font-size:12.8000001907349px"><br></div><div style="font-size:12.8000001907349px">Enquiries should be submitted to Professor Xiang-Yang Li (<a href="mailto:xli@cs.iit.edu" target="_blank">xli@cs.iit.edu</a>)</div></div></div></div><div><div class="gmail_signature"><div dir="ltr"><div>--</div><div>Ph.D student in CS Department at Illinois Institute of Technology.<br></div><div>Office : Stuart Building 019B (Basement)</div></div></div></div>
</div>