List of computer science conferences

This is a list of academic conferences in computer science. Only conferences with separate articles are included; within each field, the conferences are listed alphabetically by their short names.

General

Algorithms and theory

ESA 2009

Conferences accepting a broad range of topics from theoretical computer science, including algorithms, data structures, computability, computational complexity, automata theory and formal languages:

Algorithms

Conferences whose topic is algorithms and data structures considered broadly, but that do not include other areas of theoretical computer science such as computational complexity theory:

Geometric algorithms

Conferences on computational geometry, graph drawing, and other application areas of geometric computing:

Logic

Other specialized subtopics

Languages and software

Programming languages

Conferences on programming languages, programming language theory and compilers:

Software engineering

Conferences on software engineering:

Formal methods

Conferences on formal methods in software engineering, including formal specification, formal verification, and static code analysis:

Concurrent, distributed and parallel computing

Conferences on concurrent, distributed, and parallel computing, fault-tolerant systems, and dependable systems:

High-performance computing

Conferences on high-performance computing, cluster computing, and grid computing:

Operating systems

Conferences on operating systems, storage systems and middleware:

Computer architecture

Conferences on computer architecture:

Computer hardware

Conferences on computer hardware:

Computer-aided design

Conferences on computer-aided design and electronic design automation:

Computer networking

Conferences on computer networking:

Wireless networks and mobile computing

Wireless networks and mobile computing, including ubiquitous and pervasive computing, wireless ad hoc networks and wireless sensor networks:

Security and privacy

Conferences on computer security and privacy:

Cryptography

Cryptography conferences:

  • ACNS - Applied Cryptography and Network Security
  • ANTS - Algorithmic Number Theory Symposium
  • ASIACRYPT - International Conference on the Theory and Application of Cryptology and Information Security
  • CHES - Workshop on Cryptographic Hardware and Embedded Systems
  • CRYPTO - International Cryptology Conference
  • EUROCRYPT - International Conference on the Theory and Applications of Cryptographic Techniques
  • FSE - Fast Software Encryption Workshop
  • PKC - International Workshop on Practice and Theory in Public Key Cryptography
  • RSA - RSA Conference
  • TCC - Theory of Cryptography Conference

Data management

Conferences on databases, information systems, information retrieval, data mining and the world wide web:

Artificial intelligence

Conferences on artificial intelligence and machine learning:

Evolutionary computation

Conferences on Evolutionary computation.

Automated reasoning

Conferences on automated reasoning:

Computer vision

Conferences on computer vision (including also image analysis) and pattern recognition:

Natural language processing

Conferences on computational linguistics and natural language processing:

Computer graphics

Conferences on computer graphics, geometry processing, image processing, and multimedia:

  • Eurographics - Annual Conference of the European Association for Computer Graphics
  • MM - ACM International Conference on Multimedia
  • SGP - Symposium on Geometry Processing
  • SIGGRAPH - International Conference on Computer Graphics and Interactive Techniques

Visualization

Conferences on scientific visualization and information visualization:

Human–computer interaction

Conferences on human–computer interaction and user interfaces:

Bioinformatics and computational biology

Conferences on bioinformatics and computational biology:

Education

Conferences on computer science education and electronic learning:

  • SIGCSE - ACM Technical Symposium on Computer Science Education
gollark: If you want it to be some magic untamperable hardware, that's maybe *possible* for some amount of "untamperable", but really hard and user-hostile.
gollark: As far as I know, that would just use the fingerprint scanner to unlock an encryption key on the phone.
gollark: ↑
gollark: Fingerprint login kind of works since you just need to compare the fingerprint against the one which is stored, and it doesn't matter much if you can feed it fake fingerprints somehow.
gollark: Well, if you want some horrible "trusted fingerprint scanners" thing, then bee you and also someone will break it.

See also

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.