RS Outreach at CENet 2013

W. Eric Wong

Vice President, Technical Activities, IEEE Reliability Society

&

CENet 2013 Conference Chair


The third International Conference on Computer Engineering and Network (CENet 2013), held from July 19-20, 2013 in Shanghai, China, hosted more than 150 attendees in an extremely productive and informative gathering. Professor Eric Wong (vice president of the society for technical activities) was the Conference Chair, and Dr. Sam Keene (former president of the society) gave a keynote speech on "Six Sigma Requirement Development Tools Assure More Reliable Software," during which he discussed and demonstrated six preferred tools to produce better product designs. He also explained the benefits of membership in the Reliability Society and encouraged conference attendees to join. In addition to paper presentations, the conference also included a special seminar on "Using SCI for Subject Innovation to Produce High Quality Papers" and a roundtable discussion on the challenges of research in Computer Engineering and Network, where participants explored recent trends in the related research areas and examined the driving force behind each and every one of these as well as the expected and unexpected consequences. Some photographs taken at the opening session and during the keynote speeches are below.




Another item of significance is that the conference also arranged a tour to the Shanghai Supercomputing Center, providing its attendees a chance to directly communicate with practitioners to receive a first-hand account of the work environments and gain a better understanding of how the knowledge discussed in the classroom has actually been applied in practice.

The objective of the conference is to provide researchers and practitioners with an embedded forum for presenting and discussing their ideas and experiences with technologies and tools used for producing high-quality reliable and trustworthy computer systems more effectively and efficiently. CENet 2013 has a large enough scope to represent major topics in Computer Engineering and Network, but is focused enough to provide an in-depth representation of theory and practice in these areas. Academic researchers and industry participants can share their approaches, results, practices, and lessons learned. In particular, CENet not only allows the academic community to understand the areas that are vital to the industry, but also gives practitioners an opportunity to express their needs.

This year's conference received over 500 submissions. Each was carefully evaluated by three program committee members on the basis of originality, significance of contributions, quality of presentation, appropriate comparisons with related work, and relevance to the conference. PC members also participated in the on-line discussion for the papers they reviewed to resolve any discrepancies. Based on the comments, 142 papers were selected with an acceptance rate of less than 27%.

Upon paper acceptance, prospective authors must provide a revised, camera-ready version which took into account the review comments. The conference proceedings are published by Springer and included in the Ei Compendex database. They contain two volumes with three parts each. Part I focuses on Algorithm Design with 29 papers over 232 pages; Part II emphasizes Data Processing containing 184 pages divided among 22 papers; Part III Pattern Recognition includes 29 papers in 234 pages; Part IV has 22 papers and 187 pages devoted to one of the most exciting technologies currently surging in popularity - Cloud Computing; Part V covers recent advances in Embedded Systems with 28 papers in 228 pages; and finally Part VI has 28 papers spanning 234 pages dedicated to Network Optimization.

Each part can be used as an excellent reference by industry practitioners, university faculty, and undergraduate as well as graduate students who need to build a knowledge base of the most current advances and state-of-practice in the topics covered by this book. This will enable them to produce, maintain, and manage systems with high levels of trustworthiness and complexity that provide critical services in a variety of applications.