The MCO 20215 invites all researchers and practitioners working in areas related to modelling, computation and optimization and their applications to submit works for consideration.
We encourage all types of contributions including theory, algorithms, and applications, particularly in emergent domains such as Artificial Intelligence, Data Science, Big Data, Robotics, ...
The conference proceedings will be published in the series Lectures Notes in Networks and Systems of Spinger-Verlag, and indexed by SCOPUS, DBLP, Web of Science, EI Compendex, Norwegian Register for Scientific Journals and Series, WTI AG, INSPEC, zbMATH, SCImago
You are kindly invited to submit a paper (limited by 12 pages), using LNCS/LNAI style.
Topics include (but not limitted to):
1 - Optimization and Decision Making
- Continuous Optimization and Applications
- Discrete Optimization, Integer Programming and Applications
- Multiobjective Optimization, Multilevel Programming
- Novel opportunities of Optimization for Industry and Finance: Network, Logistic, Energy, Robotics, Economics, etc.
2 - Machine Learning & Big Data
- Machine Learning – models and methods: active learning, online learning, reinforcement learning, semi-supervised learning, unsupervised learning, etc.
- Deep Learning
- Big Data, Cloud Computing, etc.
- Optimization & Huge-Scale Optimization in Machine Learning
- Applications in Electronic Commerce, Bioinformatics, Computer Security, Web Intelligence, Intelligent Learning Database Systems, Finance, Marketing, Healthcare, Telecommunications, and other fields
3 - Computer Vision and Image Processing
- Computed Tomography
- Pattern Recognition
- Audio, Image, Video Processing
- Medical Image Processing
- Optimization Techniques for Image Processing
- Multimedia Computing Systems and Appliances
4 - Computer Communications and Networks
- Cross-Layer Design and Optimization
- Communications & Information Theory
- Signal Processing for Communications
- Networking Algorithms and Performance Evaluation
5 - Security, Reliability, Trust
- Intrusion detection
- Cryptography, Cryptanalysis
- Security protocols
- Quality of Services
- Trust Management
- Software Validation and Verification