List of Distributed Computing Conferences - Selection Criteria

Selection Criteria

The conferences listed here are major conferences of the area; they have been selected using the following criteria:

  1. the notability of the conference has been confirmed by multiple independent sources; for example, it has been mentioned in textbooks or other sources, or it has received a high ranking
  2. the conference focuses on distributed and parallel computing (instead of having a much broader scope such as algorithms in general)
  3. the conference covers a reasonably large part of the fields of distributed and parallel computing (instead of focusing on a narrow sub-topic).

For the first criterion, references are provided; criteria 2–3 are usually clear from the name of the conference.

Read more about this topic:  List Of Distributed Computing Conferences

Famous quotes containing the words selection and/or criteria:

    Judge Ginsburg’s selection should be a model—chosen on merit and not ideology, despite some naysaying, with little advance publicity. Her treatment could begin to overturn a terrible precedent: that is, that the most terrifying sentence among the accomplished in America has become, “Honey—the White House is on the phone.”
    Anna Quindlen (b. 1952)

    The Hacker Ethic: Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total.
    Always yield to the Hands-On Imperative!
    All information should be free.
    Mistrust authority—promote decentralization.
    Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
    You can create art and beauty on a computer.
    Computers can change your life for the better.
    Steven Levy, U.S. writer. Hackers, ch. 2, “The Hacker Ethic,” pp. 27-33, Anchor Press, Doubleday (1984)