Selection Criteria
The conferences listed here are major conferences of the area; they have been selected using the following criteria:
- the notability of the conference has been confirmed by multiple independent sources; for example, it has been mentioned in textbooks or other sources, or it has received a high ranking
- the conference focuses on distributed and parallel computing (instead of having a much broader scope such as algorithms in general)
- the conference covers a reasonably large part of the fields of distributed and parallel computing (instead of focusing on a narrow sub-topic).
For the first criterion, references are provided; criteria 2–3 are usually clear from the name of the conference.
Read more about this topic: List Of Distributed Computing Conferences
Famous quotes containing the words selection and/or criteria:
“When you consider the radiance, that it does not withhold
itself but pours its abundance without selection into every
nook and cranny”
—Archie Randolph Ammons (b. 1926)
“The Hacker Ethic: Access to computersand anything which might teach you something about the way the world worksshould be unlimited and total.
Always yield to the Hands-On Imperative!
All information should be free.
Mistrust authoritypromote decentralization.
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.”
—Steven Levy, U.S. writer. Hackers, ch. 2, The Hacker Ethic, pp. 27-33, Anchor Press, Doubleday (1984)