通信专业研究生研究方向展望
浏览了一下IEEE Communications Society 07年通信年会指南,现摘录其中的部分内容,给报考通信专业的同学抛砖引玉。。。
会议主题 "Smart Communications Technologies for Tomorrow" (未来智能通信技术)
虽然我不知道具体的内容,但以下几百个方向应该是通信专业最前沿的研究课题了。
红色部分是我自己翻译的。
1 COMMUNICATIONS QoS, RELIABILITY AND PERFORMANCE MODELLING (通信质量、可靠性和性能建模)
The symposium deals with performance issues for enabling current and next-generation networks and services.
Topics of Interest
1) Qos in Multimedia Networks , VoIP QoS (多媒体网络服务质量,IP语音服务质量)
2) QoS in the Internet (Internet服务质量)
3) QoS and Routing, MPLS, Multicast Service (路由和服务质量,数字证明学习系统,多点传送服务)
4) QoS Metrics ()
5) QoS of Network services, VPN, WEB (网络服务质量,虚拟专用网络,WEB)
6) QoS for Wireless Networks including Mobile and Sensor Networks (无线网络包括移动和传感器网络的服务质量)
7) QoS Aspects for PSTN /IP-NW Interworking (PSTN/IP-NW交互工作的服务质量)
8) QoS Network Architectures (服务质量网络结构)
9) Standardization Aspects of QoS and Reliability (服务质量和可靠性的标准化)
10) Traffic Modeling and characterization (交通建模和特征)
11) Traffic Control (交通控制)
12) Performance Modeling (性能建模)
13) Network Design (网络设计)
14) Simulation techniques (仿真技术)
15) Measurements techniques (测量技术)
16) Tools and software for Performance Evaluation (性能评估的工具和软件)
17) Satellite network and transport protocols (卫星网络和传输协议)
18) QoS-oriented solutions for IP over satellite (卫星IPQos导向的解决方案)
19) Satellite/terrestrial QoS mapping (卫星/陆地Qos映射)
20) Satellite adaptation layers and interfaces (卫星适应层和分界面)
21) Reliable satellite transport architectures (可靠卫星传输结构)
22) End-to-end QoS satellite architectures (端对端Qos卫星结构)
23) QoS signaling over satellite networks (卫星网络中的Qos信号)
24) Peer-to-peer application over satellite (通过卫星的点对点应用)
25) Satellite call admission control (卫星电话接入控制)
26) QoS routing in satellite networks (卫星网络的Qos路由)
27) Satellite resource allocation and planning (卫星资源分配和计划)
28) Network management in satellite networks (卫星网络中的网络管理)
29) Emerging standards over Satellite (卫星中的Emerging标准)
2 COMMUNICATIONS THEORY (通信理论)
This symposium welcomes original research papers on theoretical and applied aspects of wireless, mobile and wireline communication systems. Topics-of-interest address a wide range of physical layer issues including modulation, coding (such as turbo, LDPC, space-time, concatenated aspects), joint source-channel coding, synchronization, equalization (including soft and turbo-equalization), channel estimation, interference avoidance and advanced multiple access strategies. Theoretical performance analysis and design issues of multiple-input multiple-output (MIMO) systems, ultrawideband (UWB) transmission, optical communication (such as optical CDMA, wireless optical) and cooperative diversity (including diversity/multiplexing tradeoffs, distributed coding and signal processing as applied to ad-hoc and sensor networks) will be also featured. Research results on communication theory aspects of genetics, bioinformatics and quantum information processing are warmly welcome as well.
Topics of Interest
1) Turbo, LDPC, space-time and other designs of channel codes (Turbo,LDPC,空时及其它信道码设计)
2) Iterative detection and decoding for concatenated systems (连接系统的迭代检测和解码)
3) Space-time coding and processing (空时编码和处理)
4) MIMO system design and analysis (多输入多输出系统设计和分析)
5) Low complexity decoding algorithms (低复杂度解码算法)
6) Distributed coding and processing: ad-hoc and sensor networks (分布式编码和处理:ad-hoc和传感器网络)
7) Source Compression and joint source/channel coding (信源压缩和联合信源/信道编码)
8) OFDM and multi-carrier methods 正交频分复用和多载波方法)
9) CDMA and multi-user detection (CDMA和多用户检测)
10) Diversity, cooperative systems and diversity/multiplexing tradeoff (多样性,合作系统和多样性/多路交换技术)
11) Interference cancellation and avoidance (干扰消除和抑制)
12) UWB systems and analysis (超宽带系统和分析)
13) Soft and traditional equalization/decoding (软-传统均衡/解码)
14) Adaptive systems for communications (通信中的自适应系统)
3 COMPUTER AND COMMUNICATIONS NETWORK SECURITY (计算机和通信网络安全)
With the advent of pervasive computer in communications networks and the proliferation of heterogeneous networks, network security has become paramount. The proposed Communications and Computer Network Security Symposium will address aspects of modeling, design, implementation, deployment, network management, and security algorithms, protocols, architectures, systems and testbeds. Original papers are invited in the area of network security, source authentication, protocols, data encryption algorithms, attack scenarios, source mimicking, denial of service, countermeasure scenarios, link layer security, and so on. Furthermore, contributions devoted to the evaluation, optimization, or enhancement of security mechanisms for current technologies as well as devising efficient security and privacy solutions for emerging technologies are solicited.
Topics of Interest
1) 3G, 4G security
2) 802.11 security, 802.11i
3) Ad hoc network security
4) Advance cryptography and Quantum cryptography
5) Application/network penetration testing
6) Authentication protocols
7) Biometric security: technologies, risks and vulnerabilities
8) Bluetooth security
9) Computer communication security
10) Computer and network forensics
11) Critical infrastructure security
12) Cryptography Issues
13) Data and system integrity
14) Deployment and management of computer/network security policies
15) Distributed Denial-Of-Service (DDOS) attacks and countermeasures
16) Distributed systems security
17) DNS spoofing and security
18) Encryption standards
19) Encryption vulnerabilities
20) Financial cryptosystems
21) Firewalls
22) Formal trust models
23) Information hiding and watermarking
24) Intrusion detection, localization, and avoidance
25) IPv6 security, IPSec
26) Key distribution methods and management
27) Light-weight cryptography
28) Message authentication
29) Mobile code security
30) Network security metrics and performance evaluation
31) Network traffic analysis techniques
32) Operating System(OS) security and log analysis tools
33) Optical Network security
34) Peer-to-peer systems
35) Public-key cryptography
36) Quantum cryptography and implementation platforms
37) Quantum Key Distribution methods
38) Revocation of malicious parties
39) Robust Security Network (RSN)
40) Secure naming
41) Secure Socket Layer (SSL)
42) Security modeling and protocol design
43) Security specification techniques
44) Self-healing networks
45) Sensor network security
46) Single- and multi-source intrusion detection and response (automation)
47) Smart cards and secure hardware
48) Source and link authentication
49) Symmetric and asymmetric key cryptography
50) Testbeds
51) Transport Layer Security (TLS)
52) Trust establishment
53) Upper-layer authentication
54) Virtual Private Networks (VPNs)
55) Vulnerability, exploitation tools, and virus/worm analysis
56) Web, e-commerce, m-commerce, and e-mail security
57) Wi-Fi Protected Access (WPA)