Operating Systems
1
|
ATC-USENIX - Annual Technical Conference
|
93
|
2
|
SOSP - ACM Symposium on Operating Systems Principles
|
73
|
3
|
OSDI - USENIX Symposium on Operating Systems Design and Implementation
|
70
|
4
|
NOSSDAV - ACM SIGMM Workshop on Network and Operating Systems Support for Digital Audio and Video
|
59
|
5
|
HotOS(WWOS) - Workshop on Workstation Operating Systems (now HotOS)/Workshop on Hot Topics in Operating Systems
|
47
|
6
|
ASPLOS - Architectural Support for Programming Languages and Operating Systems
|
44
|
7
|
FAST-USENIX Conference on File and Storage Technologies
|
39
|
|
|
|
|
Programming languages
|
1
|
POPL -ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
|
129
|
2
|
ECOOP - European Conference on Object-Oriented Programming
|
75
|
3
|
PLDI - SIGPLAN Conference on Programming Language Design and Implementation
|
63
|
4
|
ICLP(JICSLP) - International Conference on Logic Programming/Joint International Conference and Symposium on Logic Programming
|
57
|
5
|
ESOP /ETAPS- European Symposium on Programming / European Joint Conferences on Theory and Practice of Software
|
49
|
6
|
International Conference on Modularity (earlier called AOSD - Aspect-Oriented Software Development conference)
|
46
|
7
|
ASE - IEEE/ACM International Conference on Automated Software Engineering
|
44
|
8
|
CC - International Conference on Compiler Construction
|
37
|
9
|
ICFP - International Conference on Functional Programming
|
36
|
10
|
VL/HCC - IEEE Symposium on Visual Languages and Human-Centric Computing
|
35
|
11
|
Principles and Practice of Declarative Programming (earlier known as PLILP - Symposium on Programming Language Implementation and Logic Programming)
|
30
|
12
|
CGO - International Symposium on Code Generation and Optimization
|
29
|
13
|
PEPM - Partial Evaluation and Program Manipulation
|
28
|
14
|
Quantitative Evaluation of SysTems (QEST) (earlier known as Petri Nets and Performance Models)
|
28
|
|
|
|
|
Real-time & Embedded Systems
|
|
1
|
RTSS - IEEE Real-Time Systems Symposium
|
85
|
2
|
CDC - IEEE Conference on Decision and Control
|
84
|
3
|
SenSys - ACM Conference on Embedded Networked Sensor Systems
|
69
|
4
|
CHES - Workshop on Cryptographic Hardware and Embedded Systems
|
53
|
5
|
RTAS - IEEE Real Time Technology and Applications Symposium
|
46
|
6
|
CASES -International Conference on Compilers, Architecture, and Synthesis for Embedded Systems
|
34
|
7
|
EMSOFT - ACM SIGBED International Conference on Embedded Software
|
31
|
8
|
ISORC - IEEE Computer Society symposium on Object-Oriented Real-Time Distributed Computing
|
29
|
9
|
SCOPES-International Workshop on
Software and Compilers for Embedded Systems
|
|
|
|
|
|
Security & Privacy
|
|
1
|
CRYPTO - International Crytology Conference
|
117
|
2
|
EUROCRYPT - Annual International Conference on the Theory and Applications of Cryptographic Techniques
|
104
|
3
|
SP - IEEE Symposium on Security and Privacy
|
101
|
4
|
CCS - ACM Conference on Computer and Communications Security
|
90
|
5
|
USENIX Security Symposium
|
74
|
6
|
NDSS -Network and Distributed System Security Symposium
|
65
|
7
|
CSF -Computer Security Foundations Symposium
|
59
|
8
|
ASIACRYPT - Annual International Conference on the Theory and Application of Cryptology and Information Security
|
54
|
9
|
ACM IH & MMSEC-Information Hiding and Multimedia Security
|
52
|
10
|
DSN - Annual IEEE/IFIP International Conference on Dependable Systems and Networks
|
51
|
11
|
ACSAC - Annual Computer Security Applications Conference
|
47
|
12
|
IAS - Information Assurance and Security
|
46
|
13
|
FSE - International Workshop on Fast Software Encryption
|
46
|
14
|
SACMAT - ACM Symposium on Access Control Models and Technologies
|
45
|
15
|
PKC - International Conference on Practice and Theory of Public-Key Cryptography
|
42
|
16
|
RAID - International Symposium on Research in Attacks, Intrusions and Defenses,
|
41
|
17
|
Financial Cryptography and Data Security
|
40
|
18
|
CT-RSA - RSA Conference Cryptographers' Track
|
38
|
19
|
ESORICS - European Symposium on Research in Computer Security
|
37
|
20
|
NSPW - New Security Paradigms Workshop
|
36
|
21
|
LISA - Large Installation System Administration Conference
|
35
|
22
|
SAC -Conference on Selected Areas in Cryptography
|
32
|
23
|
TCC-Theory of Cryptography Conference
|
32
|
24
|
ACISP - Australasian Conference on Information Security and Privacy
|
29
|
25
|
INSCRYPT - International Conference on Information Security and Cryptology
|
29
|
26
|
ACM symposium on access control models and technologies -SACMAT (earlier known as ACM Workshop on Role-Based Access Control)
|
29
|
27
|
ISC(ISW) - Information Security Conference/Information Security Workshop
|
28
|
28
|
SASN - ACM Workshop on Security of Ad Hoc and Sensor Networks
|
28
|
|
|
|
|
Simulation
|
1
|
WSC - Winter Simulation Conference
|
54
|
2
|
MSWiM - ACM International Conference on Modeling, Analysis
and Simulation of Wireless and Mobile Systems
|
35
|
3
|
ACM SIGSIM PADS - ACM SIGSIM Conference on Principles of Advanced Discrete Simulation
|
28
|
|
|
|
|
Software Engineering
|
1
|
ICSE - International Conference on Software Engineering
|
118
|
2
|
ITC - International Test Conference
|
89
|
3
|
CAV -International Conference on Computer Aided Verification
|
88
|
4
|
OOPSLA -Object-oriented Programming, Systems, Languages, and Applications
|
59
|
5
|
SPIN - International Workshop on Model Checking of Software
|
59
|
6
|
TACAS -International Conference on Tools and Algorithms for the Construction and Analysis of Systems
|
57
|
7
|
ICSME - International Conference on Software Maintenance and Evolution
|
56
|
8
|
CP - International Conference on. Principles and Practice of. Constraint Programming
|
54
|
9
|
IFIP - World Computer Congress
|
49
|
10
|
IEEE International Requirements Engineering Conference
|
47
|
11
|
Dagstuhl Seminars
|
46
|
12
|
SAS(WSA) -International Static Analysis Symposium
|
45
|
13
|
ASE - IEEE/ACM International Conference on Automated Software Engineering
|
44
|
14
|
ESEC - European Software Engineering Conference
|
44
|
15
|
WCRE - Working Conference on Reverse Engineering
|
43
|
16
|
SAC - ACM/SIGAPP Symposium On Applied Computing.
|
42
|
17
|
ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (earlier the UML conference)
|
42
|
18
|
FM - INTERNATIONAL SYMPOSIUM ON FORMAL METHODS
|
39
|
19
|
ISSRE - International Symposium on Software Reliability Engineering
|
37
|
20
|
ICPC - International Conference on Program Comprehension
|
37
|
21
|
RTA - Rewriting Techniques and Applications
|
36
|
22
|
ISSTA - ACM International Symposium on Software Testing and Analysis.
|
35
|
23
|
COMPSAC - International Computer Software and Applications Conference
|
34
|
24
|
METRICS -IEEE International Software Metrics Symposium
|
33
|
25
|
FASE - International Conference on Fundamental Approaches to Software Engineering
|
31
|
26
|
WETICE - IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises
|
30
|
27
|
FoSSaCS - International Conference on Foundations of Software Science and Computation Structures
|
30
|
28
|
FMCAD - Formal Methods in Computer-Aided Design
|
30
|
29
|
VMCAI - Verification, Model Checking and Abstract Interpretation
|
30
|
30
|
ISMM - International Symposium on Memory Management
|
30
|
31
|
ICSR - International Conference on Software Reuse
|
29
|
32
|
CSMR - European Conference on Software Maintenance and Reengineering
|
28
|
33
|
SPLC - Software Product Lines
|
28
|
|
|
|
1
|
|