• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Conferences
  • /Cfp
  • Home
  • /Conferences
  • /Cfp

The International Symposium on Computer Architecture (ISCA2020)

The International Symposium on Computer Architecture (ISCA2020)

May 30 – June 3, 2020 Valencia, Spain

The International Symposium on Computer Architecture is the premier forum for new ideas and experimental results in computer architecture.

In 2020, the 47th edition of ISCA will be held in Valencia, Spain.

 Submission Guidelines

 Upload Abstracts and Papers to HotCRP

Important Dates

  • Abstract Deadline: CLOSED
  • Full Paper Deadline: November 26, 2019
  • Rebuttal/Revision Period: February 3–14, 2020
  • Author Notification: March 4, 2020


Topics

Papers are solicited on a broad range of topics, including (but not limited to):

  • Processor, memory, and storage systems architecture
  • Multiprocessor systems
  • Datacenter-scale computing
  • IoT, mobile and embedded architecture
  • Interconnection network, router and network interface architecture
  • Accelerator-based, application-specific and reconfigurable architecture
  • Architectural support for programming languages or software development
  • Architectural support for security or virtualization
  • Instruction, thread and data-level parallelism
  • Dependable processor and system architecture
  • Architecture for emerging technologies and applications, including machine learning, novel memory technologies, quantum computing, etc.
  • Effects of circuits or technology on architecture
  • Architecture modeling and simulation methodologies
  • Evaluation and measurement of real computing systems


Organizers

  • General Chairs: José Martínez (Cornell) and José Duato (UPV)
  • Program Chair: Lieven Eeckhout (Ghent University)

LATEST NEWS
LinkedIn Profile Template
LinkedIn Profile Template
Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech
Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech
Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students
Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students
Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights
Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights
CS Juniors: ChiTech Discovery Days
CS Juniors: ChiTech Discovery Days
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter
Read Next

LinkedIn Profile Template

Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech

Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students

Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights

CS Juniors: ChiTech Discovery Days

CV Template

A History of Rendering the Future with Computer Graphics & Applications

AI Assisted Identity Threat Detection and Zero Trust Access Enforcement