INTERNET 2010 - The Second International Conference on Evolving Internet
View: 1993
Website www.iaria.org/conferences.html |
Edit Freely
Category INTERNET 2010
Deadline: April 20, 2010 | Date: September 20, 2010
Venue/Country: Valencia, Spain
Updated: 2010-06-04 19:32:22 (GMT+9)
Call For Papers - CFP
Originally designed in the spirit of interchange between scientists, Internet reached a status where large-scale technical limitations impose rethinking its fundamentals. This refers to design aspects (flexibility, scalability, etc.), technical aspects (networking, routing, traffic, address limitation, etc), as well as economics (new business models, cost sharing, ownership, etc.). Evolving Internet poses architectural, design, and deployment challenges in terms of performance prediction, monitoring and control, admission control, extendibility, stability, resilience, delay-tolerance, and interworking with the existing infrastructures or with specialized networks. The INTERNET 2010 conference deals with challenges raised by evolving Internet making use of the progress in different advanced mechanisms and theoretical foundations. The gap analysis aims at mechanisms and features concerning the Internet itself, as well as special applications for software defined radio networks, wireless networks, sensor networks, or Internet data streaming and mining.While many attempts are done and scientific events are scheduled to deal with rethinking the Internet architecture, communication protocols, and its flexibility, the current series of events starting with INTERNET 2009 is targeting network calculi and supporting mechanisms for these challenging issues.We solicit both academic, research, and industrial contributions on topics regarding new views on Internet protocols, Internet extendibility, new architectures and tradeoffs. INTERNET 2010 will offer tutorials, plenary sessions, and panel sessions. A best paper award will be granted by the IARIA’s award selection committee.The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All tracks are open to both research and industry contributions.Advanced Internet mechanismsAccess: call admission control vs. QoE vs. structural QoS / capability-based access control vs. role-based access control vs. attribute-based access controlRouting and pricing models: BGP, pricing peering agreements using microeconomics, topological routing vs. table-based routing vs. network coding, power-efficient routingOptimization in P2P/CDN networks: peer placement for streaming P2P, analysis of P2P networksTraffic engineering: estimating traffic matrices, constrained routing, exponentially bounded burstnessBehavioral traffic recognition: identifying applications from traffic behaviorTraffic analysis: methods for analysis and visualization of multidimensional measurements, characterizing protocolsSoftware defined radio networks: low power signal processing methods, applications of machine learningCognitive radio: medium access, spatiotemporality, complexity, spectrum sharing and leasing, channel selection, multi-stage pricing, cyclostationary signatures, frame synchronizationStreaming video: learning from video, techniques for in-network modulationLocation: statistical location, partial measurements, delay estimationGraph theory/topology/routing Internet supportInformation theory: distributed network coding, Shannon's entropy, Nash equilibriumOptimization: LP, NLP, NeuroP, quadratic, convex programming, compressed sensingGraph theory: random graphs, spectra graph theory, percolations and phase transitions, methods from statistical physics, geometric random graphsAlgebraic techniques: tensor analysis, matrix decompositionProcessing: signal processing techniques, equalization, point-process, source coding vs. network coding, recoverabilityStatistical machine learning: probabilistic graphical models, classification, clustering, regression, classification, neural networks, support vector machines, decision forests.Game Theory/Microeconomic theory: social choice theory, equilibria, arbitrage and incentive oriented distributed mechanism design, cooperative games, and games on graphsStochastic network calculusFractal behavior and stability mechanismsKolmogorov complexity for performance evaluationComplexity theoryInternet security mechanismsCryptography: design and analysis of cryptographic algorithms, applied cryptography, cryptographic protocols and functionsSpecification, validation design of security and dependability: security and trust models, semantics and computational models for security and trust, business models in security management, security policies models, security architectures, formal methods for verification and certification, multi-level security specificationVulnerabilities, attacks and risks: methods of detection, analysis, prevention, intrusion detection, tolerance, response and prevention, attacks and prevention of on-line fraud, denial of services attacks and prevention methodsAccess Control: authentication and non-repudiation, accounting and audit, anonymity and pseudonymityidentity and trust management, biometric methodsAnti-malware techniques: detection, analysis, preventionCyber-crime response: anti-phishing, anti-spam, anti-fraud methodsInternet trust, security, and dependability levelsNetwork and transport level securityNetwork edge security controls: firewalls, packet filters, application gatewaysWireless and mobile network security: risks of wireless insecurity, wireless vulnerabilities and intrusion detection, WLAN and WMAN MAC layer security technologies, key management mechanisms and protocols, security in ad hoc, sensor, mesh and personal communication networksSecurity of Internet protocols: routing security, naming, network management, signaling security, transport layer securityNetwork security policies: specification, implementation, deployment and managementSecurity of P2P and overlay/middleware systemsSecurity for multiple domains, large-scale systems and critical infrastructuresApplications and high level services security: Web-based applications and services, VoIP, multimedia streaming services, VoD and IPTV, collaborative applications (conferencing), electronic commerce and eBusiness, eVoting, grid computing, security of eGovernmentIntellectual property protection: digital rights management, licensing, metering, watermarking, information hiding, implementationsSecurity services integration in complex architecturesTradeoffs between security and efficiency, usability, reliability and cost.Internet performancePerformance degradation and anomaly detection mechanismsUser-oriented performance metricsNetwork and service provider-oriented performance metricsHybrid (chip and network) performance calculiIntrusive and non-intrusive performance measurement mechanismsMechanisms for performance degradation-tolerant applicationsMechanisms for application performance and network performancePerformance enhancement mechanismsPerformance and traffic entropy algorithmsPerformance prediction algorithmsInternet AQM/QoSBuffer sizing, majorization, QoS routing, finite buffer queue vs. infinite buffer queue and performanceControl theoretic framework for modeling of TCP and AQM schemesDiscrete mathematics to model buffer occupancy at queues of a network (given workloads)Game theoretic modeling of AQMs (mathematics to model selfish traffic)Fairness models (proportional fairness, max-min fairness, low state global fairness)Optimization framework for congestion control, fairness and utility maximizationModeling and simulation of large network scenarios using queuing theoryInternet monitoring and controlVisualization mechanismsSub-network/device isolation mechanismsControl feedback mechanisms (limited feedback, delay and disruption tolerance, optimal and adaptive feedback)Optimal controlAdaptive behavior controlNetwork resiliencySelf-adaptable and tunable performanceMechanisms for anticipative measurements and controlInternet and wirelessCapacity of wireless networksPotential based routingAlgebraic techniques to mine patterns from wireless networksQoS/QoE translationWireless ad hoc / mesh networks: MAC protocols, routing, congestion control, P2P CDNs on wireless meshesInternet and data streaming/mining algorithmsMathematics for clustering massive data streamsRandomized algorithms etc and impossibility resultsDimension reduction in metric spacesTensor and multidimensional algebraic techniquesNon linear dimension reductionOptimal collector positioningData fusion and correlation algorithmsInternet and sensor-oriented networks/algorithmsOptimal sensor placementInference models for sensingCongestion controlResource allocationMathematics to model different diffusion processes and applications to routingAlgorithms for data fusionAlgorithms for computing dormant/active sending periodsEnergy-driven adaptive communication protocolsInternet challengesFuture Internet architecture and designNext generation Internet infrastructureInternet cross-layer design and optimizationInternet security enforcement and validationFuture cross-Internet computingConfigurable Internet protocolsInternet-scale overlay content hostingInternet citizen-centric servicesEnd-user customizable InternetMobile InternetInternet imagingInternet codingInternet resilienceInternet QoS/QoEContext-aware, ambient, and adaptive InternetVirtualization and InternetPrivacy Enhancing Technologies - PETsINSTRUCTION FOR THE AUTHORSAuthors of selected papers will be invited to submit extended versions to one of the IARIA Journals.Important deadlines:Submission (full paper) April 20, 2010 Notification May 25, 2010 Registration June 17, 2010 Camera ready June 17, 2010 Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via an automated system. Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.Your paper should also comply with the additional editorial rules.Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.Poster ForumPosters are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as poster. Submissions are expected to be 6-8 slide deck. Posters will not be published in the Proceedings. One poster with all the slides together should be used for discussions. Presenters will be allocated a space where they can display the slides and discuss in an informal manner. The poster slide decks will be posted on the IARIA site.For more details, see the Poster Forum explanation page.Work in ProgressWork-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.For more details, see the Work in Progress explanation page Technical marketing/business/positioning presentationsThe conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to petreiaria.org.TutorialsTutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials' slide decks will be posted on the IARIA's site. Please send your proposals to petreiaria.orgPanel proposals:The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel's slide deck will be posted on the IARIA's site.For more information, petreiaria.orgWorkshop proposalsWe welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petreiaria.org.
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.