Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    INTERNET 2010 - The Second International Conference on Evolving Internet

    View: 1993

    Website www.iaria.org/conferences.html | Want to Edit it Edit Freely

    Category INTERNET 2010

    Deadline: April 20, 2010 | Date: September 20, 2010

    Venue/Country: Valencia, Spain

    Updated: 2010-06-04 19:32:22 (GMT+9)

    Call For Papers - CFP

    Originally designed in the spirit of interchange between scientists, Internet reached a status where large-scale technical limitations impose rethinking its fundamentals. This refers to design aspects (flexibility, scalability, etc.), technical aspects (networking, routing, traffic, address limitation, etc), as well as economics (new business models, cost sharing, ownership, etc.). Evolving Internet poses architectural, design, and deployment challenges in terms of performance prediction, monitoring and control, admission control, extendibility, stability, resilience, delay-tolerance, and interworking with the existing infrastructures or with specialized networks.

    The INTERNET 2010 conference deals with challenges raised by evolving Internet making use of the progress in different advanced mechanisms and theoretical foundations. The gap analysis aims at mechanisms and features concerning the Internet itself, as well as special applications for software defined radio networks, wireless networks, sensor networks, or Internet data streaming and mining.

    While many attempts are done and scientific events are scheduled to deal with rethinking the Internet architecture, communication protocols, and its flexibility, the current series of events starting with INTERNET 2009 is targeting network calculi and supporting mechanisms for these challenging issues.

    We solicit both academic, research, and industrial contributions on topics regarding new views on Internet protocols, Internet extendibility, new architectures and tradeoffs. INTERNET 2010 will offer tutorials, plenary sessions, and panel sessions. A best paper award will be granted by the IARIA’s award selection committee.

    The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All tracks are open to both research and industry contributions.

    Advanced Internet mechanisms

    Access: call admission control vs. QoE vs. structural QoS / capability-based access control vs. role-based access control vs. attribute-based access control

    Routing and pricing models: BGP, pricing peering agreements using microeconomics, topological routing vs. table-based routing vs. network coding, power-efficient routing

    Optimization in P2P/CDN networks: peer placement for streaming P2P, analysis of P2P networks

    Traffic engineering: estimating traffic matrices, constrained routing, exponentially bounded burstness

    Behavioral traffic recognition: identifying applications from traffic behavior

    Traffic analysis: methods for analysis and visualization of multidimensional measurements, characterizing protocols

    Software defined radio networks: low power signal processing methods, applications of machine learning

    Cognitive radio: medium access, spatiotemporality, complexity, spectrum sharing and leasing, channel selection, multi-stage pricing, cyclostationary signatures, frame synchronization

    Streaming video: learning from video, techniques for in-network modulation

    Location: statistical location, partial measurements, delay estimation

    Graph theory/topology/routing Internet support

    Information theory: distributed network coding, Shannon's entropy, Nash equilibrium

    Optimization: LP, NLP, NeuroP, quadratic, convex programming, compressed sensing

    Graph theory: random graphs, spectra graph theory, percolations and phase transitions, methods from statistical physics, geometric random graphs

    Algebraic techniques: tensor analysis, matrix decomposition

    Processing: signal processing techniques, equalization, point-process, source coding vs. network coding, recoverability

    Statistical machine learning: probabilistic graphical models, classification, clustering, regression, classification, neural networks, support vector machines, decision forests.

    Game Theory/Microeconomic theory: social choice theory, equilibria, arbitrage and incentive oriented distributed mechanism design, cooperative games, and games on graphs

    Stochastic network calculus

    Fractal behavior and stability mechanisms

    Kolmogorov complexity for performance evaluation

    Complexity theory

    Internet security mechanisms

    Cryptography: design and analysis of cryptographic algorithms, applied cryptography, cryptographic protocols and functions

    Specification, validation design of security and dependability: security and trust models, semantics and computational models for security and trust, business models in security management, security policies models, security architectures, formal methods for verification and certification, multi-level security specification

    Vulnerabilities, attacks and risks: methods of detection, analysis, prevention, intrusion detection, tolerance, response and prevention, attacks and prevention of on-line fraud, denial of services attacks and prevention methods

    Access Control: authentication and non-repudiation, accounting and audit, anonymity and pseudonymity

    identity and trust management, biometric methods

    Anti-malware techniques: detection, analysis, prevention

    Cyber-crime response: anti-phishing, anti-spam, anti-fraud methods

    Internet trust, security, and dependability levels

    Network and transport level security

    Network edge security controls: firewalls, packet filters, application gateways

    Wireless and mobile network security: risks of wireless insecurity, wireless vulnerabilities and intrusion detection, WLAN and WMAN MAC layer security technologies, key management mechanisms and protocols, security in ad hoc, sensor, mesh and personal communication networks

    Security of Internet protocols: routing security, naming, network management, signaling security, transport layer security

    Network security policies: specification, implementation, deployment and management

    Security of P2P and overlay/middleware systems

    Security for multiple domains, large-scale systems and critical infrastructures

    Applications and high level services security: Web-based applications and services, VoIP, multimedia streaming services, VoD and IPTV, collaborative applications (conferencing), electronic commerce and eBusiness, eVoting, grid computing, security of eGovernment

    Intellectual property protection: digital rights management, licensing, metering, watermarking, information hiding, implementations

    Security services integration in complex architectures

    Tradeoffs between security and efficiency, usability, reliability and cost.

    Internet performance

    Performance degradation and anomaly detection mechanisms

    User-oriented performance metrics

    Network and service provider-oriented performance metrics

    Hybrid (chip and network) performance calculi

    Intrusive and non-intrusive performance measurement mechanisms

    Mechanisms for performance degradation-tolerant applications

    Mechanisms for application performance and network performance

    Performance enhancement mechanisms

    Performance and traffic entropy algorithms

    Performance prediction algorithms

    Internet AQM/QoS

    Buffer sizing, majorization, QoS routing, finite buffer queue vs. infinite buffer queue and performance

    Control theoretic framework for modeling of TCP and AQM schemes

    Discrete mathematics to model buffer occupancy at queues of a network (given workloads)

    Game theoretic modeling of AQMs (mathematics to model selfish traffic)

    Fairness models (proportional fairness, max-min fairness, low state global fairness)

    Optimization framework for congestion control, fairness and utility maximization

    Modeling and simulation of large network scenarios using queuing theory

    Internet monitoring and control

    Visualization mechanisms

    Sub-network/device isolation mechanisms

    Control feedback mechanisms (limited feedback, delay and disruption tolerance, optimal and adaptive feedback)

    Optimal control

    Adaptive behavior control

    Network resiliency

    Self-adaptable and tunable performance

    Mechanisms for anticipative measurements and control

    Internet and wireless

    Capacity of wireless networks

    Potential based routing

    Algebraic techniques to mine patterns from wireless networks

    QoS/QoE translation

    Wireless ad hoc / mesh networks: MAC protocols, routing, congestion control, P2P CDNs on wireless meshes

    Internet and data streaming/mining algorithms

    Mathematics for clustering massive data streams

    Randomized algorithms etc and impossibility results

    Dimension reduction in metric spaces

    Tensor and multidimensional algebraic techniques

    Non linear dimension reduction

    Optimal collector positioning

    Data fusion and correlation algorithms

    Internet and sensor-oriented networks/algorithms

    Optimal sensor placement

    Inference models for sensing

    Congestion control

    Resource allocation

    Mathematics to model different diffusion processes and applications to routing

    Algorithms for data fusion

    Algorithms for computing dormant/active sending periods

    Energy-driven adaptive communication protocols

    Internet challenges

    Future Internet architecture and design

    Next generation Internet infrastructure

    Internet cross-layer design and optimization

    Internet security enforcement and validation

    Future cross-Internet computing

    Configurable Internet protocols

    Internet-scale overlay content hosting

    Internet citizen-centric services

    End-user customizable Internet

    Mobile Internet

    Internet imaging

    Internet coding

    Internet resilience

    Internet QoS/QoE

    Context-aware, ambient, and adaptive Internet

    Virtualization and Internet

    Privacy Enhancing Technologies - PETs

    INSTRUCTION FOR THE AUTHORS

    Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.

    Important deadlines:

    Submission (full paper) April 20, 2010

    Notification May 25, 2010

    Registration June 17, 2010

    Camera ready June 17, 2010

    Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via an automated system.

    Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.

    Your paper should also comply with the additional editorial rules.

    Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.

    Poster Forum

    Posters are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as poster. Submissions are expected to be 6-8 slide deck. Posters will not be published in the Proceedings. One poster with all the slides together should be used for discussions. Presenters will be allocated a space where they can display the slides and discuss in an informal manner. The poster slide decks will be posted on the IARIA site.

    For more details, see the Poster Forum explanation page.

    Work in Progress

    Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.

    For more details, see the Work in Progress explanation page

    Technical marketing/business/positioning presentations

    The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to petreatiaria.org.

    Tutorials

    Tutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials' slide decks will be posted on the IARIA's site. Please send your proposals to petreatiaria.org

    Panel proposals:

    The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel's slide deck will be posted on the IARIA's site.

    For more information, petreatiaria.org

    Workshop proposals

    We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petreatiaria.org.


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.