CHINACOM 2011 - 6th International ICST Conference on Communications and Networking in China
View: 4389
Website www.chinacom.org/2011/ |
Edit Freely
Category CHINACOM 2011
Deadline: March 15, 2011 | Date: August 17, 2011-August 19, 2011
Venue/Country: Harbin, China
Updated: 2011-03-03 12:42:16 (GMT+9)
Call For Papers - CFP
6th International ICST Conference on Communications and Networking in ChinaAugust 17-19, 2011, Harbin, Chinahttp://www.chinacom.org/2011/ Download in [ PDF ] formatOverview: The aim of CHINACOM is to bring together Chinese and international researchers and practitioners in networking and communications under one roof to show recent research advances in communications and networking. Following the great success of the past CHINACOM2006-2010, CHINACOM2011 will be held in Harbin, China in August 2011.Technical Symposia: Prospective authors are welcome to submit original technical papers for publication in the conference proceedings and for presentation at the following symposia:1. Wireless Communications and Networking SymposiumCo-chairs: Qing Guo, Harbin Institute of TechnologyYasushi Yamao, The University of Electro-CommunicationsDan Keun Sung, Korea Advanced Institute of Science and echnologyNandana Rajatheva, Asian Institute of TechnologyA. S. Madhukumar, Nanyang Technological UniversityKenichi Higuchi, Tokyo University of ScienceTongtong Li, Michigan State UniversityJing Liang, University of Texas at Arlington(1) Wireless Communications and Signal Processing3GPP Long-Term Evolution (LTE)LTE-advanced and 4GWireless air interface and link controlCross-layer design and physical layer based Network IssuesMulticarrier, OFDMSmart antennas, beamformingPropagation and antennas; air interfaces and capacity planningMIMO and multi-antenna communicationsCognitive radio and software defined radioCooperative communications and networkingUltra wideband communicationsSpace-time coding and processingDetection and estimationJoint source-channel codingNovel signal processing modules in LTE/LTAChannel modeling and estimationModulation and codingDiversity techniquesEqualization processingMulti-user detection, signal separation and interference rejectionJoint source-channel coding for wireless communicationsPower control algorithmsNetwork coding in wireless networksDistributed signal processingFeedback schemes in communicationsTurbo and LDPC codesRadio resource managementCDMA and spread spectrumChannel capacity and network information theoryCoding for noisy channels and erasure channelsBlind signal processing for communicationsFuture cellular architecture(2) Ad-hoc, Sensor and Mesh NetworkingApplications and evolutions of Ad Hoc, sensor, and mesh NetworksAutonomic networkingWireless, Ad Hoc, and sensor devicesPhysical layer design of Ad Hoc, sensor and mesh networksFrequency and channel allocation algorithmsTopology control and managementAlgorithms and modeling for localization, target tracking, and mobility managementArchitectures of wireless communication and mobile computing in Ad Hoc, Sensor and mesh NetworksMAC protocols for Ad Hoc, sensor, and mesh networksQoS provisioning in medium access control and routing for Ad Hoc and mesh networksAnalytical, mobility, and validation models for Ad Hoc, sensor, and mesh networksPerformance evaluation and modeling of mobile, Ad Hoc, sensor, and mesh NetworksIntegrated simulation and measurement based evaluation of Ad Hoc and sensor systemsSurvivability and reliability evaluation and modeling for Ad Hoc, sensor, and mesh networksPricing modeling and solutionsNew simulation languages, methodologies, and tools for wireless systems in Ad Hoc, sensor and mesh networksAnalysis of correctness and efficiency of protocolsData management, data aggregation, data dissemination, and query processingDistributed algorithms in Ad Hoc, sensor and mesh networksPervasive and wearable computingCo-existence issues of hybrid networksEnergy saving and power control protocols for Ad Hoc, sensor, and mesh networksResource management algorithms in mobile, wireless Ad Hoc and mesh networksSynchronization and scheduling issues in mobile and Ad Hoc networksService discovery for wireless Ad Hoc, mesh, and sensor networksCross-layer design and interactions in Ad Hoc, sensor and mesh networksMobile service and QoS management for Ad Hoc and sensor networksUbiquitous and mobile access for wireless mesh networksSecurity and privacy issues in wireless Ad Hoc, mesh, and sensor networks(3) Selected Areas in Wireless Communications and NetworkingDeep space communicationsSatellite networksGreen communicationsWireless LANs and mobile InternetRadio Frequency Identification (RFID)Personal Area Networking, Home Networking, Femto CellsBody-area networksBluetooth technologies and applications Localization techniques and GNSSVLSI Circuit, architecture and Implementation for communicationsNetwork topology controlWireless telemedicine and E-health servicesOthers2. Frontiers on Communications and Networking SymposiumCo-chairs: Jun-Hong Cui, University of ConnecticutXuejun Sha, Harbin Institute of TechnologyZinan Wang, University of Electronic Science and Technology of China(1) Optical Communications and NetworkingWavelength division multiplexingOptical virtual private networkingOptical time-division and code-division multiplexingModulation and coding for optical transmissionOptical network control and managementQuality of service issues in optical networksOptical cross connects and add drop multiplexersRouting and wavelength assignmentTraffic grooming and traffic engineeringDynamic traffic managementOptical network protection and restorationNetwork modeling and performance analysisHybrid wireless-optical access networksConvergence of optical networks with wireless networksCross layer optical networksLight-weight cryptographyMulticasting, broadcasting, and groupcastingOptical packet switching, burst switching, and label switchingSemiconductor lasers and optoelectronic devicesNext generation SONET/SDHOptical system and subsystemsHigh data rate transmission systemsOptical network architecture and protocol designRegional, core, metro, and access optical networksOptical grid and multi-domain networksOptical ethernet and passive optical networksGrid networksStorage networksFree space optical networksTerrestrial and submarine optical networksMessage authenticationIntrusion detectionCountermeasures(2) Internet and Information SecurityNetwork virtualization flow management: resource sharing, congestion control, etc.Self-protecting networkingSwitch and router architectures, performance, control, buffer management, packet schedulingNetwork management methodologies and control plane designInternet survivability and network resilience strategiesMechanisms for self-organization and autonomous networkingTraffic measurement, analysis, modeling, visualization, and engineeringAnomaly, intrusion, and attack detection/preventionPolicy based mechanisms and high-speed firewall technologyPacket classification and forwarding mechanisms at ultra-high link rates (terabits)High speed and parallel processing architectures for next generation routersConnecting mobile/wireless devices to the InternetConverged networks and applications, including NGN telecom networksContent-based networking: caching, distribution, load balancing, resiliencyRouting: unicast, multicast, anycast, etcMobile/wireless content distributionInternet applications including interactive media, voice and video, games, immersive applicationsInternet signaling and service enabling protocols, including SIP, NSIS, HTTP, RTSP/RTP, etcPrivacy and/or security issues and intrusion detection/prevention in the InternetDesign methodologies for Internet servicesInternet economics, pricing models, accounting, internet growth modelingVoIP protocols and servicesIP multimedia subsystem: architecture and designNext-generation access networkingPeer-to-peer system securityPublic-key cryptographyRevocation of malicious partiesRobust security networkMobile code securitySecurity specification techniquesSelf-healing networksMobile network securityLocation aware security in mobile networksThroughput-security trade-offs in wireless networksSecure group multimedia communicationsSecure PHY/MAC/routing protocolsSecure cooperation in wireless networksAttacks on security and vulnerability analysisApplication layer encryptionCapacity and security analysis of covert channelsSecurity of Ad-hoc/sensor networksSensor network securitySymmetric key cryptographyTransport Layer Security (TLS)Heterogeneous networks and systemsSecure Socket Layer (SSL)Security modeling and protocol design3G and 4G securityAuthentication protocolsBiometric security: technologies, risks and vulnerabilitiesCritical infrastructure securityKey distribution and managementDistributed systems securityDNS spoofing and securityEncryption standardsFinancial cryptosystemsFormal trust modelsInformation hiding and watermarkingIntrusion avoidanceIPv6 security and IPSecDeployment and management of computer/network security policiesTrust establishmentUpper-layer authenticationVirtual private networks securityWeb, e-commerce, m-commerce, and e-mail securityPower-reliability-security trade-offs in wireless networksCross-layer approaches to securitySecurity EngineeringSecure namingDistributed Denial-Of-Service (DDOS) attacks and countermeasuresLight-weight cryptographyQuantum cryptography and quantum keyDistribution network security metrics and performance evaluation(3) Selected Areas in Frontiers on Communications and NetworkingFlow and congestion controlWi-Fi Protected Access (WPA)Internet economics, pricing models, accounting, Internet growth modelingInternet survivability and network resilienceWireless service discoveryFlow and congestion controlInterference modeling and management in networksVirtual and overlay networksCommunications and Networking for Rural and Emergency ApplicationsVulnerability, exploitation tools, and virus/worm analysisNetwork management, QoS managementPricing and billingBroadcast and Multicast TechnologiesBio-inspired/Bio-oriented NetworksTCP over wirelessStrategies multihoming, network planning and optimizationRegulations and standardsOthers3. The Internet of Things and Applications SymposiumCo-chairs: Zhisen Wang , Dalian Polytechnic UniversityJian Ren , Michigan State University Ting Jiang , Beijing University of Posts and Telecommunications(1) Sensor & Detecting Technology for IOTFundamental and technology of sensors and convertersChemical Sensor, gas sensors, biosensors, optical sensors, mechanical sensors, physical sensorsWireless sensors and sensor networksIntelligent sensor and soft sensorData acquisition and measurement engineeringNew technology on developing sensorApplications(2) Emerging networks for IOTNetwork architecturesProtocols (i.e. routing, transport layer, cross layer, etc.)Control (i.e. topology, congestion, power, etc.)QoSNetwork management (i.e. resource allocation & management, addressing & location management, etc.)Data processingSecurity, trust and privacyNetwork coverageTraffic measurement and analysisConvergent solutionsMiddleware supportPerformance evaluationApplications and services(3)IOT ApplicationsIOT solutions in healthcare, logistics, transport, manufacture, power system, bioengineering and plant factory, etc.Others(4) Selected Areas in The Internet of Things and ApplicationsSystem on chip architecture & designCloud computingCyber-physical systemOthers4. Implementations and Testbeds SymposiumCo-chairs: Dechang Chen, Uniformed Services University of the Health Sciences Qinyu Zhang, Shenzhen Graduate School, Harbin Institute of TechnologyLingming Wang, iBiquity Digital CorporationPhysical-layer aspects of wireless LANs and PANs4G mobile network architecturesPhysical-layer aspects of GPRS, EDGE, 3GPP, IMT2000, UMTSDVB and DAB techniquesPhysical-layer aspects of cellular networksCoexistence in unlicensed spectraResource allocation and interference managementFixed wireless broadband data systemsZigbee technologies and applicationsSpectrum efficiency and issuesWireless system optimization techniquesWireless multimedia applicationsIntegration between satellite and terrestrial wireless networksDSP/FPGA/ARM application in communicationCommunication softwareOptical network experiments: demonstrations, test beds and field trialsOperating system security and Log analysis toolsApplication/network penetration testingVehicular communications and inter-vehicle applicationsMiddleware for cognitive radio devicesBody area networks and medical/living/health applicationsHome automation and machine learningSeamless roaming techniques and heterogeneous networking technologiesHigh-definition audio/video networking and IPTVConsumer-friendly security models and toolsOthersPublication: All accepted and presented papers will be included in the CHINACOM 2011 Conference Proceedings, made available in IEEE Xplore, and then indexed by Engineering index (Ei Compendex). Papers which were accepted and presented from CHINACOM 2006 to CHINACOM 2009 have been indexed by Ei entirely (CHINACOM 2010 proceedings are working in process). Selected best and outstanding papers will be considered for publication in special issues of the following journals after further extension:a) Confirmed: ACM/Springer Mobile Networks and Applications (MONET) - SCI indexedb) Confirmed: Wiley Security and Communication Networks (SCN) - SCI indexedc) Pending: Wiley Wireless Communications and Mobile Computing (WCMC) - SCI indexedd) Confirmed: Journal of Harbin Institute of Technology (New Series) - EI indexedPublication:Submission deadline: March 15, 2011Notification date: May 15, 2011Camera-ready due: June 15, 2011Conference dates: August 17-19, 2011Submit paper to: http://www.easychair.org/conferences/?conf=chinacom2011
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.