[Tccc] A few more days | CfP: INTERNET 2012 || June 24-29, 2012 - Venice, Italy

Petre Dini petre
Sun Feb 19 19:34:57 EST 2012


INVITATION:

=================
Please, consider contributing to and/or forwarding to the appropriate 
groups the following opportunity to submit and publish original 
scientific results to INTERNET 2012.

The submission deadline is set to February 23, 2012.

In addition, authors of selected papers will be invited to submit 
extended article versions to one of the IARIA Journals: 
http://www.iariajournals.org
=================


============== INTERNET 2012 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

INTERNET 2012, The Fourth International Conference on Evolving Internet

June 24-29, 2012 - Venice, Italy

General page: http://www.iaria.org/conferences2012/INTERNET12.html

Call for Papers: http://www.iaria.org/conferences2012/CfPINTERNET12.html

- regular papers
- short papers (work in progress)
- posters

Submission page: http://www.iaria.org/conferences2012/SubmitINTERNET12.html

Submission deadline: February 23, 2012

Sponsored by IARIA, www.iaria.org <http://www.iaria.org>
Extended versions of selected papers will be published in IARIA 
Journals: http://www.iariajournals.org

The topics suggested by the conference can be discussed in term of 
concepts, state of the art, research, standards, implementations, 
running experiments, applications, and industrial case studies. Authors 
are invited to submit complete unpublished papers, which are not under 
review in any other conference or journal in the following, but not 
limited to, topic areas.

All tracks are open to both research and industry contributions, in 
terms of Regular papers, Posters, Work in progress, 
Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and comply with the editorial rules: 
http://www.iaria.org/editorialrules.html

INTERNET 2012 Topics (topics and submission details: see CfP on the site)

Advanced Internet mechanisms
Access: call admission control vs. QoE vs. structural QoS / 
capability-based access control vs. role-based access control vs. 
attribute-based access control; Routing and pricing models: BGP, pricing 
peering agreements using microeconomics, topological routing vs. 
table-based routing vs. network coding, power-efficient routing; 
Optimization in P2P/CDN networks: peer placement for streaming P2P, 
analysis of P2P networks; Traffic engineering: estimating traffic 
matrices, constrained routing, exponentially bounded burstness; 
Behavioral traffic recognition: identifying applications from traffic 
behavior; Traffic analysis: methods for analysis and visualization of 
multidimensional measurements, characterizing protocols; Software 
defined radio networks: low power signal processing methods, 
applications of machine learning; Cognitive radio: medium access, 
spatiotemporality, complexity, spectrum sharing and leasing, channel 
selection, multi-stage pricing, cyclostationary signatu
res, frame synchronization; Streaming video: learning from video, 
techniques for in-network modulation; Location: statistical location, 
partial measurements, delay estimation

Graph theory/topology/routing Internet support
Information theory: distributed network coding, Shannon's entropy, Nash 
equilibrium; Optimization: LP, NLP, NeuroP, quadratic, convex 
programming, compressed sensing; Graph theory: random graphs, spectra 
graph theory, percolations and phase transitions, methods from 
statistical physics, geometric random graphs; Algebraic techniques: 
tensor analysis, matrix decomposition; Processing: signal processing 
techniques, equalization, point-process, source coding vs. network 
coding, recoverability; Statistical machine learning: probabilistic 
graphical models, classification, clustering, regression, 
classification, neural networks, support vector machines, decision 
forests; Game Theory/Microeconomic theory: social choice theory, 
equilibria, arbitrage and incentive oriented distributed mechanism 
design, cooperative games, and games on graphs; Stochastic network 
calculus; Fractal behavior and stability mechanisms; Kolmogorov 
complexity for performance evaluation; Complexity theory

Internet security mechanisms
Cryptography: design and analysis of cryptographic algorithms, applied 
cryptography, cryptographic protocols and functions; Specification, 
validation design of security  and dependability: security and trust 
models, semantics and computational models for security and trust, 
business models in security management, security policies models, 
security architectures, formal methods for verification and 
certification, multi-level security specification;  Vulnerabilities, 
attacks and risks: methods of detection, analysis, prevention, intrusion 
detection, tolerance, response and prevention, attacks and prevention of 
on-line fraud, denial of services attacks and prevention methods; Access 
Control:  authentication and non-repudiation, accounting and audit, 
anonymity and pseudonymity; identity and trust management, biometric 
methods;  Anti-malware techniques: detection, analysis, prevention; 
Cyber-crime response: anti-phishing, anti-spam, anti-fraud methods

Internet trust, security, and dependability levels
Network and transport level security; Network edge security controls: 
firewalls, packet filters, application gateways; Wireless and mobile 
network security: risks of wireless insecurity, wireless vulnerabilities 
and intrusion detection, WLAN and WMAN MAC layer security technologies, 
key management mechanisms and protocols, security in ad hoc, sensor, 
mesh and personal communication  networks; Security of Internet 
protocols: routing security, naming, network management,  signaling 
security, transport layer security; Network security policies: 
specification, implementation, deployment and management; Security of 
P2P and overlay/middleware  systems; Security for multiple domains, 
large-scale systems and critical infrastructures; Applications and high 
level services security: Web-based applications and services, VoIP, 
multimedia streaming services, VoD and IPTV, collaborative applications 
(conferencing), electronic commerce and eBusiness,  eVoting, grid 
computing, security of eGovernment; Intellectual property protection: 
digital rights management, licensing, metering, watermarking, 
information hiding, implementations; Security services integration in 
complex architectures; Tradeoffs between security and efficiency, 
usability, reliability and cost.

Internet performance
Performance degradation and anomaly detection mechanisms; User-oriented 
performance metrics; Network and service provider-oriented performance 
metrics; Hybrid (chip and network) performance calculi; Intrusive and 
non-intrusive performance measurement mechanisms; Mechanisms for 
performance degradation-tolerant applications; Mechanisms for 
application performance and network performance; Performance enhancement 
mechanisms; Performance and traffic entropy algorithms; Performance 
prediction algorithms

Internet AQM/QoS
Buffer sizing, majorization, QoS routing, finite buffer queue vs. 
infinite buffer queue and performance; Control theoretic framework for 
modeling of TCP and AQM schemes; Discrete mathematics to model buffer 
occupancy at queues of a network (given workloads); Game theoretic 
modeling of AQMs (mathematics to model selfish traffic); Fairness models 
(proportional fairness, max-min fairness, low state global fairness); 
Optimization framework for congestion control, fairness and utility 
maximization; Modeling and simulation of large network scenarios using 
queuing theory

Internet monitoring and control
Visualization mechanisms; Sub-network/device isolation mechanisms; 
Control feedback mechanisms (limited feedback, delay and disruption 
tolerance, optimal and adaptive feedback); Optimal control; Adaptive 
behavior control; Network resiliency; Self-adaptable and tunable 
performance; Mechanisms for anticipative measurements and control

Internet and wireless
Capacity of wireless networks; Potential based routing; Algebraic 
techniques to mine patterns from wireless networks; QoS/QoE translation; 
Wireless ad hoc / mesh networks: MAC protocols, routing, congestion 
control, P2P CDNs on wireless meshes

Internet and data streaming/mining algorithms
Mathematics for clustering massive data streams; Randomized algorithms 
etc and impossibility results; Dimension reduction in metric spaces; 
Tensor and multidimensional algebraic techniques; Non linear dimension 
reduction; Optimal collector positioning; Data fusion and correlation 
algorithms

Internet and sensor-oriented networks/algorithms
Optimal sensor placement; Inference models for sensing; Congestion 
control; Resource allocation; Mathematics to model different diffusion 
processes and applications to routing; Algorithms for data fusion; 
Algorithms for computing dormant/active sending periods; Energy-driven 
adaptive communication protocols

Internet challenges
Future Internet architecture and design; Next generation Internet 
infrastructure; Internet cross-layer design and optimization; Internet 
security enforcement and validation; Future cross-Internet computing; 
Configurable Internet protocols; Internet-scale overlay content hosting; 
Internet citizen-centric services; End-user customizable Internet; 
Mobile Internet; Internet imaging; Internet coding; Internet resilience; 
Internet QoS/QoE; Context-aware, ambient, and adaptive Internet; 
Virtualization and Internet; Privacy Enhancing Technologies - PETs

---------------
Committee: http://www.iaria.org/conferences2012/ComINTERNET12.html
====================



More information about the TCCC mailing list