INVITATION:
 
=================
Please, consider to contribute to and/or forward to the appropriate groups the 
following opportunity to submit and publish original scientific results to 
INTERNET 2012.
 
The submission deadline is set to February 5, 2012.
 
In addition, authors of selected papers will be invited to submit extended 
article versions to one of the IARIA Journals: http://www.iariajournals.org
=================
 
 
============== INTERNET 2012 | Call for Papers ===============
 
CALL FOR PAPERS, TUTORIALS, PANELS
 
INTERNET 2012, The Fourth International Conference on Evolving Internet
June 24-29, 2012 - Venice, Italy
 
 
General page: http://www.iaria.org/conferences2012/INTERNET12.html
 
Call for Papers: http://www.iaria.org/conferences2012/CfPINTERNET12.html
 
- regular papers
- short papers (work in progress)
- posters
- ideas
 
Submission page: http://www.iaria.org/conferences2012/SubmitINTERNET12.html
 
Submission deadline: February 5, 2012
 
Sponsored by IARIA, www.iaria.org
 
Extended versions of selected papers will be published in IARIA Journals: 
http://www.iariajournals.org
 
Please note the Poster and Work in Progress options.
 
The topics suggested by the conference can be discussed in term of concepts, 
state of the art, research, standards, implementations, running experiments, 
applications, and industrial case studies. Authors are invited to submit 
complete unpublished papers, which are not under review in any other conference 
or journal in the following, but not limited to, topic areas.
 
All tracks are open to both research and industry contributions, in terms of 
Regular papers, Posters, Work in progress, Technical/marketing/business 
presentations, Demos, Tutorials, and Panels.
 
Before submission, please check and comply with the Editorial rules: 
http://www.iaria.org/editorialrules.html

 
INTERNET 2012 Topics (topics and submission details: see CfP on the site)
 
 
Advanced Internet mechanisms
Access: call admission control vs. QoE vs. structural QoS / capability-based 
access control vs. role-based access control vs. attribute-based access 
control; Routing and pricing models: BGP, pricing peering agreements using 
microeconomics, topological routing vs. table-based routing vs. network coding, 
power-efficient routing; Optimization in P2P/CDN networks: peer placement for 
streaming P2P, analysis of P2P networks; Traffic engineering: estimating 
traffic matrices, constrained routing, exponentially bounded burstness; 
Behavioral traffic recognition: identifying applications from traffic behavior; 
Traffic analysis: methods for analysis and visualization of multidimensional 
measurements, characterizing protocols; Software defined radio networks: low 
power signal processing methods, applications of machine learning; Cognitive 
radio: medium access, spatiotemporality, complexity, spectrum sharing and 
leasing, channel selection, multi-stage pricing, cyclostationary signatures, !
 frame synchronization; Streaming vi
deo: learning from video, techniques for in-network modulation; Location: 
statistical location, partial measurements, delay estimation
 
Graph theory/topology/routing Internet support
Information theory: distributed network coding, Shannon's entropy, Nash 
equilibrium; Optimization: LP, NLP, NeuroP, quadratic, convex programming, 
compressed sensing; Graph theory: random graphs, spectra graph theory, 
percolations and phase transitions, methods from statistical physics, geometric 
random graphs; Algebraic techniques: tensor analysis, matrix decomposition; 
Processing: signal processing techniques, equalization, point-process, source 
coding vs. network coding, recoverability; Statistical machine learning: 
probabilistic graphical models, classification, clustering, regression, 
classification, neural networks, support vector machines, decision forests; 
Game Theory/Microeconomic theory: social choice theory, equilibria, arbitrage 
and incentive oriented distributed mechanism design, cooperative games, and 
games on graphs; Stochastic network calculus; Fractal behavior and stability 
mechanisms; Kolmogorov complexity for performance evaluation; Complexity theory
 
Internet security mechanisms
Cryptography: design and analysis of cryptographic algorithms, applied 
cryptography, cryptographic protocols and functions; Specification, validation 
design of security  and dependability: security and trust models, semantics and 
computational models for security and trust, business models in security 
management, security policies models, security architectures, formal methods 
for verification and certification, multi-level security specification;  
Vulnerabilities, attacks and risks: methods of detection, analysis, prevention, 
intrusion detection, tolerance, response and prevention, attacks and prevention 
of on-line fraud, denial of services attacks and prevention methods; Access 
Control:  authentication and non-repudiation, accounting and audit, anonymity 
and pseudonymity; identity and trust management, biometric methods;  
Anti-malware techniques: detection, analysis, prevention; Cyber-crime response: 
anti-phishing, anti-spam, anti-fraud methods
 
Internet trust, security, and dependability levels
Network and transport level security; Network edge security controls: 
firewalls, packet filters, application gateways; Wireless and mobile network 
security: risks of wireless insecurity, wireless vulnerabilities and intrusion 
detection, WLAN and WMAN MAC layer security technologies, key management 
mechanisms and protocols, security in ad hoc, sensor, mesh and personal 
communication  networks; Security of Internet protocols: routing security, 
naming, network management,  signaling security, transport layer security; 
Network security policies: specification, implementation, deployment and 
management; Security of P2P and overlay/middleware  systems; Security for 
multiple domains, large-scale systems and critical infrastructures; 
Applications and high level services security: Web-based applications and 
services, VoIP, multimedia streaming services, VoD and IPTV, collaborative 
applications (conferencing), electronic commerce and eBusiness,  eVoting, grid 
computing, security
of eGovernment; Intellectual property protection: digital rights management, 
licensing, metering, watermarking, information hiding, implementations; 
Security services integration in complex architectures; Tradeoffs between 
security and efficiency, usability, reliability and cost.
 
Internet performance
Performance degradation and anomaly detection mechanisms; User-oriented 
performance metrics; Network and service provider-oriented performance metrics; 
Hybrid (chip and network) performance calculi; Intrusive and non-intrusive 
performance measurement mechanisms; Mechanisms for performance 
degradation-tolerant applications; Mechanisms for application performance and 
network performance; Performance enhancement mechanisms; Performance and 
traffic entropy algorithms; Performance prediction algorithms
 
Internet AQM/QoS
Buffer sizing, majorization, QoS routing, finite buffer queue vs. infinite 
buffer queue and performance; Control theoretic framework for modeling of TCP 
and AQM schemes; Discrete mathematics to model buffer occupancy at queues of a 
network (given workloads); Game theoretic modeling of AQMs (mathematics to 
model selfish traffic); Fairness models (proportional fairness, max-min 
fairness, low state global fairness); Optimization framework for congestion 
control, fairness and utility maximization; Modeling and simulation of large 
network scenarios using queuing theory
 
Internet monitoring and control
Visualization mechanisms; Sub-network/device isolation mechanisms; Control 
feedback mechanisms (limited feedback, delay and disruption tolerance, optimal 
and adaptive feedback); Optimal control; Adaptive behavior control; Network 
resiliency; Self-adaptable and tunable performance; Mechanisms for anticipative 
measurements and control
 
Internet and wireless
Capacity of wireless networks; Potential based routing; Algebraic techniques to 
mine patterns from wireless networks; QoS/QoE translation; Wireless ad hoc / 
mesh networks: MAC protocols, routing, congestion control, P2P CDNs on wireless 
meshes
 
Internet and data streaming/mining algorithms
Mathematics for clustering massive data streams; Randomized algorithms etc and 
impossibility results; Dimension reduction in metric spaces; Tensor and 
multidimensional algebraic techniques; Non linear dimension reduction; Optimal 
collector positioning; Data fusion and correlation algorithms
 
Internet and sensor-oriented networks/algorithms
Optimal sensor placement; Inference models for sensing; Congestion control; 
Resource allocation; Mathematics to model different diffusion processes and 
applications to routing; Algorithms for data fusion; Algorithms for computing 
dormant/active sending periods; Energy-driven adaptive communication protocols
 
Internet challenges
Future Internet architecture and design; Next generation Internet 
infrastructure; Internet cross-layer design and optimization; Internet security 
enforcement and validation; Future cross-Internet computing; Configurable 
Internet protocols; Internet-scale overlay content hosting; Internet 
citizen-centric services; End-user customizable Internet; Mobile Internet; 
Internet imaging; Internet coding; Internet resilience; Internet QoS/QoE; 
Context-aware, ambient, and adaptive Internet; Virtualization and Internet; 
Privacy Enhancing Technologies - PETs
 
----------------------------------
Committee: http://www.iaria.org/conferences2012/ComINTERNET12.html
====================
----
[[ Petri Nets World:                                                ]]
[[              http://www.informatik.uni-hamburg.de/TGI/PetriNets/ ]]
[[ Mailing list FAQ:                                                ]]
[[ http://www.informatik.uni-hamburg.de/TGI/PetriNets/pnml/faq.html ]]
[[ Post messages/summary of replies:                                ]]
[[                               [email protected] ]]

Reply via email to