[Fiware] 1st CfP: INTERNET 2014 || June 22 - 26, 2014 - Seville, Spain

Nuria De-Lama Sanchez nuria.delama at atos.net
Tue Oct 22 09:17:39 CEST 2013


Find below an opportunity that should be quite interesting for most
technical chapters in FI-WARE. I apologize for multiple postings, but I
did not want to miss the opportunity to inform you about it. 
Best regards and let us know if you go ahead with something. 

INVITATION:

=================

Please consider to contribute to and/or forward to the appropriate
groups the following opportunity to submit and publish original
scientific results to INTERNET 2014.

The submission deadline is January 28, 2014.

Authors of selected papers will be invited to submit extended article
versions to one of the IARIA Journals: http://www.iariajournals.org

=================


============== INTERNET 2014 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

INTERNET 2014, The Sixth International Conference on Evolving Internet

June 22 - 26, 2014 - Seville, Spain


General page: http://www.iaria.org/conferences2014/INTERNET14.html

Call for Papers: http://www.iaria.org/conferences2014/CfPINTERNET14.html

- regular papers

- short papers (work in progress)

- posters

Submission page:
http://www.iaria.org/conferences2014/SubmitINTERNET14.html


Submission deadline: January 28, 2014

Sponsored by IARIA, www.iaria.org


Extended versions of selected papers will be published in IARIA
Journals:  http://www.iariajournals.org

Print proceedings will be available via Curran Associates, Inc.:
http://www.proceedings.com/9769.html

Articles will be archived in the free access ThinkMind Digital Library:
http://www.thinkmind.org


Please note the Poster and Work in Progress options.

The topics suggested by the conference can be discussed in term of
concepts, state of the art, research, standards, implementations,
running experiments, applications, and industrial case studies. Authors
are invited to submit complete unpublished papers, which are not under
review in any other conference or journal in the following, but not
limited to, topic areas. 

All tracks are open to both research and industry contributions, in
terms of Regular papers, Posters, Work in progress,
Technical/marketing/business presentations, Demos, Tutorials, and
Panels.

Before submission, please check and conform with the Editorial rules:
http://www.iaria.org/editorialrules.html
 

INTERNET 2014 Topics (topics and submission details: see CfP on the
site)

Advanced Internet mechanisms

    Access: call admission control vs. QoE vs. structural QoS /
capability-based access control vs. role-based access control vs.
attribute-based access control; Routing and pricing models: BGP, pricing
peering agreements using microeconomics, topological routing vs.
table-based routing vs. network coding, power-efficient routing;
Optimization in P2P/CDN networks: peer placement for streaming P2P,
analysis of P2P networks; Traffic engineering: estimating traffic
matrices, constrained routing, exponentially bounded burstness;
Behavioral traffic recognition: identifying applications from traffic
behavior; Traffic analysis: methods for analysis and visualization of
multidimensional measurements, characterizing protocols; Software
defined radio networks: low power signal processing methods,
applications of machine learning; Cognitive radio: medium access,
spatiotemporality, complexity, spectrum sharing and leasing, channel
selection, multi-stage pricing, cyclostationary signature  s, frame
synchronization; Streaming video: learning from video, techniques for
in-network modulation; Location: statistical location, partial
measurements, delay estimation

Graph theory/topology/routing Internet support

    Information theory: distributed network coding, Shannon's entropy,
Nash equilibrium; Optimization: LP, NLP, NeuroP, quadratic, convex
programming, compressed sensing; Graph theory: random graphs, spectra
graph theory, percolations and phase transitions, methods from
statistical physics, geometric random graphs; Algebraic techniques:
tensor analysis, matrix decomposition; Processing: signal processing
techniques, equalization, point-process, source coding vs. network
coding, recoverability; Statistical machine learning: probabilistic
graphical models, classification, clustering, regression,
classification, neural networks, support vector machines, decision
forests; Game Theory/Microeconomic theory: social choice theory,
equilibria, arbitrage and incentive oriented distributed mechanism
design, cooperative games, and games on graphs; Stochastic network
calculus; Fractal behavior and stability mechanisms; Kolmogorov
complexity for performance evaluation; Complexity theory

Internet security mechanisms

    Cryptography: design and analysis of cryptographic algorithms,
applied cryptography, cryptographic protocols and functions;
Specification, validation design of security  and dependability:
security and trust models, semantics and computational models for
security and trust, business models in security management, security
policies models, security architectures, formal methods for verification
and certification, multi-level security specification;  Vulnerabilities,
attacks and risks: methods of detection, analysis, prevention, intrusion
detection, tolerance, response and prevention, attacks and prevention of
on-line fraud, denial of services attacks and prevention methods; Access
Control:  authentication and non-repudiation, accounting and audit,
anonymity and pseudonymity; identity and trust management, biometric
methods;  Anti-malware techniques: detection, analysis, prevention;
Cyber-crime response: anti-phishing, anti-spam, anti-fraud methods

Internet trust, security, and dependability levels

    Network and transport level security; Network edge security
controls: firewalls, packet filters, application gateways; Wireless and
mobile network security: risks of wireless insecurity, wireless
vulnerabilities and intrusion detection, WLAN and WMAN MAC layer
security technologies, key management mechanisms and protocols, security
in ad hoc, sensor, mesh and personal communication  networks; Security
of Internet protocols: routing security, naming, network management,
signaling security, transport layer security; Network security policies:
specification, implementation, deployment and management; Security of
P2P and overlay/middleware  systems; Security for multiple domains,
large-scale systems and critical infrastructures; Applications and high
level services security: Web-based applications and services, VoIP,
multimedia streaming services, VoD and IPTV, collaborative applications
(conferencing), electronic commerce and eBusiness,  eVoting, grid
computing, security of
  eGovernment; Intellectual property protection: digital rights
management, licensing, metering, watermarking, information hiding,
implementations; Security services integration in complex architectures;
Tradeoffs between security and efficiency, usability, reliability and
cost.

Internet performance

    Performance degradation and anomaly detection mechanisms;
User-oriented performance metrics; Network and service provider-oriented
performance metrics; Hybrid (chip and network) performance calculi;
Intrusive and non-intrusive performance measurement mechanisms;
Mechanisms for performance degradation-tolerant applications; Mechanisms
for application performance and network performance; Performance
enhancement mechanisms; Performance and traffic entropy algorithms;
Performance prediction algorithms

Internet AQM/QoS

    Buffer sizing, majorization, QoS routing, finite buffer queue vs.
infinite buffer queue and performance; Control theoretic framework for
modeling of TCP and AQM schemes; Discrete mathematics to model buffer
occupancy at queues of a network (given workloads); Game theoretic
modeling of AQMs (mathematics to model selfish traffic); Fairness models
(proportional fairness, max-min fairness, low state global fairness);
Optimization framework for congestion control, fairness and utility
maximization; Modeling and simulation of large network scenarios using
queuing theory

Internet monitoring and control

    Visualization mechanisms; Sub-network/device isolation mechanisms;
Control feedback mechanisms (limited feedback, delay and disruption
tolerance, optimal and adaptive feedback); Optimal control; Adaptive
behavior control; Network resiliency; Self-adaptable and tunable
performance; Mechanisms for anticipative measurements and control

Internet and wireless

    Capacity of wireless networks; Potential based routing; Algebraic
techniques to mine patterns from wireless networks; QoS/QoE translation;
Wireless ad hoc / mesh networks: MAC protocols, routing, congestion
control, P2P CDNs on wireless meshes

Internet and data streaming/mining algorithms

    Mathematics for clustering massive data streams; Randomized
algorithms etc and impossibility results; Dimension reduction in metric
spaces; Tensor and multidimensional algebraic techniques; Non linear
dimension reduction; Optimal collector positioning; Data fusion and
correlation algorithms

Internet and sensor-oriented networks/algorithms

    Optimal sensor placement; Inference models for sensing; Congestion
control; Resource allocation; Mathematics to model different diffusion
processes and applications to routing; Algorithms for data fusion;
Algorithms for computing dormant/active sending periods; Energy-driven
adaptive communication protocols 

Internet challenges

    Future Internet architecture and design; Next generation Internet
infrastructure; Internet cross-layer design and optimization; Internet
security enforcement and validation; Future cross-Internet computing;
Configurable Internet protocols; Internet-scale overlay content hosting;
Internet citizen-centric services; End-user customizable Internet;
Mobile Internet; Internet imaging; Internet coding; Internet resilience;
Internet QoS/QoE; Context-aware, ambient, and adaptive Internet;
Virtualization and Internet; Privacy Enhancing Technologies - PETs


Committee: http://www.iaria.org/conferences2014/ComINTERNET14.html


================================================














To stop receiving notices about INTERNET, please reply with "DROP
INTERNET nuria.delama at atosorigin.com" in the subject field.

To receive notices about specific topics only, please reply with "TOPIC
CHANGE nuria.delama at atosorigin.com" in the subject field, and the
specific topics in the email body.

To stop receiving any notice, please reply with "UNSUBSCRIBE
nuria.delama at atosorigin.com" in the subject field.
------------------------------------------------------------------
This e-mail and the documents attached are confidential and intended 
solely for the addressee; it may also be privileged. If you receive 
this e-mail in error, please notify the sender immediately and destroy it. 
As its integrity cannot be secured on the Internet, the Atos 
group liability cannot be triggered for the message content. Although 
the sender endeavours to maintain a computer virus-free network, 
the sender does not warrant that this transmission is virus-free and 
will not be liable for any damages resulting from any virus transmitted. 

Este mensaje y los ficheros adjuntos pueden contener informacion confidencial 
destinada solamente a la(s) persona(s) mencionadas anteriormente 
pueden estar protegidos por secreto profesional. 
Si usted recibe este correo electronico por error, gracias por informar 
inmediatamente al remitente y destruir el mensaje. 
Al no estar asegurada la integridad de este mensaje sobre la red, Atos 
no se hace responsable por su contenido. Su contenido no constituye ningun 
compromiso para el grupo Atos, salvo ratificacion escrita por ambas partes. 
Aunque se esfuerza al maximo por mantener su red libre de virus, el emisor 
no puede garantizar nada al respecto y no sera responsable de cualesquiera 
danos que puedan resultar de una transmision de virus. 
------------------------------------------------------------------
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.fiware.org/private/old-fiware/attachments/20131022/bc803e71/attachment.html>


More information about the Old-Fiware mailing list

You can get more information about our cookies and privacy policies clicking on the following links: Privacy policy   Cookies policy