ELSNET-List Message

ELSNET-List Message

Subject: [ E-CFP ] 2nd CfP: INTERNET 2013 || July 21 - 26, 2013 - Nice, France
From: <invitation_(on)_iariainfo.org>
Date received: 09 Jan 2013
Deadline: 27 Feb 2013
Start date: 21 Jul 2013



Please consider to contribute to and/or forward to the
appropriate groups the following opportunity to submit and
publish original scientific results to INTERNET 2013.

The submission deadline is February 27, 2013.

Authors of selected papers will be invited to submit extended
article versions to one of the IARIA Journals:


============== INTERNET 2013 | Call for Papers ===============


INTERNET 2013, The Fifth International Conference on Evolving

July 21 - 26, 2013 - Nice, France

General page:

Call for Papers:

- regular papers

- short papers (work in progress)

- posters

Submission page:

Submission deadline: February 27, 2013

Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA
Journals: http://www.iariajournals.org

Print proceedings will be available via Curran Associates, Inc.:

Articles will be archived in the free access ThinkMind Digital
Library: http://www.thinkmind.org

Please note the Poster and Work in Progress options.

The topics suggested by the conference can be discussed in term
of concepts, state of the art, research, standards,
implementations, running experiments, applications, and
industrial case studies. Authors are invited to submit complete
unpublished papers, which are not under review in any other
conference or journal in the following, but not limited to, topic

All tracks are open to both research and industry contributions,
in terms of Regular papers, Posters, Work in progress,
Technical/marketing/business presentations, Demos, Tutorials, and

Before submission, please check and conform with the Editorial
rules: http://www.iaria.org/editorialrules.html

INTERNET 2013 Topics (topics and submission details: see CfP on
the site)

Advanced Internet mechanisms

    Access: call admission control vs. QoE vs. structural QoS /
    capability-based access control vs. role-based access control
    vs. attribute-based access control; Routing and pricing
    models: BGP, pricing peering agreements using microeconomics,
    topological routing vs. table-based routing vs. network
    coding, power-efficient routing; Optimization in P2P/CDN
    networks: peer placement for streaming P2P, analysis of P2P
    networks; Traffic engineering: estimating traffic matrices,
    constrained routing, exponentially bounded burstness;
    Behavioral traffic recognition: identifying applications from
    traffic behavior; Traffic analysis: methods for analysis and
    visualization of multidimensional measurements,
    characterizing protocols; Software defined radio networks:
    low power signal processing methods, applications of machine
    learning; Cognitive radio: medium access, spatiotemporality,
    complexity, spectrum sharing and leasing, channel selection,
    multi-stage pricing, cyclostationary signature s, frame
    synchronization; Streaming video: learning from video,
    techniques for in-network modulation; Location: statistical
    location, partial measurements, delay estimation

Graph theory/topology/routing Internet support

    Information theory: distributed network coding, Shannon's
    entropy, Nash equilibrium; Optimization: LP, NLP, NeuroP,
    quadratic, convex programming, compressed sensing; Graph
    theory: random graphs, spectra graph theory, percolations and
    phase transitions, methods from statistical physics,
    geometric random graphs; Algebraic techniques: tensor
    analysis, matrix decomposition; Processing: signal processing
    techniques, equalization, point-process, source coding vs.
    network coding, recoverability; Statistical machine learning:
    probabilistic graphical models, classification, clustering,
    regression, classification, neural networks, support vector
    machines, decision forests; Game Theory/Microeconomic theory:
    social choice theory, equilibria, arbitrage and incentive
    oriented distributed mechanism design, cooperative games, and
    games on graphs; Stochastic network calculus; Fractal
    behavior and stability mechanisms; Kolmogorov complexity for
    performance evaluation; Complexity theory

Internet security mechanisms

    Cryptography: design and analysis of cryptographic
    algorithms, applied cryptography, cryptographic protocols and
    functions; Specification, validation design of security and
    dependability: security and trust models, semantics and
    computational models for security and trust, business models
    in security management, security policies models, security
    architectures, formal methods for verification and
    certification, multi-level security specification;
    Vulnerabilities, attacks and risks: methods of detection,
    analysis, prevention, intrusion detection, tolerance,
    response and prevention, attacks and prevention of on-line
    fraud, denial of services attacks and prevention methods;
    Access Control: authentication and non-repudiation,
    accounting and audit, anonymity and pseudonymity; identity
    and trust management, biometric methods; Anti-malware
    techniques: detection, analysis, prevention; Cyber-crime
    response: anti-phishing, anti-spam, anti-fraud methods

Internet trust, security, and dependability levels

    Network and transport level security; Network edge security
    controls: firewalls, packet filters, application gateways;
    Wireless and mobile network security: risks of wireless
    insecurity, wireless vulnerabilities and intrusion detection,
    WLAN and WMAN MAC layer security technologies, key management
    mechanisms and protocols, security in ad hoc, sensor, mesh
    and personal communication networks; Security of Internet
    protocols: routing security, naming, network management,
    signaling security, transport layer security; Network
    security policies: specification, implementation, deployment
    and management; Security of P2P and overlay/middleware
    systems; Security for multiple domains, large-scale systems
    and critical infrastructures; Applications and high level
    services security: Web-based applications and services, VoIP,
    multimedia streaming services, VoD and IPTV, collaborative
    applications (conferencing), electronic commerce and
    eBusiness, eVoting, grid computing, security of eGovernment;
    Intellectual property protection: digital rights management,
    licensing, metering, watermarking, information hiding,
    implementations; Security services integration in complex
    architectures; Tradeoffs between security and efficiency,
    usability, reliability and cost.

Internet performance

    Performance degradation and anomaly detection mechanisms;
    User-oriented performance metrics; Network and service
    provider-oriented performance metrics; Hybrid (chip and
    network) performance calculi; Intrusive and non-intrusive
    performance measurement mechanisms; Mechanisms for
    performance degradation-tolerant applications; Mechanisms for
    application performance and network performance; Performance
    enhancement mechanisms; Performance and traffic entropy
    algorithms; Performance prediction algorithms

Internet AQM/QoS

    Buffer sizing, majorization, QoS routing, finite buffer queue
    vs. infinite buffer queue and performance; Control theoretic
    framework for modeling of TCP and AQM schemes; Discrete
    mathematics to model buffer occupancy at queues of a network
    (given workloads); Game theoretic modeling of AQMs
    (mathematics to model selfish traffic); Fairness models
    (proportional fairness, max-min fairness, low state global
    fairness); Optimization framework for congestion control,
    fairness and utility maximization; Modeling and simulation of
    large network scenarios using queuing theory

Internet monitoring and control

    Visualization mechanisms; Sub-network/device isolation
    mechanisms; Control feedback mechanisms (limited feedback,
    delay and disruption tolerance, optimal and adaptive
    feedback); Optimal control; Adaptive behavior control;
    Network resiliency; Self-adaptable and tunable performance;
    Mechanisms for anticipative measurements and control

Internet and wireless

    Capacity of wireless networks; Potential based routing;
    Algebraic techniques to mine patterns from wireless networks;
    QoS/QoE translation; Wireless ad hoc / mesh networks: MAC
    protocols, routing, congestion control, P2P CDNs on wireless

Internet and data streaming/mining algorithms

    Mathematics for clustering massive data streams; Randomized
    algorithms etc and impossibility results; Dimension reduction
    in metric spaces; Tensor and multidimensional algebraic
    techniques; Non linear dimension reduction; Optimal collector
    positioning; Data fusion and correlation algorithms

Internet and sensor-oriented networks/algorithms

    Optimal sensor placement; Inference models for sensing;
    Congestion control; Resource allocation; Mathematics to model
    different diffusion processes and applications to routing;
    Algorithms for data fusion; Algorithms for computing
    dormant/active sending periods; Energy-driven adaptive
    communication protocols

Internet challenges

    Future Internet architecture and design; Next generation
    Internet infrastructure; Internet cross-layer design and
    optimization; Internet security enforcement and validation;
    Future cross-Internet computing; Configurable Internet
    protocols; Internet-scale overlay content hosting; Internet
    citizen-centric services; End-user customizable Internet;
    Mobile Internet; Internet imaging; Internet coding; Internet
    resilience; Internet QoS/QoE; Context-aware, ambient, and
    adaptive Internet; Virtualization and Internet; Privacy
    Enhancing Technologies - PETs



To stop receiving notices about INTERNET, please reply with "DROP
INTERNET elsnet-list_(at)_let.uu.nl" in the subject field.

To receive notices about specific topics only, please reply with
"TOPIC CHANGE elsnet-list_(at)_let.uu.nl" in the subject field, and
the specific topics in the email body.

To stop receiving any notice, please reply with "UNSUBSCRIBE
elsnet-list_(at)_let.uu.nl" in the subject field.
- ELSNET mailing list Elsnet-list_(at)_elsnet.org
- To manage your subscription go to:


[ Search | Events calendar | Deadline calendar ]


Page generated 22-06-2018 by Steven Krauwer Disclaimer / Contact ELSNET