CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Reply To:
Date:
Sun, 1 Mar 2009 18:19:54 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (237 lines)
INVITATION

=================

Please consider to contribute to and/or forward to the appropriate groups
the following opportunity to submit and publish original scientific
results.

=================


============== INTERNET 2009 | Call for Papers ===============


CALL FOR PAPERS, TUTORIALS, PANELS


INTERNET 2009, The First International Conference on Evolving Internet

August 23-29, 2009 - Cannes, French Riviera, France

General page: http://www.iaria.org/conferences2009/INTERNET09.html

Call for Papers: http://www.iaria.org/conferences2009/CfPINTERNET09.html

Submission deadline: March 20, 2009


Technically Co-sponsored by IEEE France Section

Sponsored by IARIA, www.iaria.org

Submissions will be peer-reviewed, published by IEEE CPS, posted in IEEE
Digital Library, and indexed with the major indexes.

Extended versions of selected papers will be published in IARIA Journals:
http://www.iariajournals.org

Please note the Poster Forum and Work in Progress special submission with
on progress and challenging ideas.


Note: All topics are open to both research and industry contributions.


INTERNET 2009 Special Areas (details in the CfP on site):



- Advanced Internet mechanisms

   Access: call admission control vs. QoE vs. structural QoS /
capability-based access control vs. role-based access control vs.
attribute-based access control; Routing and pricing models: BGP,
pricing peering agreements using microeconomics, topological routing
vs. table-based routing vs. network coding, power-efficient routing;
Optimization in P2P/CDN networks: peer placement for streaming P2P,
analysis of P2P networks; Traffic engineering: estimating traffic
matrices, constrained routing, exponentially bounded burstness;
Behavioral traffic recognition: identifying applications from traffic
behavior; Traffic analysis: methods for analysis and visualization of
multidimensional measurements, characterizing protocols; Software
defined radio networks: low power signal processing methods,
applications of machine learning; Cognitive radio: medium access,
spatiotemporality, complexity, spectrum sharing and leasing, channel
selection, multi-stage pricing, cyclostationary signatures, frame
synchronization; Streaming video: learning from video, techniques for
in-network modulation; Location: statistical location, partial
measurements, delay estimation

- Graph theory/topology/routing Internet support

   Information theory: distributed network coding, Shannon's entropy, Nash
equilibrium; Optimization: LP, NLP, NeuroP, quadratic, convex
programming, compressed sensing; Graph theory: random graphs, spectra
graph theory, percolations and phase transitions, methods from
statistical physics, geometric random graphs; Algebraic techniques:
tensor analysis, matrix decomposition; Processing: signal processing
techniques, equalization, point-process, source coding vs. network
coding, recoverability; Statistical machine learning: probabilistic
graphical models, classification, clustering, regression,
classification, neural networks, support vector machines, decision
forests; Game Theory/Microeconomic theory: social choice theory,
equilibria, arbitrage and incentive oriented distributed mechanism
design, cooperative games, and games on graphs; Stochastic network
calculus; Fractal behavior and stability mechanisms; Kolmogorov
complexity for performance evaluation; Complexity theory

- Internet security mechanisms

   Cryptography: design and analysis of cryptographic algorithms, applied
cryptography, cryptographic protocols and functions; Specification,
validation design of security  and dependability: security and trust
models, semantics and computational models for security and trust,
business models in security management, security policies models,
security architectures, formal methods for verification and
certification, multi-level security specification;  Vulnerabilities,
attacks and risks: methods of detection, analysis, prevention,
intrusion detection, tolerance, response and prevention, attacks and
prevention of on-line fraud, denial of services attacks and prevention
methods; Access Control:  authentication and non-repudiation,
accounting and audit, anonymity and pseudonymity; identity and trust
management, biometric methods;  Anti-malware techniques: detection,
analysis, prevention; Cyber-crime response: anti-phishing, anti-spam,
anti-fraud methods

- Internet trust, security, and dependability levels

   Network and transport level security; Network edge security controls:
firewalls, packet filters, application gateways; Wireless and mobile
network security: risks of wireless insecurity, wireless
vulnerabilities and intrusion detection, WLAN and WMAN MAC layer
security technologies, key management mechanisms and protocols,
security in ad hoc, sensor, mesh and personal communication  networks;
Security of Internet protocols: routing security, naming, network
management,  signaling security, transport layer security; Network
security policies: specification, implementation, deployment and
management; Security of P2P and overlay/middleware  systems; Security
for multiple domains, large-scale systems and critical infrastructures;
Applications and high level services security: Web-based applications
and services, VoIP, multimedia streaming services, VoD and IPTV,
collaborative applications (conferencing), electronic commerce and
eBusiness,  eVoting, grid computing, security of eGovernment;
Intellectual property protection: digital rights management, licensing,
metering, watermarking, information hiding, implementations; Security
services integration in complex architectures; Tradeoffs between
security and efficiency, usability, reliability and cost.

- Internet performance

   Performance degradation and anomaly detection mechanisms; User-oriented
performance metrics; Network and service provider-oriented performance
metrics; Hybrid (chip and network) performance calculi; Intrusive and
non-intrusive performance measurement mechanisms; Mechanisms for
performance degradation-tolerant applications; Mechanisms for
application performance and network performance; Performance
enhancement mechanisms; Performance and traffic entropy algorithms;
Performance prediction algorithms

- Internet AQM/QoS

   Buffer sizing, majorization, QoS routing, finite buffer queue vs.
infinite buffer queue and performance; Control theoretic framework for
modeling of TCP and AQM schemes; Discrete mathematics to model buffer
occupancy at queues of a network (given workloads); Game theoretic
modeling of AQMs (mathematics to model selfish traffic); Fairness
models (proportional fairness, max-min fairness, low state global
fairness); Optimization framework for congestion control, fairness and
utility maximization; Modeling and simulation of large network
scenarios using queuing theory

- Internet monitoring and control

   Visualization mechanisms; Sub-network/device isolation mechanisms;
Control feedback mechanisms (limited feedback, delay and disruption
tolerance, optimal and adaptive feedback); Optimal control; Adaptive
behavior control; Network resiliency; Self-adaptable and tunable
performance; Mechanisms for anticipative measurements and control

- Internet and wireless

   Capacity of wireless networks; Potential based routing; Algebraic
techniques to mine patterns from wireless networks; QoS/QoE
translation; Wireless ad hoc / mesh networks: MAC protocols, routing,
congestion control, P2P CDNs on wireless meshes

- Internet and data streaming/mining algorithms

   Mathematics for clustering massive data streams; Randomized algorithms
etc and impossibility results; Dimension reduction in metric spaces;
Tensor and multidimensional algebraic techniques; Non linear dimension
reduction; Optimal collector positioning; Data fusion and correlation
algorithms

- Internet and sensor-oriented networks/algorithms

   Optimal sensor placement; Inference models for sensing; Congestion
control; Resource allocation; Mathematics to model different diffusion
processes and applications to routing; Algorithms for data fusion;
Algorithms for computing dormant/active sending periods; Energy-driven
adaptive communication protocols
- Internet challenges

   Future Internet architecture and design; Next generation Internet
infrastructure; Internet cross-layer design and optimization; Internet
security enforcement and validation; Future cross-Internet computing;
Configurable Internet protocols; Internet-scale overlay content
hosting; Internet citizen-centric services; End-user customizable
Internet; Mobile Internet; Internet imaging; Internet coding; Internet
resilience; Internet QoS/QoE; Context-aware, ambient, and adaptive
Internet; Virtualization and Internet; Privacy Enhancing Technologies -
PETs



==========================

INTERNET Advisory Committee

Eugen Borcoci, University ?Politehnica? Bucharest, Romania

Petre Dini, Cisco Systems, Inc., USA / Concordia University, Canada

Bezalel Gavish, Southern Methodist University - Dallas, USA

Erol Gelenbe, Imperial College London, UK

M. Tamer Özsu, University of Waterloo / Royal Society of Canada, Canada

Francis Rousseaux, IRCAM, France


INTERNET 2009 Industry Reserch Chair

Olivier Audouin, Alcatel-Lucent Bell Labs - Nozay, France


INTERNET 2009 Technical Program Committee Chairs

Evangelos Kranakis, Carleton University, Canada

Clement Leung, Victoria University - Melbourne, Australia

Shawn McKee, University of Michigan, USA

Yong Man Ro, Information and Communication University - Daejon, South Korea

Adarshpal Sethi, University of Delaware - Newark, USA

==========================

    ---------------------------------------------------------------
                To unsubscribe, send an empty email to
     mailto:[log in to unmask]
    For further details of CHI lists see http://sigchi.org/listserv
    ---------------------------------------------------------------

ATOM RSS1 RSS2