ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Tue, 22 Feb 2011 17:54:25 -0500
Lilly Sun Chen <[log in to unmask]>
"ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
Lilly Sun Chen <[log in to unmask]>
text/plain (225 lines)

Note that the submission deadline has been extended to February 28, 2011.
Please consider to contribute to and/or forward to the appropriate groups
the following opportunity to submit and publish original scientific

============== INTERNET 2011 | Call for Papers ===============


INTERNET 2011, The Third International Conference on Evolving Internet

June 19-24, 2011 - Luxembourg

General page:

Call for Papers:

Submission deadline: February 28, 2011

Technical Co-Sponsors:
- Kyushu Institute of Technology
- University Politehnica of Bucharest
- Leibniz-Rechenzentrum (LRZ) - Garching
Sponsored by IARIA,

Extended versions of selected papers will be published in IARIA Journals:

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of
concepts, state of the art, research, standards, implementations, running
experiments, applications, and industrial case studies. Authors are
invited to submit complete unpublished papers, which are not under review
in any other conference or journal in the following, but not limited to,
topic areas.

All tracks are open to both research and industry contributions, in terms
of Regular papers, Posters, Work in progress, Technical/marketing/business
presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules:

INTERNET 2011 Topics (topics and submission details: see CfP on the site)

Advanced Internet mechanisms
Access: call admission control vs. QoE vs. structural QoS /
capability-based access control vs. role-based access control vs.
attribute-based access control; Routing and pricing models: BGP, pricing
peering agreements using microeconomics, topological routing vs.
table-based routing vs. network coding, power-efficient routing;
Optimization in P2P/CDN networks: peer placement for streaming P2P,
analysis of P2P networks; Traffic engineering: estimating traffic
matrices, constrained routing, exponentially bounded burstness; Behavioral
traffic recognition: identifying applications from traffic behavior;
Traffic analysis: methods for analysis and visualization of
multidimensional measurements, characterizing protocols; Software defined
radio networks: low power signal processing methods, applications of
machine learning; Cognitive radio: medium access, spatiotemporality,
complexity, spectrum sharing and leasing, channel selection, multi-stage
pricing, cyclostationary signatures,
frame synchronization; Streaming video: learning from video, techniques
for in-network modulation; Location: statistical location, partial
measurements, delay estimation

Graph theory/topology/routing Internet support
Information theory: distributed network coding, Shannon's entropy, Nash
equilibrium; Optimization: LP, NLP, NeuroP, quadratic, convex programming,
compressed sensing; Graph theory: random graphs, spectra graph theory,
percolations and phase transitions, methods from statistical physics,
geometric random graphs; Algebraic techniques: tensor analysis, matrix
decomposition; Processing: signal processing techniques, equalization,
point-process, source coding vs. network coding, recoverability;
Statistical machine learning: probabilistic graphical models,
classification, clustering, regression, classification, neural networks,
support vector machines, decision forests; Game Theory/Microeconomic
theory: social choice theory, equilibria, arbitrage and incentive oriented
distributed mechanism design, cooperative games, and games on graphs;
Stochastic network calculus; Fractal behavior and stability mechanisms;
Kolmogorov complexity for performance evaluation; Complexity theory

Internet security mechanisms
Cryptography: design and analysis of cryptographic algorithms, applied
cryptography, cryptographic protocols and functions; Specification,
validation design of security and dependability: security and trust
models, semantics and computational models for security and trust,
business models in security management, security policies models, security
architectures, formal methods for verification and certification,
multi-level security specification; Vulnerabilities, attacks and risks:
methods of detection, analysis, prevention, intrusion detection,
tolerance, response and prevention, attacks and prevention of on-line
fraud, denial of services attacks and prevention methods; Access Control:
authentication and non-repudiation, accounting and audit, anonymity and
pseudonymity; identity and trust management, biometric methods;
Anti-malware techniques: detection, analysis, prevention; Cyber-crime
response: anti-phishing, anti-spam, anti-fraud methods

Internet trust, security, and dependability levels
Network and transport level security; Network edge security controls:
firewalls, packet filters, application gateways; Wireless and mobile
network security: risks of wireless insecurity, wireless vulnerabilities
and intrusion detection, WLAN and WMAN MAC layer security technologies,
key management mechanisms and protocols, security in ad hoc, sensor, mesh
and personal communication networks; Security of Internet protocols:
routing security, naming, network management, signaling security,
transport layer security; Network security policies: specification,
implementation, deployment and management; Security of P2P and
overlay/middleware systems; Security for multiple domains, large-scale
systems and critical infrastructures; Applications and high level services
security: Web-based applications and services, VoIP, multimedia streaming
services, VoD and IPTV, collaborative applications (conferencing),
electronic commerce and eBusiness, eVoting, grid computing, security of eG
overnment; Intellectual property protection: digital rights management,
licensing, metering, watermarking, information hiding, implementations;
Security services integration in complex architectures; Tradeoffs between
security and efficiency, usability, reliability and cost.

Internet performance
Performance degradation and anomaly detection mechanisms; User-oriented
performance metrics; Network and service provider-oriented performance
metrics; Hybrid (chip and network) performance calculi; Intrusive and
non-intrusive performance measurement mechanisms; Mechanisms for
performance degradation-tolerant applications; Mechanisms for application
performance and network performance; Performance enhancement mechanisms;
Performance and traffic entropy algorithms; Performance prediction

Internet AQM/QoS
Buffer sizing, majorization, QoS routing, finite buffer queue vs. infinite
buffer queue and performance; Control theoretic framework for modeling of
TCP and AQM schemes; Discrete mathematics to model buffer occupancy at
queues of a network (given workloads); Game theoretic modeling of AQMs
(mathematics to model selfish traffic); Fairness models (proportional
fairness, max-min fairness, low state global fairness); Optimization
framework for congestion control, fairness and utility maximization;
Modeling and simulation of large network scenarios using queuing theory

Internet monitoring and control
Visualization mechanisms; Sub-network/device isolation mechanisms; Control
feedback mechanisms (limited feedback, delay and disruption tolerance,
optimal and adaptive feedback); Optimal control; Adaptive behavior
control; Network resiliency; Self-adaptable and tunable performance;
Mechanisms for anticipative measurements and control

Internet and wireless
Capacity of wireless networks; Potential based routing; Algebraic
techniques to mine patterns from wireless networks; QoS/QoE translation;
Wireless ad hoc / mesh networks: MAC protocols, routing, congestion
control, P2P CDNs on wireless meshes

Internet and data streaming/mining algorithms
Mathematics for clustering massive data streams; Randomized algorithms etc
and impossibility results; Dimension reduction in metric spaces; Tensor
and multidimensional algebraic techniques; Non linear dimension reduction;
Optimal collector positioning; Data fusion and correlation algorithms

Internet and sensor-oriented networks/algorithms
Optimal sensor placement; Inference models for sensing; Congestion
control; Resource allocation; Mathematics to model different diffusion
processes and applications to routing; Algorithms for data fusion;
Algorithms for computing dormant/active sending periods; Energy-driven
adaptive communication protocols

Internet challenges
Future Internet architecture and design; Next generation Internet
infrastructure; Internet cross-layer design and optimization; Internet
security enforcement and validation; Future cross-Internet computing;
Configurable Internet protocols; Internet-scale overlay content hosting;
Internet citizen-centric services; End-user customizable Internet; Mobile
Internet; Internet imaging; Internet coding; Internet resilience; Internet
QoS/QoE; Context-aware, ambient, and adaptive Internet; Virtualization and
Internet; Privacy Enhancing Technologies - PETs

INTERNET Advisory Chairs
Emmanuel Chaput, ENSEEIHT / IRIT-CNRS, France
Jaime Lloret Mauri, Polytechnic University of Valencia, Spain
Eugen Borcoci, University ?Politehnica? Bucharest, Romania

INTERNET Research/Industry Chairs
Tingyao Wu, Alcatel-Lucent - Antwerpen, Belgium
Jerome Galtier, Orange Labs, France
Robert van der Mei, Centrum Wiskunde & Informatica, The Netherlands

INTERNET Special Area Chairs

- Routing
Mark Yampolskiy, Leibniz-Rechenzentrum (LRZ) - Garching, Germany

- Traffic
Vladimir Zaborovsky, Technical University - Saint-Petersburg, Russia

- Performance
Sabine Wittevrongel, Ghent University, Belgium

- Security
Christian Callegari, University of Pisa, Italy

- Wireless
Dirceu Cavendish, Kyushu Institute of Technology, Japan

- P2P
Krzysztof Walkowiak, Wroclaw University of Technology, Poland

- Cloud and Internet
Massimo Villari, University of Messina, Italy

- Multimedia
Danny De Vleeschauwer, Alcaltel-Lucent Bell Labs - Antwerp, Belgium


                To unsubscribe, send an empty email to
     mailto:[log in to unmask]
    For further details of CHI lists see