ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

EMERGING 2010 - The Second International Conference on Emerging Network Intelligence

Date2010-10-25

Deadline2010-05-20

VenueFlorence, Italy Italy

Keywords

Websitehttps://www.iaria.org/conferences.html

Topics/Call fo Papers

Next-generation large distributed networks and systems require substantial reconsideration of exiting ‘de facto’ approaches and mechanisms to sustain an increasing demand on speed, scale, bandwidth, topology and flow changes, user complex behavior, security threats, and service and user ubiquity. As a result, growing research and industrial forces are focusing on new approaches for advanced communications considering new devices and protocols, advanced discovery mechanisms, and programmability techniques to express, measure and control the service quality, security, environmental and user requirements.

The event EMERGING 2010, The Second International Conference on Emerging Network Intelligence, constitutes a stage to present and evaluate the advances in emerging solutions for next-generation architectures, devices, and communications protocols. Particular focus is aimed at optimization, quality, discovery, protection, and user profile requirements supported by special approaches such as network coding, configurable protocols, context-aware optimization, ambient systems, anomaly discovery, and adaptive mechanisms.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All tracks are open to both research and industry contributions.

Evolution of telecommunications network architectures
Advanced communications systems
New configurable protocols stacks and real-time mechanisms
Applications and services for next-generation architectures
Scalability and manageability of network architectures
Opportunistic and cooperative communications
Next generation networks (NGN)
Optical networks
Wireless networks, Mobile networks
Ad-Hoc, Sensor, Vehicle networks
Access, Residential, Last mile networks
Home, Body and Personal area Networks
Active networks
Self Organizing networks
Storage area networks
Peer-to-Peer and overlay networks
Network measurements and testbeds
Transmission technologies (e.g., Ultra Wideband)

Applications and services
Peer-to-Peer applications and services
Web services
Mobile applications
Entertainment and games
Home automation
Surveillance, Home monitoring
Medical and health applications
e-commerce, m-commerce
Location-based services
Real-time and multimedia applications
Real-time services over IP

Networking and service differentiation
Network design and planning
Network management and control
Traffic engineering
Traffic control, Flow control
Congestion and admission control
QoS support and Performance
Routing, Switching, QoS routing
Mobility management
Multicast
Service reliability, availability

Emerging networking
Network coding
Visualization of network behavior
Semantic routing
Network flow processing
Cross-layer design and optimization
High-speed networking
Context-aware mobile networking

Advanced network elements
Network processors
Content addressable memories
Multi-core processors
Context-aware reconfigurable devices
Portable and wearable devices
Mobile multimedia devices

Optimization
Power optimization in data centers
Delay and disruption tolerant networks
Video conferencing and telepresence systems
Resource optimization
Context-aware optimization

Quality
Quality of service
Quality of performance
Quality of experience
Quality of data
Quality of modeling
Quality-oriented routing
Quality of context /degradation, trust, uncertainty, consistency/

Smartness
Cognitive radio
Autonomic and dependable communications
Ambient systems
Identity and location in mobile environments
Smart homes
Brain-like networking and computing

Discovery
Resource discovery
Service discovery
Content discovery
Flaws/anomaly discovery

Protection
Anticipative control and management
Data protection strategies
Collaborative Internet attack containment
Micro-kernels and robustness

Security
Trust and credential negotiations
Privacy
Intrusion prevention and containment
Security in virtualization approach
Architectural support for security
Security, privacy, and dependability
Security in cooperative networks

Programmability
Programmable and real-time network traffic measurements
Adaptive scheduling
Network and application load balancing
High-performance capabilities-based networks
Software techniques to improve virtualized I/O performance

End-user
Frequently changing user profile
User mobility and ubiquity
Scalable and resource intensive multi-user distributed applications
User identity and multi-service access technologies
End-user perception
End-user based networking and service orchestration
End-user activity recognition with multiple goals

Mobility
Mobile Internet services
Mobility-oriented protocols /Mobile IP, etc./
Wearable and/or mobile technologies
Self-discovery and localizing entities
Seamless handover

Ubiquity
Ubiquitous computing
Pervasive and embedded systems
Ubiquitous sustainability
Sensing location
Activity patterns
Smart environments in the workplaces
Ubiquitous cities

Semantics and Adaptiveness
Content-aware networks
Network-aware applications
Semantic Web
Adaptive systems
Adaptive applications
Self-adaptiveness
Ontology-based adaptation
Semantic profile
Semantic service orchestration
Multi-technology semantic integration /sensors, ehealth, geosensing, etc./

Wireless
Wireless access technologies / WLANs, WiMAX, satellite, 3G, etc./
Multi-hop wireless networks /sensor, ad hoc, mesh, etc./
Wireless QoS and reliability
Wireless body area networks
Energy optimization

Emerging technologies and applications
Vehicular ad hoc networks
Bio-inspired networks
Tele-medicine/e-health networks
User-centric services and applications
Autonomous and autonomic systems
Self-manageable systems
Emerging computation business models
Social networks
eSociety

INSTRUCTION FOR THE AUTHORS

Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.

Important deadlines:

Submission (full paper) May 20, 2010
Notification June 25, 2010
Registration July 10, 2010
Camera ready July 17, 2010

Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via an automated system.

Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.

Your paper should also comply with the additional editorial rules.

Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.

Poster Forum

Posters are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as poster. Submissions are expected to be 6-8 slide deck. Posters will not be published in the Proceedings. One poster with all the slides together should be used for discussions. Presenters will be allocated a space where they can display the slides and discuss in an informal manner. The poster slide decks will be posted on the IARIA site.

For more details, see the Poster Forum explanation page.

Work in Progress

Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.

For more details, see the Work in Progress explanation page

Technical marketing/business/positioning presentations

The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to petre-AT-iaria.org.

Tutorials

Tutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials' slide decks will be posted on the IARIA's site. Please send your proposals to petre-AT-iaria.org

Panel proposals:

The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel's slide deck will be posted on the IARIA's site.

For more information, petre-AT-iaria.org

Workshop proposals

We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petre-AT-iaria.org.

Last modified: 2010-06-04 19:32:22