ICSNC 2010 - The Fifth International Conference on Systems and Networks Communications
Topics/Call fo Papers
The Fifth International Conference on Systems and Networks Communications (ICSNC 2010) continues a series of events covering a broad spectrum of systems and networks related topics. The conference covers fundamentals on wireless, high speed, sensor and mobile and ad hoc networks, security, policy based systems, and education systems. Topics are targeting design, implementation, testing, use cases, tools, and lessons learnt for such networks and systems.
The conference has the following specialized topics:
WINET
Wireless networks
HSNET
High speed networks
SENET
Sensor networks
MHNET
Mobile and Ad hoc networks
VENET
Vehicular networks
RFID
Radio-frequency identification systems
SESYS
Security systems
MCSYS
Multimedia communications systems
POSYS
Policy-based systems
PESYS
Pervasive education systems
We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.
The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All tracks are open to both research and industry contributions.
WINET: Wireless networks
3G/4G integration
Wireless protocols, architectural and design concepts
Design and implementation of mobile information systems
Wireless communications and mechanisms
Antenna and RF subsystems
Coding & modulation & equalization,
Channel modeling and characterization
Equalization/Synchronization
Wireless technologies
Wireless applications & services
IP Multimedia subsystems (IMS)
Wireless and mobility
Wireless-wireline convergence
Radio communications systems
Specialized wireless networks
Management of wireless networks
Position on standards & fora on wireless networks
Business models on wireless networks
Communications regulations, Spectrum management
Software-Defined Radio (SDR) [ architectures, hardware, software, signal processing and smart antennas, etc.]
HSNET: High speed networks
Technologies, protocols, and applications for high speed networks
Voice over high speed networks
Services and interconnections of high speed networks
Technologies for High speed optical networks
Optical burst switching
End-to-end applications
Optical control plan
Advanced optical technology architectures
Design of high speed systems and networks
Methodologies and development tools for high speed networks
Management and control of high speed networks
Performance in high speed networks
Security aspects in high speed networks
QoS/SLA in high speed networks
Diagnosing high speed networks
High speed networks and NGN
SENET: Sensor networks
Architectures and protocols for wired and wireless sensor networks
Design of sensor networks
Instrumentation and models for deployment of sensors networks
Power in sensor networks
Ad hoc and wireless sensor networks
Management and control of sensor networks
Performance in sensor networks
Security and reliability aspects in sensor networks
Information assurance in sensor networks
QoS/SLA in sensor networks
Applications, case studies and prototypes with sensor networks
MHNET: Mobile and Ad hoc networks
Mobile technology and fundamentals
Analytical and validation models for mobility
Architecture and routing protocols for mobile networks
Architectures, frameworks, fundamentals on ad hoc networks
Energy efficient design, cross-layer design, scalability
MAC protocols for ad-hoc and sensor networks (801.11, Bluetooth, etc.)
Data, information, and signal processing in mobile networks
Complexity analysis of mobile algorithms and protocols
Software platforms and development tools supporting mobility
QoS/SLA, access control and security in mobile and ad hoc networks
Location and mobility management
Location and service discovery in ad hoc networks
Planning, provisioning, and deployment mobility features
Directional and smart antennas for mobile and ad-hoc networks
Performance and security in ad hoc and mobile networks
Self-organization, synchronization and stability in ad hoc networks
Self-management in ad hoc and mobile networks
Ad hoc and mobile networks and autonomic computing
Mobile ad hoc platforms, systems and tools
Applications over ad hoc networks
Standards evolution on mobility and ad hoc networks
VENET: Vehicular networks
Communication technologies in vehicular networks
Frameworks and architectures for vehicular networks
Interoperability with Internet and other networks
Vehicle-infrastructure communications
Vehicle-to-vehicle communications
Emerging inter/intra-vehicle and infrastructure-to-vehicle wireless technologies
Cross-layer design and optimization for vehicular networks
Middleware and service architectures for vehicular networks
Propagation issues
Vehicular sensors and data collection and process
On-drive diagnostics and repair technologies and systems
Protocol features /MAC, QoS, routing, multicast, addressing, identity/
Mobility and hand-off
Properties /security, privacy, performance, robustness, real-time, etc./
Control and management in vehicular networks
Driver-oriented support systems /assistance, active&passive safety, etc./
Case studies and fields trials on vehicular networks
Applications across vehicular networks /content distribution, alerting, etc./
Standardization /802.11p, DSRC, etc./ and standard platforms /JasPar, AUTOSTAR, etc./
RFID: Radio-frequency identification systems
Fundamentals for RFID systems
Communications in RFID systems
Next generation RFID Technologies
RFID middleware design and architecture
Antenna design for RFID
System design and deployment
Circuits and architecture
RFID ans sensor networks
Bridging RFID networks in heterogeneous networks
Collision, proximity, speed
Security, privacy, trust
Monitoring and control of RFID systems
Localization and tracking
Inventory tracking
Testing and verification
Planing and executing RFID systems
RFID pilot projects
Use cases in deploying and operating /finance, manufacture, agriculture, transportation, etc./
Tools for supporting the design and deployment of RFID systems
SESYS: Security systems
Security analysis methodologies
Middleware and distributed systems security
Cryptography, certificates, information hiding, access control
Protection, risk, vulnerabilities, attacks, authorization/authentication
Access control, wireless access control, broadband access control
Biometrics, smart cards, identification and trust methodologies
Certification, accreditation anonymity, and audit
Security management, emergency contingency planning, identify theft, life safety
Wireless and mobile security
Fast security associations
Electronic surveillance and e-commerce protocols
Security and trust in web-services-based applications
Peer-to-peer security, denial of services
Information survivability, insider threat protection, integrity
Intellectual property rights, privacy, legal and regulatory issues
Criminal exploitation of technology
Commercial and industrial security
Viruses, hackers, worms, spam, and other malicious code
MCSYS: Multimedia communications systems
Technologies, protocols, and mechanisms for multimedia communications
Multimedia compression mechanisms and information representation
Multimedia encoding and compression, MPEG-1 to MPEG-4, Wavelet and fractal
Multimedia frameworks, communications, and middleware
Next generation multimedia communications,
Mobile multimedia communications,
Methodologies and development tools for multimedia communications systems
Wireless mobile multimedia communications
Ad hoc multimedia networks
IP-based Multimedia Subsystems (IMS)
QoS/SLA in mobile multimedia services and applications
Mechanisms for interactive multimedia applications
Designing and implementing interactive applications
Multimedia authoring, publishing, and right securing
Security and performance for multimedia communications
Management, QoS, and security aspects in streaming over wireless ad hoc networks,
Management and control of multimedia systems
Standards protocols for multimedia communications
POSYS: Policy-based control systems
Policy for automation control
Trusting policy control commands
Policy-driven autonomic organizations
Policy-based control scalability
Policy sensors for feedback control
Policy conflict detection and conflict resolution
Context-aware policy-driven adaptive frameworks
Policy integrity, trust and negotiations
Policy-based software applications
Policing pervasive computing environments
Policing on-demand systems and services
PESYS: Pervasive Education Systems
Learning and teaching systems
E-learning methods and e-learning scenarios
Tools and architectures for mobile/ubiquitous e-learning
Cooperative learning and working
Mobile technology and education
Distance learning and education
Computers and arts
Education in developing regions
Reflection in learning software and hardware
Social impact metrics on distance learning
Methodologies and processes for education
Curriculum projects and experiences
Intelligent support
Multimedia environment for teaching
E-market place for higher education
Embedded systems education
Wearable computers and education
INSTRUCTION FOR THE AUTHORS
Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.
Important deadlines:
Submission (full paper) March 20, 2010
Notification April 25, 2010
Registration May 15, 2010
Camera ready May 22, 2010
Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via an automated system.
Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.
Your paper should also comply with the additional editorial rules.
Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.
Poster Forum
Posters are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as poster. Submissions are expected to be 6-8 slide deck. Posters will not be published in the Proceedings. One poster with all the slides together should be used for discussions. Presenters will be allocated a space where they can display the slides and discuss in an informal manner. The poster slide decks will be posted on the IARIA site.
For more details, see the Poster Forum explanation page.
Work in Progress
Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.
For more details, see the Work in Progress explanation page
Technical marketing/business/positioning presentations
The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to petre-AT-iaria.org.
Tutorials
Tutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials' slide decks will be posted on the IARIA's site. Please send your proposals to petre-AT-iaria.org
Panel proposals:
The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel's slide deck will be posted on the IARIA's site.
For more information, petre-AT-iaria.org
Workshop proposals
We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petre-AT-iaria.org.
The conference has the following specialized topics:
WINET
Wireless networks
HSNET
High speed networks
SENET
Sensor networks
MHNET
Mobile and Ad hoc networks
VENET
Vehicular networks
RFID
Radio-frequency identification systems
SESYS
Security systems
MCSYS
Multimedia communications systems
POSYS
Policy-based systems
PESYS
Pervasive education systems
We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.
The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All tracks are open to both research and industry contributions.
WINET: Wireless networks
3G/4G integration
Wireless protocols, architectural and design concepts
Design and implementation of mobile information systems
Wireless communications and mechanisms
Antenna and RF subsystems
Coding & modulation & equalization,
Channel modeling and characterization
Equalization/Synchronization
Wireless technologies
Wireless applications & services
IP Multimedia subsystems (IMS)
Wireless and mobility
Wireless-wireline convergence
Radio communications systems
Specialized wireless networks
Management of wireless networks
Position on standards & fora on wireless networks
Business models on wireless networks
Communications regulations, Spectrum management
Software-Defined Radio (SDR) [ architectures, hardware, software, signal processing and smart antennas, etc.]
HSNET: High speed networks
Technologies, protocols, and applications for high speed networks
Voice over high speed networks
Services and interconnections of high speed networks
Technologies for High speed optical networks
Optical burst switching
End-to-end applications
Optical control plan
Advanced optical technology architectures
Design of high speed systems and networks
Methodologies and development tools for high speed networks
Management and control of high speed networks
Performance in high speed networks
Security aspects in high speed networks
QoS/SLA in high speed networks
Diagnosing high speed networks
High speed networks and NGN
SENET: Sensor networks
Architectures and protocols for wired and wireless sensor networks
Design of sensor networks
Instrumentation and models for deployment of sensors networks
Power in sensor networks
Ad hoc and wireless sensor networks
Management and control of sensor networks
Performance in sensor networks
Security and reliability aspects in sensor networks
Information assurance in sensor networks
QoS/SLA in sensor networks
Applications, case studies and prototypes with sensor networks
MHNET: Mobile and Ad hoc networks
Mobile technology and fundamentals
Analytical and validation models for mobility
Architecture and routing protocols for mobile networks
Architectures, frameworks, fundamentals on ad hoc networks
Energy efficient design, cross-layer design, scalability
MAC protocols for ad-hoc and sensor networks (801.11, Bluetooth, etc.)
Data, information, and signal processing in mobile networks
Complexity analysis of mobile algorithms and protocols
Software platforms and development tools supporting mobility
QoS/SLA, access control and security in mobile and ad hoc networks
Location and mobility management
Location and service discovery in ad hoc networks
Planning, provisioning, and deployment mobility features
Directional and smart antennas for mobile and ad-hoc networks
Performance and security in ad hoc and mobile networks
Self-organization, synchronization and stability in ad hoc networks
Self-management in ad hoc and mobile networks
Ad hoc and mobile networks and autonomic computing
Mobile ad hoc platforms, systems and tools
Applications over ad hoc networks
Standards evolution on mobility and ad hoc networks
VENET: Vehicular networks
Communication technologies in vehicular networks
Frameworks and architectures for vehicular networks
Interoperability with Internet and other networks
Vehicle-infrastructure communications
Vehicle-to-vehicle communications
Emerging inter/intra-vehicle and infrastructure-to-vehicle wireless technologies
Cross-layer design and optimization for vehicular networks
Middleware and service architectures for vehicular networks
Propagation issues
Vehicular sensors and data collection and process
On-drive diagnostics and repair technologies and systems
Protocol features /MAC, QoS, routing, multicast, addressing, identity/
Mobility and hand-off
Properties /security, privacy, performance, robustness, real-time, etc./
Control and management in vehicular networks
Driver-oriented support systems /assistance, active&passive safety, etc./
Case studies and fields trials on vehicular networks
Applications across vehicular networks /content distribution, alerting, etc./
Standardization /802.11p, DSRC, etc./ and standard platforms /JasPar, AUTOSTAR, etc./
RFID: Radio-frequency identification systems
Fundamentals for RFID systems
Communications in RFID systems
Next generation RFID Technologies
RFID middleware design and architecture
Antenna design for RFID
System design and deployment
Circuits and architecture
RFID ans sensor networks
Bridging RFID networks in heterogeneous networks
Collision, proximity, speed
Security, privacy, trust
Monitoring and control of RFID systems
Localization and tracking
Inventory tracking
Testing and verification
Planing and executing RFID systems
RFID pilot projects
Use cases in deploying and operating /finance, manufacture, agriculture, transportation, etc./
Tools for supporting the design and deployment of RFID systems
SESYS: Security systems
Security analysis methodologies
Middleware and distributed systems security
Cryptography, certificates, information hiding, access control
Protection, risk, vulnerabilities, attacks, authorization/authentication
Access control, wireless access control, broadband access control
Biometrics, smart cards, identification and trust methodologies
Certification, accreditation anonymity, and audit
Security management, emergency contingency planning, identify theft, life safety
Wireless and mobile security
Fast security associations
Electronic surveillance and e-commerce protocols
Security and trust in web-services-based applications
Peer-to-peer security, denial of services
Information survivability, insider threat protection, integrity
Intellectual property rights, privacy, legal and regulatory issues
Criminal exploitation of technology
Commercial and industrial security
Viruses, hackers, worms, spam, and other malicious code
MCSYS: Multimedia communications systems
Technologies, protocols, and mechanisms for multimedia communications
Multimedia compression mechanisms and information representation
Multimedia encoding and compression, MPEG-1 to MPEG-4, Wavelet and fractal
Multimedia frameworks, communications, and middleware
Next generation multimedia communications,
Mobile multimedia communications,
Methodologies and development tools for multimedia communications systems
Wireless mobile multimedia communications
Ad hoc multimedia networks
IP-based Multimedia Subsystems (IMS)
QoS/SLA in mobile multimedia services and applications
Mechanisms for interactive multimedia applications
Designing and implementing interactive applications
Multimedia authoring, publishing, and right securing
Security and performance for multimedia communications
Management, QoS, and security aspects in streaming over wireless ad hoc networks,
Management and control of multimedia systems
Standards protocols for multimedia communications
POSYS: Policy-based control systems
Policy for automation control
Trusting policy control commands
Policy-driven autonomic organizations
Policy-based control scalability
Policy sensors for feedback control
Policy conflict detection and conflict resolution
Context-aware policy-driven adaptive frameworks
Policy integrity, trust and negotiations
Policy-based software applications
Policing pervasive computing environments
Policing on-demand systems and services
PESYS: Pervasive Education Systems
Learning and teaching systems
E-learning methods and e-learning scenarios
Tools and architectures for mobile/ubiquitous e-learning
Cooperative learning and working
Mobile technology and education
Distance learning and education
Computers and arts
Education in developing regions
Reflection in learning software and hardware
Social impact metrics on distance learning
Methodologies and processes for education
Curriculum projects and experiences
Intelligent support
Multimedia environment for teaching
E-market place for higher education
Embedded systems education
Wearable computers and education
INSTRUCTION FOR THE AUTHORS
Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.
Important deadlines:
Submission (full paper) March 20, 2010
Notification April 25, 2010
Registration May 15, 2010
Camera ready May 22, 2010
Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via an automated system.
Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.
Your paper should also comply with the additional editorial rules.
Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.
Poster Forum
Posters are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as poster. Submissions are expected to be 6-8 slide deck. Posters will not be published in the Proceedings. One poster with all the slides together should be used for discussions. Presenters will be allocated a space where they can display the slides and discuss in an informal manner. The poster slide decks will be posted on the IARIA site.
For more details, see the Poster Forum explanation page.
Work in Progress
Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.
For more details, see the Work in Progress explanation page
Technical marketing/business/positioning presentations
The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to petre-AT-iaria.org.
Tutorials
Tutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials' slide decks will be posted on the IARIA's site. Please send your proposals to petre-AT-iaria.org
Panel proposals:
The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel's slide deck will be posted on the IARIA's site.
For more information, petre-AT-iaria.org
Workshop proposals
We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petre-AT-iaria.org.
Other CFPs
- The Fifth International Conference on Software Engineering Advances
- The First International Conferences on Access Networks, Services and Technologies
- The Second International Conference on Evolving Internet
- The Sixth International Conference on Wireless and Mobile Communications
- The Fifth International Multi-Conference on Computing in the Global Information Technology
Last modified: 2010-06-04 19:32:22