ICN 2014 - 1st International Conference on Information-Centric Networking
Topics/Call fo Papers
The fundamental concept in Information-Centric Networking (ICN) is to evolve the Internet from today’s host based packet delivery towards directly retrieving information objects by names in a secure, reliable, scalable, and efficient way. These architectural design efforts aim to directly address the challenges that arise from the increasing demands for highly scalable content distribution, from accelerated growths of mobile devices, from wide deployment of Internet-of-things (IoT), and from the need to secure the global Internet.
Rapid progresses have been made over the last few years, initial designs are sketched, new research challenges exposed, and prototype implementations are deployed on testbeds of various scales. The research efforts have reached a new stage that allow one to experiment with proposed architectures and to apply a proposed architecture design to address real world problems. It also becomes important to compare different design approaches and develop methodologies for architecture evaluations. Some research areas, such as routing and caching, have drawn considerable attention; some other areas, such as trust management, effective and efficient application of cryptography, experience from prototyping, and lessons from experimentations, to name a few, have yet to be fully explored.
Rapid progresses have been made over the last few years, initial designs are sketched, new research challenges exposed, and prototype implementations are deployed on testbeds of various scales. The research efforts have reached a new stage that allow one to experiment with proposed architectures and to apply a proposed architecture design to address real world problems. It also becomes important to compare different design approaches and develop methodologies for architecture evaluations. Some research areas, such as routing and caching, have drawn considerable attention; some other areas, such as trust management, effective and efficient application of cryptography, experience from prototyping, and lessons from experimentations, to name a few, have yet to be fully explored.
Other CFPs
- 19th ACM Symposium on Access Control Models and Technologies
- International Computing Education Research Conference
- Seventh ACM Conference on Security and Privacy in Wireless and Mobile Networks
- The International Conference on Theory and Practice of Digital Libraries (TPDL)
- 5th ACM Conference on Bioinformatics, Computational Biology and Health Informatics (ACM BCB)
Last modified: 2013-09-22 22:04:50