ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

IIKI 2014 - International Conference on Identification, Information and Knowledge in the Internet of Things 2014

Date2014-10-17 - 2014-10-18

Deadline2014-07-10

VenueBeijing, China China

Keywords

Websitehttps://ireg.bnu.edu.cn/IIKI2014

Topics/Call fo Papers

Realising the full potential of the Internet of Things requires solving serious technical and business problems: the identification of things, the organisation, integration and management of big data, and the effective use of knowledge-based decision systems.
These challenges, and more, are the focus for the International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).
The 2014 conference, the third in the IIKI series, provides the scientific and technical community a dedicated forum for discussing research, development, and applications in the Internet of Things.
The conference is attended by international experts from the US, Europe, Australasia and China.
The conference publishes in major international peer-reviewed journals.
CONFERENCE TRACKS
TRACK 1: KNOWLEDGE ENGINEERING, BIG DATA, AND CLOUD COMPUTING
CHAIRS: WEISHAN ZHANG ZHANGWS-AT-UPC.EDU.CN EBRAHIM BAGHERI EBAGHERI-AT-MAGIC.UBC.CA
The Internet of Things, and of services and people, coupled with social networks means a huge increase in data. Analysing Big Data will become a key focus of research, competition, and innovation in the IoT. Processing of Big Data will in the cloud, and data mining will use background knowledge of societal, cultural, and personal trends. Knowledge engineering for better data mining, new approaches to cloud computing for big data, and new paradigms for Big Data processing are key topics. The topics in this track includes but not limited to:
Engineering of Big Data applications for smart cities
Parallel and distributed processing approaches in cloud computing
New algorithms for Big Data processing, and data mining for Big Data intelligence
Security and privacy in cloud computing and big data processing
Knowledge engineering for Big Data processing and cloud computing
Context awareness for mobile cloud/pervasive cloud, and Big Data processing
TRACK 2: PERVASIVE SERVICE SYSTEMS AND WEARABLE COMPUTING
CHAIRS: ZHANGBING ZHOU ZHANGBING.ZHOU-AT-GMAIL.COM ANTONIO J. JARA JARA-AT-IEEE.ORG
As the most promising ubiquitous computing devices, wearable computing devices, including clothing, iWatches, Google glasses, iRings and similar items, can range from providing very specific features like heart rate monitoring and pedometer capabilities to advanced smart functions. With the proliferation of ubiquitous computing devices and mobile internet, future pervasive services will be increasingly large-scale and operate at an inter-organizational level. The modeling, representation, discovery, chaining, and implementation of pervasive services are challenging, and the exploration and realization of pervasive service systems requires a cross-disciplinary research. The topics in this track include but are not limited to:
Modeling and representation of ubiquitous computing devices
Discovery and chaining mechanisms of ubiquitous computing devices
Theoretical foundations of pervasive service computing
Context-awareness for pervasive service systems
Environments and tools for the development of pervasive service systems
Case studies of pervasive service systems
TRACK 3: WIRELESS AND MOBILE SECURITY
CHAIR: XIUZHEN CHENG CHENG-AT-GWU.EDU
In recent years, advances in wireless and mobile technologies have dramatically changed our personal and working lives. Many challenges exist in wireless and mobile applications, particularly, security ensuring and privacy.. The goal of this track is to explore cutting-edge research in this area. Topics include but are not limited to
Trust in wireless and mobile networks
Intrusion prevention and detection in wireless and mobile networks
Security and privacy in wireless communications and mobile computing
Security and privacy in emerging applications
TRACK 4: COGNITIVE RADIO NETWORKS AND SECURITY
CHAIR: HANG LIU LIUH-AT-CUA.EDU
Cognitive radio (CR), with the capability to flexibly adapt its parameters, has been considered as the enabling technology for dynamic spectrum access (DSA) and sharing to alleviate the spectrum scarcity problem and increase spectrum utilization. There has been tremendous progress in the research, development, and regulatory acceptance of CRs and CR networks as well as DSA in recent years. This track focuses on cognitive radios and networks and dynamic spectrum access, including novel approaches and technologies enabling more efficient use of the radio spectrum. Contributions dealing with regulatory aspects of dynamic spectrum access and cognitive radio applications are also welcomed. The topics include, but not limited to,
Algorithm and protocol design for cognitive radios and networks
Cross-layer optimization of cognitive radio networks
Radio resource management
Coexistence with legacy systems
Spectrum sensing mechanisms
Spectrum measurements and analysis
Spectrum trading and auctions
Applications of CRNs and DSA
Experimental prototypes and results
Security of cognitive radio networks
Resource allocation for cognitive radio networks
Game theory in cognitive radio
Architectures for cognitive radio networks
Regulatory aspects of dynamic spectrum access
Security of cognitive radio networks
Resource allocation for cognitive radio networks
Game theory in cognitive radio
Architectures for cognitive radio networks
TRACK 5: FRONTIERS IN CYBER-PHYSICAL SYSTEMS
CHAIR: HOUBING SONG H.SONG-AT-IEEE.ORG
Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability that will far exceed the simple embedded systems of today. CPS technology will transform the way people interact with engineered systems ? just as the Internet has transformed the way people interact with information. New smart CPS will drive innovation and competition in sectors such as agriculture, energy, transportation, building design and automation, healthcare, and manufacturing.
Work focused on theory, algorithms, implementation and field deployments will be of great interest to the track. Areas of interests include (but not limited to)
Control, optimization, signal processing, information theory
Machine learning, verification, data mining,
Sensor networks, embedded systems, human in the loop systems, social networks,
Mobile computing, participatory sensing, crowd-sourcing, cloud computing
TRACK 6: REGULATIONS AND STANDARDS FOR THE INTERNET OF THINGS
CHAIR: ZHUYAN XI XIZHUYAN-AT-SOHU.COM
This Track focuses on how to develop the Internet of things as an industry, and how the Internet of Things as a technology cluster influences government governance, enterprise operation and society development. Topics include but not limited to
Policies, Regulations and Standards of the Internet of Things
Operation management of Internet of things in the smart city and intelligence industry
Social impacts such as security, privacy, and trust
Application and innovation of Internet of Things in management
Technology adoption of the Internet of Things
Information security management of Internet of Things
TRACK 7: USER EXPERIENCE IN THE IOT
CHAIR: PETER THOMAS PETER.THOMAS-AT-MANIFESTO-GROUP.COM
As the move from desktop to mobile has focused us on design for everyday lives, so the IoT will place increasing emphasis on sensitive, contextual design for in-the-moment interaction. Our experience of the world will be increasingly mediated by invisible, embedded and hyper interactive digital tools and needs new and radical approaches to understanding and designing the user experience. This track explores new user experience challenges for the IoT.
TRACK 8:MOBILE OPPORTUNISTIC NETWORKS
CHAIR: SHENGLING WANG WANGSL0362-AT-163.COM
Mobile opportunistic networks are delay tolerant networks where mobile carriers communicate with each other via their short-distance and low-cost devices to share data objects among mobile users. Unlike mobile ad hoc networks (MANETs) that require end-to-end communication paths for message exchange, the communications in mobile opportunistic networks take place on the establishment of opportunistic contacts among mobile nodes, without availability of end-to-end message routing paths. Such networks face numerous challenges due to the frequent disruptions and delays, and intermittent connectivity environment. Areas of interest in this track include (but are not limited to)
Routing, dissemination and caching in mobile opportunistic networks
Theoretical Analysis for mobile opportunistic networks
Security, trust, privacy in mobile opportunistic networks
Cooperation for opportunistic computing
Applications for mobile opportunistic networks
TRACK 9: PHD SYMPOSIUM AND POSTER TRACK
CHAIRS: ANTONIO JARA JARA-AT-IEEE.ORG SHENLING WANG WANGSL0362-AT-163.COM
This track is open to PhD Students, at any stage in their studies and in any area of study that relates to the Internet of Things, including technical, social and philosophical studies. Students should submit their problem statement and an account of their progress. Students in early stages of their Ph.D. will benefit from interacting with other Ph.D. students, as well as with members of the event processing research community represented at the conference.
This track also welcomes posters (no more than 2 pages) in any topics of the conference.
INDUSTRY TRACK
CHAIRS: ANTONIO JARA JARA-AT-IEEE.ORG RONGFANG BIE RFBIE-AT-BNU.EDU.CN
This special session is intended to provide a forum for industry engineers (including utility engineers) in the Internet of Things to share their implementation experiences and practical issues regarding the relevant issues through intensive discussion.

Last modified: 2014-05-25 16:07:25