ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Chinacom 2011 - 6th International ICST Conference on Communications and Networking in China

Date2011-08-17

Deadline2011-03-15

VenueHarbin, China China

Keywords

Websitehttps://www.chinacom.org/2011/

Topics/Call fo Papers

6th International ICST Conference on Communications and Networking in China
August 17-19, 2011, Harbin, China
http://www.chinacom.org/2011/
Download in [ PDF ] format

Overview: The aim of CHINACOM is to bring together Chinese and international researchers and practitioners in networking and communications under one roof to show recent research advances in communications and networking. Following the great success of the past CHINACOM2006-2010, CHINACOM2011 will be held in Harbin, China in August 2011.

Technical Symposia: Prospective authors are welcome to submit original technical papers for publication in the conference proceedings and for presentation at the following symposia:

1. Wireless Communications and Networking Symposium

Co-chairs: Qing Guo, Harbin Institute of Technology

Yasushi Yamao, The University of Electro-Communications

Dan Keun Sung, Korea Advanced Institute of Science and echnology

Nandana Rajatheva, Asian Institute of Technology

A. S. Madhukumar, Nanyang Technological University

Kenichi Higuchi, Tokyo University of Science

Tongtong Li, Michigan State University

Jing Liang, University of Texas at Arlington

(1) Wireless Communications and Signal Processing
3GPP Long-Term Evolution (LTE)
LTE-advanced and 4G
Wireless air interface and link control
Cross-layer design and physical layer based Network Issues
Multicarrier, OFDM
Smart antennas, beamforming
Propagation and antennas; air interfaces and capacity planning
MIMO and multi-antenna communications
Cognitive radio and software defined radio
Cooperative communications and networking
Ultra wideband communications
Space-time coding and processing
Detection and estimation
Joint source-channel coding
Novel signal processing modules in LTE/LTA
Channel modeling and estimation
Modulation and coding
Diversity techniques
Equalization processing
Multi-user detection, signal separation and interference rejection
Joint source-channel coding for wireless communications
Power control algorithms
Network coding in wireless networks
Distributed signal processing
Feedback schemes in communications
Turbo and LDPC codes
Radio resource management
CDMA and spread spectrum
Channel capacity and network information theory
Coding for noisy channels and erasure channels
Blind signal processing for communications
Future cellular architecture
(2) Ad-hoc, Sensor and Mesh Networking
Applications and evolutions of Ad Hoc, sensor, and mesh Networks
Autonomic networking
Wireless, Ad Hoc, and sensor devices
Physical layer design of Ad Hoc, sensor and mesh networks
Frequency and channel allocation algorithms
Topology control and management
Algorithms and modeling for localization, target tracking, and mobility management
Architectures of wireless communication and mobile computing in Ad Hoc, Sensor and mesh Networks
MAC protocols for Ad Hoc, sensor, and mesh networks
QoS provisioning in medium access control and routing for Ad Hoc and mesh networks
Analytical, mobility, and validation models for Ad Hoc, sensor, and mesh networks
Performance evaluation and modeling of mobile, Ad Hoc, sensor, and mesh Networks
Integrated simulation and measurement based evaluation of Ad Hoc and sensor systems
Survivability and reliability evaluation and modeling for Ad Hoc, sensor, and mesh networks
Pricing modeling and solutions
New simulation languages, methodologies, and tools for wireless systems in Ad Hoc, sensor and mesh networks
Analysis of correctness and efficiency of protocols
Data management, data aggregation, data dissemination, and query processing
Distributed algorithms in Ad Hoc, sensor and mesh networks
Pervasive and wearable computing
Co-existence issues of hybrid networks
Energy saving and power control protocols for Ad Hoc, sensor, and mesh networks
Resource management algorithms in mobile, wireless Ad Hoc and mesh networks
Synchronization and scheduling issues in mobile and Ad Hoc networks
Service discovery for wireless Ad Hoc, mesh, and sensor networks
Cross-layer design and interactions in Ad Hoc, sensor and mesh networks
Mobile service and QoS management for Ad Hoc and sensor networks
Ubiquitous and mobile access for wireless mesh networks
Security and privacy issues in wireless Ad Hoc, mesh, and sensor networks
(3) Selected Areas in Wireless Communications and Networking
Deep space communications
Satellite networks
Green communications
Wireless LANs and mobile Internet
Radio Frequency Identification (RFID)
Personal Area Networking, Home Networking, Femto Cells
Body-area networks
Bluetooth technologies and applications Localization techniques and GNSS
VLSI Circuit, architecture and Implementation for communications
Network topology control
Wireless telemedicine and E-health services
Others
2. Frontiers on Communications and Networking Symposium

Co-chairs: Jun-Hong Cui, University of Connecticut

Xuejun Sha, Harbin Institute of Technology

Zinan Wang, University of Electronic Science and Technology of China

(1) Optical Communications and Networking
Wavelength division multiplexing
Optical virtual private networking
Optical time-division and code-division multiplexing
Modulation and coding for optical transmission
Optical network control and management
Quality of service issues in optical networks
Optical cross connects and add drop multiplexers
Routing and wavelength assignment
Traffic grooming and traffic engineering
Dynamic traffic management
Optical network protection and restoration
Network modeling and performance analysis
Hybrid wireless-optical access networks
Convergence of optical networks with wireless networks
Cross layer optical networks
Light-weight cryptography
Multicasting, broadcasting, and groupcasting
Optical packet switching, burst switching, and label switching
Semiconductor lasers and optoelectronic devices
Next generation SONET/SDH
Optical system and subsystems
High data rate transmission systems
Optical network architecture and protocol design
Regional, core, metro, and access optical networks
Optical grid and multi-domain networks
Optical ethernet and passive optical networks
Grid networks
Storage networks
Free space optical networks
Terrestrial and submarine optical networks
Message authentication
Intrusion detection
Countermeasures
(2) Internet and Information Security
Network virtualization flow management: resource sharing, congestion control, etc.
Self-protecting networking
Switch and router architectures, performance, control, buffer management, packet scheduling
Network management methodologies and control plane design
Internet survivability and network resilience strategies
Mechanisms for self-organization and autonomous networking
Traffic measurement, analysis, modeling, visualization, and engineering
Anomaly, intrusion, and attack detection/prevention
Policy based mechanisms and high-speed firewall technology
Packet classification and forwarding mechanisms at ultra-high link rates (terabits)
High speed and parallel processing architectures for next generation routers
Connecting mobile/wireless devices to the Internet
Converged networks and applications, including NGN telecom networks
Content-based networking: caching, distribution, load balancing, resiliency
Routing: unicast, multicast, anycast, etc
Mobile/wireless content distribution
Internet applications including interactive media, voice and video, games, immersive applications
Internet signaling and service enabling protocols, including SIP, NSIS, HTTP, RTSP/RTP, etc
Privacy and/or security issues and intrusion detection/prevention in the Internet
Design methodologies for Internet services
Internet economics, pricing models, accounting, internet growth modeling
VoIP protocols and services
IP multimedia subsystem: architecture and design
Next-generation access networking
Peer-to-peer system security
Public-key cryptography
Revocation of malicious parties
Robust security network
Mobile code security
Security specification techniques
Self-healing networks
Mobile network security
Location aware security in mobile networks
Throughput-security trade-offs in wireless networks
Secure group multimedia communications
Secure PHY/MAC/routing protocols
Secure cooperation in wireless networks
Attacks on security and vulnerability analysis
Application layer encryption
Capacity and security analysis of covert channels
Security of Ad-hoc/sensor networks
Sensor network security
Symmetric key cryptography
Transport Layer Security (TLS)
Heterogeneous networks and systems
Secure Socket Layer (SSL)
Security modeling and protocol design
3G and 4G security
Authentication protocols
Biometric security: technologies, risks and vulnerabilities
Critical infrastructure security
Key distribution and management
Distributed systems security
DNS spoofing and security
Encryption standards
Financial cryptosystems
Formal trust models
Information hiding and watermarking
Intrusion avoidance
IPv6 security and IPSec
Deployment and management of computer/network security policies
Trust establishment
Upper-layer authentication
Virtual private networks security
Web, e-commerce, m-commerce, and e-mail security
Power-reliability-security trade-offs in wireless networks
Cross-layer approaches to security
Security Engineering
Secure naming
Distributed Denial-Of-Service (DDOS) attacks and countermeasures
Light-weight cryptography
Quantum cryptography and quantum key
Distribution network security metrics and performance evaluation
(3) Selected Areas in Frontiers on Communications and Networking
Flow and congestion control
Wi-Fi Protected Access (WPA)
Internet economics, pricing models, accounting, Internet growth modeling
Internet survivability and network resilience
Wireless service discovery
Flow and congestion control
Interference modeling and management in networks
Virtual and overlay networks
Communications and Networking for Rural and Emergency Applications
Vulnerability, exploitation tools, and virus/worm analysis
Network management, QoS management
Pricing and billing
Broadcast and Multicast Technologies
Bio-inspired/Bio-oriented Networks
TCP over wireless
Strategies multihoming, network planning and optimization
Regulations and standards
Others
3. The Internet of Things and Applications Symposium

Co-chairs: Zhisen Wang , Dalian Polytechnic University

Jian Ren ,      Michigan State University

Ting Jiang ,        Beijing University of Posts and Telecommunications

(1) Sensor & Detecting Technology for IOT
Fundamental and technology of sensors and converters
Chemical Sensor, gas sensors, biosensors, optical sensors, mechanical sensors, physical sensors
Wireless sensors and sensor networks
Intelligent sensor and soft sensor
Data acquisition and measurement engineering
New technology on developing sensor
Applications
(2) Emerging networks for IOT
Network architectures
Protocols (i.e. routing, transport layer, cross layer, etc.)
Control (i.e. topology, congestion, power, etc.)
QoS
Network management (i.e. resource allocation & management, addressing & location management, etc.)
Data processing
Security, trust and privacy
Network coverage
Traffic measurement and analysis
Convergent solutions
Middleware support
Performance evaluation
Applications and services
(3)IOT Applications
IOT solutions in healthcare, logistics, transport, manufacture, power system, bioengineering and plant factory, etc.
Others
(4) Selected Areas in The Internet of Things and Applications
System on chip architecture & design
Cloud computing
Cyber-physical system
Others
4. Implementations and Testbeds Symposium

Co-chairs: Dechang Chen, Uniformed Services University of the Health Sciences

Qinyu Zhang, Shenzhen Graduate School, Harbin Institute of Technology

Lingming Wang, iBiquity Digital Corporation

Physical-layer aspects of wireless LANs and PANs
4G mobile network architectures
Physical-layer aspects of GPRS, EDGE, 3GPP, IMT2000, UMTS
DVB and DAB techniques
Physical-layer aspects of cellular networks
Coexistence in unlicensed spectra
Resource allocation and interference management
Fixed wireless broadband data systems
Zigbee technologies and applications
Spectrum efficiency and issues
Wireless system optimization techniques
Wireless multimedia applications
Integration between satellite and terrestrial wireless networks
DSP/FPGA/ARM application in communication
Communication software
Optical network experiments: demonstrations, test beds and field trials
Operating system security and Log analysis tools
Application/network penetration testing
Vehicular communications and inter-vehicle applications
Middleware for cognitive radio devices
Body area networks and medical/living/health applications
Home automation and machine learning
Seamless roaming techniques and heterogeneous networking technologies
High-definition audio/video networking and IPTV
Consumer-friendly security models and tools
Others
Publication: All accepted and presented papers will be included in the CHINACOM 2011 Conference Proceedings, made available in IEEE Xplore, and then indexed by Engineering index (Ei Compendex). Papers which were accepted and presented from CHINACOM 2006 to CHINACOM 2009 have been indexed by Ei entirely (CHINACOM 2010 proceedings are working in process). Selected best and outstanding papers will be considered for publication in special issues of the following journals after further extension:

a) Confirmed: ACM/Springer Mobile Networks and Applications (MONET) - SCI indexed

b) Confirmed: Wiley Security and Communication Networks (SCN) - SCI indexed

c) Pending: Wiley Wireless Communications and Mobile Computing (WCMC) - SCI indexed

d) Confirmed: Journal of Harbin Institute of Technology (New Series) - EI indexed

Publication:

Submission deadline: March 15, 2011
Notification date: May 15, 2011
Camera-ready due: June 15, 2011
Conference dates: August 17-19, 2011
Submit paper to: http://www.easychair.org/conferences/?conf=chinaco...

Last modified: 2011-03-03 12:42:16