Tuesday, February 17, 2015

Sixth International Conference on Internet Technologies and Applications (ITA 13)

IEEE SPONSORED CONFERENCE CALL FOR PAPERS

**********
Due to multiple requests from paper authors, we have been able to extend the submission deadline by 3 weeks...
EXTENDED Submission deadline: Friday 13th March 2015
**********

Sixth International Conference on Internet Technologies and Applications (ITA 13)


www.ita15.net

Conference: Tuesday 8th - Friday 11th September 2015, Glyndwr University, Wrexham, North Wales, UK

Call for Submissions

Celebrating its 10 year anniversary, the sixth in a highly-successful series of biennial international conferences on INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 15) will be held in Wrexham, North East Wales, UK from Tuesday 8th to Friday 11th September 2015.

ITA 15 is sponsored by the IEEE with papers submitted to IEEE XPlore.  Papers will also be indexed in Scopus.

The conference will draw together researchers, artists and developers from academia and industry across all fields of Internet computing, creative digital media, moving image and engineering.  All accepted papers will be published in the conference proceedings.  The conference proceedings will be submitted to be indexed to Scopus and Thomson Reuters Conference Proceedings Citation Index (Web of Science). There will be a range of events from keynote addresses, technical and poster sessions, workshops, tutorials and for the second time we will be hosting a specially curated exposition of artworks relating to the conference proceedings.  The formal sessions will be supplemented by an excellent social programme including a visit to the historic English city of Chester, a boat trip on the River Dee and a medieval Welsh banquet at Ruthin Castle.  See the conference website (http://www.ita15.net) for full details of submission and registration.  ITA 05, ITA 07, ITA 09, ITA 11, and ITA 13 (www.ita13.org) were thoroughly enjoyed by all the many participants.  Come and join us in Wales in September 2015 and be part of ITA 15!

Submissions should be made via the EDAS system: http://edas.info/N19227

Keynote speakers

  * Professor Margaret Ross (Southampton Solent University/British Computer Society)
  * Professor Carsten Maple (University of Warwick/Council of Professors and Heads of Computing)
  * Professor Michael Lebby (President and CEO, OneChip Photonics Corporation)


Conference Location

The conference will be hosted by the Centre for Creative and Applied Research for the Digital Society (CARDS) (www.cards-uk.org) at Glyndŵr University, Wrexham (www.glyndwr.ac.uk).  Wrexham is a beautiful Welsh town conveniently situated between the metropolitan centres of Manchester and Liverpool in England and the tranquility of the North Wales countryside and mountains of Snowdonia.

Nearby are the historic city of Chester and the international festival centre of Llangollen. Wrexham is served by two international airports (Manchester and Liverpool) both comfortably less than an hour away by road or train.

Workshops/expo/tutorial

ITA 15 will also include the following full-day workshop/expo sessions, all of which will take place on Thursday 10th September:
   * The second International workshop on Technologies for Health and Wellness (THAW)
   * The second Art Expo

Further workshops and tutorials to be announced!
Key dates

Submission deadline: Friday 20th February 2015
Notification to authors: Friday 10th April 2015
Camera-ready version due: Friday 8th May 2015
Early registration by: Friday 8th May 2015
Conference dates: Tuesday 8th - Friday 11th September 2015

The scope of the ITA conference series is wide and covers all aspects of Internet activity ranging from technical hardware and software solutions to applications and creative digital media, and the wider issues arising from them.

Papers (and multimedia artefacts where relevant) are invited on any of the topics below or related fields and should be submitted, via the submission page of the conference website (www.ita15.net).  Final, camera-ready papers must conform to the author guidelines and must not exceed six pages in length (short papers/posters have a limit of four pages). Please contact the conference organizers directly for guidance on multimedia submission by e-mail ita@glyndwr.ac.uk.

Topics of Interest

* Accessibility/Assisted Living
* Ad-hoc networks
* AI/Expert systems
* Art with Science
* Big data/Big connectivity
* Control Systems
* Creative Internet technologies
* Cultural ecologies
* Cultural environments
* Cultural sustainability
* Data-mining
* Digital art
* Digital modelling
* Distributed systems
* e-Business/e-Commerce
* e-Learning/e-Society
* Environmental applications
* Ethical, social, legal issues
* Filtering
* Grid Computing
* Human-Computer Interaction
* Health Informatics
* Health Technologies
* High Performance Computing
* Intelligent networking
* Integration
* Internet applications
* Internet of Things/Internet of Everything (IoT/IoE)
* Internet languages
* Internet hardware and software
* Internet technologies
* Music and audio
* Network algorithms
* Network architectures
* Network devices
* Network management
* Network modelling
* Network optimisation
* Network performance
* Privacy
* Protocols and standards
* Public Resource Computing (PRC)
* Robotics
* Routing
* Security
* Semantics
* Sensor networks
* Services
* Simulation and Modelling
* Smart networks
* Storage
* Systems failure
* Traffic/Traffic policies/Traffic shaping
* Ubiquitous computing
* Visualisation
* Web hardware/software
* Wireless networks

These topics, however, are only intended as an illustrative guide. Please contact the conference chair or programme chair for additional guidance.  (See www.ita15.net)


We look forward to welcoming you to Wales in September 2015.

ITA 15 Programme Chair: Dr. Stuart Cunningham, CARDS, Glyndwr University, Wales, UK
ITA 15 Conference Chair: Dr. Rich Picking, CARDS, Glyndwr University, Wales, UK
Centre for Creative and Applied Research for the Digital Society (CARDS)
Glyndwr University
Plas Coch Campus, Mold Road
Wrexham, LL11 2AW, UK
r.picking@glyndwr.ac.uk.
------------------------------
----------------------------------------------

Saturday, February 14, 2015

The 11th International Wireless Communications & Mobile Computing Conference

Call for Papers

Trust, Privacy and Security Symposium
The 11th International Wireless Communications & Mobile Computing Conference

IWCMC’15 Website: http://iwcmc.org/2015/
Submission Link: https://edas.info/newPaper.php?c=17319
Valamar Lacroma Hotels & Resorts, Dubrovnik, Croatia, August 24-27, 2015

Technically sponsored by IEEE, IEEE Croatia Section
Local sponsor: University of Dubrovnik, Croatia


Symposium Co-Chairs:
Peter Mueller, IBM Zurich Research Laboratory, Switzerland, pmu@zurich.ibm.com
Yuli Yang, Meliksah University, Kayseri, Turkey, yang_yuli@hotmail.com, yyang@meliksah.edu.tr

Scope:
With the advancement of mobile computer applications and due to the proliferation of heterogeneous computer and communication networks, trust, privacy and security issues have become paramount. The development of a plethora of communication standards using different spectrum bands has refocused the research interests on mobile and wireless security. Recently, the importance of the addressed area has been dramatically highlighted by some successful attacks against mobile platforms.
The Symposium on Trust, Privacy and Security of IWCMC 2015 is soliciting original papers on research and development topics in the field of the security of wireless networks and pervasive computing. Prospective authors are cordially invited to submit original technical papers – up to 6 pages of length. Accepted papers will be published in the conference proceedings and will be submitted to the IEEE digital library (IEEE Xplore). The authors will provide an oral presentation at IWCMC 2015 in Dubrovnik.
Topics of interest include, but are not limited to:

- Application Level Trust, Privacy and Security
- Architectures related to Trust, Privacy and Security
- Attacks and Counter Measures in Mobile and Wireless Networks
- Big Data Security and Privacy
- Computer and Network Forensics
- Cross-layer Design for Robustness and Security
- Cryptanalysis, Lightweight Cryptographic Algorithms and Applications
- Data Center Security
- Formal Trust Models, Security Modeling and Protocol Design
- Identity Management and Key Management Systems
- Information System Security
- Intrusion Detection and Response in Wireless Networks
- Key distribution and management
- Location-based services and their security and privacy aspects
- Mobile and Wireless Network Security
- Network Public Opinion Analysis and Monitoring
- Network Security Metrics and Their Performance Evaluation
- Online Social Networks and Their Security Aspects
- Physical Layer Security
- Privacy and Security in Clouds and Contents Distribution Networks
- Privacy in Location-based Services
- Privacy and Anonymity in Vehicular Networks
- Resource Allocation, Incentives, and Game-Theoretic Approaches
- Security in Cognitive Radio Networks and Cooperative Communication Systems
- Security of Mesh Networks
- Security of Mobile Multimedia and Cloud Media
- Security of Wireless Sensor Networks
- Security of Cyber Physical Systems
- Smart Phone Security
- Threat and Vulnerability Analysis for Mobile Communication


Submission Guidelines:
Prospective authors are invited to submit original technical papers, up to 6 pages of length, using the EDAS link: https://edas.info/newPaper.php?c=17297
Selected papers will be considered for possible publication in a special issue in one of the following Journals. (For more information, please visit: http://iwcmc.org/2015)

1.      Wiley Journal of Wireless Communications and Mobile Computing (WCMC)
2.      International Journal of Sensor Networks (IJSNet)
3.      The International Journal of Autonomous and Adaptive Communications Systems (IJAACS)
4.      KSII Transactions on Internet and Information Systems
5.      Peer-to-Peer Networking & Applications

Note: There will be a best paper award, best Symposium award and best Workshop award.

Important Dates:
Submission:                             February 15, 2015
Acceptance notification:                April 15, 2015
Camera-ready paper submissions:         May 10, 2015
Registration deadline for authors:      May 10, 2015.
------------------------------
----------------------------------------------

Thursday, February 12, 2015

International Conference on Future Networks Systems and Security 2015 (FNSS 2015)

CALL FOR PAPERS
International Conference on Future Networks Systems and Security 2015 (FNSS 2015), Paris, France
June 11-13, 2015

Paper submission deadline: March 1, 2015 (EXTENDED DEADLINE)
EDAS page: http://edas.info/N19237

The network of the future is envisioned as an effective, intelligent, adaptive, active and high performance Internet that can enable applications ranging from smart cities to tsunami monitoring. The network of the future will be a network of billions or trillions of entities (devices, machines, things, vehicles) communicating seamlessly with one another and is rapidly gaining global attention from academia, industry, and government.

The International Conference on Future Networks Systems and Security aims to provide a forum that brings together researchers from academia, practitioners from industry, standardization bodies, and government to meet and exchange ideas on recent research and future directions for the evolution of the future Internet. The technical discussion will be focused on the technology, communications, systems and security aspects of relevance to the network of the future. The technical topics of interest to the workshop include, but are not limited to:
       
-future Internet architecture and technologies
-access network technologies and capillary networks;
-channel and traffic models;
-spectrum management for M2M/IoT radio communications;
-RFID, sensors, actuator technologies;
-IoT network infrastructure;
-IoT security protocols;
-IPv6 and wireless sensor networks;
-Privacy in applications of the IoT;
-IoT networking and communication security,
-Circuit and system design for secure smart objects,
-Security, trust, and privacy issues for devices and services;
-naming, address management and end-to-end addressability;
-cloud computing interworking;
-semantic technologies;
-smart grids and smart spaces
-Methods for security analysis and audit
-Privacy and anonymization techniques
-Secure cloud of things
-Trust management architectures
-Lightweight security solutions
-Authentication and access control
-Identification and biometrics
-Liability and policy enforcement
-Security of Big data
-Cyber physical systems security
-Cyber attacks detection and prevention
-Ethics and legal considerations
-Network management and governance


AUTHOR GUIDELINES
Each submitted paper must be original and unpublished work, not submitted for publication elsewhere (copyright problems fall entirely under responsibility of the authors). Each paper will be reviewed by at least three experts in the relevant field ensuring the publication of only top quality contributions. Submission of a paper should be regarded as an undertaking that, should the paper be accepted, at least one of the authors should register and present orally the paper in the conference. Failure to do so shall lead to exclusion of the paper from the proceedings.

FNSS 2015 proceedings will be published by Springer as part of the Communications in Computer and Information Science series (http://www.springer.com/series/7899). Extended versions of selected FNSS2015 papers will be invited for a journal special issue.

Authors should prepare their manuscripts carefully in adherence to Springer requirements using the template available at: http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0

Prospective authors are invited to submit full papers (10 to 15 pages in length) electronically through the EDAS (http://edas.info/N19237) system using the standard Springer template. Only PDF files will be accepted for the review process and all submissions must be done through EDAS.

IMPORTANT DATES
Paper submission due: March 1, 2015
Notification of acceptance: March 15, 2015
Camera ready: March 22, 2015

GENERAL CHAIRS
Robin Doss, Deakin University, Australia
Selwyn Piramuthu, University of Florida, USA
Wei Zhou, ESCP Europe, France

PUBLICITY CHAIR
Lei Pan, Deakin University, Australia

TECHNICAL PROGRAMME COMMITTEE
Adil Al-Yasiri, University of Salford, UK
Elizabeth Basha, University of the Pacific, USA
Lejla Batina, Radbound University Nijmegen, Netherlands
Aniruddha Bhattacharjya, Narasaraopeta Engineering College, India
David Boyle, Imperial College London, UK
Sammy Chan, City University of Hong Kong, PRC
Roberto Di Pietro, Bell Labs, France
Ángel García-Fernández, Curtin University, Australia
Rama Garimella, IIIT Hyderabad, India
I-Hong Hou, Texas A&M University, USA
Shweta Jain, York College CUNY, USA
Jiong Jin, Swinburne University of Technology, Australia
Gul Khan, Ryerson University, Canada
Sachin Agarwal Kumar, Delhi Technological University, India
Lambros Lambrinos, Cyprus University of Technology, Cyprus
Yee Wei Law, University of South Australia, Australia
Albert Levi, Sabanci University, Turkey
Li Liu, National University of Singapore, Singapore
Cicero Martelli, Federal University of Technology, Brazil
Sjouke Mauw, University of Luxembourg, Luxembourg
Yang Peng, Iowa State University, USA
Pedro Peris-Lopez, Carlos III University of Madrid, Spain
William Plymale, Virginia Tech, USA
Rajib Rana, CSIRO, Australia
Damith Ranasinghe, University of Adelaide, Australia
Rui Santos Cruz, Universidade de Lisboa, Portugal
Zhefu Shi, University of Missouri - Kansas City, USA
Houbing Song, West Virginia University, USA
David Sundaram, University of Auckland, New Zealand
Sameer Tilak, University of California at San Diego, USA
Neelanarayanan Venkataraman, VIT University, India
Hui Wu, University of New South Wales, Australia

WEBMASTER
Shaowu Liu, Deakin University, Australia

For more information, please email Robin Doss: robin.doss@deakin.edu.au.
----------------------------------------------------------------------------

Tuesday, February 10, 2015

The Ninth IEEE International Workshop on Autonomic and Opportunistic Communications

CALL FOR PAPERS

               The Ninth IEEE International Workshop on
              Autonomic and Opportunistic Communications
                             (AOC 2015)

                   http://cnd.iit.cnr.it/aoc2015

                           sponsored by
                       IEEE Computer Society,
                        EU FP7 MOTO Project

                  June 14-17 2015, Boston, MA, USA



The diffusion of lightweight, powerful portable devices, also enriched with a
variety of sensing capabilities, is enabling new ways for users' communication,
and laying the foundation for realizing the ubiquitous networking idea. Acting
either as the main communication mode or as complement to existing mobile
network infrastructures, opportunistic networking can leverage the mobility of
end users and enhance their communication capabilities. The opportunistic
exploitation of extemporary contacts among the users of the network paves the
way to a number of applications but also poses new and challenging problems to
the networking research community. The AOC 2015 workshop aims at serving as a
meeting point for people working in the area and a forum for exchanging ideas,
discussing solutions, and sharing experiences among researchers, professionals,
and application developers, both from industry and academia.  As with the
previous eight editions of the AOC workshop series, the scope of this year's
workshop will remain on general issues related to opportunistic networking and
computing. Yet, AOC 2015 will have a primary interest in new directions of
opportunistic communications, such as mobile social networking, autonomous
solutions for smart cities, big data for autonomic and opportunistic systems
service composition techniques, scenarios of co-existence with infrastructure
networks, and insights to their operation coming from other disciplines such as
game theory and cognitive psychology. The workshop will solicit original papers
addressing theoretical and practical aspects of autonomic and opportunistic
communications but also papers describing prototype implementations and
deployments.


Topics of interest for AOC 2015 include, but are not limited to:

- Techniques for data dissemination and replication
- Context and social awareness mechanisms and algorithms
- Autonomous and self-adaptive systems for smart cities
- Autonomous solutions for IoT and cyber-physical systems
- Big data for autonomic and opportunistic systems
- Mobile social networking algorithms and applications
- Co-existence of opportunistic networks with infrastructure mobile wireless
  networks
- Mobility models and statistical analysis of mobility traces
- Service composition in autonomic and opportunistic networks
- Cognition-driven information processing and decision making
- Performance modelling, scaling laws, and fundamental limits for autonomic and
  opportunistic communications
- Participatory and urban sensing in autonomic and opportunistic networks
- Game-theoretic insights to the operation of autonomic and opportunistic
  networks
- Trust, security, and reputation
- Autonomic and opportunistic communication testbeds and prototypes, measurement
  data from real experiments
- Socio-economic models for autonomic and opportunistic communications
- Autonomic and opportunistic solutions for mobile cloud applications
- Applications and middleware support
- Routing, transport, and reliability issues



PAPER SUBMISSION AND PUBLICATION
------------------------------
------------------------------------------
All submissions must describe original research, not published or
currently under review for another workshop, conference, or journal.
Papers must be submitted electronically through EDAS. You can find
detailed submission instructions at:
http://cnd.iit.cnr.it/aoc2015/submission.html

IEEE AOC 2015 is using the EDAS Conference Management Software.
Paper submission is possible via this link:
http://edas.info/N19275

Manuscripts are limited to 6 pages, single spacing, double column, and must strictly adhere to the IEEE conference template format. Guidelines on paper submission and formatting are available at http://cnd.iit.cnr.it/aoc2015/submission.html

********************************************************************************
Submission implies the willingness of at least one author to attend the workshop
and present the paper. Accepted papers will be included in the proceedings of
IEEE WoWMoM 2015 and published in the IEEE Digital Library. Workshop organizers
reserve the right to exclude a paper from distribution after the workshop
(e.g., removal from IEEE Xplore) if the paper is not presented at the conference.

There will be no separate registration for workshop, but one single registration
will cover both conference and workshops participation. At least one author of
each accepted paper is required and present his/her work at the workshop.
********************************************************************************

EDITORIAL FOLLOW-UP
------------------------------------------------------------------------
Extended versions of workshop selected papers will be considered for possible
fast track publication on the Computer Communications Journal (Elsevier).

IMPORTANT DATES (EXTENDED DEADLINES)
------------------------------------------------------------------------
- Abstract submission deadline:         March 7,  2015
- Full manuscript due:                  March 14, 2015
- Acceptance notification:              April 20, 2015
- Camera Ready:                         May 7,    2015


CONTACTS
------------------------------------------------------------------------
For further information, please visit the conference website at
http://cnd.iit.cnr.it/aoc2015, or contact the PC Chairs:
aoc2015@iit.cnr.it


ORGANIZING COMMITTEE
------------------------------------------------------------------------
WORKSHOP Co-Chairs
Lorenzo Valerio, IIT-CNR, Italy
Matteo Mordacchini, IIT-CNR, Italy

STEERING Committee
Marco Conti, IIT-CNR, Italy
Silvia Giordano, SUPSI, Switzerland
Ioannis Stavrakakis, University of Athens, Greece

PUBLICITY Chair
Elisabetta Biondi, IIT-CNR, Italy

PROGRAM Committee
Andreea Picu, ETH Zurich, Switzerland
Anna Forster, SUPSI, Switzerland
Chiara Boldrini, IIT-CNR, Italy
Christian Rohner, Uppsala University, Sweden
Daniele Miorandi, Create-net, Italy
Daniele Puccinelli, SUPSI, Switzerland
Eiko Yoneki, University of Cambridge, UK
Elena Pagani, University of Milano, Italy
Eleonora Borgia, IIT-CNR, Italy
Franck Legendre, ETH Zurich, Switzerland
Franco Zambonelli, University of Modena and Reggio Emilia, Italy
Gunnar Karlsson, KTH, Sweden
Hongyi Wu, University of Louisiana at Lafayette, USA
Jian-Nong Cao, Hong Kong Polytechnic University, HK
Jorg Ott, Aalto University, Finland
Katia Obraczka, University of California Santa Cruz, USA
Konstantinos Oikonomou, Ionian University, Greece
Kyunghan Lee, North Carolina State University, USA
Michela Papandrea, SUSPSI, Switzerland
Melek Onen, EURECOM, France
Nils Aschenbruck, University of Osnabruck, Germany
Roger Whitaker, Cardiff University, UK
Sebastian Zander, Swinbourne University of Technology, Australia
Serge Fdida, UPMC Sorbonne Universites, France
Tristan Henderson, University of St Andrews, United Kingdom
Valerio Arnaboldi, IIT-CNR, Italy
Valtteri Niemi, University of Turku, Finland
Vania Conan, Thales Communication and Security, France

Sunday, February 8, 2015

ICACCI Special Session on Advances in Data and Knowledge Engineering

ICACCI Special Session on Advances in Data and Knowledge Engineering

http://icacci-conference.org/web/ISDKE-2015

Fourth International Conference on Advances in Computing, Communications and Informatics (ICACCI-2015)
August 10-13, 2015, Kochi, India

Technically Co-sponsored by IEEE Communications Society and IEEE Systems, Man, and Cybernetics Society
------------------------------
------------------------------------------------------------------------------------
The amount of data produced across the globe has been growing exponentially and will continue to grow at an accelerating rate for the foreseeable future. Given the rising complexity of data, the need for proficient data engineering techniques for acquiring valuable information from the data has never been greater. Knowledge is central to modern society. The Knowledge Engineering refers to all aspects involved in building, maintaining and using knowledge-based systems which contain large amounts of knowledge, rules and reasoning mechanisms to provide solutions to real-world problems. The special session on Advances in Data and Knowledge Engineering provides a forum to communicate results of new developments in data and knowledge engineering.

The organizers invite original and unpublished work from individuals active in the broad theme of the Special Sessions. Authors should submit their papers online using EDAS. Unregistered authors should first create an account on EDAS to log on. Further guidelines for submission are posted at: http://icacci-conference.org/web/call-for-papers

The accepted and presented papers will be published in the conference proceedings and submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.

Topics of interest include but not limited to:

Big Data and Data-Warehousing System Architectures
Classification, Projection, Regression, Optimization Clustering
Data Integration, Metadata Management, and Interoperability
Data Mining and Knowledge Discovery
Database Design and Modeling
Database Security, Personalization, Recommendation
Database System Internals, Performance, Self-tuning Benchmarking and Testing
Distributed, Parallel, Grid, P2P, Cloud Databases
Feature Selection and Extraction
Flash and Main Memory Data
High Performance Transaction Management
Human-Machine Cooperation
Information Fusion
Information Retrieval and Information Extraction
In-Memory Database Architecture and Systems
Online Advertising
Query Processing, Indexing, and Optimization
Self-Managing Database Systems
Semi-structured, Web, and Linked Data Management
Social Networks, Social Web, Graph, and Personal Information Management
Streams and Sensor Networks
Strings, Texts, and Keyword Search
Temporal, Spatial, Mobile, and Multimedia Data
Web and Social Media Analysis
Web Databases, Ontology Based Databases
Architectures for Knowledge and Data Based Systems
Knowledge and Data Engineering Tools and Techniques
Knowledge Reengineering
Knowledge Representation
Knowledge Based Software Engineering
Web-Based Knowledge Management
Recommender Systems
Uncertainty Knowledge Management
Visual Data Analytics
Knowledge Discovery

KEY DATES
-------------
Paper Submission Ends:  March 31, 2015
Acceptance Notification: April 30, 2015
Final Paper Deadline: June 12, 2015

TECHNICAL PROGRAM COMMITTEE
-----------------------------
Seiki Akama, Tsukuba University, Japan
Rashid Ali, College of Computers and Information Technology, Taif University, Saudi Arabia
Mazin Alshamrani, University of Surrey, United Kingdom
Dariusz Barbucha, Gdynia Maritime University, Poland
Pierre Borne, Ecole Centrale de Lille, France
Ram Chakka, Meerut Institute of Engineering and Technology, India
Suphamit Chittayasothorn, King Mongkut’s Institute of Technology Ladkrabang, Thailand
Ireneusz Czarnowski, Gdynia Maritime University, Poland
Omid Mahdi Ebadati E., Hamdard University, India
Dariusz Gasior, Wroclaw University of Technology, Poland
Roberto Herrera Lara, National Polytechnic School, Ecuador
Avinash Jha, OppCorp Learning & Development Private Limited, India
Arkadiusz Kawa, Poznan University of Economics, Poland
Lie Lu, Dolby, USA
Edwin Lughofer, University of Linz, Austria
Kazumi Nakamatsu, University of Hyogo, Japan
Vuong M. Ngo, Ho Chi Minh City Open University, Vietnam
Beatriz Sainz, University of Valladolid, Spain
Nandakishore Santhi, Los Alamos National Laboratory, USA
Shahid Shah, Indian Institute of Science, India
Chokri Souani, University of Sousse, Tunisia
Fan Wang, Microsoft, USA
Hao Wang, The Chinese University of Hong Kong, Hong Kong
Michał Woźniak, Wroclaw University of Technology, Poland.
----------------------------------------------------------------------------

International Conference on Information and Communication Technology Research 2015 (ICTRC2015)

You are invited to submit your papers to the International Conference on Information and Communication Technology Research 2015 (ICTRC2015), which will be held in Abu Dhabi, UAE in the period 17 -19 May, 2015. The conference is technically sponsored by IEEE UAE section.

ICTRC2015 aims to be the forum for scientists, academics, engineers, and industry professionals throughout the World to present their latest research results, ideas, developments, and applications in all areas of Information and Communication Technology. The conference is organized by Khalifa University and co-organized by EBTIC (ETISALAT-BT Innovation Centre) and ANKABUT (Emirates Advanced Network for Research and Education). The event is sponsored by the TRA (Telecommunications Regulatory Authority).

Prospective authors are invited to submit full papers, written in English, of not more than 4 pages, in IEEE double-column format. Submissions must present original work that has not been previously published, and is not under review elsewhere.

Papers must be submitted electronically, in PDF format, on-line via the EDAS system: http://edas.info/N18541

All submissions will be peer-reviewed by the International Review Committee of the ICTRC2015 conference. Accepted submissions will be invited to present at the conference in oral or poster format. All accepted papers will be published in the IEEE Xplore. Travel assistance will be awarded to selected accepted international papers.

Topics of interest include, but are not limited to:

Track 1: Communication & Networking
Track 2: Signal Processing, Circuits, and Systems
Track 3: Computer and Information
Track 4: Big Data, & Data Analytics
Track 5: Information Security
Track 6: ICT Convergence & Emerging Trends

For more info please visit: http://events.kustar.ac.ae/ictrc2015/

Important Dates:
Deadline for Submission: Final 15-February-2015
Acceptance Notification: 15-March-2015
Final Manuscript Due: 5-April-2015
Conference Dates: 17-19 May 2015

__________________
ICTRC2015 Organizing Committee.
------------------------------
----------------------------------------------

Saturday, February 7, 2015

Fog Networking for 5G and IoT workshop

==============================
===========
CFP: Fog Networking for 5G and IoT workshop
>>>>> In conjunction with SECON 2015 <<<<<
=========================================
22 June 2015, SEATTLE - USA

http://secon2015.ieee-secon.org/workshop-program

Important dates
Submission deadline(Hard): April 1st, 2015
Notification of acceptance: April 15th, 2015
Camera Ready: April 30th, 2015
Workshop: June 22nd, 2015


Scope:

Pushing computation, control and storage into the "cloud" has been a key trend in networking in the past decade. Over-dependence on the cloud, however, indicates that availability and fault tolerance issues in the cloud would directly impact millions of end-users. Indeed, the cloud is now "descending" to the network edge and often diffused among the client devices in both mobile and wireline networks. The cloud is becoming the "fog."
Empowered by the latest chips, radios, and sensors, each client device today is powerful in computation, in storage, in sensing and in communication. Yet client devices are still limited in battery power, global view of the network, and mobility support. Most interestingly, the collection of many clients in a crowd presents a highly distributed, under-organized, and possibly dense network. Further, wireless networks is increasingly used locally, e.g. intra-building, intra-vehicle, and personal body-area networks; and data generated locally is increasingly consumed locally.
Fog Network presents an architecture that uses one or a collaborative multitude of end-user clients or near-user edge devices to carry out storage, communication, computation, and control in a network.
It is an architecture that will support the Internet of Things, heterogeneous 5G mobile services, and home and personal area networks. Fog Networking leverages past experience in sensor networks, P2P and MANET research, and incorporates the latest advances in devices, network systems, and data science to reshape the "balance of power" in the ecosystem of computing and networking.
As the first high-quality IEEE workshop in the emergent area of Fog Networking, this workshop's scope includes:
-       Edge data analytics and stream mining
-       Edge resource pooling
-       Edge caching and distributed data center
-       Client-side measurement and crowd-sensing
-       Client-side control and configuration
-       Security and privacy in Fog
-       Fog applications in IoT
-       Fog applications in 5G
-       Fog applications in home and personal area networking

Accepted and presented papers will be published in the IEEE FOG Networking Proceedings by the IEEE Computer Society Conference Publishing Services and IEEE Xplore Digital Library.To be published in the IEEE FOG Networking Proceedings an author of an accepted paper is required to register for the workshop at the full (member or non-member) rate and the paper must be presented by an author of that paper at the conference unless the TPC Chair grants permission for a substitute presenter arranged in advance of the event and who is qualified both to present and answer questions.  Non-refundable registration fees must be paid prior to uploading the final IEEE formatted, publication-ready version of the paper.  For authors with multiple accepted papers, one full registration is valid for up to 3 papers.

Workshop Co-Chairs:

Mung Chiang
Arthur LeGrand Doty Professor of Electrical Engineering
Director of Keller Center for Innovation in Engineering Education
Princeton University

Sangtae Ha
Assistant Professor, Computer Science Department
University of Colorado at Boulder

Junshan Zhang
Professor, Electrical and Computer Engineering Department
Arizona State University

Workshop Technical Program Committee:

Bharath Balasubramanian (AT&T Labs)
Suman Banerjee (University of Wisconsin)
John Brassil (HP Labs)
Gary Chan (Hong Kong University of Science and Technology)
Tian Lan (George Washington University)
Athina Markopoulou (UC Irvine)
Rajesh Panta (AT&T Labs)
Chunming Qiao (University of Buffalo)
Moo-ryong Ra (AT&T Labs)
Tao Zhang (Cisco)