Home page logo

fulldisclosure logo Full Disclosure mailing list archives

2nd CfP: INTERNET 2010 || September 20-25, 2010 - Valencia, Spain
From: Sandra Sendra<sandra.sendra.upv () gmail com>
Date: Fri, 12 Mar 2010 12:17:55 +0100


Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and 
publish original scientific results.

============== INTERNET 2010 | Call for Papers ===============


INTERNET 2010: The Second International Conference on Evolving Internet
September 20-25, 2010 - Valencia, Spain

General page: http://www.iaria.org/conferences2010/INTERNET10.html

Call for Papers: http://www.iaria.org/conferences2010/CfPINTERNET10.html

Submission deadline: April 20, 2010

Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org
Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )
Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore
Submitted for indexing: Elsevier's EI Compendex Database, EI's Engineering Information Index
Other indexes are being considered: INSPEC, DBLP, Thomson Reuters Conference Proceedings Citation Index

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, 
implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete 
unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, 
topic areas. 

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, 
Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

INTERNET 2010 Tracks (tracks' topics and submission details: see CfP on the site)

Advanced Internet mechanisms
Access: call admission control vs. QoE vs. structural QoS / capability-based access control vs. role-based access 
control vs. attribute-based access control; Routing and pricing models: BGP, pricing peering agreements using 
microeconomics, topological routing vs. table-based routing vs. network coding, power-efficient routing; Optimization 
in P2P/CDN networks: peer placement for streaming P2P, analysis of P2P networks; Traffic engineering: estimating 
traffic matrices, constrained routing, exponentially bounded burstness; Behavioral traffic recognition: identifying 
applications from traffic behavior; Traffic analysis: methods for analysis and visualization of multidimensional 
measurements, characterizing protocols; Software defined radio networks: low power signal processing methods, 
applications of machine learning; Cognitive radio: medium access, spatiotemporality, complexity, spectrum sharing and 
leasing, channel selection, multi-stage pricing, cyclostationary signatures, !
 frame synchronization; Streaming vi
deo: learning from video, techniques for in-network modulation; Location: statistical location, partial measurements, 
delay estimation

Graph theory/topology/routing Internet support
Information theory: distributed network coding, Shannon's entropy, Nash equilibrium; Optimization: LP, NLP, NeuroP, 
quadratic, convex programming, compressed sensing; Graph theory: random graphs, spectra graph theory, percolations and 
phase transitions, methods from statistical physics, geometric random graphs; Algebraic techniques: tensor analysis, 
matrix decomposition; Processing: signal processing techniques, equalization, point-process, source coding vs. network 
coding, recoverability; Statistical machine learning: probabilistic graphical models, classification, clustering, 
regression, classification, neural networks, support vector machines, decision forests; Game Theory/Microeconomic 
theory: social choice theory, equilibria, arbitrage and incentive oriented distributed mechanism design, cooperative 
games, and games on graphs; Stochastic network calculus; Fractal behavior and stability mechanisms; Kolmogorov 
complexity for performance evaluation; Complexity theory

Internet security mechanisms
Cryptography: design and analysis of cryptographic algorithms, applied cryptography, cryptographic protocols and 
functions; Specification, validation design of security and dependability: security and trust models, semantics and 
computational models for security and trust, business models in security management, security policies models, security 
architectures, formal methods for verification and certification, multi-level security specification; Vulnerabilities, 
attacks and risks: methods of detection, analysis, prevention, intrusion detection, tolerance, response and prevention, 
attacks and prevention of on-line fraud, denial of services attacks and prevention methods; Access Control: 
authentication and non-repudiation, accounting and audit, anonymity and pseudonymity; identity and trust management, 
biometric methods; Anti-malware techniques: detection, analysis, prevention; Cyber-crime response: anti-phishing, 
anti-spam, anti-fraud methods

Internet trust, security, and dependability levels
Network and transport level security; Network edge security controls: firewalls, packet filters, application gateways; 
Wireless and mobile network security: risks of wireless insecurity, wireless vulnerabilities and intrusion detection, 
WLAN and WMAN MAC layer security technologies, key management mechanisms and protocols, security in ad hoc, sensor, 
mesh and personal communication networks; Security of Internet protocols: routing security, naming, network management, 
signaling security, transport layer security; Network security policies: specification, implementation, deployment and 
management; Security of P2P and overlay/middleware systems; Security for multiple domains, large-scale systems and 
critical infrastructures; Applications and high level services security: Web-based applications and services, VoIP, 
multimedia streaming services, VoD and IPTV, collaborative applications (conferencing), electronic commerce and 
eBusiness, eVoting, grid computing, security of eGover!
 nment; Intellectual property protec
tion: digital rights management, licensing, metering, watermarking, information hiding, implementations; Security 
services integration in complex architectures; Tradeoffs between security and efficiency, usability, reliability and 

Internet performance
Performance degradation and anomaly detection mechanisms; User-oriented performance metrics; Network and service 
provider-oriented performance metrics; Hybrid (chip and network) performance calculi; Intrusive and non-intrusive 
performance measurement mechanisms; Mechanisms for performance degradation-tolerant applications; Mechanisms for 
application performance and network performance; Performance enhancement mechanisms; Performance and traffic entropy 
algorithms; Performance prediction algorithms

Internet AQM/QoS
Buffer sizing, majorization, QoS routing, finite buffer queue vs. infinite buffer queue and performance; Control 
theoretic framework for modeling of TCP and AQM schemes; Discrete mathematics to model buffer occupancy at queues of a 
network (given workloads); Game theoretic modeling of AQMs (mathematics to model selfish traffic); Fairness models 
(proportional fairness, max-min fairness, low state global fairness); Optimization framework for congestion control, 
fairness and utility maximization; Modeling and simulation of large network scenarios using queuing theory

Internet monitoring and control
Visualization mechanisms; Sub-network/device isolation mechanisms; Control feedback mechanisms (limited feedback, delay 
and disruption tolerance, optimal and adaptive feedback); Optimal control; Adaptive behavior control; Network 
resiliency; Self-adaptable and tunable performance; Mechanisms for anticipative measurements and control

Internet and wireless
Capacity of wireless networks; Potential based routing; Algebraic techniques to mine patterns from wireless networks; 
QoS/QoE translation; Wireless ad hoc / mesh networks: MAC protocols, routing, congestion control, P2P CDNs on wireless 

Internet and data streaming/mining algorithms
Mathematics for clustering massive data streams; Randomized algorithms etc and impossibility results; Dimension 
reduction in metric spaces; Tensor and multidimensional algebraic techniques; Non linear dimension reduction; Optimal 
collector positioning; Data fusion and correlation algorithms

Internet and sensor-oriented networks/algorithms
Optimal sensor placement; Inference models for sensing; Congestion control; Resource allocation; Mathematics to model 
different diffusion processes and applications to routing; Algorithms for data fusion; Algorithms for computing 
dormant/active sending periods; Energy-driven adaptive communication protocols 

Internet challenges
Future Internet architecture and design; Next generation Internet infrastructure; Internet cross-layer design and 
optimization; Internet security enforcement and validation; Future cross-Internet computing; Configurable Internet 
protocols; Internet-scale overlay content hosting; Internet citizen-centric services; End-user customizable Internet; 
Mobile Internet; Internet imaging; Internet coding; Internet resilience; Internet QoS/QoE; Context-aware, ambient, and 
adaptive Internet; Virtualization and Internet; Privacy Enhancing Technologies - PETs

Jaime Lloret Mauri, Polytechnic University of Valencia, Spain
Jesus Tomas, Polytechnic University of Valencia, Spain 

INTERNET Advisory Chairs
Eugen Borcoci, University 'Politehnica' Bucharest, Romania 
Vicente Casares, Polytechnic University of Valencia, Spain 
Petre Dini, Concordia University, Canada / IARIA

INTERNET 2010 Research Institute Liaison Chairs
Jerome Galtier, Orange-FTgroup, France
Yong Man Ro, KAIST (Korea Advanced Institute of Science and Technology) - Daejeon, Republic of Korea
William W. Wu, Advanced Technology Mechanization Co. - Bethesda, USA / Nanjing University of Aeronautics and 
Astronautics, China 

INTERNET 2010 Industry/Research Chairs
Olivier Audouin, Alcatel-Lucent Bell Labs, France 

Committee members: http://www.iaria.org/conferences2010/ComINTERNET10.html

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
  • 2nd CfP: INTERNET 2010 || September 20-25, 2010 - Valencia, Spain Sandra Sendra (Mar 12)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]