On Tue, May 1, 2012 at 9:29 PM, <[email protected]> wrote: > Send Tccc mailing list submissions to > [email protected] > > To subscribe or unsubscribe via the World Wide Web, visit > https://lists.cs.columbia.edu/cucslists/listinfo/tccc > or, via email, send a message with subject or body 'help' to > [email protected] > > You can reach the person managing the list at > [email protected] > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of Tccc digest..." > > > Today's Topics: > > 1. [WLN 2012] Call for papers.. (Fadi Al-Turjman) > 2. Extended CFP::DEIS2012- Czech Republic > (The International Conference on Digital Enterprise and Information > Systems) > 3. (Deadline extension) IEEE UIC/ATC 2012 (Ching-Hsien Hsu (Robert)) > 4. Postdoctoral Opportunity. (Wanqing Tu) > 5. cfp:4th Intl Workshop on Wireless & Mobile Networks > (WiMo-2012), India-ACM -ICPS (kimri1011 Lee) > 6. CFP for IEEE LCN Workshop on Security in Communications > Networks (Charles Clancy) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Tue, 1 May 2012 07:33:20 -0400 > From: "Fadi Al-Turjman" <[email protected]> > Subject: [Tccc] [WLN 2012] Call for papers.. > To: <[email protected]>, <[email protected]> > Cc: [email protected], [email protected] > Message-ID: <[email protected]> > Content-Type: text/plain; charset="us-ascii" > > Call for Papers > > IEEE Workshop on Wireless Local Networks (WLN) in LCN 2012, > > October 22, 2012, Clearwater, Florida, USA > > > > Deadline for paper submission is May 12, 2012, only 12 days left! > > > > IEEE WLN 2012 is soliciting works describing both theoretical and practical > research endeavors. We also encourage visionary and experimental > descriptions. Short reports on work-in-progress and demos will also be > accommodated. > > > > The following is a non-exclusive list of topics of interest: > > Design and deployment guidelines. > > Implementation and testbed issues. > > Network management architectures. > > Protocol design, including cross-layer and opportunistic approaches. > > Wireless multihop networks, including mesh, ad hoc and sensor networks. > > Wireless relay, including fixed and mobile elements. > > Integration and coexistence issues (as in RSNs and IoT). > > Coexistence of heterogeneous wireless networks. > > Wireless access schemes and techniques. > > Mobility & network management . > > Resource management functionalities (CAC, reservation, scheduling, etc.) > > Cognitive radios and dynamic spectrum networks. > > Performance evaluation, including analytical and simulation approaches. > > > > More details can be found at: www.cs.queensu.ca/wln12 > > > > > > Most sincerely, > > Fadi Al-Turjman, PhD. > > Queen's University, Canada > > http://research.cs.queensu.ca/~fadi > > > > > > ------------------------------ > > Message: 2 > Date: Tue, 1 May 2012 07:01:28 -0700 > From: "The International Conference on Digital Enterprise and > Information Systems" <[email protected]> > Subject: [Tccc] Extended CFP::DEIS2012- Czech Republic > To: [email protected] > Message-ID: > > <3c19d8e062bcd22878693a794783ba55.squir...@secure82.inmotionhosting.com> > > Content-Type: text/plain;charset=iso-8859-1 > > Apologies in advance for multiple received copies of the CFP. > > > The Second International Conference on Digital Enterprise and Information > Systems (DEIS2012) > VSB-Technical University of Ostrava, Ostrava, Czech > Republic > July 16-18, 2012 > http://www.sdiwc.net/deis2012/ > > ======================================================================== > > The proposed conference on the above theme will be held at VSB-Technical > University of Ostrava, Ostrava, Czech Republic, From July 16-18, 2012 > which aims to enable > > researchers build connections between different digital applications. > > The conference welcomes papers on the following (but not limited to) > research topics: > > - Digital Management products > - Digital Economy > - Digital Innovation Management > - IT Management > - Business Technology Intelligence > - E-Business > - Consumer Electronics > - Digital Libraries > - Digital Data Mining > - Digital Enterprises > - E-Commerce Technology > - E-Commerce in developing countries > - Global E-Commerce > - Infrastructure for E-Commerce > - E-Logistics > - E-Government > - E-Procurement > - E-Services > - Marketing on the Web > - Barriers to E-Business Adoption > - Cryptography for enabling E-Commerce > - E-Commerce Strategy & Implementation > - Internet payment systems > - Business-oriented E-Commerce > - Consumer-oriented E-Commerce > - Web advertising and Web Publishing > - Mobile Commerce > - E-Communities > - E-Business Applications and Software > - Supply Chain Management & E-Fulfilment > - Anti-cyberterrorism > - XML-Based Languages > - Soft Computing Techniques > - Computational Intelligence > - Mobile Networking, Mobility and Nomadicity > - Ubiquitous Computing, Services and Applications > - Forensics, Recognition Technologies and Applications > - Fuzzy and Neural Network Systems > - Signal Processing, Pattern Recognition and Applications > - Distributed and Parallel Applications > - User Interfaces,Visualization and Modeling > - Mobile, Ad Hoc and Sensor Network Management > - Web Services Architecture, Modeling and Design > - Quality of Service, Scalability and Performance > - Self-Organizing Networks and Networked Systems > - Data Management in Mobile Peer-to-Peer Networks > - Data Stream Processing in Mobile/Sensor Networks > - Indexing and Query Processing for Moving Objects > - User Interfaces and Usability Issues form Mobile Applications > - Sensor Networks and Social Sensing > - Embedded Systems and Software > - Information Propagation on Social Networks > - Resource and Knowledge Discovery Using Social Networks > - Computer Crime Prevention and Detection > - Confidentiality Protection > - Critical Infrastructure Management > - Critical Computing and Storage > - Cryptography and Data Protection > > Researchers are encouraged to submit their work electronically. All papers > will be fully refereed by a minimum of two specialized referees. Before > final acceptance, > > all referees comments must be considered. > > Important Dates > ============== > Submission Date : June 10, 2012 > Notification of acceptance: June 22, 2012 > Camera Ready submission : June 30, 2012 > Registration : June 30, 2012 > Conference dates : July 16-18, 2012 > > > > > ------------------------------ > > Message: 3 > Date: Tue, 1 May 2012 22:51:56 +0800 > From: "Ching-Hsien Hsu \(Robert\)" <[email protected]> > Subject: [Tccc] (Deadline extension) IEEE UIC/ATC 2012 > To: <[email protected]> > Message-ID: <BCE95A6B974A47848956537D3C84596D@ASUSsmall> > Content-Type: text/plain; charset="big5" > > -------------------------------------------------------------------------------------------------- > Apologies if you received multiple copies from other sources. > > Due to receiving several requests for deadline extension, we have decided to > extend the paper submission deadline to May 15, 2012 (Firm). > ============================================================= > > IEEE UIC/ATC 2012 > > The 9th IEEE International Conference on > Ubiquitous Intelligence and Computing (UIC 2012) > > The 9th IEEE International Conference on > Autonomic and Trusted Computing (ATC 2012) > > http://conf.kyusan-u.ac.jp/uic2012/ > http://conf.kyusan-u.ac.jp/atc2012/ > > Fukuoka, Japan, September 04-07, 2012 > ------------------------------------------------------------------------ > > 1. Submission deadline > 2. Topics > 3. Special Issues > 4. Workshops > 5. Submission & Publication > 6. Sponsors > > ================= > Submission deadline > ================= > > Submission Deadline: May 15, 2012 (Firm) > > ======= > Topics: > ======= > > 1. Ubiquitous Intelligent/Smart Systems > * Sensor, Ad Hoc, Mesh & P2P Networks > * Social Networking and Computing > * Knowledge Representation and Ontology > * Wearable, Personal and Body Area Systems > * Middleware and Intelligent Platforms > * Intelligent Services and Architectures > * Agents, Swarm and Context-aware Systems > * Nature-inspired Intelligent Systems > > 2. Ubiquitous Intelligent/Smart Environments > * Smart Room, Home, Office, Laboratory > * Smart Shop, Hospital, Campus, City, etc. > * Smart Vehicle, Road, Traffic & Transportation > * Healthcare and Elder/Child Care Services > * Pervasive/Ubiquitous Media and Services > * Pervasive Learning, Games, Entertainment > * Other Intelligent/Smart Applications > > 3. Ubiquitous Intelligent/Smart Objects > * Electronic Labels, Cards, E-Tags and RFID > * Embedded Chips, Sensors & Actuators > * MEMS, NEMS, Micro & Biometric Devices > * Smart Appliances and Wearable Devices > * Material, Textile, Cloth, Furniture, etc. > * Embedded Software and Agents > * Interaction to Smart Objects/Devices > * Smart Object OS and Programming > > 4. Personal/Social/Physical Aspects > * Real/Cyber World Modeling and Semantics > * User/Object Identity and Activity Recognition > * Adaptive User Interfaces and Tools > * Security, Privacy, Safety and Legal Issues > * Emotional, Ethical and Psychological Factors > > ================== > Journal Special Issues > ================== > > High rank papers, after extensions, will be published in special issues of > the following prestigious journals > > International Journal of Communication Systems (Wiley) (SCI, EI) > Future Generation Computer Systems (Elsevier) (SCI, EI) > Journal of Systems Architecture (Elsevier) (SCI, EI) > Automated Software Engineering (Springer) (SCI, EI) > Journal of Internet Technology (SCI, EI) > Information System Frontiers (Springer) (SCI, EI) > > Best Paper Awards will be presented to high quality papers. > > ============ > Workshops > ============ > > Some workshops are organized in conjunction with UIC-2012 International > Conference. > Proceedings of UIC-2012 Workshops will be also published by IEEE CS Press > (IEEE-DL & EI indexed) > > USMAP 2012: http://iseco.idv.tw/yphuang/~USMAP2012.html > The 2012 International Workshop on Ubiquitous Service Models and Applications > > UISTA 2012: http://dns2.asia.edu.tw/~chenyh/UISTA2012.html > The 2012 International Workshop on Ubiquitous Information Security Techniques > and Applications > > WiNA 2012: http://people.chu.edu.tw/~wina/2012/ > The Fourth International Workshop on Wireless Network Algorithm and Theory > > WEISS 2012: http://rtes.ee.ncku.edu.tw/weiss2012/ > The 2012 International Workshop on Embedded Intelligence and Smart Systems > > UIPM 2012: https://sites.google.com/site/uicuipm2012/ > The 2012 International Workshop on Ubiquitous Information Processing and > Management > > GreenPS 2012: > http://otc.iscas.ac.cn/tcse/jinbeihong/Workshop%20on%20GPS/Workshop%20on%20UIC.html > The 2012 International Workshop on Green and Pervasive Software > > DDCP 2012: http://www.lac.inpe.br/DDCPD-2012/ > The 2012 International Workshop on Infrastructure, Technologies and > Applications for Distributed Data Collection, Processing and Dissemination > > ===================== > Submission & Publication > ===================== > > Papers need to be prepared according to the IEEE CS format, and submitted in > PDF format via the UIC 2012 submission site: http://cse.stfx.ca/~uic2012/sub/ > > All accepted papers will be published by IEEE CS Press (IEEE-DL & EI indexed). > > ========= > Sponsors: > ========= > > Sponsored by: > Institute of Electrical and Electronic Engineers (IEEE) > IEEE Computer Society > IEEE Technical Commitee on Scalable Computing > > In-cooperation with: > The Information Processing Society of Japan (IPSJ) > The Institute of Electronics, Information and Communication Engineers (IEICE) > The IPSJ Special Interest Group on Distributed Processing Systems (IPSJ > SIG-DPS) > The IPSJ Special Interest Group on Mobile Computing and Ubiquitous > Communication (IPSJ SIG-MBL) > The IEICE Special Interest Group on Dependable Computing (IEICE SIG-DC) > > > > ------------------------------ > > Message: 4 > Date: Tue, 1 May 2012 16:38:59 +0000 > From: Wanqing Tu <[email protected]> > Subject: [Tccc] Postdoctoral Opportunity. > To: "[email protected]" <[email protected]> > Message-ID: > <[email protected]> > Content-Type: text/plain; charset="utf-8" > > > The Department of Computer Science at Glynd?r University (UK) invites > applications for a full-time one-year postdoctoral researcher in the field of > wireless communications. > The candidate must have a Ph.D degree before starting the position, and > should have an excellent track record especially in the following areas: > wireless multihop networks (e.g., > mesh networks), wireless multimedia networking, scalable wireless > communications, multirate and multichannel wireless networks. The candidate > should have good > communication skills in English (both oral and written). The post ideally > starts from August 1, 2012. Interested candidates please send your enquires > and CVs, etc. to Dr. Wanqing Tu, > at [email protected]<mailto:[email protected]> > > Glynd?r University is an equal opportunity employer. > > Best Regards, > > Dr. Wanqing Tu > Senior Lecturer in Computing > Glyndwr University > > ------------------------------ > > Message: 5 > Date: Wed, 2 May 2012 12:55:16 +0900 > From: kimri1011 Lee <[email protected]> > Subject: [Tccc] cfp:4th Intl Workshop on Wireless & Mobile Networks > (WiMo-2012), India-ACM -ICPS > To: [email protected] > Message-ID: > <cafgzgdamv39jgzz4jhbqwitn79sehqupi_0vmhkae_x5pvl...@mail.gmail.com> > Content-Type: text/plain; charset=ISO-8859-1 > > *The Fourth International Workshop on Wireless & Mobile Networks (WiMo-2012) > * > > *In conjunction with CCSEIT-2012* > > *October 26~28, 2012* > > *Venue : Avinashilingam University Coimbatore, India.* > > http://airccse.org/wimo2012/index.html > > * * > > *Call for Paper* > > * * > > * * The Fourth International workshop on Wireless & Mobile > Network (WiMo 2012) is dedicated to address the challenges in the areas of > wireless & mobile networks. The workshop looks for significant > contributions to the Wireless and Mobile computing in theoretical and > practical aspects. The Wireless and Mobile computing domain emerges from > the integration among personal computing, networks, communication > technologies, cellular technology and the Internet Technology. The modern > applications are emerging in the area of mobile ad hoc networks and sensor > networks. This workshop is intended to cover contributions in both the > design and analysis in the context of mobile, wireless, ad-hoc, and sensor > networks. The goal of this workshop is to bring together researchers and > practitioners from academia and industry to focus on advanced wireless and > Mobile computing concepts and establishing new collaborations in these > areas. > > Authors are solicited to contribute to the workshop by submitting articles > that illustrate research results, projects, surveying works and industrial > experiences that describe significant advances in the following areas, but > are not limited to > > *Topics of Interest:* > > * * > > ? Architectures, protocols, and algorithms to cope with mobile & > wireless Networks > > ? Distributed algorithms of mobile computing > > ? OS and middleware support for mobile computing and networking > > ? Routing, and communication primitives in ad hoc and sensor > networks > > ? Synchronization and scheduling issues in mobile and ad hoc > networks > > ? Resource management in mobile, wireless and ad-hoc networks > > ? Data management on mobile and wireless computing > > ? Integration of wired and wireless networks > > ? Broadband access networks > > ? Energy saving protocols for ad hoc and sensor networks > > ? Complexity analysis of algorithms for mobile environments > > ? Information access in wireless networks > > ? Algorithms and modeling for tracking and locating mobile users > > ? Satellite communications > > ? Cryptography, security and privacy of mobile & wireless networks > > ? Performance of mobile and wireless networks and systems > > ? Mobile ad hoc and sensor networks > > ? Wireless multimedia systems > > ? Service creation and management environments for mobile/wireless > systems > > ? Recent trends in mobile and wireless applications > > > > *Paper Submission* > > Authors are invited to submit papers through the conference Submission > system ( Track:WiMo 2012 > )<https://www.easychair.org/account/signin.cgi?conf=coneco2012>by May > 13, 2012. Submissions must be original and should not have been > published previously or be under consideration for publication while being > evaluated for this workshop. The proceedings of the workshop will be > published by ACM - ACM International Conference Proceeding Series (ICPS) > (Confirmed) along with main conference Proceedings. ACM International > Conference Proceeding Series (ICPS) will be available in ACM Digital > Library<http://dl.acm.org/> > > Selected papers from wimo-2012, after further revisions, will be published > in an International Journal (Approval Pending) > > International Journal of Wireless & Mobile Networks > (IJWMN)<http://airccse.org/journal/ijwmn.html> > > International journal of Computer Networks & Communications > (IJCNC)<http://airccse.org/journal/ijcnc.html> > > International journal of Network Security & Its > Applications(IJNSA)<http://airccse.org/journal/ijnsa.html> > > International journal of computer science & information Technology > (IJCSIT)<http://airccse.org/journal/ijcsit.html> > > International Journal of Database Management Systems ( IJDMS > )<http://airccse.org/journal/ijdms/ijdms.html> > > Computer Science & Engineering: An International Journal > (CSEIJ)<http://airccse.org/journal/cseij/index.html> > > > > *Important Dates:* > > > > *Paper Submission Deadline: May 13, 2012 * > > *Paper Status Notification : July 20, 2012* > > *Camera-ready Due : July 31, 2012 * > > > ------------------------------ > > Message: 6 > Date: Wed, 02 May 2012 00:29:29 -0400 > From: Charles Clancy <[email protected]> > Subject: [Tccc] CFP for IEEE LCN Workshop on Security in > Communications Networks > To: [email protected] > Message-ID: <[email protected]> > Content-Type: text/plain; charset=ISO-8859-1; format=flowed > > Workshop on Security in Communications Networks > > Held in Conjunction with IEEE LCN 2012 > > Secure Group Communications > > Recent years have seen growth in the number of services and > applications that enable groups of people and/or devices to > communicate and collaborate in real-time. Oftentimes, these > groups are spontaneously formed based on a common interest > or objective, have a limited life span and use one or more > network technologies to connect group members with available > resources and each other. Examples range from multi-player > online games and video conferencing to the coordination of > first responders at a crime scene or troops in a battlefield. > Secure group communication is a difficult problem that needs > to be addressed to guarantee the confidentiality, integrity, > and availability of these applications. Challenges include > user mobility, device heterogeneity, lack of infrastructure, > cross domain interactions, as well as dynamic memberships > without pre-configuration. > > The main purpose of this workshop is to promote further > research interests and activities on Secure Group > Communication. This workshop aims to increase the synergy > between academic and industrial researchers working in this > area. We are interested in experimental, systems-related, > and work-in-progress papers in all aspects of Secure Group > Communications. > > The topics of interest include (but are not limited to): > > * Novel and emerging secure architectures > * Study of attack strategies, attack modeling > * Case studies and analysis of actual attacks > * Group key management (incl. dynamic key generation, > distribution, update and revocation) > * Context/capability/situational-aware group memberships > * Identity management > * Protection of video and multimedia content > * Secure multicast > * Secure collaborative services > * Secure data accumulation, storage and access control > * Tradeoffs between security vs. performance vs. usability > * Secure group communications in mobile ad hoc, mesh, > vehicular and incident area networks, etc. > > Dates: > > Submission: May 12, 2012 > Notification: June 30, 2012 > Camera Ready: July 28, 2012 > Workshop: October 22-25, 2012 > > http://www.sick-workshop.org/ > > -- > *T. Charles Clancy*, PhD > Director, Hume Center for National Security and Technology > Associate Professor, Electrical and Computer Engineering > Virginia Tech Research Center @ Arlington > 900 N. Glebe Rd, Arlington, VA 22203 > http://www.hume.ictas.vt.edu > http://www.cyber.vt.edu > > > ------------------------------ > > _______________________________________________ > Tccc mailing list > [email protected] > https://lists.cs.columbia.edu/cucslists/listinfo/tccc > > End of Tccc Digest, Vol 110, Issue 1 > ************************************
_______________________________________________ IEEE Communications Society Tech. Committee on Computer Communications (TCCC) - for discussions on computer networking and communication. [email protected] https://lists.cs.columbia.edu/cucslists/listinfo/tccc
