--------------------------------------------------------------------------------------------------- CALL FOR PAPERS - CITS 2013 Work-In-Progress (WiP) ---------------------------------------------------------------------------------------------------
The IEEE 2013 International Conference on Computer, Information and Telecommunication Systems (CITS 2013) May 7-9, 2013, Piraeus-Athens, Greece Work-In-Progress (WiP) Session --------------------------------------------------------------------------------------------------- The IEEE 2013 International Conference on Computer, Information and Telecommunication Systems (CITS 2013) welcomes Work In Progress (WiP) papers dedicated to new and on-going research in Computer Systems, Information Technology, Web Technologies, Networking Systems, Telecommunications Systems, Security Systems, and applications, that summarize speculative breakthroughs, industry featured projects, open problems, methodologies, foundations,new application challenges, visionary ideas, and preliminary research studies or recent achievements. Following the scope of the main conference, topics covering the above-mentioned areas will be of interest. The primary purpose of the WiP session is to provide researchers, developers, industrials, with an opportunity to discuss their evolving ideas and gather feedback from the research community at large. Submissions will be peer-reviewed. Accepted papers will be published in the conference proceedings and presented at the conference. --------------------------------------------------------------------------------------------------- TOPICS OF INTEREST include, but are not limited to: == Computer-aided designs and technology Cloud, Green, and Grid computing and architectures Soft and Mobile computing,Social networking and computing Scientific and High-performance computing algorithms Operating system and middleware for mobile computing and networking Pervasive computing and Reconfigurable computing Computer architectures and hardware technology Low-power computer technology and Display technology Modeling, simulation, and Performance evaluation Real-time systems and simulations, System integration,System engineering Object Oriented Language, Software design Software performance and engineering, Verification and validation Evolutionary algorithms and computing, Artificial intelligence Fuzzy systems and fuzzy logic, Neural networks, Expert systems Agents and multi-agents systems, Adaptive learning automata Digital circuits systems and logic design, Systems on chip (SoC) Embedded systems, Hardware and software co-design Input/Output systems, Memory systems, and VLSI design == Bio-inspired and nature-inspired solutions in wireless ad hoc and sensor network Bioinformatics and biological computing and engineering Broadband access technologies, Cognitive radio Cross-layer design for mobile and wireless networks Dynamic spectrum management, Disruption tolerant networks Energy-efficient networks, Future Internet, Hybrid networks Medium access control protocols, Routing protocols Network management, Network services and protocols Optical networks, Opportunistic networks, Personal area networks Performance-oriented design and evaluation of networks & mobile applications Quality of service provisioning, Smart grids Testbed design and implementation, Traffic Eng. & measurements Underwater networks, Sensor networks 60 GHz networking, Wireless networks == Data mining, Database and data warehouses, Future web e-Government, e-Commerce, e-Health, e-Learning, and adaptive learning Geographical information systems (GIS), Global positioning systems (GPS) Network systems, Proxies and servers, Protocols and standards Signal and Image processing,Telematics Web-Based Simulation Applications Human-computer interaction (HCI) == Authentication and access control Network security, Biometrics systems, Keystroke dynamics Computer and communication security Cryptography and cryptanalysis, Quantum cryptography Digital watermarking, fingerprinting, and traitor tracing schemes Detection analysis and prevention of malware Intrusion detection systems, Information systems security Multimedia and Multimedia security Network systems forensics Operating systems security, Program security, Physical security Privacy enhancing technologies Public-key infrastructure systems Security of e-Systems and applications Security modeling, tools & simulation Security of personal area networks Security of WiFi and WiMax systems Security of web systems, PHY and MAC protocols User and location privacy, Virtual Private Network systems Vulnerability, attack modeling, and Virus analysis Web security and privacy, Web-based application security == Accessibility issues and Technology Data Fusion and Digital Libraries Content transformation and adaptation in proxy server Metadata and metamodeling, Ontology and semantic web Personalized web sites/Web site classification and optimization Portal strategies, System integration Quality recommendation for software service provisioning Service oriented architecture User modeling, Usability and ergonomics Web analytics, Web services and engineering Web interfaces and applications Web searching, browsing and ranking Web information retrieval, Web intelligence Web performance measurement, modeling and caching XML and Data management == Adaptive communications, Channel estimation Cooperative communications, Channel coding Interference management, OFDM communications Modulation techniques and MIMO systems Novel applications enabled by telecommunication networking systems Power line, Spread-spectrum, UWB, and Satellite communications Wireless broadcasting and communication ---------------------------------------------------------------------------------------------- PAPER SUBMISSIONS Your paper must be original material that has neither been previously published nor is currently under review by another conference or journal. The paper must be no longer than 4 (FOUR) PAGES in the IEEE 10-point, two-column conference format including authors’ names and affiliations. To write your paper, you can use the standard IEEE Transactions templates for Microsoft Word or LaTeX formats found at: http://www.ieee.org/go/conferencepublishing/templates Papers must be submitted in Portable Document Format (PDF) format, using the following EDAS link: http://edas.info/N14137 ---------------------------------------------------------------------------------------------- IMPORTANT DATES: WiP Paper Submission due: March 18, 2013 WiP Author notification due: March 31, 2013 WiP Camera-ready paper submission due: April 8, 2013 WiP session: May 7-9, 2013 ---------------------------------------------------------------------------------------------- Authors of all accepted papers will be required to oral presentation at the conference. --------------------------------------------------------------------------------------------- _______________________________________________ IEEE Communications Society Tech. Committee on Computer Communications (TCCC) - for discussions on computer networking and communication. [email protected] https://lists.cs.columbia.edu/cucslists/listinfo/tccc
