| |||||||||||||||
NSysS 2015 : International Conference on Networking Systems and Security | |||||||||||||||
Link: http://www.buet.ac.bd/cse/nsyss/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
NSysS 2015
http://cse.buet.ac.bd/nsyss/ First Call for Papers The 1st International Conference on Networking Systems and Security 2015 (NSysS 2015) aims at providing a forum of researchers, practitioners, developers, and users to exchange new ideas and results related to computer networks, networking systems, and security across academia and industry. NSysS 2015 will be held during January 5-7, 2015 in Dhaka, the capital of Bangladesh. We solicit original technical papers articulating novel ideas, protocols, and algorithms with ground-breaking results and/or quantified experiences involving networking systems and security. The conference values papers, which will take a broad networking and/or security perspective(s) covering contemporary and future applications. Of particular interest are technical contributions that enable new and compelling networking and security paradigms. Important dates: Paper submission deadline: August 17, 2014 (Extended) Notification of paper acceptance: September 30, 2014 Poster and demo submission deadline: October 7, 2014 Notification of poster and demo acceptance: October 14, 2014 Program: January 5-7, 2015 TPC Co-Chairs Md. Mostofa Akbar, BUET, Bangladesh Suman Kumar Nath, Microsoft Research, USA Invited Speakers Raouf Boutaba, University of Waterloo, Canada Mohammed Atiquzzaman, University of Oklahoma, USA Manzur Murshed, Federation University, Australia Scope: Scope of the workshop covers, but is not limited to, the following: Addressing and location management Broadband access technologies Capacity planning Cellular and broadband wireless nets Challenges for 'Big Sensor Data' Cognitive radio networking Congestion control Content-based network service Cross layer design and optimization Cyber‐physical systems and networking Data centers Data reduction, inference, and signal processing Delay/disruption tolerant networks Denial of service Detection, classification, tracking, reasoning, and decision making Dynamic spectrum management Economic aspects of the Internet Embedded software for sensor networks Energy harvesting Experience with real-world applications Experimental results from operational networks or network applications Fault-tolerance, reliability, and troubleshooting Future Internet design Innovative applications and deployment experiences Innovative sensing and processing platforms including cloud, crowd, and consumer devices Insights into network and traffic characteristics Middleware support for networking Mobile, participatory, and social sensing Multicast, broadcast and anycast Multimedia protocols Near field communication Network applications and services Network architectures Network coding Network control Network health monitoring and management Network management and traffic engineering Network security and privacy Network simulation and emulation Network, transport, and application-layer protocols Networking issues for emerging applications New models of sensor usage (e.g. mobile sensing, body sensing, RFIDs, robots) Novel components, devices and architectures for networked sensing Operating system and host support for networking Operating systems and runtime environments Optical networks P2P, overlay, and content distribution networks Peer‐to‐peer networks Performance evaluation Power control and management Pricing and billing Programming paradigms for sensing systems Provable correctness and performance guarantees Quality of service Resource allocation and management Resource management Resource management, QoS, and signaling RFID networks and protocols Routing protocols Satellite networks Scheduling and buffer management SDNs and network programming Security, trust and privacy Self-organizing networks Sensor data processing, mining, and machine learning Sensor data quality, integrity, and trustworthiness Sensor data storage, retrieval, processing and management Sensor tasking, control, and actuation Social computing and networks Support for integrated sensing, actuation and control Switches and switching Techniques for network measurement and simulation Testing, Verification and Validation Theoretical foundation and fundamental bounds Topology characterization and inference Underground and underwater networks User interfaces for sensing applications and systems Vehicular networks Web services and performance Wireless, mobile, ad-hoc, and sensor networks Author Instructions Authors are invited to submit papers describing original research of theoretical or practical significance to Network Systems and Security. Submitted papers must describe work not previously published. They must not be submitted simultaneously to another conference with refereed proceedings or to a journal. Papers should not exceed 10 pages in IEEE style. Please find the template of IEEE style here. Papers significantly shorter than 10 pages, however, having sufficient novelty and depth are also welcome. Only electronic submissions will be allowed. The submission system will be open soon. Proceedings Accepted papers will be published in the conference proceedings, which will be indexed in various reputed computer science index databases. Journal Special Issue A special issue in a reputed journal is planned for selected papers appeared in the conference. |
|