| |||||||||||||||
MILCOM 2015 : Military Communications Conference | |||||||||||||||
Link: http://www.milcom.org/docs/milcom2015_call_for_papers.pdf | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
MILCOM 2015 solicits unclassified technical papers and proposals for tutorials and panels on current and emerging topics
applicable to all facets of military communications. We encourage professionals in industry, academia and government worldwide to contribute and participate. The general forum will be open to all and there will be a restricted access portion of the program to support ITAR-controlled or FOUO material. TECHNICAL TRACKS - Topics include but are not limited to the following: • Advanced Antenna and RF Technology • Anti-jamming Techniques • Cognitive Radios • Compressive Sensing • Cooperative Communication • Ad Hoc, Mesh, Sensor Networks • Capacity Analysis and Optimization • Cognitive Networks • Content-Based Networking • Cross-Layer Design • Disruption-Tolerant Networks • Heterogeneous Networks • Dynamic Spectrum Management • Free-space Optical and Laser-based Communications • Modified Commercial Wireless Communication • Modulation and Coding • Physical-layer Security • Propagation and Channel Modeling • Radar System, Detection and Localization • Satellite Signals • Signal Processing Algorithms • Underwater Communications • Hybrid Optical/RF Networks • Multicasting • Network and Information Sciences • Network Coding • Network Discovery • Networked Control System • Optical Networks TRACK 1 – WAVEFORMS AND SIGNAL PROCESSING TRACK 2 – NETWORKING PROTOCOLS AND PERFORMANCE • Overlay Networks • Protocols: MAC, Link-Layer, Network, Transport • Quality of Service • Routing • Software Defined Networking • Topology and Network Control • Authentication, Authorization and Accounting • Access Control • Cloud Security • Critical Infrastructure Security • Cyber Operations • Cyber Defense • Distributed Systems Security • Identity Management • Intrusion Detection • Joint Tactical Network Security TRACK 3 – CYBER SECURITY AND TRUSTED COMPUTING • Malware Analysis • Mobile Network Security • Risk Management • Threat Monitoring and Analysis • Trust and Privacy • A2/AD Systems and Operations • Airborne Networks • Autonomous Systems • Communications-on-the-Move • Disadvantaged Networks • IED Detection/Geolocation • Integrated EW and Communications • Satellite Communications and Networks • Small Satellite Communications Networks TRACK 4 – SYSTEM PERSPECTIVES • System Modeling and Simulations • Space Networks • System Architecture • Test Beds, Experiments, Exercises and Demonstrations • Cognitive Analysis • Communication SW, Services, and Multimedia Applications • E-skin Communications • Homeland Security • Human Behavior in Cyber World • Human Factors in Communication System Design • Internet of Things • Low-Power Devices • LPI/LPD/LPE Communications • Machine-to-Machine Communications TRACK 5 – SELECTED TOPICS IN COMMUNICATIONS • Nano Communication Networks • Network Science • Sensor Communications • Social Networks • Survivable Communications and Networks |
|