ICCCN 2011

20th IEEE Int’l Conf. on Computer Communications and Networks

(ICCCN 2011)

http://www.icccn.org/icccn11/

Sheraton Hotel and Resort, Maui, Hawaii, August 1-4, 2011

Proposal submission: the sooner the better, no later than Nov. 15, 2010

IEEE International Conference on Computer Communications and Networks (ICCCN) will celebrate its 20th anniversary at Maui, Hawaii, August 1-4, 2011. Quality workshops are to be held in conjunction with ICCCN.

The workshops aim to explore special topics and provide international forums for scientists, engineers, and computer users to exchange and share their experiences, new ideas, and research results on hot and broad topics on computer communications and networks. Workshops for presenting papers from industrial companies and papers on design and implementations of systems and services are welcome. ICCCN is a premier international conference in the field and running a workshop in association with it is of high visibility.

The proceedings of the workshops program will be published, as the ICCCN 2011 main conference, by IEEE Communications Society and IEEE Digital Library.

The topics we are soliciting include, but are NOT limited to:

· Mobile Cloud Computing and Services

· Green communications and Networking

· Embedded and Real-time Networking Systems

· Cognitive Networking and Communications

· Next Generation Broadband Wireless Access Networks

· Virtualized Infrastructure Systems and Architectures

· Networking of Mobile Handheld Devices, Social Networking

· RFID and Internet of Things

· Smart Grids

· Security and Privacy in communications and networks

Submission Guidelines and Publication:

One workshop may take one day with 12 or more accepted and registered papers. Please send a workshop proposal by Nov 15, 2010, to

Prof. Liqiang Zhang and cc to: Prof. Waltenegus Dargie

Workshop General Chair Workshop General Co-Chair

E-mail: liqzhang Email: waltenegus.dargie

Please note that the proposals will be reviewed once received and we will try to make the decision and send the notification back as soon as possible. So submitting a proposal early has the advantage.

Particularly, early-bird proposals (by Oct. 15th) are encouraged and will be given higher priority.

For each approved workshop, at least one organizer must commit to attending and running the workshop on site. Please do not hesitate to send emails to the chairs if you have any questions.

The workshop proposal should include following information:

1. Title of the workshop

2. Workshop organizer(s): name, affiliation, address, phone and fax numbers, e-mail,

with the indication of the main contact person (no more than three chairs in one workshop)

3. A brief description of the content and technical issues

4. Planned format of the workshop, e.g. number of papers, sessions, keynotes, panels etc.

5. A description of the publicity and promotion plan

6. Tentative list of program committee members

7. Short bio of the main workshop organizers (up to 200 words)

Each workshop will start to advertise and distribute its CFP after receiving the approval notification.

Papers submitted to each workshop should be original, and, be peer reviewed by the program committee or external reviewers. An accepted paper must be registered and presented at the conference venue and must be limited to 6 pages in standard IEEE camera-ready format (double-column, 10-pt font). More updates will be posted on the ICCCN-2011 Web site.

Important Dates:

Proposal submission due: Nov 15, 2010

Proposal notification due: Dec 1, 2010

Advertisements

New paper accepted for publication

The manuscript entitled as QoE-driven dynamic management proposals for 3G VoIP services authored by Jose-Oscar Fajardoa, Fidel Liberal, Is-Haka Mkwawa, Lingfen Sun and Harilaos Koumaras has been accepted for publication by the Journal of Computer Communications, Elsevier.

In this paper the authors propose a combined approach where service level adaptation is considered first and, provided that no suitable parameter combination is capable of providing enough QoE, a change of network state will be suggested. In order to do so we analyse the performance of the end-to-end (e2e) performance metrics in this  convergent scenario, the root causes of possible degradations and, finally, the combined effects of the different network segments and their impact on the user perceived QoE. We show the the map of best performing VoIP configurations for every state of the network segments. Furthermore, considering each of these configurations, we analyse the acceptability of the service or the convenience of trying to modify the network state. Finally, a lightweight implementation based on simple network state estimation and decision heurisitics is proposed and validated in terms of accuracy and responsiveness.

CALL for WORKSHOP PROPOSALS – ACM CCS 2010

Proposals are solicited for workshops to be held in conjunction with ACM CCS 2010. Each workshop provides a forum to address a specific topic at the forefront of security research. A workshop must be full day in length.Proceedings of all workshops will be available (on a CD) to the workshop attendees. Each workshop will also offer on-line proceedings through ACM Digital Library, with a separate ISBN.

Workshop Proposal Submission

For new workshops, proposals should include:

* Workshop title
* A draft “Call for Papers” articulating the scope and topics covered by the workshop
* A brief summary and justification for the workshop, including anticipated benefits to the ACM CCS community.
* Planned activities
* Expected number of submissions and acceptance rate
* Expected number of attendees
* Program chair(s), and, if available, tentative program committee * A one-paragraph biographical sketch for each organizer, describing relevant qualifications, including research and conference/workshop organizing experience

For previously-held workshops, in addition to the above, proposals must provide the following information, for the most recent incarnation of the workshop:

* Number of submissions
* Number of accepted papers
* Number of registered attendees

Please submit workshop proposals by email to the ACM CCS Workshop Chairs, Ting Yu (yu@csc.ncsu.edu) and Ninghui Li (ninghui@cs.purdue.edu). All workshop proposals will be reviewed by the CCS Steering Committee.

Proposal Evaluation Criteria

* The workshop is within scope of computer and communications security and concerns a coherent and worthwhile technical topic.
* Its novelty with respect to other forums, especially with respect to other CCS workshops.
* Its likely impact on the target community, including likely high participation.
* One of the best ways to show likely interest is to have a strong set of researchers who have agreed to serve on the PC.

Important Dates

* Submissions deadline: February 15, 2010 (Deadline Extended, early submissions are welcome)
* Decisions communicated: February 28, 2010

CCS Support for Workshops

If a workshop proposal is accepted, the ACM CCS workshop chair will work closely with workshop organizers. The ACM CCS workshop chair will help create/maintain the submission and reviewing websites for workshops, and is responsible for monitoring and coordinating organizational aspects of all workshops.

ACM CCS 2010 – ACM Computer and Communications Security

ACM CCS 2010 OCT 4-8, 2010

HYATT REGENCY CHICAGO, IL, USA
http://sigsac.org/ccs/CCS2010

The annual ACM Computer and Communications Security Conference is a leading international forum for information security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of computer and communications security, as well as case studies and implementation experiences. Papers should have relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers must make a convincing argument for the practical significance of the results. All topic areas related to computer and communications security are of interest and in scope. Accepted paper will be published by ACM Press in the conference proceedings. Outstanding papers will be invited for possible publication in a special issue of the ACM Transactions on Information and System Security.

Paper Submission Process

Submissions must be made by the deadline of April 17, 2010, through the website: http://www.easychair.org/conferences/?conf=ccs2010 Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.

Paper Format

Submissions must be at most ten pages in double-column ACM format (note: pages must be numbered) excluding the bibliography and well-marked appendices, and at most 12 pages overall. Submissions must NOT be anonymized. Only PDF or Postscript files will be accepted. Submissions may also be accompanied by a link to a short (at most 3 minutes) video or slide presentation. For more details on the supplemental material, see the CCS 2010 website. Submissions not meeting these guidelines risk rejection without consideration of their merits.

Tutorial Submissions

Proposals for long (3-hour) and short (1.5-hour) tutorials on research topics of current and emerging interest should be submitted electronically to the tutorials chair by May 24, 2010. The guidelines for tutorial proposals can be found on the website.

Important Dates

– Paper submission due: Saturday, April 17, 2010
– Acceptance notification: Monday, June 21, 2010
– Final papers due: Friday, July 16, 2010

GENERAL CHAIR:
Ehab Al-Shaer (University of North Carolina Charlotte, USA)

PROGRAM CHAIRS:
Angelos D. Keromytis (Columbia University, USA)
Vitaly Shmatikov (University of Texas at Austin, USA)

Tutorial Chair
Gail-Joon Ahn Arizona State University

Workshop Co-Chairs
Ting Yu North Carolina State University, USA
Ninghui Li Purdue University

Treasurer
Sencun Zhu Pennsylvania Sate University, USA

Publication Chair
Hao Chen, UC Davis

Web Chair
Kun Bai IBM T.J. Watson Research, USA

Student Travel Grant Chairs
Angelos Stavrou George Mason University, USA

Poster& Demo Chairs
Adam Lee, University of Pittsburgh, USA
Xinming Ou Kansas State University, USA

Publicity Chairs
Chris Kruegel University of California, Santa Barbara, USA Carlos Becker Westphall, Federal University of Santa Catarina, Brazil

Patrons& Industry Outreach
Bill Chu University of North Carolina Charlotte, USA
XiaoFeng Wang Indiana University, USA
Jorge Lobo IBM T.J. Watson Research, USA

Local Arrangements Committee
Yan Chen (Chair) Northwestern University, USA
V.N. Venkatakrishnan University of Illinois Chicago, USA
Tricha Anjali Illinois Institute of Technology, USA

Regional Arrangements Committee
Alex Liu (Chair) Michigan State University, USA
EJ Jung University of Iowa, USA
Yong Guan Iowa State University, USA
Kui (Quinn) Ren, Illinois Institute of Technology, USA

TECHNICAL PROGRAM COMMITEE:

Ben Adida (Harvard, USA)
Adam Barth (UC Berkeley, USA)
Emery Berger (U of Massachusetts, USA)
Bruno Blanchet (CNRS, ENS, INRIA, France)
Steve Borbash (Dept of Defense, USA)
Nikita Borisov (UIUC, USA)
Stephen Chong (Harvard, USA)
Mihai Christodorescu (IBM Research, USA)
Veronique Cortier (LORIA-CNRS, France)
Jed Crandall (U of New Mexico, USA)
Weidong Cui (Microsoft Research, USA)
Marc Dacier (Eurecom, France)
George Danezis (Microsoft Research, UK)
Roger Dingledine (Tor Project, USA)
Ulfar Erlingsson (Microsoft Research, USA)
Cedric Fournet (MSR-INRIA, France)
Vanessa Friaz-Martinez (Telefonica Research, Spain)
Vinod Ganapathy (Rutgers, USA)
Philippe Golle (PARC, USA)
Virgil Gligor (CMU, USA)
Steven Gribble (U of Washington, USA)
Alex Halderman (U of Michigan, USA)
Susan Hohenberger (Johns Hopkins, USA)
Trent Jaeger (Penn State, USA)
Stas Jarecki (UC Irvine, USA)
Ari Juels (RSA Laboratories, USA)
Apu Kapadia (Indiana U, USA)
Engin Kirda (Eurecom, France)
Yoshi Kohno (U of Washington, USA)
Ralf Kuesters (U of Trier, Germany)
Michael Locasto (George Mason, USA)
Tal Malkin (Columbia, USA)
Patrick McDaniel (Penn State, USA)
Dave Molnar (Microsoft Research, USA)
Fabian Monrose (U of North Carolina, USA)
Steven Murdoch (U of Cambridge, UK)
Steven Myers (Indiana U, USA)
David Naumann (Stevens Tech, USA)
Lasse Overlier (FFI, Norway)
Benny Pinkas (U of Haifa, Israel)
Bart Preneel (KU Leuven, Belgium)
Tom Reps (U of Wisconsin, USA)
Reiner Sailer (IBM Research, USA)
Steve Schneider (U of Surrey, UK)
R. Sekar (SUNY Stony Brook, USA)
Anil Somayaji (Carleton U, Canada)
Angelos Stavrou (George Mason, USA)
Jonathan Trostle (JHU APL, USA)
Helen Wang (Microsoft Research, USA)
XiaoFeng Wang (Indiana U, USA)
Brent Waters (U of Texas at Austin, USA)
Haifeng Yu (NUS, Singapore)
Yuanyuan Zhou (UCSD, USA)
Mary Ellen Zurko (IBM, USA)