GenCWiNets'08
The 1st IEEE International Workshop on Generation C Wireless Networks
In conjunction with IEEE IPCCC 2008
As we progress from Generation X to Generation Z, we are also advancing towards
Generation C where "the community is connected through context-aware content". Wired
networks and applications have already responded well to the needs of Generation C.
Though wireless is already prevalent in the forms of WLAN, WPAN cellular etc, they are
still seen as the last mile enabler for these wired applications. As advances in
pervasive computing, wireless communication and sensor networks continue, real time
information availability, ubiquitous connectivity and convergence can enable new
applications that are context aware and provide valuable services to the community.
This workshop provides a forum for academia, industry, and government agencies to discuss
the challenges involved in the design, deployment and operational issues of Generation C
wireless networks. The workshop will identify and define new applications, fundamental
issues and potential solutions. Contributions of all types including case studies and
research, addressing the main focus or one of following non-exclusive list of topics
are equally welcome:
- Connectivity and convergence of heterogonous networks (interoperability, handoff, QoS, policies, resource management, roaming, etc)
- Smart environments (buildings, roads, vehicles, etc)
- Location based services
- Security, privacy, and performance trade-offs
- Community based networks
- Next generation networking applications including social, vehicular, healthcare, etc
- Context-aware networks, service management and adaptive protocols
- Cognitive networks, protocols, and services
- Mobility models and traffic patterns
- Cross-layer designs and optimizations
- Testbeds, benchmarks, prototypes and experimental studies
Paper Submission
All submissions will be handled electronically through EDAS
system. Papers should describe
original, previously unpublished work, not currently under review by another conference,
workshop, or journal. Authors are invited to submit a maximum of 8 page regular papers and
4 page short papers including the abstract, figures and references. Papers should include
the title, author(s), authors' affiliation and an abstract. Papers must not exceed 10
single-spaced and two-column pages using at least 10 point size type on 8.5 * 11 inches
pages. For further formatting guidelines please follow IEEE conference style available at
www.computer.org/portal/site/cscps.
Selected papers will be further considered for possible publication in International Journal of Autonomous and Adaptive Communications Systems (IJAACS).
Paper registration deadline extended to: Oct. 21, 2008, 23:59 EDT
Paper submission deadline extended to: Oct. 25, 2008, 23:59 EDT
General Chair:
Lakshmi Venkatraman, Robert Bosch LLC, USA
Program Chairs:
Vivek Jain, Robert Bosch LLC, USA
Wenyuan Xu, University of South Carolina, USA
Technical Program Committee Members:
Arup Acharya, IBM TJ Watson, USA
Dharam Agrawal, University of Cincinnati, USA
Onur Altintas, Toyota InfoTechnology, Japan
Oliver Amft, ETH Zurich, Switzerland
Nils Aschenbruck, University of Bonn, Germany
Heribert Baldus, Philips Research, The Netherlands
Subir Biswas, Michigan State University, USA
Yingying Chen, Stevens Institute of Technology, USA
Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
Wai Chen, Telcordia Technologies, USA
Krishna Chintalapudi, Robert Bosch LLC, USA
Mustafa Ergen, University of California, Berkeley, USA
Marco Gruteser, Rutgers University, USA
Ashok Jhunjhunwala, Indian Institute of Technology Madras, India
Ramesh Joshi, Indian Institute of Technology Roorkee, India
Abtin Keshavarzian, Robert Bosch LLC, USA
Soraya Kouadri Most¨¦aoui, The Open University, UK
Bhaskar Krishnamachari, University of Southern California, USA
Anup Kumar, University Of Louisville, USA
Loukas Lazos, University of Arizona, USA
Donggang Liu, University of Texas at Arlington, USA
Tamer Nadeem, Siemens Corporate Research, USA
Nagesh Nandiraju, Motorola Inc., USA
Jeffrey Pan, Google Inc., USA
Adrian Perrig, Carnegie Mellon University, USA
Cem Saraydar, General Motors R&D, USA
Ichiro Satoh, National Institute of Informatics, Japan
Rahul Shah, Intel Corporation, USA
Xiaodong Wang, Qualcomm Inc., USA
Hongwei Zhang, Wayne State University, USA
Lin Zhong, Rice University, USA
|
The 1st IEEE International Workshop on Dynamic Spectrum Access and Cognitive Radio Networks
In conjunction with IEEE IPCCC 2008
New policies and regulatory rules for more efficient allocation and utilization of spectrum have been at the center of current discussions involving governments, industry and academia. The radio spectrum has undoubtedly become a key resource for modern society, and several facts have been fuelling the debate on new spectrum usage models. Cognitive Radio Networks (CRNs) are seen as the technology that will enable flexible, efficient and reliable spectrum use by adapting the radio's operating characteristics to the real-time conditions of the environment. CRNs enable new spectrum usage modes, such as Dynamic Spectrum Access, which will allow wireless devices to opportunistically access spectrum in both the licensed and unlicensed bands. This workshop will focus on key research challenges related to the dynamic spectrum access paradigm and cognitive radio networks, and it is intended to be a forum for collaboration across multiple communities, ranging from academic to government to industry. Original papers are invited on protocol/algorithm design, experimental results, analytical modeling in the area of dynamic spectrum access and cognitive radio networks covering but not limited to following topics:
- PHY, MAC, and Network layer protocols and algorithms for Cognitive Radio Networks
- Cross-Layer Protocol Design and QoS support in Cognitive Radio Networks
- Cooperation and Game theory based protocols and algorithms for Cognitive Radios Networks
- Spectrum Sensing Techniques
- Standardization activities in cognitive radio networks, such as IEEE 802.22 and IEEE P1900
- Security in Cognitive Radio Networks
- Spectrum Sensing and Cognitive Radio Test-beds and prototypes
- Practical Experiments on performance evaluation of Cognitive Radio Networks
- Applications of Cognitive Radios
Paper submission
Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published. Paper length should not exceed 6 pages formatted in IEEE conference style, including the abstract, figures and references. Papers should be submitted in pdf format through the EDAS paper submission. All accepted papers will be published in the conference proceedings. At least one author of accepted papers is required to register at the full registration rate.
Workshop Co-Chairs
Dave Cavalcanti (Philips Research North America)
dave.cavalcanti@philips.com
Alireza Seyedi (University of Rochester)
alireza@ece.rochester.edu
Techical Program Committee Members:
Chun-Ting Chou, National Taiwan University, Taiwan
Edward Au, Institute for Infocomm Research, Singapore
Monisha Ghosh, Philips Research North America, USA
Li-Chun Wang, National Chiao Tung University, Taiwan
Carlos Cordeiro, Intel Corporation, USA
Sai Shankar, Broadcom, USA
Kyutae Lim, Georgia Institute of Technology, USA
Stefan Mangold, Swisscom Innovations, Switzerland
R. Chandramouli, Stevens Institute of Technology, USA
Srikathyayani Srikanteswara, Intel Corporation, USA
Jianfeng Wang, Philips Research North America, USA
Honggang Zhang, Zhejiang University, China
Vahid Tarokh, Harvard University, USA
Tommaso Melodia, The State University of New York at Buffalo, USA
|
WIDA'08
The 1st IEEE International Workshop on Information and Data Assurance
In conjunction with IEEE IPCCC 2008
Increasing reliance on the Internet for business and commercial purposes and the global availability of information has resulted in a whole suit of problems that are rooted in information assurance. As more and more complex systems evolve, the need for security and data assurance grows even more. Large corporations and research institutions regularly come up with solutions to counter malicious and non-malicious, external and internal threats. However, the field of information assurance is such that new threats evolve on a regular basis and continuous research and innovation is critical to stem the threats that continually arise. Information Assurance can then be defined as the protection and defense of information systems so as to ensure the authenticity, availability, confidentiality, integrity, and non-repudiation of critical data and user credentials. Authentication is a direct approach to information assurance, where the external party is asked to prove its authenticity. This can be achieved by encryption, certification or some previously agreed upon protocol. Confidentiality and integrity cover the areas of data protection by directly modifying the data using encryption or keeping the data in secured backed-up locations. The goal of non-repudiation states that an entity that has proven its identity should also be held responsible for its actions. We seek papers that address theoretical, empirical, experimental and system-related approaches to information assurance. Papers should describe original and previously unpublished work. Additionally, the papers should not be currently under review at other conference, workshop or journals. Accepted papers will be published in the proceedings of IPCCC. Topics of interest include, but are not limited to:
- Wireless and Ad-hoc Security
- Network and Data Restoration
- Network Reliability/Availability
- Denial of Service Protection
- Security system architecture
- Optical networks security
- Intrusion Detection and Prevention
- Sensor network security
- Trust negotiation/management
- Privacy models and mechanisms
- E-commerce security
- Man-in-the-middle and other attack analysis
- Key management and Cryptography
- Botnets detection and response
- Authorization, account management and access-control
- Web/Internet security
- Theoretical and empirical risk analysis
Final Paper Submission Guidelines
Papers should describe original, previously unpublished work, not currently under review by another conference, workshop, or journal. Authors are invited to submit a maximum of 8 page regular papers and 4 page short papers including the abstract, figures and references. Papers should include the title, author(s), authors' affiliation and an abstract. The formatting should be according to IEEE conference style available at:
www.computer.org/portal/site/cscps.
Please note that the paper will not be included in conference proceedings if its length exceeds 8 pages. Papers should be submitted in a PDF format using the EDAS system at:
http://edas.info/newPaper.php?c=6887&
Program Chairs:
Anurag Gupta (Google Inc) anurag.gupta@ieee.org
Anindo Mukherjee (Google Inc) anindom@gmail.com
Technical Program Commitee Members:
Dave Cavalcanti, Philips Research North America
Yingying Chen, Stevens Institute of Technology
Marco Cremonini, Universita` di Milano
Hongmei Deng, Intelligent Automation Inc.
Christos Douligeris, University of Piraeus
Falko Dressler, University of Erlangen
Stephan Eidenbenz, Los Alamos National Laboratory
Kumkum Garg, Indian Institute of Technology, Roorkee
Yi-an Huang, Georgia Institute of Technology
Zhen Jiang, West Chester University of Pennsylvania
Tarun Joshi, Microsoft Corporation
Tom Karygiannis, NIST
Sokratis Katsikas, University of Piraeus
Jun Li, University of Oregon
Alex Liu, Michigan State University
Madjid Merabti, Liverpool John Moores University
Geyong Min, University of Bradford
Shivakant Mishra, University of Colorado
Mukesh Singhal, University of Kentucky
Avinash Srinivasan, Bloomsburg University
Shambhu Upadhyaya, University at Buffalo
Haitang Wang, Motorola Inc.
Xiaoxin Wu, Intel
Ye Xia, University of Florida
Yang Xiao, The University of Alabama
Rui Xue, IOS,CAS
Meng Yu, Western Illinois University
|
NSP'08
The 1st IEEE International Workshop on Network Security and Privacy
In Conjunction with the IEEE IPCCC 2008
This workshop provides a forum for academia, industry, and government agencies to discuss the challenges involved in network security and privacy. The workshop will identify and define new network security vulnerabilities, fundamental privacy issues and potential solutions. Contributions of all types including case studies and research, addressing the main focus or one of following non-exclusive list of topics are equally welcome:
- Anonymous communications
- BGP security
- Botnets and counter-measures
- Covert Channels
- Denial of service attacks
- DNS security
- Email spam
- Firewall and traffic monitoring
- Honeypot/honeynet
- Internet Worms and Virus
- On-line Frauds
- Malware and Spyware
- Network forensic
- Network intrusion detection and prevention
- Network security policy
- Phishing attacks
- P2P security
- RFID security
- Security Testbeds, benchmarks, prototypes and experimental studies
- Security and privacy in wireless and sensor networks
- Social network privacy and security
- User authentication and authorization
- Web security
Paper Submission
Papers should describe original, previously unpublished work, not currently under review by another conference,
workshop, or journal. Authors are invited to submit a maximum of 6 page papers including the abstract, figures,
and references (The final version of the accepted paper could be up to 8 pages with $100 for each extra page).
Papers should include the title, author(s), authors' affiliation and an abstract. The formatting should be according
to IEEE conference style available at:
www.computer.org/portal/site/cscps
Papers should be submitted in a PDF format using the EDAS system through:
http://edas.info/newPaper.php?c=6864
General Chair:
Bing Wang, University of Connecticut
Program Chairs:
Guofei Gu, Texas A&M Univeristy, USA
Haining Wang, College of William and Mary, USA
Technical Program Committee Members:
Ehab Al-Shaer, DePaul University
Guanling Chen, University of Massachusetts at Lowell
Yan Chen, Northwestern University
Zesheng Chen, Florida International University
Yingfei Dong, University of Hawaii
Xiaojiang Du, North Dakota University
Zhenhai Duan, Florida State University
Yong Guan, Iowa State University
Thorsten Holz, University of Mannheim
Eunjin Jung, University of Iowa
Jaeyeon Jung, Intel Research
Qun Li, College of William and Mary
Zhijie Shi, University of Connecticut
Kyoungwon Suh, Illinois State University
Patrick Traynor, Georgia Institute of Technology
Xinyuan Wang, George Mason University
Michele Weigle, Old Dominion University
Duminda Wijesekera, George Mason University
Matthew Wright, University of Texas at Arlington
Dong Xuan, Ohio State University
Sencun Zhu, Penn State University
Cliff Zou, University of Central Florida
|