28th IEEE

International Performance Computing and Communications Conference

IPCCC 2009 - December 14-16, 2009

Phoenix, Arizona, USA

Home General Information Contact and Committee Information Author's Information Workshops Program at a Glance Hotel Registration

Important dates about workshops:
Paper submission due:23rd October, 2009
Acceptance notice:1st November, 2009
Camera-ready:8th November, 2009
Workshop Date:14th-16th December, 2009

The 1st IEEE International Workshop on Broadband Wireless Network Communications Performance
In conjunction with IEEE IPCCC 2009

Broadband wireless sits at the confluence of the most remarkable growth stories of the telecommunications industry in recent years. Both wireless and broadband have on their own enjoyed rapid mass-market adoption. Broadband wireless is about bringing the broadband experience to a wireless context, which offers users certain unique benefits and convenience.

Emerging technologies of broadband wireless and cellular like Mobile WiMAX based on IEEE 802.16e standard, long-term evolution (LTE) networks, HSDP, WiRAN, etc are expected to not only compete with the broadband wireless market share in urban areas with DSL, cable, and optical fibers, but also threaten the hotspot based WiFi and even the voice-oriented cellular wireless market.? The success of these services depends on the way network operators, wireless access equipment vendors and service providers will deal with the stringent constraints imposed by the underlying wireless architecture. Seamless and ubiquitous coverage and QoS provisioning are the crucial points to face.

This workshop concerns the emerging and the different broadband wireless and mobile networks. Submissions are welcome from academia, industry, and government organizations. Topics of interest for this workshop include, but not limited to, the following:

  • Broadband wireless technologies: LTE, WiMAX, WiRAN, HSDPA, HSUPA
  • Resource allocation and interference management
  • Quality of service and scheduling methods
  • Capacity planning and dimensioning
  • Cross-layer design and Physical layer based issue
  • Interworking architecture and interoperability
  • Relay assisted and cooperative communications
  • Location and provisioning and mobility management
  • Call admission and flow/congestion control
  • Performance optimization
  • Channel capacity modeling and analysis

Paper submission
Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published. Paper length should not exceed 6 pages formatted in IEEE conference style, including the abstract, figures and references. Papers should be submitted in pdf format through the EDAS paper submission. All accepted papers will be published in the conference proceedings. At least one author of accepted papers is required to register at the full registration rate.

Workshop Co-Chairs
Tara Ali Yahiya (Paris-Sud University, France), tara.ali-yahiya@u-psud.fr
Hakima Chaouchi (Telecom Sud Paris), hakima.chaouchi@it-sudparis.eu

Technical Program Committee chair


Faouzi Bader, CTTC, Spain

Technical Program Committee Members:


Alain Mourad ,Samsung Electronics Research Institute, UK

Aline Viana, Inria Saclay, France

Andre-Luc Beylot, ENSEEIHT, France

Anelise Munaretto, UTFPR, Brazil

Faouzi Bader, CTTC, Spain

Guy Pujolle, University of Paris 6, France

Hakima Chaouchi, Telecom Sud Paris, France

Harry Perros, North Carolina State University

Ivan Ganchev, university of Limerik, Ireland

Jose-Marcos Nogueira, Federal University of Minas Gerais, Brazil

Mairtin O'Droma, University of  Limerick, Ireland

Mauro Fonseca, PUC-PR, Brazil

Nikos Passas, University of Athens, Greece

Peter Mueller, IBM Zurich Research Laboratory

Peter Reichl, Telecommunications Research Center, Vienna 

Ramon Aguero, University of Cantabria, Spain

Spaniol Otto, RWTH Aachen University, Germany

Tara Ali Yahiya, University Paris Sud, France

Vasilis Friderikos, King's College of London, UK

The 2nd IEEE International Workshop on Dynamic Spectrum Access and Cognitive Radio Networks
In conjunction with IEEE IPCCC 2009

New policies and regulatory rules for more efficient allocation and utilization of spectrum have been at the center of current discussions involving governments, industry and academia. For example, on November 14 2008, the US Federal Communications Commission (FCC) adopted the rules that allow unlicensed transmitters to operate in TV bands on a secondary basis. Dynamic Spectrum Access (DSA) and Cognitive Radio Networks (CRNs) are considered as the two key technologies that will enable flexible, efficient and reliable spectrum use by adapting the radio’s operating characteristics to the real-time conditions of the environment. This workshop will focus on key research challenges related to the dynamic spectrum access paradigm and cognitive radio networks, and it is intended to be a forum for collaboration across multiple communities, ranging from academic to government to industry. Original papers are invited on protocol/algorithm design, experimental results, analytical modeling in the area of dynamic spectrum access and cognitive radio networks covering but not limited to following topics:

  • Spectrum-management regulation and policy making
  • Cooperation and game theory based protocols and algorithms for Cognitive Radios Networks
  • Spectrum sensing techniques
  • Standardization in DSA or CRN, such as IEEE 802.22, 802.19 or 802.11 TVWS SG.
  • Security in Cognitive Radio Networks
  • Spectrum sensing and cognitive radio test-beds and prototypes
  • Practical experiments on performance evaluation of cognitive radio networks
  • New Applications in TV-band White Space.

Paper submission
Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published. Paper length should not exceed 6 pages formatted in IEEE conference style, including the abstract, figures and references. Papers should be submitted in pdf format through the EDAS paper submission. All accepted papers will be published in the conference proceedings. At least one author of accepted papers is required to register at the full registration rate.

Workshop Co-Chairs
Chun-Ting Chou (National Taiwan University, Taiwan) chuntingchou@cc.ee.ntu.edu.tw
Dave Cavalcanti (Philips Research North America) dave.cavalcanti@philips.com
Alireza Seyedi (University of Rochester) alireza@ece.rochester.edu

Techical Program Committee Members:
Edward Au, Institute for Infocomm Research, Singapore
Monisha Ghosh, Philips Research North America, USA
Li-Chun Wang, National Chiao Tung University, Taiwan
Carlos Cordeiro, Intel Corporation, USA
Sai Shankar, Broadcom, USA
Kyutae Lim, Georgia Institute of Technology, USA
Stefan Mangold, Swisscom Innovations, Switzerland
R. Chandramouli, Stevens Institute of Technology, USA
Srikathyayani Srikanteswara, Intel Corporation, USA
Jianfeng Wang, Philips Research North America, USA
Honggang Zhang, Zhejiang University, China
Vahid Tarokh, Harvard University, USA
Tommaso Melodia, The State University of New York at Buffalo, USA
Hung-Yun Hsieh, National Taiwan University, Taiwan
Ping-Cheng Yeh, National Taiwan University, Taiwan
Kelvin L. Dias, Federal University of Para, Brazil

The 2nd IEEE International Workshop on Information and Data Assurance
In conjunction with IEEE IPCCC 2009

Increasing reliance on the Internet for business and commercial purposes and the global availability of information has resulted in a whole suit of problems that are rooted in information assurance. As more and more complex systems evolve, the need for security and data assurance grows even more. Large corporations and research institutions regularly come up with solutions to counter malicious and non-malicious, external and internal threats. However, the field of information assurance is such that new threats evolve on a regular basis and continuous research and innovation is critical to stem the threats that continually arise. Information Assurance can then be defined as the protection and defense of information systems so as to ensure the authenticity, availability, confidentiality, integrity, and non-repudiation of critical data and user credentials. Authentication is a direct approach to information assurance, where the external party is asked to prove its authenticity. This can be achieved by encryption, certification or some previously agreed upon protocol. Confidentiality and integrity cover the areas of data protection by directly modifying the data using encryption or keeping the data in secured backed-up locations. The goal of non-repudiation states that an entity that has proven its identity should also be held responsible for its actions. We seek papers that address theoretical, empirical, experimental and system-related approaches to information assurance. Papers should describe original and previously unpublished work. Additionally, the papers should not be currently under review at other conference, workshop or journals. Accepted papers will be published in the proceedings of IPCCC. Topics of interest include, but are not limited to:

  • Wireless and Ad-hoc Security
  • Network and Data Restoration
  • Network Reliability/Availability
  • Denial of Service Protection
  • Security system architecture
  • Optical networks security
  • Intrusion Detection and Prevention
  • Sensor network security
  • Trust negotiation/management
  • Privacy models and mechanisms
  • E-commerce security
  • Man-in-the-middle and other attack analysis
  • Key management and Cryptography
  • Botnets detection and response
  • Authorization, account management and access-control
  • Web/Internet security
  • Theoretical and empirical risk analysis

Final Paper Submission Guidelines
Papers should describe original, previously unpublished work, not currently under review by another conference, workshop, or journal. Authors are invited to submit a maximum of 8 page regular papers and 4 page short papers including the abstract, figures and references. Papers should include the title, author(s), authors' affiliation and an abstract. The formatting should be according to IEEE conference style available at: www.computer.org/portal/site/cscps.

Please note that the paper will not be included in conference proceedings if its length exceeds 8 pages. Papers should be submitted in a PDF format using the EDAS system at: https://edas.info/newPaper.php?c=8175

Program Chairs:
Anurag Gupta (Google Inc) anurag.gupta@ieee.org
Anindo Mukherjee (Google Inc) anindom@gmail.com

Technical Program Committee Members:
Andre-Luc Beylot, ENSEEIHT
Artur Hecker, TELECOM ParisTech
Avinash Srinivasan, Bloomsburg University
Deepa Kundur, Texas A&M University
Falko Dressler, University of Erlangen
Farid Naït-Abdesselam, University of Lille
Haitang Wang, Motorola Inc.
Hakima Chaouchi, INT
Hongmei Deng, Intelligent Automation Inc.
Hui Song, Frostburg State University
Ivan Ganchev, University of Limerick
Jun Li, University of Oregon
Marco Cremonini, Universita` di Milano
Meng Yu, Western Illinois University
Mohamad Badra , LIMOS Laboratory, CNRS France
Mukesh Singhal, University of Kentucky
Shivakant Mishra, University of Colorado
Sokratis Katsikas, University of Piraeus
Stephan Eidenbenz, Los Alamos National Laboratory
Tarun Joshi, University of Cincinnati
Vasilis Friderikos, King's College London
Wensheng Zhang, Iowa State University
Ye Xia, University of Florida
Yingying Chen, Stevens Institute of Technology
Yu Chen, State University of New York - Binghamton
Zhen Jiang, West Chester University of Pennsylvania

For questions, suggestions, or problems with the IPCCC website, please email the webmaster.