Submit a Paper

Propose a Workshop

The Seventh International Conference on Systems and Networks Communications

ICSNC 2012

November 18-23, 2012 - Lisbon, Portugal


Technical Co-Sponsors and Logistics Supporters
     
ARCHIVE
printer friendly
pdf version
printer friendly

Details:

  • Colocated with other events part of SoftNet 2012
  • Posters will be presented during the conference
  • A Work in Progress track is available for preliminary work
  • A Research Ideas track is available for ideas in early stages

Due to many requests, submission deadline is extended to July 29.

Submission (full paper) July 7, 2012 July 29, 2012
Notification September 7, 2012
Registration September 21, 2012
Camera ready September 21, 2012

ISBN: 978-1-61208-231-8

Published by IARIA XPS Press

Archived in the free access ThinkMindTM Digital Library
Authors of selected papers will be invited to submit extended versions to a IARIA Journal
Articles will be submitted to appropriate indexes.

All tracks/topics are open to both research and industry contributions.

Tracks:

  • WINET: Wireless networks
    3G/4G integration; Wireless protocols, architectural and design concepts; Design and implementation of mobile information systems; Wireless communications and mechanisms; Antenna and RF subsystems; Coding & modulation & equalization; Channel modeling and characterization; Equalization/Synchronization; Wireless technologies; Wireless applications & services; IP Multimedia subsystems (IMS); Wireless and mobility; Wireless-wireline convergence; Radio communications systems; Specialized wireless networks; Management of wireless networks; Position on standards & fora on wireless networks; Business models on wireless networks; Communications regulations, Spectrum management; Software-Defined Radio (SDR) [ architectures, hardware, software, signal processing and smart antennas, etc.]
  • HSNET: High speed networks
    Technologies, protocols, and applications for high speed networks; Voice over high speed networks; Services and interconnections of high speed networks; Technologies for High speed optical networks; Optical burst switching; End-to-end applications; Optical control plan; Advanced optical technology architectures; Design of high speed systems and networks; Methodologies and development tools for high speed networks; Management and control of high speed networks; Performance in high speed networks; Security aspects in high speed networks; QoS/SLA in high speed networks; Diagnosing high speed networks; High speed networks and NGN
  • SENET: Sensor networks
    Architectures and protocols for wired and wireless sensor networks; Design of sensor networks; Instrumentation and models for deployment of sensors networks; Power in sensor networks; Ad hoc and wireless sensor networks; Management and control of sensor networks; Performance in sensor networks; Security and reliability aspects in sensor networks; Information assurance in sensor networks; QoS/SLA in sensor networks; Applications, case studies and prototypes with sensor networks
  • MHNET: Mobile and Ad hoc networks
    Mobile technology and fundamentals; Analytical and validation models for mobility; Architecture and routing protocols for mobile networks; Architectures, frameworks, fundamentals on ad hoc networks; Energy efficient design, cross-layer design, scalability; MAC protocols for ad-hoc and sensor networks (801.11, Bluetooth, etc.); Data, information, and signal processing in mobile networks; Complexity analysis of mobile algorithms and protocols; Software platforms and development tools supporting mobility; QoS/SLA, access control and security in mobile and ad hoc networks; Location and mobility management; Location and service discovery in ad hoc networks; Planning, provisioning, and deployment mobility features; Directional and smart antennas for mobile and ad-hoc networks; Performance and security in ad hoc and mobile networks; Self-organization, synchronization and stability in ad hoc networks; Self-management in ad hoc and mobile networks; Ad hoc and mobile networks and autonomic computing; Mobile ad hoc platforms, systems and tools; Applications over ad hoc networks; Standards evolution on mobility and ad hoc networks
  • VENET: Vehicular networks
    Communication technologies in vehicular networks; Frameworks and architectures for vehicular networks; Interoperability with Internet and other networks; Vehicle-infrastructure communications; Vehicle-to-vehicle communications; Emerging inter/intra-vehicle and infrastructure-to-vehicle wireless technologies; Cross-layer design and optimization for vehicular networks; Middleware and service architectures for vehicular networks; Propagation issues Vehicular sensors and data collection and process; On-drive diagnostics and repair technologies and systems; Protocol features /MAC, QoS, routing, multicast, addressing, identity/; Mobility and hand-off ; Properties /security, privacy, performance, robustness, real-time, etc./; Control and management in vehicular networks; Driver-oriented support systems /assistance, active&passive safety, etc./; Case studies and fields trials on vehicular networks; Applications across vehicular networks /content distribution, alerting, etc./; Standardization /802.11p, DSRC, etc./ and standard platforms /JasPar, AUTOSTAR, etc./
  • RFID: Radio-frequency identification systems
    Fundamentals for RFID systems; Communications in RFID systems; Next generation RFID Technologies; RFID middleware design and architecture; Antenna design for RFID; System design and deployment; Circuits and architecture; RFID ans sensor networks; Bridging RFID networks in heterogeneous networks; Collision, proximity, speed; Security, privacy, trust; Monitoring and control of RFID systems; Localization and tracking; Inventory tracking; Testing and verification; Planing and executing RFID systems; RFID pilot projects; Use cases in deploying and operating /finance, manufacture, agriculture, transportation, etc./; Tools for supporting the design and deployment of RFID systems
  • SESYS: Security systems
    Security analysis methodologies; Middleware and distributed systems security; Cryptography, certificates, information hiding, access control; Protection, risk, vulnerabilities, attacks, authorization/authentication; Access control, wireless access control, broadband access control; Biometrics, smart cards, identification and trust methodologies; Certification, accreditation anonymity, and audit; Security management, emergency contingency planning, identify theft, life safety; Wireless and mobile security; Fast security associations; Electronic surveillance and e-commerce protocols; Security and trust in web-services-based applications; Peer-to-peer security, denial of services; Information survivability, insider threat protection, integrity; Intellectual property rights, privacy, legal and regulatory issues; Criminal exploitation of technology; Commercial and industrial security; Viruses, hackers, worms, spam, and other malicious code
  • MCSYS: Multimedia communications systems
    Technologies, protocols, and mechanisms for multimedia communications; Multimedia compression mechanisms and information representation; Multimedia encoding and compression, MPEG-1 to MPEG-4, Wavelet and fractal; Multimedia frameworks, communications, and middleware; Next generation multimedia communications; Mobile multimedia communications; Methodologies and development tools for multimedia communications systems; Wireless mobile multimedia communications; Ad hoc multimedia networks; IP-based Multimedia Subsystems (IMS); QoS/SLA in mobile multimedia services and applications; Mechanisms for interactive multimedia applications; Designing and implementing interactive applications; Multimedia authoring, publishing, and right securing; Security and performance for multimedia communications; Management, QoS, and security aspects in streaming over wireless ad hoc networks; Management and control of multimedia systems; Standards protocols for multimedia communications
  • POSYS: Policy-based systems
    Policy for automation control; Trusting policy control commands; Policy-driven autonomic organizations; Policy-based control scalability; Policy sensors for feedback control; Policy conflict detection and conflict resolution; Context-aware policy-driven adaptive frameworks; Policy integrity, trust and negotiations; Policy-based software applications; Policing pervasive computing environments; Policing on-demand systems and services
  • PESYS: Pervasive education system
    Learning and teaching systems; E-learning methods and e-learning scenarios; Tools and architectures for mobile/ubiquitous e-learning; Cooperative learning and working; Mobile technology and education; Distance learning and education; Computers and arts; Education in developing regions; Reflection in learning software and hardware; Social impact metrics on distance learning; Methodologies and processes for education; Curriculum projects and experiences; Intelligent support; Multimedia environment for teaching; E-market place for higher education; Embedded systems education; Wearable computers and education
 
 

Copyright (c) 2006-2012, IARIA