Submit a Paper

Propose a Workshop

The Third International Conference on Evolving Internet


June 19-24, 2011 - Luxembourg

Call for Papers

Originally designed in the spirit of interchange between scientists, Internet reached a status where large-scale technical limitations impose rethinking its fundamentals. This refers to design aspects (flexibility, scalability, etc.), technical aspects (networking, routing, traffic, address limitation, etc), as well as economics (new business models, cost sharing, ownership, etc.). Evolving Internet poses architectural, design, and deployment challenges in terms of performance prediction, monitoring and control, admission control, extendibility, stability, resilience, delay-tolerance, and interworking with the existing infrastructures or with specialized networks. 

The INTERNET 2011 conference deals with challenges raised by evolving Internet making use of the progress in different advanced mechanisms and theoretical foundations. The gap analysis aims at mechanisms and features concerning the Internet itself, as well as special applications for software defined radio networks, wireless networks, sensor networks, or Internet data streaming and mining.

While many attempts are done and scientific events are scheduled to deal with rethinking the Internet architecture, communication protocols, and its flexibility, the current series of events starting with INTERNET 2009 is targeting network calculi and supporting mechanisms for these challenging issues.

We solicit both academic, research, and industrial contributions on topics regarding new views on Internet protocols, Internet extendibility, new architectures and tradeoffs. INTERNET 2011 will offer tutorials, plenary sessions, and panel sessions. A best paper award will be granted by the IARIA’s award selection committee.

We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.

Industrial presentations are not subject to the format and content constraints of regular submissions. We expect short and long presentations that express industrial position and status.

Tutorials on specific related topics and panels on challenging areas are encouraged.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All tracks are open to both research and industry contributions.

Advanced Internet mechanisms

Access: call admission control vs. QoE vs. structural QoS / capability-based access control vs. role-based access control vs. attribute-based access control
Routing and pricing models: BGP, pricing peering agreements using microeconomics, topological routing vs. table-based routing vs. network coding, power-efficient routing
Optimization in P2P/CDN networks: peer placement for streaming P2P, analysis of P2P networks
Traffic engineering: estimating traffic matrices, constrained routing, exponentially bounded burstness
Behavioral traffic recognition: identifying applications from traffic behavior
Traffic analysis: methods for analysis and visualization of multidimensional measurements, characterizing protocols
Software defined radio networks: low power signal processing methods, applications of machine learning
Cognitive radio: medium access, spatiotemporality, complexity, spectrum sharing and leasing, channel selection, multi-stage pricing, cyclostationary signatures, frame synchronization
Streaming video: learning from video, techniques for in-network modulation
Location: statistical location, partial measurements, delay estimation

Graph theory/topology/routing Internet support

Information theory: distributed network coding, Shannon's entropy, Nash equilibrium
Optimization: LP, NLP, NeuroP, quadratic, convex programming, compressed sensing
Graph theory: random graphs, spectra graph theory, percolations and phase transitions, methods from statistical physics, geometric random graphs
Algebraic techniques: tensor analysis, matrix decomposition
Processing: signal processing techniques, equalization, point-process, source coding vs. network coding, recoverability
Statistical machine learning: probabilistic graphical models, classification, clustering, regression, classification, neural networks, support vector machines, decision forests.
Game Theory/Microeconomic theory: social choice theory, equilibria, arbitrage and incentive oriented distributed mechanism design, cooperative games, and games on graphs
Stochastic network calculus
Fractal behavior and stability mechanisms
Kolmogorov complexity for performance evaluation
Complexity theory

Internet security mechanisms

Cryptography: design and analysis of cryptographic algorithms, applied cryptography, cryptographic protocols and functions
Specification, validation design of security  and dependability: security and trust models, semantics and computational models for security and trust, business models in security management, security policies models, security architectures, formal methods for verification and certification, multi-level security specification
Vulnerabilities, attacks and risks: methods of detection, analysis, prevention, intrusion detection, tolerance, response and prevention, attacks and prevention of on-line fraud, denial of services attacks and prevention methods
Access Control:  authentication and non-repudiation, accounting and audit, anonymity and pseudonymity
identity and trust management, biometric methods
Anti-malware techniques: detection, analysis, prevention
Cyber-crime response: anti-phishing, anti-spam, anti-fraud methods

Internet trust, security, and dependability levels

Network and transport level security
Network edge security controls: firewalls, packet filters, application gateways
Wireless and mobile network security: risks of wireless insecurity, wireless vulnerabilities and intrusion detection, WLAN and WMAN MAC layer security technologies, key management mechanisms and protocols, security in ad hoc, sensor, mesh and personal communication  networks
Security of Internet protocols: routing security, naming, network management,  signaling security, transport layer security
Network security policies: specification, implementation, deployment and management
Security of P2P and overlay/middleware  systems
Security for multiple domains, large-scale systems and critical infrastructures
Applications and high level services security: Web-based applications and services, VoIP, multimedia streaming services, VoD and IPTV, collaborative applications (conferencing), electronic commerce and eBusiness,  eVoting, grid computing, security of eGovernment
Intellectual property protection: digital rights management, licensing, metering, watermarking, information hiding, implementations
Security services integration in complex architectures
Tradeoffs between security and efficiency, usability, reliability and cost.

Internet performance

Performance degradation and anomaly detection mechanisms
User-oriented performance metrics
Network and service provider-oriented performance metrics
Hybrid (chip and network) performance calculi
Intrusive and non-intrusive performance measurement mechanisms
Mechanisms for performance degradation-tolerant applications
Mechanisms for application performance and network performance
Performance enhancement mechanisms
Performance and traffic entropy algorithms
Performance prediction algorithms

Internet AQM/QoS

Buffer sizing, majorization, QoS routing, finite buffer queue vs. infinite buffer queue and performance
Control theoretic framework for modeling of TCP and AQM schemes
Discrete mathematics to model buffer occupancy at queues of a network (given workloads)
Game theoretic modeling of AQMs (mathematics to model selfish traffic)
Fairness models (proportional fairness, max-min fairness, low state global fairness)
Optimization framework for congestion control, fairness and utility maximization
Modeling and simulation of large network scenarios using queuing theory

Internet monitoring and control

Visualization mechanisms
Sub-network/device isolation mechanisms
Control feedback mechanisms (limited feedback, delay and disruption tolerance, optimal and adaptive feedback)
Optimal control
Adaptive behavior control
Network resiliency
Self-adaptable and tunable performance
Mechanisms for anticipative measurements and control

Internet and wireless

Capacity of wireless networks
Potential based routing
Algebraic techniques to mine patterns from wireless networks
QoS/QoE translation
Wireless ad hoc / mesh networks: MAC protocols, routing, congestion control, P2P CDNs on wireless meshes

Internet and data streaming/mining algorithms

Mathematics for clustering massive data streams
Randomized algorithms etc and impossibility results
Dimension reduction in metric spaces
Tensor and multidimensional algebraic techniques
Non linear dimension reduction
Optimal collector positioning
Data fusion and correlation algorithms

Internet and sensor-oriented networks/algorithms

Optimal sensor placement
Inference models for sensing
Congestion control
Resource allocation
Mathematics to model different diffusion processes and applications to routing
Algorithms for data fusion
Algorithms for computing dormant/active sending periods
Energy-driven adaptive communication protocols

Internet challenges

Future Internet architecture and design
Next generation Internet infrastructure
Internet cross-layer design and optimization
Internet security enforcement and validation
Future cross-Internet computing
Configurable Internet protocols
Internet-scale overlay content hosting
Internet citizen-centric services
End-user customizable Internet
Mobile Internet
Internet imaging
Internet coding
Internet resilience
Internet QoS/QoE
Context-aware, ambient, and adaptive Internet
Virtualization and Internet
Privacy Enhancing Technologies - PETs



Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals.

Publisher: XPS (Xpert Publishing Services)
Archived: ThinkMindTM Digital Library (free access)
Prints available at Curran Associates, Inc.
Articles will be submitted to appropriate indexes.

Important deadlines:

Due to numerous requests, submissions are accepted until March 5, 2011
Submission (full paper) February 5, 2011 March 5, 2011
Notification March 31, 2011 April 1, 2011
Registration April 15, 2011 April 18, 2011
Camera ready April 20, 2011

Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via an automated system.

Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here.

Your paper should also comply with the additional editorial rules.

Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.


Posters are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as poster.  Submissions are expected to be 6-8 slide deck. Posters will not be published in the Proceedings. One poster with all the slides together should be used for discussions. Presenters will be allocated a space where they can display the slides and discuss in an informal manner. The poster slide decks will be posted on the IARIA site.

For more details, see the Posters explanation page.

Work in Progress

Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress.  Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings.

For more details, see the Work in Progress explanation page

Technical marketing/business/positioning presentations

The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to


Tutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials' slide decks will be posted on the IARIA's site. Please send your proposals to

Panel proposals:

The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel's slide deck will be posted on the IARIA's site.

For more information,

Workshop proposals

We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to


Copyright (c) 2006-2011, IARIA