The Second International Workshop on Ubiquitous Computing (UbiC-2010)


The Second International Workshop on Ubiquitous Computing (UbiC-2010)

June 24 ~ 26, 2010, Ankara, Turkey
Call for Papers

The Second International workshop on Ubiquitous Computing will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the workshop is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.

Topic of Interest

Authors are solicited to contribute to the workshop by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to

  • Architectural structure, design decisions and philosophies
  • Autonomic management of ubiquitous systems
  • Context and location awareness, context based and implicit computing
  • Distributed Computing
  • Ubicomp Human-computer Interaction for devices
  • Intelligent devices and environments
  • Internet Computing and Applications
  • Interoperability and large scale deployment
  • Middleware services and agent technologies
  • Personalized & special field applications
  • Security Issues and Applications
  • Service discovery mechanisms and protocols
  • Software infrastructures
  • System support infrastructures and services
  • Ubiquitous systems and trust
  • User interfaces and interaction models
  • Virtualization over networks of devices
  • Wearable computers and technologies
  • Wireless networking and mobile, pervasive and ubiquitous computing
  • Wireless/mobile service management and delivery
  • Mobile Computing
  • Network Protocols & Wireless Communication

Paper Submission:

Authors are invited to submit papers for the workshop through email (ubic2010@yahoo.com or ubic2010@airccse.org) by December 10, 2009. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this workshop. The workshop proceedings will be published by LNCS series along with the main conference proceedings (WiMo 2010). Selected papers from, after further revisions, will be published in the following journal (confirmed).

Important Dates:

Paper Submission Deadline: December 10, 2009
Paper Status Notification: February 25, 2010
Camera-ready Due: March 25, 2010

For more details, please visit http://airccse.org/ubic/ubic2010.html

Advertisement

The First International workshop on Communications Security & Information Assurance (CSIA-2010)


The First International workshop on Communications Security & Information Assurance (CSIA-2010)

Call for Paper

The workshop focuses on all technical and practical aspects of Communications Security & Information Assurance (CSIA) for wired and wireless networks. The goal of this workshop is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Authors are solicited to contribute to the workshop by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Communication Security & Information assurance

          • Access control, Anonymity, Audit and audit reduction & Authentication and authorization
          • Applied cryptography, Cryptanalysis, Digital Signatures
          • Biometric security
          • Boundary control devices
          • Certification and accreditation
          • Cross-layer design for security
          • Data and system integrity, Database security
          • Defensive information warfare
          • Denial of service protection, Intrusion Detection, Anti-malware
          • Distributed systems security
          • Electronic commerce
          • E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojon Protection
          • Grid security
          • Information hiding and watermarking & Information survivability
          • Insider threat protection, Integrity
          • Intellectual property protection
          • Internet/Intranet Security
          • Key management and key recovery
          • Language-based security
          • Mobile and wireless security
          • Mobile, Ad Hoc and Sensor Network Security
          • Monitoring and surveillance
          • Multimedia security ,Operating system security, Peer-to-peer security
          • Performance Evaluations of Protocols & Security Application
          • Privacy and data protection
          • Product evaluation criteria and compliance
          • Risk evaluation and security certification
          • Risk/vulnerability assessment
          • Security & Network Management
          • Security and Assurance in Operational, Technological, commercial Area
          • Security Engineering and Its Application
          • Security Models & protocols
          • Security threats like DDoS, MiM, Session Hijacking, Replay attack etc & countermeasures
          • Trusted computing
          • Ubiquitous Computing Security
          • Virtualization security, VoIP security, Web 2.0 security

Authors are invited to submit papers for the workshop through E-mail (csia.workshop@yahoo.com or csia2010@airccse.org) by December 10, 2009. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this workshop. The proceedings of the conference will be published by Springer (LNCS) in Communications in Computer and Information Science (CCIS) Series(Confirmed). Selected papers from CSIA-2010, after further revisions, will be published in the special issues of the following international journals.

Selected papers from CSIA 2010, after further revisions, will be published in the special issue of an International Journal (Confirmed)

International journal of Network Security & Its Applications (IJNSA)

Important Dates
Submission Deadlines:10 December 2009
Paper Status Notification:25 February 2010
Camera-ready Due:25 March 2010

for More details, Please visit

The First International workshop on Communications Security & Information Assurance (CSIA-2010)

The Second International Conference on Wireless & Mobile Networks (WiMo-2010)


The Second International Conference on Wireless & Mobile Networks (WiMo-2010)

Call for Papers

The Second International Conference on Wireless & Mobile Network (WiMo 2010) is dedicated to address the challenges in the areas of wireless & mobile networks. The Conference looks for significant contributions to the Wireless & Mobile computing in theoretical and practical aspects. The Wireless & Mobile computing domain emerges from the integration among personal computing, networks, communication technologies, cellular technology and the Internet Technology. The modern applications are emerging in the area of mobile ad hoc networks and sensor networks. This Conference is intended to cover contributions in both the design and analysis in the context of mobile, wireless, ad-hoc, and sensor networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & Mobile computing concepts and establishing new collaborations in these areas.
Topics of interest  Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to

  • Architectures, protocols, and algorithms to cope with mobile & wireless Networks
  • Distributed algorithms of mobile computing
  • OS and middleware support for mobile computing and networking
  • Routing, and communication primitives in ad hoc and sensor networks
  • Synchronization and scheduling issues in mobile and ad hoc networks
  • Resource management in mobile, wireless and ad-hoc networks
  • Data management on mobile and wireless computing
  • Integration of wired and wireless networks
  • Broadband access networks
  • Energy saving protocols for ad hoc and sensor networks
  • Complexity analysis of algorithms for mobile environments
  • Information access in wireless networks
  • Algorithms and modeling for tracking and locating mobile users
  • Satellite communications
  • Cryptography, security and privacy of mobile & wireless networks
  • Performance of mobile and wireless networks and systems
  • Mobile ad hoc and sensor networks
  • Wireless multimedia systems
  • Service creation and management environments for mobile/wireless systems
  • Recent trends in mobile and wireless applications  Paper submission Authors are invited to submit papers for the conference Submission system ( Easy chair ) by 10,December 2009. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Springer (LNCS) in Communications in Computer and Information Science (CCIS) Series(Confirmed). Selected papers from WiMo-2010, after further revisions, will be published in the special issues of the following international journals.

    International Journal of Wireless & Mobile Networks (IJWMN)

  • for more details click the link

     

    The Second International Conference on Wireless & Mobile Networks (WiMo-2010)

    %d bloggers like this: