The Second International Workshop on Ad Hoc & Ubiquitous Computing (AUC-2010)


**Apologies for cross-posting **

The Second International Workshop on Ad Hoc & Ubiquitous Computing (AUC-2010)

(In conjunction with NetCoM 2010)
December 27~29, 2010, Chennai, India

http://coneco2009.com/auc/index.html

Call for Paper:

Second International workshop on Ad hoc & Ubiquitous Computing will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the workshop is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.

Topic of Interest:

Authors are solicited to contribute to the workshop by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to

Ad Hoc Computing :

  • Ad Hoc Networks of Autonomous Intelligent Systems
  • Addressing and location management
  • Architectures, protocols, and algorithms
  • Data management issues
  • Distributed technology
  • Mobile ad hoc learning
  • Mobile and wireless ad hoc networks
  • Mobile agents for ad hoc networking
  • Network design and planning
  • Novel Architectures for Ad Hoc and Sensor Networks
  • Performance Analysis and Simulation of Protocols
  • Power-aware and energy-efficient designs
  • Quality of service
  • Resource allocation
  • Security and privacy
  • Self-configuring and self-healing schemes
  • Services and applications
  • Wireless & Mobile network Security
  • Wireless sensor network

Ubiquitous Computing :

  • Architectural structure, design decisions and philosophies
  • Autonomic management of ubiquitous systems
  • Context and location awareness, context based and implicit computing
  • Distributed Computing
  • Ubicomp Human-computer Interaction for devices
  • Intelligent devices and environments
  • Internet Computing and Applications
  • Interoperability and large scale deployment
  • Middleware services and agent technologies
  • Personalized & special field applications
  • Security Issues and Applications
  • Service discovery mechanisms and protocols
  • Software infrastructures
  • System support infrastructures and services
  • Ubiquitous systems and trust
  • User interfaces and interaction models
  • Virtualization over networks of devices
  • Wearable computers and technologies
  • Wireless networking and mobile, pervasive and ubiquitous computing
  • Wireless/mobile service management and delivery
  • Mobile Computing
  • Network Protocols & Wireless Communication

Paper submission:

Authors are invited to submit papers for the workshop through email (auc.workshop@yahoo.com or auc2009@airccse.org )by June 30, 2010. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this workshop.

All accepted papers will be included in the conference proceedings published by Conference Publishing Services (CPS)(submitted for possible indexing by EI).

All CPS Publications are included in the IEEE Xplore.
All CPS Publications are archived in IEEE Computer Society Digital Library (CSDL)

Selected papers from the conference, after further revisions, will be published in the following international journals (Confirmed).

Important Dates :

Submission Deadline  : June 30, 2010
Authors Notification   : August 20, 2010
Final Manuscript Due : September 20, 2010

Advertisement

Second Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC 10)


**Apologies for cross-posting **

Second Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor

Networks (GRAPH-HOC 10)

(In Conjunction with NETCOM – 2010)

http://coneco2009.com/graphhoc/graphhoc.html

December 27~29, 2010, Chennai, India

Call for Paper:

The Second International workshop focuses on the applications of graph theory in different areas of wireless ad hoc networks such as Mobile Ad hoc Networks (MANETs), Vehicular Ad hoc Networks (VANETs) and sensor networks. Graph theoretic concepts are applied in several fundamental issues such as connectivity, data gathering, routing, mobility, energy efficiency and topology control. Papers submitted for the workshop should focus on a problem that is of both theoretical as well as practical interest in the area of ad hoc networks and sensor networks. This workshop will thus provide a platform for researchers from both theoretical and practical domains of ad hoc networks to meet and exchange their ideas. Topics of interest include (but not limited to):

  • Distributed extensions of centralized graph theoretic routing algorithms
  • Connectivity analysis under different mobility models
  • Data gathering algorithms and protocols for sensor networks
  • Applications of Random Graph theory in ad hoc networks and sensor networks
  • Algorithms for scheduling and resource allocation problems
  • Algorithms for topology control and power assignment
  • Evacuation routing algorithms and protocols for vehicular ad hoc networks
  • Secure routing algorithms and protocols based on graph theory
  • Approximation heuristics for NP-complete problems related to ad hoc networks

Submission Procedures :

Authors are invited to submit papers for the Workshop through email : gt_adhoc@airccse.org by June 30, 2010. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Workshop. The workshop proceeding will be published by Conference Publishing Services (CPS).

All CPS Publications are included in the IEEE Xplore.
All CPS Publications are archived in IEEE Computer Society Digital Library(CSDL)

For each accepted paper, at least one of the authors should have completed full registration for the NetCom 2010 conference in order for the paper to be published in the workshop and conference proceedings.
Important Dates :

Submission Deadlines    : June 30, 2010
Authors Notification      : August 20, 2010
Final Manuscript Due    : September 20, 2010

The Second International Conference on Networks & Communications (NetCoM – 2010)


December 27 – 29, 2010.    Chennai, India

http://airccse.org/netcom/netcom.html

Call for Papers:

The Second International Conference on Networks & Communications will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Networks & Data Communications. The Conference looks for significant contributions to the Computer Networks & Communications for wired and wireless networks in theoretical and practical aspects. Original papers are invited on computer Networks, network protocols and wireless networks, Data communication Technologies, and network security. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.

Topics Of Interest:

Authors are solicited to contribute to the workshop by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to

  • Addressing & location management
  • Broadband access technologies
  • Adhoc and sensor networks
  • Cross layer design and optimization
  • Heterogeneous wireless networks
  • High speed networks
  • Internet and Web applications
  • Measurement & Performance Analysis
  • Mobile & Broadband Wireless Internet
  • Mobile networks & Wireless LAN
  • Network Architectures
  • Network Based applications
  • Network Operations & management
  • Network Protocols & Wireless Networks
  • Network Security trust, & privacy
  • Next Generation Internet
  • Next Generation Web Architectures
  • Peer to peer and overlay networks
  • QoS and Resource Management
  • Recent trends & Developments in Computer Networks
  • Routing, switching and addressing techniques
  • Self-Organizing Networks and Networked Systems
  • Ubiquitous networks
  • Virtual & overlay networks
  • Wireless communications
  • Wireless mesh networks and protocols
  • Wireless Multimedia systems

Paper submission:

Authors are invited to submit papers for the conference through EasyChair Paper Submission System by June 30, 2010 (for more details visit paper submission page). Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference.

All accepted papers will be included in the conference proceedings published by Conference Publishing Services (CPS)(submitted for possible indexing by EI).

All CPS Publications are included in the IEEE Xplore.
All CPS Publications are archived in IEEE Computer Society Digital Library (CSDL)

Selected papers from the conference, after further revisions, will be published in the following international journals (Confirmed).

Important Dates:

Submission Deadline    : June 30, 2010
Authors Notification    : August 20, 2010
Final Manuscript Due   : September 20, 2010

The Second International Conference on Network & Communications Security (NCS – 2010)


http://coneco2009.com/ncs/ncs.html

December 27~29, 2010 Chennai, India

Call for Paper:

There is a shift away from the traditional client-server model to systems based on the peer-to peer network, which allows users share resources effectively. Also, due to increase in number of Internet applications & users, the security issues and pivotal challenges include integrity verification, authentication, and access control etc., are also increasing. As a consequence, the subject of security protection in Network & Communication area has attracted intensive research activities in academia and industry. With the recent advances in Communication & network technology, the applications in commercial security scenario become increasing essential.

The purpose of this Conference is to publish latest & high-quality research works on Computer Networks & Communications security for wired and wireless networks in theoretical and practical aspects. This Conference aims to promote state-of-the-art research in the area of computer Networks security.

Authors are solicited to contribute to the special issue by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to

• Access control, Anonymity, Audit and audit reduction & Authentication

and authorization

• Applied cryptography, Cryptanalysis, Digital Signatures

• Biometric security

• Boundary control devices

• Certification and accreditation

• Cross-layer design for security

• Security & Network Management

• Data and system integrity, Database security

• Defensive information warfare

• Denial of service protection, Intrusion Detection, Anti-malware

• Distributed systems security

• Electronic commerce

• E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojan Protection

• Grid security

• Information hiding and watermarking & Information survivability

• Insider threat protection, Integrity

• Intellectual property protection

• Internet/Intranet Security

• Key management and key recovery

• Language-based security

• Mobile and wireless security

• Mobile, Ad Hoc and Sensor Network Security

• Monitoring and surveillance

• Multimedia security, Operating system security, Peer-to-peer security

• Performance Evaluations of Protocols & Security Application

• Privacy and data protection

• Product evaluation criteria and compliance

• Risk evaluation and security certification

• Risk/vulnerability assessment

• Security & Network Management

• Security Models & protocols

• Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)

• Trusted computing

• Ubiquitous Computing Security

• Virtualization security, VoIP security, Web 2.0 security

Submission Procedures:

Authors are invited to submit papers for the conference through Easychair (https://www.easychair.org/login.cgi?conf=netcom2010 ) submission system by June 30, 2010. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The conference proceeding will be published by Conference Publishing Services (CPS).

All CPS Publications are included in the IEEE Xplore.

All CPS Publications are archived in IEEE Computer Society Digital Library(CSDL)

Selected papers from the conference, after further revisions, will be published in the following international journals (Confirmed).

International Journal of Wireless & Mobile Networks (IJWMN)

International journal of Computer Networks & Communications (IJCNC)

International journal of Network Security & Its Applications (IJNSA)

International journal of computer science & information Technology (IJCSIT)

International Journal of Database Management Systems ( IJDMS )

Important Dates:

Submission Deadline   : June 30, 2010
Authors Notification   : August 20, 2010
Final Manuscript Due  : September 20, 2010
Conference Date            : December 27~29, 2010

For more details visit conference web site http://coneco2009.com/ncs/ncs.html

International Journal of Wireless & Mobile Networks (IJWMN)


International Journal of Wireless & Mobile Networks

(IJWMN)

ISSN:0975-3834

http://airccse.org/journal/ijwmn.html

Scope & Topics:

The International Journal of Wireless & Mobile Networks (IJWMN) is a quarterly open access journal that publishes

articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.

Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks &

Communications.

Topics of interest include, but are not limited to, the following

.  Architectures, protocols, and algorithms to cope with mobile & wireless Networks

.  Distributed algorithms of mobile computing

.  OS and middleware support for mobile computing and networking

.  Routing, and communication primitives in ad-hoc and sensor networks

.  Synchronization and scheduling issues in mobile and ad hoc networks

.  Resource management in mobile, wireless and ad-hoc networks

.  Data management on mobile and wireless computing

.  Integration of wired and wireless networks

.  Broadband access networks

.  Energy saving protocols for ad hoc and sensor networks

.  Complexity analysis of algorithms for mobile environments

.  Information access in wireless networks

.  Algorithms and modeling for tracking and locating mobile users

.  Satellite communications

.  Cryptography, security and privacy of mobile & wireless networks

.  Performance of mobile and wireless networks and systems

.  Mobile ad hoc and sensor networks

.  Wireless multimedia systems

.  Service creation and management environments for mobile/wireless systems

Paper submission:

Authors are invited to submit papers for this journal through e-mail ijwmn@airccse.org.

Submissions must be original and should not have been published previously or be under consideration for publication

while being evaluated for this Journal.

Important Dates:

Submission deadline      : 20 June, 2010

Acceptance notification: 20 July, 2010

Final manuscript due     : 31 July, 2010

Publication date             : determined by the Editor-in-Chief

For other details please visit http://airccse.org/journal/ijwmn.html

The First International Conference on Computer Science and Information Technology (COSIT-2011)


The First International Conference on Computer Science and Information Technology (COSIT-2011)

http://coneco2009.com/cosit/cosit.html

January 2 ~ 4, 2011. Bangalore, India

Call For Paper

The First International conference on Computer Science and Information Technology (COSIT) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Conference looks for significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.

Authors are solicited to contribute to the workshop by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to

Topics of Interest

  • Algorithms and Bioinformatics
  • Computer Architecture and Real time Systems
  • Database and Data Mining
  • Dependable, reliable and autonomic computing
  • Distributed and parallel systems & algorithms
  • DSP/Image Processing/Pattern

Recognition/Multimedia

  • Embedded system and software
  • Game and software engineering
  • Geographical Information Systems/ Global

Navigation   Satellite Systems (GIS/GNSS)

  • Grid and scalable computing
  • Intelligent Information & Database Systems
  • IT policy and business management
  • Mobile and ubiquitous computing
  • Modeling and Simulation
  • Multimedia systems and services
  • Networking and communications
  • Parallel and Distributed Systems
  • Security and Information Assurance
  • Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.)
  • Software Engineering
  • Web and internet computing

Paper Submission

Authors are invited to submit papers through the conference Submission system by June 30, 2010. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Springer (LNCS) in  Communications in Computer and Information Science (CCIS) Series(Confirmed).

Selected papers from COSIT 2011, after further revisions, will be published in the special issue of the following journal.

International journal of Network Security & Its Applications (IJNSA)
International journal of Computer Networks & Communications (IJCNC)
International Journal of Wireless & Mobile Networks (IJWMN)
International journal of computer science & information Technology (IJCSIT)

Important Dates:

Submission Deadline : June 30, 2010
Authors Notification : September 10, 2010
Final Manuscript Due : September 25, 2010

The Second International Conference on Network & Communications Security (NCS – 2010)


**Apologies for cross-posting **

The Second International Conference on Network & Communications Security (NCS – 2010)

http://coneco2009.com/ncs/ncs.html
December 27~29, 2010 Chennai, India

Call for Paper:

There is a shift away from the traditional client-server model to systems based on the peer-to peer network, which allows users share resources effectively. Also, due to increase in number of Internet applications & users, the security issues and pivotal challenges include integrity verification, authentication, and access control etc., are also increasing. As a consequence, the subject of security protection in Network & Communication area has attracted intensive research activities in academia and industry. With the recent advances in Communication & network technology, the applications in commercial security scenario become increasing essential.

The purpose of this Conference is to publish latest & high-quality research works on Computer Networks & Communications security for wired and wireless networks in theoretical and practical aspects. This Conference aims to promote state-of-the-art research in the area of computer Networks security.

Authors are solicited to contribute to the special issue by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to

•  Access control, Anonymity, Audit and audit reduction & Authentication and authorization

•  Applied cryptography, Cryptanalysis, Digital Signatures

•  Biometric security

•  Boundary control devices

•  Certification and accreditation

•  Cross-layer design for security

•  Security & Network Management

•  Data and system integrity, Database security

•  Defensive information warfare

•  Denial of service protection, Intrusion Detection, Anti-malware

•  Distributed systems security

•  Electronic commerce

•  E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojan Protection

•  Grid security

•  Information hiding and watermarking & Information survivability

•  Insider threat protection, Integrity

•  Intellectual property protection

•  Internet/Intranet Security

•  Key management and key recovery

•  Language-based security

•  Mobile and wireless security

•  Mobile, Ad Hoc and Sensor Network Security

•  Monitoring and surveillance

•  Multimedia security, Operating system security, Peer-to-peer security

•  Performance Evaluations of Protocols & Security Application

•  Privacy and data protection

•  Product evaluation criteria and compliance

•  Risk evaluation and security certification

•  Risk/vulnerability assessment

•  Security & Network Management

•  Security Models & protocols

•  Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)

•  Trusted computing

•  Ubiquitous Computing Security

•  Virtualization security, VoIP security, Web 2.0 security

Submission Procedures:

Authors are invited to submit papers for the conference through Easy chair (https://www.easychair.org/login.cgi?conf=netcom2010 ) submission system by May 20, 2010. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The conference proceeding will be published by Conference Publishing Services (CPS).

All CPS Publications are included in the IEEE Xplore.

All CPS Publications are archived in IEEE Computer Society Digital Library(CSDL)

Selected papers from the conference, after further revisions, will be published in the following international journals (Confirmed).

Important Dates:

Submission Deadline : June 13, 2010
Authors Notification   : August 20, 2010
Final Manuscript Due : September 20, 2010
Conference Date         : December 27~29, 2010

For more details visit conference web site http://coneco2009.com/ncs/ncs.html

Second Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC 10)


Second Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC 10)

(In Conjunction with NETCOM – 2010)

http://coneco2009.com/graphhoc/graphhoc.html

December 27~29, 2010, Chennai, India

Call For Paper:
The Second International workshop focuses on the applications of graph theory in different areas of wireless ad hoc networks such as Mobile Ad hoc Networks (MANETs), Vehicular Ad hoc Networks (VANETs) and sensor networks. Graph theoretic concepts are applied in several fundamental issues such as connectivity, data gathering, routing, mobility, energy efficiency and topology control. Papers submitted for the workshop should focus on a problem that is of both theoretical as well as practical interest in the area of ad hoc networks and sensor networks. This workshop will thus provide a platform for researchers from both theoretical and practical domains of ad hoc networks to meet and exchange their ideas. Topics of interest include (but not limited to):

  • Distributed extensions of centralized graph theoretic routing algorithms
  • Connectivity analysis under different mobility models
  • Data gathering algorithms and protocols for sensor networks
  • Applications of Random Graph theory in ad hoc networks and sensor networks
  • Algorithms for scheduling and resource allocation problems
  • Algorithms for topology control and power assignment
  • Evacuation routing algorithms and protocols for vehicular ad hoc networks
  • Secure routing algorithms and protocols based on graph theory
  • Approximation heuristics for NP-complete problems related to ad hoc networks

Submission Procedures :

Authors are invited to submit papers for the Workshop through email : gt_adhoc@airccse.org by June 13, 2010. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Workshop. The workshop proceeding will be published by Conference Publishing Services (CPS).

All CPS Publications are included in the IEEE Xplore.
All CPS Publications are archived in IEEE Computer Society Digital Library(CSDL)

For each accepted paper, at least one of the authors should have completed full registration for the NetCom 2010 conference in order for the paper to be published in the workshop and conference proceedings.
Important Dates :

Submission Deadlines    : June 13, 2010
Authors Notification        : August 20, 2010
Final Manuscript Due     : September 20, 2010

The Second International Conference on Networks & Communications (NetCoM – 2010)


***Apologies for possible multiple copies***

The Second International Conference on Networks & Communications

(NetCoM – 2010)

December 27 – 29, 2010.    Chennai, India

http://airccse.org/netcom/netcom.html

Call for Papers:

The Second International Conference on Networks & Communications will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Networks & Data Communications. The Conference looks for significant contributions to the Computer Networks & Communications for wired and wireless networks in theoretical and practical aspects. Original papers are invited on computer Networks, network protocols and wireless networks, Data communication Technologies, and network security. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.

Topics Of Interest:

Authors are solicited to contribute to the workshop by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to

  • Addressing & location management
  • Broadband access technologies
  • Adhoc and sensor networks
  • Cross layer design and optimization
  • Heterogeneous wireless networks
  • High speed networks
  • Internet and Web applications
  • Measurement & Performance Analysis
  • Mobile & Broadband Wireless Internet
  • Mobile networks & Wireless LAN
  • Network Architectures
  • Network Based applications
  • Network Operations & management
  • Network Protocols & Wireless Networks
  • Network Security trust, & privacy
  • Next Generation Internet
  • Next Generation Web Architectures
  • Peer to peer and overlay networks
  • QoS and Resource Management
  • Recent trends & Developments in Computer Networks
  • Routing, switching and addressing techniques
  • Self-Organizing Networks and Networked Systems
  • Ubiquitous networks
  • Virtual & overlay networks
  • Wireless communications
  • Wireless mesh networks and protocols
  • Wireless Multimedia systems

Paper submission:

Authors are invited to submit papers for the conference through EasyChair Paper Submission System by June 13, 2010 (for more details visit paper submission page). Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference.

All accepted papers will be included in the conference proceedings published by Conference Publishing Services (CPS)(submitted for possible indexing by EI).

All CPS Publications are included in the IEEE Xplore.
All CPS Publications are archived in IEEE Computer Society Digital Library (CSDL)

Selected papers from the conference, after further revisions, will be published in the following international journals (Confirmed).

Important Dates:

Submission Deadline   : June 13, 2010
Authors Notification    : August 20, 2010
Final Manuscript Due  : September 20, 2010

Second Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC 10)


(In Conjunction with NETCOM – 2010)

http://coneco2009.com/graphhoc/graphhoc.html

December 27~29, 2010, Chennai, India

Call For Paper:
The Second International workshop focuses on the applications of graph theory in different areas of wireless ad hoc networks such as Mobile Ad hoc Networks (MANETs), Vehicular Ad hoc Networks (VANETs) and sensor networks. Graph theoretic concepts are applied in several fundamental issues such as connectivity, data gathering, routing, mobility, energy efficiency and topology control. Papers submitted for the workshop should focus on a problem that is of both theoretical as well as practical interest in the area of ad hoc networks and sensor networks. This workshop will thus provide a platform for researchers from both theoretical and practical domains of ad hoc networks to meet and exchange their ideas. Topics of interest include (but not limited to):

  • Distributed extensions of centralized graph theoretic routing algorithms
  • Connectivity analysis under different mobility models
  • Data gathering algorithms and protocols for sensor networks
  • Applications of Random Graph theory in ad hoc networks and sensor networks
  • Algorithms for scheduling and resource allocation problems
  • Algorithms for topology control and power assignment
  • Evacuation routing algorithms and protocols for vehicular ad hoc networks
  • Secure routing algorithms and protocols based on graph theory
  • Approximation heuristics for NP-complete problems related to ad hoc networks

Submission Procedures :

Authors are invited to submit papers for the Workshop through email : gt_adhoc@airccse.org by June 13, 2010. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Workshop. The workshop proceeding will be published by Conference Publishing Services (CPS).

All CPS Publications are included in the IEEE Xplore.
All CPS Publications are archived in IEEE Computer Society Digital Library(CSDL)

For each accepted paper, at least one of the authors should have completed full registration for the NetCom 2010 conference in order for the paper to be published in the workshop and conference proceedings.
Important Dates :

Submission Deadlines    : June 13, 2010
Authors Notification      : August 20, 2010
Final Manuscript Due     : September 20, 2010

%d bloggers like this: