Mycolleagues’s Announcements

Conferences and Workshops news

BWIA 2008

The 2nd International Workshop on Broadband Wireless Internet Access (BWIA 2008 )

held in conjunction with the 4th IEEE International Conference on Wireless
and Mobile Computing, Networking and Communications (WiMob  2008).
Avignon, France on 12-14 Oct 2008.

Important Dates:
Paper submission:  July 10, 2008 (EXTENDED)
Acceptance notification:  July 30, 2008
Final Manuscript due:  August 21, 2008
Registration and full payment due: August 20, 2008
Workshop date: October 12, 2008
Submission web site:


June 15, 2008 Posted by | Call4papers workshops, Workshops | Leave a comment

LAACS 2008

|                                                                          |
|                 8-9 September 2008 – Gramado, Brazil                     |
|                                       |
|                                                                          |
|                             CALL FOR PAPERS                              |

The increasing complexity, heterogeneity, and dynamism of networks,
services, and applications have made information technology (IT) and
networking infrastructures quite difficult to operate and manage. In order
to address this challenge, the autonomic communication and computing
approach brings innovative solutions that require scientific and
technological advances in a wide variety of fields. The purpose of the
Latin American Autonomic Computing Symposium is to present and discuss
research results and practical experiences that address various aspects of
autonomics in computing and networking systems.

In its previous editions, LAACS  has established itself as the principal
Latin American forum for discussing autonomic computing advances. In this
third edition, LAACS 2008 will be held in the city of Gramado, Brazil and
organized by the Federal University of Rio Grande do Sul (UFRGS). LAACS
2008 is organized in technical and demo sessions, posters, panels, and



Authors are invited to submit complete, unpublished papers that are not
under review in any other conference or journal in the following, or
related topic areas:

1) Architecture

– Autonomic architectures and principles
– Paradigms, tools and techniques autonomic systems (IT and networks)
– Self-management of distributed systems and networks (e.g., based on
peer-to-peer principles)
– Self-* technologies
– Organic computing: Bio-inspired networks and systems
– Software architectures for self-managing systems
– Autonomic grid architectures

2) Tools

– Policy control for autonomic networks & systems
– Sensing, monitoring and measurements for autonomic systems
– Advances in and application of control theory
– Knowledge based systems control
– Toolkits, environments, models, languages, runtime and compiler
technologies for building self-managing components, systems or
– User experiences, Interfaces to autonomic systems
– Management of autonomic systems

3) Autonomic Networking

– Control and management in dynamic/mobile network environments
– Self-co-operating peer-to-peer networks
– Self-organizing network elements, and administrative domains
– Plug and play networking components
– Cognitive networking
– Application of autonomic management to mobile and wireless Networking
including 3GPP evolved UTRAN, SAE networks, etc.

4) Autonomic Computing

– Autonomic IT Service Management
– Fault-tolerance and resilience
– Experiences with self-* solutions
– Autonomic and Trusted Computing



– Paper/poster registration and submission deadline: July 8, 2008
– Notification of acceptance: August 3, 2008
– Final camera ready paper due: August 17, 2008
– Tutorial and demo submission due: August 3, 2008
– Event dates: September 8-9, 2008

June 15, 2008 Posted by | Call4papers workshops, Workshops | Leave a comment

ICNP 2008

Internet Network Management Workshop 2008
October 19, 2008 – Orlando, Florida

Co-located with ICNP 2008

Abstract Submission:      July 14, 2008 (5:00pm EDT) – Extended
Paper Submission:         July 14, 2008 (5:00pm EDT) – Extended
Acceptance Notification:  August 6, 2008
Camera Ready Due:         September 5, 2008
Workshop:                 October 19, 2008


In many ways, computer network management remains the least understood
aspect of computer
networking. There is a lack of well-established principles for guiding
the design of
networks for manageability. There is also a lack of scientific
theories for analyzing the
state of a network and for the evolution of network state.

The Internet Network Management (INM) workshop provides an opportunity
to elevate
participants’ collective experience with IP networks into ideas,
principles, and theories
that can be leveraged in today’s networks, or can be carried forward
into the clean-slate
design of future networks that intrinsically support management,
rather than treating
management as a bolted-on afterthought.

The INM workshop seeks original and thought provoking ideas, case
studies, experimental
results, position papers, and clean-slate designs. Submissions
concerning special-purpose
networks, such as VoIP, content distribution, or mobile wireless
networks are welcome.
The workshop will provide a forum for the exchange of experience and

June 15, 2008 Posted by | Call4papers workshops, Workshops | Leave a comment

Thursday, 4 December 2008

co-located with

held in New Orleans, LA, USA, from 30 Nov – 4 Dec 2008

Internet access is undergoing a fundamental change. More powerful
devices and lower cost radio technologies are facilitating the
transition to the Mobile Internet in which users can access a diverse
range of services and applications anytime, anywhere. However, the
huge increase in demand that this brings cannot easily be met by
current radio access systems. Hence, there is a need for more
powerful, more efficient, higher speed, lower cost radio technologies
for Broadband Wireless Access.
There is much energy within the community to develop more advanced
BWA technologies – activities span the wireless domain, ranging from
more advanced antenna technologies to co-operative relays to mesh
networking systems and many more: future networks will likely employ
some mix of these different mechanisms. We anticipate that this 4th
workshop will continue the successful series, providing a forum for
new research results and reports on practical experience working with
innovative technologies in the domain of Broadband Wireless Access.

Submitted papers must describe new work that is not currently under
review nor has been previously published. Paper length should not
exceed five-pages and submission is via EDAS. Papers should be
submitted in a .pdf or .ps format by selecting Globecom 2008 on EDAS
and then selecting the workshop submission link. Please see the
Author Information page for submission guidelines in the IEEE
GLOBECOM 2008 website
for more information.
All submitted papers will be reviewed by up to three experts and if
accepted, published in the conference proceedings, which will be
available at IEEEXplore and registered in Engineering Index (EI).
At least one author of accepted papers is required to register for
the workshop at the full registration rate.

Selected papers from this workshop will be published in an
internationally renowned journal. (pending)

Submission deadline: Jul 1 2008
Acceptance notification: Sep 8 2008
Camera ready: TBC

June 15, 2008 Posted by | Call4papers workshops, Workshops | Leave a comment

TrustCom 2008

Call for Papers for
The 2008 International Symposium on Trusted Computing (TrustCom 2008 )

Organizer: Trusted Computing Institute, Central South University, China
Zhang Jia Jie, China, November 18-20, 2008
To be held in conjunction with
The 9th International Conference for Young Computer Scientists (ICYCS 2008)
In cooperation with the IEEE Computer Society

The 2008 International Symposium on Trusted Computing (TrustCom 2008), to be
held in conjunction with the 9th International Conference for Young Computer
Scientists (ICYCS 2008), aims at bringing together researchers and practitioners
in the world working on trusted computing with regard to security, safety,
privacy, reliability, dependability, survivability, availability, and fault
tolerance aspects of computer systems and networks, and providing a forum for
them to present and discuss emerging ideas and trends in this highly challenging
research field.

Scope and Interests:
TrustCom 2008 is an international forum for presenting and discussing emerging
ideas and trends in trusted computing in computer systems and networks from both
the research community as well as the industry. Topics of interest include, but
are not limited to:
(1) Semantics, metrics and models of trust
(2) Trust establishment, propagation, and management
(3) Trusted computing platform
(4) Trusted network computing
(5) Trusted operating system
(6) Trusted software
(7) Trusted database
(8) Trusted services and applications
(9) Trust in e-commerce and e-government
(10) Trust in mobile and wireless networks
(11) Cryptography and security protocols
(12) Reliable and fault-tolerant computer systems/networks
(13) Survivable computer systems/networks
(14) Authentication in computer systems/networks
(15) Access control in computer systems/networks
(16) Key management in computer systems/networks

Important Dates:
(1) Paper submission due:                 June 15, 2008
(2) Notification of decision:         July 15, 2008
(3) Camera-ready papers due:                August 1, 2008

June 15, 2008 Posted by | Call4papers workshops, Workshops | Leave a comment

Med-Hoc-Net 2008

(Med-Hoc-Net 2008 )

June 23-27 2008, Palma de Mallorca, Spain


The organizing committee of the 7th IFIP Annual Mediterranean Ad Hoc Networking Workshop are pleased to inform you the registration process for the conference is already open.

Med-Hoc-Net 2008 is the major annual international workshop aiming to serve as a platform for researchers and visionaries from academia, research labs, and industry from all over the world. Sharing ideas, views, results, and experiences in the field of wireless multi-hop networking is what Med-Hoc-Net 2008 intends to be about. Anything from theoretical and experimental achievements, to innovative ad hoc systems, prototyping efforts, and case studies is of interest to the Med-Hoc-Net community.

The full registration fee is 500 € Euros. It includes attendance to the workshop, workshop proceedings, coffee breaks, lunches, conference dinner, conference reception and transportation to the conference. IFIP members has a reduction on the fee. IFIP members and students has a discount in the registration fee.

Full registration: 500€ (early) / 550€ (late)
IFIP members: 450€(early) / 500€ (late)

June 15, 2008 Posted by | Call4participations | Leave a comment

The 3rd International Conference on Malicious and Unwanted Software
(MALWARE ’08), formerly the International Swarm Intelligence and Other
Forms of Malware Workshop, will be held this year October 7-8, 2008 at
the Hilton Alexandria Mark Center, Fairfax, Virginia.  The conference
has technical sponsorship from the IEEE Computer Society.  The
conference is designed to bring together experts from industry,
academia, and government to present and discuss, in an open environment,
the latest advances and discoveries in the field malicious and unwanted
software, the techniques, economics and legal issues behind their use,
and the methods to detect and control them.

The organizers thus solicit original written contributions addressing
this issue. We welcome case studies based on recent Malware events,
describing large-scale responses strategies employed, tools and
techniques that were used, and quantitative measurements and
interpretation on these events providing insight on the gravity of the
scalability problem. In addition, the organizing committee equally
welcomes more traditional research contributions of a theoretical
nature, including modeling and simulations, or of a more practical
nature, such as in-vitro laboratory experiments and tool and technique
development and testing. Contributions of both types, case studies and
research, addressing the main focus or one of following non-exclusive
list of topics are equally welcome:

– Worms, viruses and other propagating Malware
– Spyware, rootkits, keystroke loggers, information theft Malware
– Swarm-Intelligence, Swarm Worms, Zombies, distributed Intelligence Malware
– Honeypots, Honeyclients, and other examples of Malware data collection
– Email based Malware, Trojan Horses, and other forms of Malware
requiring human interaction and/or control.
– Case studies, experimental designs, and measurement methodologies use
to track and characterize Malware.
– Botnet command and control structures
– The economics behind Malware, Botnets, and other malicious code.
– Tools and methodologies used to detect and track Botnets.
– Code reverse engineering tools and practices
– Malware performance
– Malware capture and analysis tools
– Spam, Phishing – detection and analysis
– Significant operational experiences
– Survey studies
– The legal implications of unwanted software use
– Malware, the legal system, and law enforcement

More detailed information can be found on the conference Website:

Submission of papers            June 20, 2008 23:59:59 EST
Notification of Acceptance      August 15, 2008, 23:59:59 EST
Camera ready papers             August 29th, 2008: 23:59:59 EST
Workshop dates                  October 7-8, 2008

June 15, 2008 Posted by | Call4papers workshops, Workshops | Leave a comment

QShine 2008

ICST QShine 2008 Call for Participations.

Call for Participation
ICST QShine 2008
Hong Kong, China
July 07 – 28, 2008

Conference Technical Sponsors:

QShine 2008 is Technically co-sponsored by ACM SIGMM, and SIGSIM.

Conference Overview:

You are cordially invited to participate in the upcoming 5th
International Conference on Heterogeneous Networking for Quality,
Reliability, Security and Robustness (QShine 2008). The aim of
this conference is to bring together research and practitioners to
present  and share the latest results in the areas of performance,
configuration, cross-layer approaches, scalability, resilience and
survivability of large scale heterogeneous networks and distributed
systems. Following the tradition of the previous QShine meetings,
QShine 2008 will feature prominent invited speakers as well as papers
by top researchers in the field. There will also be five workshops
covering a wide range of topics including cognitive radio networks,
mobile contents, intelligenttransportation systems, grid computing, and
satellite/terrestrial interworking.

QShine 2008 Keynote Speakers:

Two renowned world-class areas leaders will provide keynote talks:

(1) Prof. Vijay K. Bhargava, Chair Professor and Head of the Department of
Electrical and Computer Engineering at the University of British Columbia:

Keynote Speech Title: “Cognitive Radio Networks: The Future is Friendly”

(2) Prof. Yi-Bing Lin, Chair Professor and Dean of College of Computer
Science, National Chiao Tung University, Taiwan:

Keynote Speech Title: “Reducing Call Costs Acrossing Various International
Telecommunications Networks”

June 15, 2008 Posted by | Call4participations | Leave a comment

DS-RT 2008

12th IEEE/ACM International Symposium on
Distributed Simulation and Real Time Applications,
October 27-29, 2008
Vancouver, BC, Canada

DEMO/TOOL SUBMISSION:   Due Date: June 20th
Notification: July  10th

June 15, 2008 Posted by | Call4demo | Leave a comment

AOMP 2008

AOMP: Agent-Oriented Software Engineering Methodologies and Processes
Track of the 24th Edition ACM Symposium on Applied Computing
Honolulu, Hawaii, USA,  March 8 -12, 2009


AOSE methodologies have been studied since 2000. Traditionally the focus was only onto one of the methodologies’characteristics: workproducts. Investigations on another fundamental characteristic – the process – have been proposed only recently. The aims of this track are the deeper investigations of AOSE methodologies and their underpinned processes. The investigation has started from the idea that an ideal general-purpose AOSE methodology and an ideal general-purpose AOSE process do not exist. The AOSE methodologies proposed in literature in the last years typically are special purpose methodologies with the aim of engineering specific kinds of complex system, and no general purpose AOSE methodology was proposed.  Now there is the need to build new methodologies for new kinds of applications domain (like for example the self-* domain), but the constructions of a new methodology from scratch is a very complex and time-consuming task. So, the reuse of portions of well-tested and well-known methodologies has become very important. Moreover, key factors for the success of new methodologies can often be found in the clear definition of their scope, in the identification of a precise application and development context and in the adoption of a proper formalisation of the approach.  In this track we aim at studying all the elements that affect the construction of a new design process from the features it aims to exhibit to the final evaluation of the result also including adopted modelling languages, techniques and specific methods.

The list of most relevant topics includes, but it is not limited to:

* Methodologies for agent-oriented analysis and design
* Agent-Oriented Software Engineering
* Design of software development processes
* Situational Method Engineering techniques for AOSE design processes
* Relationships between MAS meta-models and their relative AOSE methodologies
* Relationships between AOSE processes and the other traditional processes (e.g. OO)
* Relationship between AOSE methodologies (processes) and MAS Infrastructures
* Meta-modelling techniques
* Software development process models
* Fragment definitions and descriptions
* Integration of  agent-oriented methodologies and processes
* Approaches for AOSE  methodologies: design patterns, components, and architectures
* MAS Product Lines
* Supporting tools for AOSE methodologies/processes construction and enactment
* Standardisation for AOSE methodologies and processes
* Self-* approaches in AOSE methodologies and processes

Important Dates:
Aug. 16, 2008 (strict): Paper submissions
Oct. 11, 2008: Author notification
Oct. 25, 2008: Camera-Ready Copy

June 15, 2008 Posted by | Uncategorized | Leave a comment