INVITATION:
=================
Please, consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results to ICCGI 2012.
The submission deadline is set to February 5, 2012.
In addition, authors of selected papers will be invited to submit extended article versions to one of the IARIA Journals: http://www.iariajournals.org
=================
============== ICCGI 2012 | Call for Papers ===============
CALL FOR PAPERS, TUTORIALS, PANELS
ICCGI 2012, The Seventh International Multi-Conference on Computing in the Global Information Technology
June 24-29, 2012 - Venice, Italy
General page: http://www.iaria.org/conferences2012/ICCGI12.html
Call for Papers: http://www.iaria.org/conferences2012/CfPICCGI12.html
- regular papers
- short papers (work in progress)
- posters
- ideas
Submission page: http://www.iaria.org/conferences2012/SubmitICCGI12.html
Submission deadline: February 5, 2012
Sponsored by IARIA, www.iaria.org
Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org
Please note the Poster and Work in Progress options.
The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.
All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.
Before submission, please check and comply with the Editorial rules: http://www.iaria.org/editorialrules.html
ICCGI 2012 Topics (topics and submission details: see CfP on the site)
Industrial systems
Control theory and systems; Fault-tolerance and reliability; Data engineering; Enterprise computing and evaluation; Electrical and electronics engineering; Economic decisions and information systems; Advanced robotics; Virtual reality systems; Industrial systems and applications; Industrial and financial systems; Industrial control electronics; Industrial IT solutions
Evolutionary computation
Algorithms, procedures, mechanisms and applications; Computer architecture and systems; Computational sciences; Computation in complex systems; Computer and communication systems; Computer networks; Computer science theory; Computation and computer security; Computer simulation; Digital telecommunications; Distributed and parallel computing; Computation in embedded and real-time systems; Soft computing; User-centric computation
Autonomic and autonomous systems
Automation and autonomous systems; Theory of Computing; Autonomic computing; Autonomic networking; Network computing; Protecting computing; Theories of agency and autonomy; Multi-agent evolution, adaptation and learning; Adjustable and self-adjustable autonomy; Pervasive systems and computation; Computing with locality principles; GRID networking and services; Pervasive computing; Cluster computing and performance; Artificial intelligence Computational linguistics; Cognitive technologies; Decision making; Evolutionary computation; Expert systems; Computational biology
Bio-technologies
Models and techniques for biometric technologies; Bioinformatics; Biometric security; Computer graphics and visualization; Computer vision and image processing; Computational biochemistry; Finger, facial, iris, voice, and skin biometrics; Signature recognition; Multimodal biometrics; Verification and identification techniques; Accuracy of biometric technologies; Authentication smart cards and biometric metrics; Performance and assurance testing; Limitations of biometric technologies; Biometric card technologies; Biometric wireless technologies; Biometric software and hardware; Biometric standards
Knowledge data systems
Data mining and Web mining; Knowledge databases and systems; Data warehouse and applications; Data warehousing and information systems; Database performance evaluation; Semantic and temporal databases; Database systems Databases and information retrieval; Digital library design; Meta-data modeling
Mobile and distance education
Human computer interaction; Educational technologies; Computer in education; Distance learning; E-learning; Mobile learning Cognitive support for learning; Internet-based education; Impact of ICT on education and society; Group decision making and software; Habitual domain and information technology; Computer-mediated communications; Immersing authoring; Contextual and cultural challenges in user mobility
Intelligent techniques, logics, and systems
Intelligent agent technologies; Intelligent and fuzzy information processing; Intelligent computing and knowledge management; Intelligent systems and robotics; Fault-tolerance and reliability; Fuzzy logic & systems; Genetic algorithms; Haptic phenomena; Graphic recognition; Neural networks; Symbolic and algebraic computation; Modeling, simulation and analysis of business processes and systems
Knowledge processing
Knowledge representation models; Knowledge languages; Cognitive science; Knowledge acquisition; Knowledge engineering; Knowledge processing under uncertainty; Machine intelligence; Machine learning; Making decision through Internet; Networking knowledge plan
Information technologies
Information technology and organizational behavior; Agents, data mining and ontologies; Information retrieval systems; Information and network security; Information ethics and legal evaluations; Optimization and information technology; Organizational information systems; Information fusion; Information management systems; Information overload; Information policy making; Information security; Information systems; Information discovery
Internet and web technologies
Internet and WWW-based computing; Web and Grid computing; Internet service and training; IT and society; IT in education and health; Management information systems; Visualization and group decision making; Web based language development; Web search and decision making; Web service ontologies; Scientific web intelligence; Online business and decision making; Business rule language; E-Business; E-Commerce; Online and collaborative work; Social eco-systems and social networking; Social decisions on Internet; Computer ethics
Digital information processing
Mechatronics; Natural language processing; Medical imaging; Image processing; Signal processing; Speech processing; Video processing; Pattern recognition; Pattern recognition models; Graphics & computer vision; Medical systems and computing
Cognitive science and knowledge agent-based systems
Cognitive support for e-learning and mobile learning; Agents and cognitive models; Agents & complex systems; computational ecosystems; Agent architectures, perception, action & planning in agents; Agent communication: languages, semantics, pragmatics & protocols; Agent-based electronic commerce and trading systems Multi-agent constraint satisfaction; Agent programming languages, development environments and testbeds; Computational complexity in autonomous agents; Multi-agent planning and cooperation; Logics and formal models of for agency verification; Nomadic agents; Negotiation, auctions, persuasion; Privacy and security issues in multi-agent systems
Mobility and multimedia systems
Mobile communications; Multimedia and visual programming; Multimedia and decision making; Multimedia systems; Mobile multimedia systems; User-centered mobile applications; Designing for the mobile devices; Contextual user mobility; Mobile strategies for global market; Interactive television and mobile commerce
Systems performance
Performance evaluation; Performance modeling; Performance of parallel computing; Reasoning under uncertainty; Reliability and fault-tolerance; Performance instrumentation; Performance monitoring and corrections; Performance in entity-dependable systems; Real-time performance and near-real time performance evaluation; Performance in software systems; Performance and hybrid systems; Measuring performance in embedded systems
Networking and telecommunications
Telecommunication and Networking; Telecommunication Systems and Evaluation; Multiple Criteria Decision Making in Information Technology; Network and Decision Making; Networks and Security; Communications protocols (SIP/H323/MPLS/IP); Specialized networks (GRID/P2P/Overlay/Ad hoc/Sensor); Advanced services (VoIP/IPTV/Video-on-Demand; Network and system monitoring and management; Feature interaction detection and resolution; Policy-based monitoring and managements systems; Traffic modeling and monitoring; Traffic engineering and management; Self-monitoring, self-healing and self-management systems; Man-in-the-loop management paradigm
Software development and deployment
Software requirements engineering; Software design, frameworks, and architectures; Software interactive design; Formal methods for software development, verification and validation; Neural networks and performance; Patterns/Anti-patterns/Artifacts/Frameworks; Agile/Generic/Agent-oriented programming; Empirical software evaluation metrics; Software vulnerabilities; Reverse engineering; Software reuse; Software security, reliability and safety; Software economics; Software testing and debugging; Tracking defects in the OO design; Distributed and parallel software; Programming languages; Declarative programming; Real-time and embedded software; Open source software development methodologies; Software tools and deployment environments; Software Intelligence; Software Performance and Evaluation
Knowledge virtualization
Modeling techniques, tools, methodologies, languages; Model-driven architectures (MDA); Service-oriented architectures (SOA); Utility computing frameworks and fundamentals; Enabled applications through virtualization; Small-scale virtualization methodologies and techniques; Resource containers, physical resource multiplexing, and segmentation; Large-scale virtualization methodologies and techniques; Management of virtualized systems; Platforms, tools, environments, and case studies; Making virtualization real; On-demand utilities Adaptive enterprise; Managing utility-based systems; Development environments, tools, prototypes
Systems and networks on the chip
Microtechnology and nanotechnology; Real-time embedded systems; Programming embedded systems; Controlling embedded systems; High speed embedded systems; Designing methodologies for embedded systems; Performance on embedded systems; Updating embedded systems; Wireless/wired design of systems-on-the-chip; Testing embedded systems; Technologies for systems processors; Migration to single-chip systems
Context-aware systems
Context-aware autonomous entities; Context-aware fundamental concepts, mechanisms, and applications; Modeling context-aware systems; Specification and implementation of awareness behavioral contexts; Development and deployment of large-scale context-aware systems and subsystems; User awareness requirements Design techniques for interfaces and systems; Methodologies, metrics, tools, and experiments for specifying context-aware systems; Tools evaluations, Experiment evaluations
Networking technologies
Next generation networking; Network, control and service architectures; Network signalling, pricing and billing; Network middleware; Telecommunication networks architectures; On-demand networks, utility computing architectures; Next generation networks [NGN] principles; Storage area networks [SAN]; Access and home networks; High-speed networks; Optical networks; Peer-to-peer and overlay networking; Mobile networking and systems; MPLS-VPN, IPSec-VPN networks; GRID networks; Broadband networks
Security in network, systems, and applications
IT in national and global security; Formal aspects of security; Systems and network security; Security and cryptography; Applied cryptography; Cryptographic protocols; Key management; Access control; Anonymity and pseudonymity management; Security management; Trust management; Protection management; Certification and accreditation; Virii, worms, attacks, spam; Intrusion prevention and detection; Information hiding; Legal and regulatory issues
Knowledge for global defense
Business continuity and availability; Risk assessment; Aerospace computing technologies; Systems and networks vulnerabilities; Developing trust in Internet commerce; Performance in networks, systems, and applications; Disaster prevention and recovery; IT for anti-terrorist technology innovations (ATTI); Networks and applications emergency services; Privacy and trust in pervasive communications; Digital rights management; User safety and protection
Information Systems [IS]
Management Information Systems; Decision Support Systems; Innovation and IS; Enterprise Application Integration; Enterprise Resource Planning; Business Process Change; Design and Development Methodologies and Frameworks; Iterative and Incremental Methodologies; Agile Methodologies; IS Standards and Compliance Issues; Risk Management in IS Design and Development; Research Core Theories; Conceptualizations and Paradigms in IS; Research Ontological Assumptions in IS Research; IS Research Constraints, Limitations and Opportunities; IS vs Computer Science Research; IS vs Business Studies
IPv6 Today - Technology and deployment
IP Upgrade - An Engineering Exercise or a Necessity?; Worldwide IPv6 Adoption - Trends and Policies; IPv6 Programs, from Research to Knowledge Dissemination; IPv6 Technology - Practical Information; Advanced Topics and Latest Developments in IPv6; IPv6 Deployment Experiences and Case Studies; IPv6 Enabled Applications and Devices
Modeling
Continuous and Discrete Models; Optimal Models; Complex System Modeling; Individual-Based Models; Modeling Uncertainty; Compact Fuzzy Models; Modeling Languages; Real-time modeling; Performance modeling
Optimization
Multicriteria Optimization; Multilervel Optimization; Goal Programming; Optimization and Efficiency; Optimization-based decisions; Evolutionary Optimization; Self-Optimization; Extreme Optimization; Combinatorial Optimization; Discrete Optimization; Fuzzy Optimization; Lipschitzian Optimization; Non-Convex Optimization; Convexity; Continuous Optimization; Interior point methods; Semi-definite and Conic Programming
Complexity
Complexity Analysis; Computational Complexity; Complexity Reduction; Optimizing Model Complexity; Communication Complexity; Managing Complexity; Modeling Complexity in Social Systems; Low-complexity Global Optimization; Software Development for Modeling and Optimization; Industrial applications
------------------------------
Committee:http://www.iaria.org/conferences2012/ComICCGI12.html
====================
[Apologies for duplicate emails]
Dear colleagues,
A short summary of Thursday's events at RIPE 63 can be found below. The
full Daily Meeting Report, including photos, links to presentations,
webcasts and further information, can be found at:
http://ripe63.ripe.net/programme/report/thursday/
Address Policy Working Group
The third AP WG session started on Thursday with discussion on the IPv6
PI/PA unification proposal made by Gert Doering, AP Working Group
co-Chair. There was an analysis of special cases, the costs and the
"multiple blocks per LIR" scenario that would result from the
unification. The RIPE NCC was tasked to look into possible reasons why
LIRs would like to be able to request multiple prefixes. More feedback
was encouraged on the mailing list.
During the Open Policy Hour, the recent RFC 6382, published by the IETF,
was presented. Some possible interpretation issues with the ripe-525
policy, "Autonomous System (AS) Number Assignment Policy" were
highlighted. The attendees present reached the conclusion that a policy
proposal should not be submitted.
DNS Working Group
The first session of the DNS Session WG had a very diverse set of
presentations, ranging from an update by the RIPE NCC, an update on the
DANE work in IETF, to DNS configuration management and two different
implementations of an authoritative DNS server.
The second DNS session started with an interesting presentation about
the excessive increased query load on the root name servers that
occurred for a brief time this summer, followed by a presentation on
"DNSSEC Trigger". There was also an update on the "IDN Variant Issues
Project" and an update on the status of the DNSEASY and SSR Meetings.
The session ended with a very engaging panel discussion, ranging from
the technical to the political implications of blocking or rewriting DNS
query results at the registry or ISP level and how that affects
operators throughout the world.
EIX Working Group
The first presentation of the session was an introduction to the local
peering scene in Austria, given by Christian Panigl, VIX. There was then
an update on EIX activities, which included the new IPv4 policy and
switch wishlist. Remco van Mook, Equinix, and Martin Pels, AMS-IX,
offered to help with the document. The session continued with a
presentation on "Monitoring Platforms for Internet Exchange Points" and
"Jumbo Frames in AMS-IX", which prompted many in the audience to voice
their opinions.
The second EIX WG session began with a presentation on "Extended
Communities for Route-Servers and ASN32", followed by "How to Resolve
Edge Redundancy for Peering". Next up was Joao Damas, ISC, who talked
about the Open Source Routing project he was working on. There were two
presentations on problems experienced with Proxy-ARP and discussion
focused on why this happened. A Cisco representative said he would bring
this feedback back to Cisco. The session ended with on open mic session
of lightning updates.
RIPE Database Working Group
The RIPE NCC shared the latest RIPE Database developments. RIPE NCC
staff members, Kaveh Ranjbar and Denis Walker, presented on the action
points from the RIPE 62 Meeting, all of which have been completed.
The main discussion of the session was about the geolocation service.
The RIPE NCC showed a prototype of the service and the WG Chair will
present the proposed way forward on the RIPE Database mailing list. The
RIPE NCC was also requested to investigate how internationalisation
could be made possible and what would need to be done if it is decided
to fully serve the data in utf-8.
As reported in the Anti-Abuse WG earlier this week, a requirement of an
abuse contact i in the RIPE Database will start the PDP in the coming
weeks.. This is the result of the Abuse Contact Task Force. An other
issue raised was that objects sponsored by an LIR are not shown in the
RIPE Database. The mailing list will be used to analyse how to move forward.
Cooperation Working Group
The RIPE Cooperation Working Group met in the final session of the day,
and included a remote presentation from European Commission
representative Andrea Glorioso, who emphasised the need for more
synchronisation between the RIPE community and the Commission. Chris
Buckridge, RIPE NCC, gave an update on the Internet Governance Forum
2011, while Nurani Nimpuno, Netnod, spoke about the work of the United
Nations CSTD Working Group on "Improvements to the IGF".
MAT Working Group
The session started with NIC Brazil reporting on how RIPE TTM data is
being used in real time in Brazil. Next there was a presentation on
Google's "Measurement Lab (M-Lab)" . After the talk, a number of people
asked if Google was considering integrating or sponsoring RIPE Atlas.
Wolfgang Nagele, RIPE NCC, then presented on "PCAP Analysis with
HADOOP". The session concluded with two presentations by the RIPE NCC,
one of which updated the audience on the recent developments in the RIPE
NCC's measurements activities. The other announced the introduction of
user defined measurements for RIPE Atlas. David Freedman, Claranet, then
asked the audience how the reachability of a prefix could be measured so
that people can build filters properly and proposed an experiment.
Interest was expressed and he said he would formulate a more solid proposal.
IPv6 Privacy BoF
An IPv6 Privacy BoF was held in the Park Congress I room following the
last working group sessions of the day. The German NGO Arbeitskreis
Vorratsdatenspeicherung’s (Working Group on Data Retention) position on
how user privacy should be supported by ISPs and software/hardware
vendors was discussed as well as how privacy concerns will influence
ISPs’ IPv6 assignment practices.
[Apologies for duplicate emails]
Dear colleagues,
A short summary of Wednesday's events at RIPE 63 can be found below. The
full Daily Meeting Report, including photos, links to presentations,
webcasts and further information, can be found at:
http://ripe63.ripe.net/programme/report/wednesday/
Address Policy Working Group
Emilio Madaio, RIPE NCC Policy Development Officer, gave on overview of
"Current Policy Topics" and the "Policy Development Office Activities".
Alex le Heux, RIPE NCC, continued with "Feedback from RIPE NCC
Registration Services", showing how the implementation can take from
days to years.
The APWG co-Chairs announced their intention to declare consensus on
proposal 2011-02, "Removal of multihomed requirement for IPv6 PI".
2011-04, "Extension of the Minimum Size for IPv6 Initial Allocation" and
2011-05, "Safeguarding future IXPs with IPv4 space" were presented and
discussed.
Dave Wilson, HEAnet, gave an overview "On Inter-RIR Transfers" and asked
for discussion on whether we need an inter-RIR transfer policy. The RIPE
NCC was requested to evaluate the current transfer policy. Rob Blokzijl
then introduced his initiative for the "IPv4 Maintenance Policy" document.
Shane Kerr, ISC, explained the conclusions from yesterday's IPv6 WG
session about IPv6 renumbering. The last item on the agenda was a review
of the withdrawn policy 2008-08, "Initial Certification Policy in the
RIPE NCC Service Region".
ENUM Working Group
The ENUM WG started with Wolfgang Nagele, RIPE NCC, giving an update of
the RIPE NCC's ENUM service. Patrik Faltstrom, Cisco, gave a short
presentation about User ENUM in Sweden. The third presenter, Lino
Santos, reported about the progress made with ENUM in Portugal.
Most of the WG session was covered by an interesting panel discussion
with ENUM experts from various countries and a speaker from from TERENA.
The discussion focused around why ENUM is not so successful and if ENUM
itself is a service or if it is an underlying technology on which
services can be based. An action was assigned to contact all ENUM
operators between now and RIPE 64.
Routing Working Group
Geoff Huston, APNIC, presented the mystery of "The Flat World of BGP"
and Thomas Mangin, EXA Networks Ltd., presented on exaBGP and asked for
feedback. Randy Bush, IIJ, presented the "Impact of the Tohoku
Earthquake on Japanese ISPs" and concluded this was a boring event; the
Internet worked around failures. He also presented on the CPU load of
BGPSEC. Daniel Karrenberg, RIPE NCC, asked for input on the usefulness
of RIS routing beacons. The responses were that they were useful. There
was an action on the RIPE NCC to publish the IPv6 Routing
Recommendations document.
RIPE NCC Services Working Group
The RIPE NCC Services Working Group was the final session of the day.
Following an introduction to the newly composed Senior Management team
by Axel Pawlik, RIPE NCC Managing Director, there was an update from the
RIPE NCC Senior Managers on the organisation's various activities,
priorities and developments and the results of the RIPE NCC Membership
and Stakeholder Survey 2011. There were presentations on the RIPE NCC's
preparation for the distribution of the last remaining IPv4 address
space, and on the progress of the RIPE NCC's project on Contractual
Relationship Requirements for End Users. Finally, Daniel Karrenberg,
RIPE NCC Chief Scientist, reported on the development and future plans
for RIPE Atlas.
PGP Key-Signing Party
The PGP Key-Signing Party has been a regular feature at the last few
RIPE Meetings, and RIPE 63 was no exception. While cryptography ensures
the secrecy of communication, it is important to establish a “web of
trust” so that the authenticity of the involved parties is also known
with a high degree of confidence. The RIPE Meeting presents an ideal
opportunity for attendees to meet, exchange, verify and sign each
others' public keys. Yesterday’s Key-Signing Party was attended by 10-15
people and will be continued at future RIPE meetings.
Dear colleagues,
ITEMS International (Paris) is conducting an independent review of the
ICANN Address Supporting Organisation (ASO). It is very important for
reviewers to gather the views and opinions of the Regional Internet
Registry (RIR) communities, particularly concerning Global Policies.
The RIPE community is strongly urged to share their views on this short
questionnaire:
www.items.fr/aso.php
Kind regards,
Axel Pawlik
RIPE NCC
Managing Director
[Apologies for duplicate emails]
Dear Colleagues,
A short summary of Tuesday's events at RIPE 63 can be found below. The
full Daily Meeting Report, including photos, links to presentations,
webcasts and further information, can be found at:
http://ripe63.ripe.net/programme/report/tuesday/
Plenary
Day two of RIPE 63 began with a busy Plenary session, with talks on
"DDoS Attack Trends Through 2009-2011", the "Reputation of Networks –
RIPE Region" and "Operational Experiences in Deploying 100 GbE". The
RIPE NCC talked about "IPv4 and IPv6 assignments for RIPE NCC Routing
Information Service" and "Resource Request for Business Operations".
There were several comments from the audience about this and it was left
to the community to decide the outcome during the Closing Plenary on
Friday.
The second Plenary session continued the focus on technical issues,
starting with a presentation on transit costs, followed by BGP policy
violations in the data-plane, and an analysis of IPv6 latencies. A study
of measured trends in IPv6 adoption looked primarily at trends seen
around and following World IPv6 Day.
The third Plenary session saw RIPE NCC's Managing Director, Axel Pawlik,
share the RIPE NCC's plan for contacting legacy space holders in the
RIPE NCC service region. The presentation prompted a lot of
participation from the audience, many of whom were legacy space holders
themselves. Axel encouraged legacy space holders, even those with
particularly specific situations, to contact the RIPE NCC. RIPE Chair,
Rob Blokzijl, supported the efforts to "blow off the dust" of legacy
address space.
IPv6 remains a hot topic at RIPE Meetings, with a talk on "IPv6
Deployment Beauty Pageant" and a four-person panel discussing "CPE and
End-User IPv6". Audience comments indicated that having hardware
providers speaking about IPv6 deployment was an encouraging indication
that things were moving in the right direction. Next, several
interesting Lightning Talks were held and David Kessens, reported from a
draft document currently reviewed by the IETF: IANA Reserved IPv4
prefixes for shared CGN space and urged everyone to look at the draft
and participate in the discussion. At the end of the session, Marco
Hogewoning, WG co-Chair, introduced 'speed dating' between those who
have deployed IPv6 and those busy deploying it.
IPv6 Working Group
Shane Kerr, ISC, gave a presentation on renumbering for enterprise
networks and the IETF Working Group that has been established to look at
this issue, seeking operator feedback on their work. The update to RIPE
Document, ripe-501, "Requirements for IPv6 in ICT Equipment", which will
conclude its Last Call phase next week, was discussed. Constanze Bürger
delivered an update on the German government's roll-out of a federal
IPv6 network, which led to some discussion and Timo Hilbrink provided an
update on the IPv6 deployment of Dutch ISP XS4ALL.
Anti-Abuse Working Group
There was a good mix of the technical, the practical and the policy at
the Anti-Abuse Working Group session. Joao Damas, ISC, gave an
interesting presentation on passive DNS. Laura Cobley, Customer Services
Manager at the RIPE NCC, spoke about how to report abuse to the RIPE
NCC. She received many helpful suggestions on how the process should
work. Michele Neylon, Blacknight, talked about how hosting companies
deal with abuse. The session ended with lengthy discussion on
interactions with governments and legal enforcement agencies.