| |||||||||||||||
NSysS 2016 : 2nd International Conference on Networking Systems and Security | |||||||||||||||
Link: http://cse.buet.ac.bd/nsyss2016/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The 2nd International Conference on Networking Systems and Security 2016 (NSysS 2016) aims at providing a forum of researchers, practitioners, developers, and users to exchange new ideas and results related to computer networks, networking systems, and security across academia and industry. The conference is technically co-sponsored by ACM Chapter and IEEE Bangladesh Section [approval pending].
We solicit original technical papers articulating novel ideas, protocols, and algorithms with ground-breaking results and/or quantified experiences involving networking systems and security. The conference values papers, which will take a broad networking and/or security perspective(s) covering contemporary and future applications. Of particular interest are technical contributions that enable new and compelling networking and security paradigms. Scope: Scope of the conference covers, but is not limited to, the following: Addressing and location management Cellular and broadband wireless nets Cognitive radio networking Congestion control Cross layer design and optimization Cyber physical systems and networking Data centers Data reduction, inference, and signal processing Delay/disruption tolerant networks Denial of service Embedded software for sensor networks Energy harvesting Experience with real-world applications Experimental results from operational networks or network applications Fault-tolerance, reliability, and troubleshooting Future Internet design Innovative applications and deployment experiences Mobile, participatory, and social sensing Multicast, broadcast and anycast Multimedia protocols Near field communication Network architectures Network management and traffic engineering Network security and privacy Network simulation and emulation Network, transport, and application-layer protocols Novel components, devices and architectures for networked sensing Operating systems and runtime environments Optical networks P2P, overlay, and content distribution networks Power control and management Quality of service Resource allocation and management RFID networks and protocols Satellite networks Scheduling and buffer management Security, trust and privacy Self-organizing networks Sensor data storage, retrieval, processing and management Social computing and networks Switches and switching Theoretical foundation and fundamental bounds Topology characterization and inference Underground and underwater networks Vehicular networks Wireless, mobile, ad-hoc, and sensor networks |
|