Dear all,
FYI, it seems that Springer LNCS is becoming more
strict about the proceedings they will accept to
publish.
In the recent past, any conference whose scope
was a central topic of computer science was
accepted, which means that very low level events
were sitting side by side with very high level
events.
This seems to be changing. For example, TESTCOM
2005 was finally published in IFIP-LNCS, but only
after some discussion where the acceptance ratio
was a key criterion.
Anyway, we have the TC6 bylaw that all our events
(except workshops) are supposed to have
acceptance rates below 50%. If this is the case,
we will probably be accepted in IFIP-LNCS.
Therefore, we should continue to enforce this
policy, independently of the fact that we still
target LNCS publication or not (according to the
"new" TC6 publication policy).
Best regards,
Guy
--
________________________________________________________________________
Prof. Guy Leduc Phone : +32 4 366 26 98
Université de Liège Secr : +32 4 366 26 91
Réseaux Informatiques Fax : +32 4 366 29 89
Research Unit in Networking (RUN) Email: Guy.Leduc(a)ulg.ac.be
EECS Department, Institut Montefiore, B 28, B-4000 LIEGE 1, BELGIUM
http://www.run.montefiore.ulg.ac.be/People/GuyLeduc/
CoNEXT 2005 - The E-NEXT NoE conference - http://www.co-next.net/
We apologize if you received multiple copies of this call for Papers.
The submission deadline has been extended to 10 July 2005!
IFIP International Symposium on
Network-Centric Ubiquitous Systems (NCUS 2005)
http://www.abo.fi/~lyan/conf/ncus05.html
To be held in conjunction with
IFIP International Conference on Embedded and Ubiquitous Computing
(EUC 2005), Nagasaki, Japan, 6-9 December 2005
[Call for Papers]
Historically, ubiquitous systems have been highly engineered for a
particular task, with no spontaneous interactions among devices.
Recent advances in wireless communication and sensor and actuator
technologies have given rise to a new genre of ubiquitous systems.
This new genre is characterized as self-organizing, critically
resource constrained, and network-centric. The fundamental change is
communication: numerous small devices operating collectively, rather
than as stand-alone devices, form a dynamic ambient network that
connects each device to more powerful networks and processing
resources.
IFIP International Symposium on Network-Centric Ubiquitous Systems
(NCUS 2005) is launched to serve as a premier international forum for
researchers and practitioners, from both industry and academia to
share latest research results and ideas on ubiquitous networking and
its applications, thereby promoting research activities in this area.
In addition to regular research papers to be selected on standard peer
reviewed, the program of the workshop will include invited talks and
position papers.
Topics of interest include, but not limited to, the following:
* Software Engineering technologies and Formal Techniques for
modeling, designing, and testing network-centric ubiquitous systems
* Hardware Architectures, Communication Protocols, Human-Computer
Interaction and other enabling technologies for network-centric
ubiquitous systems
* Theoretical foundations and algorithms for ubiquitous networking
* Context awareness, adaptation and management in network-centric
ubiquitous systems
* Peer-to-Peer and overlay networks, systems, and applications in
ubiquitous systems
* Mobile networks, Sensor networks, unmanned air and ground vehicle
networks, and applications
* Web services and Middleware support for ubiquitous networking
* Security and Trust management in ubiquitous networks, systems, and
applications
* Energy management and harvesting for network-centric ubiquitous systems
* Simulation, Performance evaluation, Experiments, and trials of
ubiquitous networks and applications
* Comprehensive survey on timely topics
[Submission]
Prospective authors are encouraged to submit an electronic version of
original manuscripts (not being considered for publication elsewhere),
not exceeding 18 single-column, single-spaced pages, to
lu.yan(a)ieee.org, with the subject line "Submission to NCUS2005".
Submissions should be in PDF. Authors should make sure that the
submission can be viewed via Acrobat Reader and printed correctly via
standard letter or A4 size paper. We strongly recommend authors to
format their submissions in Springer-Verlag LNCS style (instructions
and templates are available here).
[Proceedings]
Accepted papers will be published as proceedings by Lecture Notes in
Computer Science (LNCS), Springer-Verlag. Instructions about the
preparation of a final proceedings version will be sent to the authors
of accepted papers. Authors of an accepted paper must guarantee that
at least one of the authors will attend the symposium and present
their paper.
[Important Dates]
Submission Deadline July 10, 2005
Notification of Acceptance August 15, 2005
Final Version Deadline September 15, 2005
[Organizing Committee]
General Co-chair:
Jingyuan (Alex) Zhang, University of Alabama, USA
Jon (Jong-Hoon) Youn, University of Nebraska at Omaha, USA
Steering Co-Chair:
Laurence T. Yang, St. Francis Xavier University, Canada
Program Co-chair:
Lu Yan, Turku Centre for Computer Science (TUCS), Finland
Luis Javier Garcia Villalba, Complutense University of Madrid (UCM), Spain
Program Committee:
Nael Abu-Ghazaleh, SUNY Binghamton, USA
Saad Biaz, Auburn University, USA
Jacir L. Bordim, University of Brasilia, Brazil
Phillip Bradford, University of Alabama, USA
Jiannong Cao, Hong Kong Polytechnic University, China
Guangbin Fan, University of Mississippi, USA
Satoshi Fujita, Hiroshima University, Japan
Xiaoyan Hong, University of Alabama, USA
Anup Kumar, University of Louisville, USA
Jiageng Li, University of West Georgia, USA
Koji Nakano, Hiroshima University, Japan
Huai-Rong Shao, Samsung, USA
Randy Smith, University of Alabama, USA
Dajin Wang, Montclair State University, USA
Zhijun Wang, University of Alabama, USA
Claudia Jacy Barenco Abbas, University of Brasilia, Brazil
Qing-An Zeng, University of Cincinnati, USA
Ming Yu, SUNY at Binghamton, USA
Jiang (Leo) Li, Howard University, USA
Mohamed Ould-Khaoua, University of Glasgow, UK
Mieso Denko, University of Guelph, Canada
Chih-Hung Chang, Tamkang University, Taiwan
Chung-Ta King, National TsingHua University, Taiwan
Yu-Chee Tseng, National Chiao-Tung University, Taiwan
Xinrong Zhou, Abo Akademi, Finland
Antonio Puliafito, University of Messina, Italy
Chu-Sing Yang, National Sun Yat-sen University, Taiwan
Han-Chieh Chao, National Dong Hwa University, Taiwan
Jianhua Ma, Hosei University, Japan
Nidal Nasser, University of Guelph, Canada
Hong Shen, Japan Advanced Institute of Science and Technology, Japan
Hai Jin, Huazhong University of Science and Technology, China
Doo-Hwan Bae, Korea Advanced Institute of Science and Technology, Korea
Jun Pang, INRIA-Futurs, France
Rafael Timoteo de Sousa, Universidad de Brasilia, Brazil
Ricardo Puttini, Universidad de Brasilia, Brazil
Paulo Roberto de Lira Gondim, Universidad de Brasilia, Brazil
Mario Dantas, Universidad Federal de Santa Catarina, Brazil
Mirela Sechi Moretti Annoni Notare, Faculdades Barddal, Brazil
Alba Melo, Universidad de Brasiliam, Brazil
Dan Grigoras, University College Cork, Ireland
Ami Marowka, Shenkar College of Engineering and Design, Israel
Hesham Ali, University of Nebraska at Omaha, USA
Chulho Won, University of Nebraska at Omaha, USA
Hamid Sharif, University of Nebraska at Lincoln, USA
Jitender Deogun, University of Nebraska at Lincoln, USA
Seungjin Park, Michigan Technological University, USA
Dana Petcu, Institute e-Austria Timisoara, Romania
Maria Ganzha, Private Institute of Higher Learning, Poland
Kathy Liszka, University of Akron, USA
Hyunjeong Lee, University of Nevada, USA
Song Ci, University of Massachusetts Boston, USA
Hyunyoung Lee, University of Denver, USA
Guanling Chen, University of Massachusetts Lowell, USA
Gary Marsden, University of Cape Town, South Africa
Marcin Paprzycki, Oklahoma State University, USA
Il Kyeun Ra, University of Colorado at Denver, USA
First International Conference on Scalable Information Systems
(INFOSCALE)
30 May - 1 Jun 2006, Hong Kong
http://www.infoscale.org/
PRELIMINARY CALL FOR PAPERS
As the data volumes continue to increase and the ways of information
dispersion across the globe continue to diversify, new scalable methods
and structures are needed for efficiently processing those distributed
and autonomous data. Grid computing, P2P technology, distributed
information retrieval technology, and networking technology all must be
merged to address the scalability concern. This forum focuses on this
key merged domain and looks for new integrated solutions for this
diversifying world of information.
Conference Scope:
Parallel Information Retrieval
Scalable Distributed Information Retrieval
Scalable Grid Information Systems
P2P Systems
Scalable Mobile/Sensor DB Systems
Index Compression Methods
Architectures for Scalability
Networking for Scalable Information Systems
Scalable Information System Applications
(medicine, biology, military, etc.)
Evaluation Metrics for Scalability
VLDB
Data Mining
Information Security
Important Deadlines (tentative):
Paper submission: 1 Oct 2005
Notification: 31 Dec 2005
Final version: 15 Feb 2006
Publications: Original and previously unpublished technical papers
are solicited for presentation at the conference and publication in
the proceedings. The proceedings will be published by IEEE Press and
available online through IEEE Xplore. Selected papers will be
published in journal special issues.
General Chair
Xiaohua Jia, City University of Hong Kong
PC Chairs
Abdur Chowdhury, AOL
Francis Lau, The University of Hong Kong
Frank Zhigang Wang, Cambridge-Cranfield High Performance
Computing Facilities
Steering Committee Chairs
Imrich Chlamtac, CreateNet Research Consortium, Chair
Ophir Frieder, Illinois Institute of Technology, Co-chair
Publicity Chairs
Jinli Cao, La Trobe University
Local Arrangement Chair
Victor Lee, City University of Hong Kong
Program Committee
Khalid Al-Begain, University of Glamorgan, Wales
David Al-Dabass, University of Nottingham Trent, UK
Mohand Boughanem, University Paul Sabatier, France
Andrei Broder, IBM T. J. Watson Research Center, USA
Wentong Cai, Nanyang Technological University, Singapore
Jamie Callan, Carnegie Mellon University, USA
David Carmel, IBM Research, Israel
Jose Manuel Garcia Carrasco, University of Murcia, Spain
Scott Cost, University of Maryland Baltimore County, USA
Fabio Crestani, University of Strathclyde, UK
Arjen de Vries, Centrum voor Wiskunde en Informatica,
Netherlands
David Doermann, University of Maryland, USA
Tarek El-Ghazawi, George Washington University, USA
Dan Feng, Huazhong University of Science and Technology, P. R.
China
Galal Hassan Galal-Edeen, Cairo University, Egypt
Lee Giles, Pennsylvania State University, USA
Nazli Goharian, Illinois Institute of Technology, USA
Siegmar Gross, University of Applied Sciences, Germany
David Grossman, Illinois Institute of Technology, USA
David Hawking, Commonwealth Scientific and Industrial Research
Organisation, Australia
Andreas Henrich, University of Bamberg, Germany
Otthein Herzog, University of Bremen, Germany
Djoerd Hiemstra, University of Twente, Netherlands
Jimmy Huang, York University, Canada
George Ioannidis, University of Bremen, Germany
Narayana Jayaram, London Metropolitan University, UK
Guojun Jin, Lawrence Berkeley Laboratory, USA
Joemon Jose, University of Glasgow, UK
Paul Kantor, Rutgers University, USA
Stefan Kirn, University of Hohenheim, Germany
Aleksander Kolcz, AOL, USA
Peter Komisarczuk, University of Wellington, New Zealand
Axel Korthaus, University of Mannheim, Germany
Donald Kraft, Louisiana State University, USA
Mounia Lalmas, Queen Mary University of London, UK
Minglu Li, Shanghai Jiaotong University, P. R. China
Tao Li, University of Rochester, USA
Andrew MacFarlane, City University London, UK
James Mayfield, Johns Hopkins University, USA
Massimo Melucci, University of Padova, Italy
Lingkui Meng, Wuhan University, P. R. China
Charles Nicholas, University of Maryland, USA
Greg Pass, AOL, USA
Yale Patt, University of Texas, USA
Thomas Roelleke, Queen Mary University London, UK
Heiner Stuckenschmidt, Vrije Universiteit Amsterdam, Netherlands
Xian-He Sun, Illinois Institute of Technology, USA
Ulrich Thiel, Fraunhofer Integrated Publication and information
Systems Institute, Germany
Ingo Timm, University of Bremen, Germany
Anastasios Tombros, Queen Mary University London, UK
Pavel Tvrdik, Czech Technical University, Czech Republic
Herman Vandermulen, AOL, USA
Zhichen Xu, Yahoo, USA
Wai Gen Yee, Illinois Institute of Technology, USA
Jim Yip, University of Huddersfield, UK
Clement Yu, University of Illinois at Chicago, USA
Zhu Zhang, University of Michigan, USA
[Many appologies if you receive duplicates of this message]
=======================================
C A L L for P A R T I C I P A T I O N
=======================================
*** PERFORMANCE 2005 ***
The 24th IFIP WG7.3 International Symposium on
Computer Performance Modeling, Measurement and Evaluation
Juan-les-Pins, France
October 3-7, 2005
http://www-sop.inria.fr/maestro/performance2005/
The IFIP WG7.3 International Symposium on Computer Performance Modeling,
Measurement and Evaluation (PERFORMANCE 2005) will be held in
Juan-les-Pins, France on October 5-7, 2005. The tutorials will be held
on October 3 and 4, 2005.
The list of accepted papers and tutorials and the conference
registration form can be found on the conference website.
Registrations are now *open*. Early conference registration: by
September 3, 2005.
Student travel grant:
A number of student travel grants will be available. Details on how to
apply can be found on the conference website.
Conference hotel:
Rooms have been reserved at a negotiated rate at
Hotel Ambassador
50-52, chemin des Sables
B.P. 49 - 06160 Juan-Les-Pins Cedex
FRANCE
Tel: +33 (0)4 92 93 74 10 - Fax: +33 (0)4 93 67 79 85
e-mail: manager(a)hotel-ambassadeur.com
URL: http://www.hotel-ambassadeur.com/
A list of nearby hotels has been posted on the conference website.
------------------------------------------------------------------------
General Chair:
Philippe Nain (INRIA, France)
Program Committee Co-Chairs:
Cheng-Shang Chang (National Tsing Hua U., Taiwan)
Daniel A. Menascé (George Mason U., USA)
Tutorial Co-Chairs:
Eitan Altman (INRIA, France)
Zhen Liu (IBM T. J. Watson Reseach Center, USA)
Proceedings Chair:
Rudesindo Nunez Queija (CWI & U. Eindhoven, Netherlands)
Posters Chair:
Thomas Bonald (France Telecom R&D, France)
Local arrangements:
Ephie Deriche (INRIA, France)
Dany Sergeant (INRIA, France)
Finance Chair:
Dany Sergeant (INRIA, France)
Publicity Chair:
Sara Alouf (INRIA, France)
Corporate Sponsors:
IBM T.J. Watson Research Center
France Telecom R&D
Texas Instruments
Institutional Sponsors:
IFIP WG7.3
Computer Performance Foundation
INRIA
Conseil Régional de la Région Provence-Alpes-Côte-d'Azur
Conseil Général des Alpes-Maritimes
------------------------------------------------------------------------
--------------------------------------------
ACM Student Research Competition
--------------------------------------------
For the first time, the annual SIGMOBILE MOBICOM conference is hosting the
ACM Student Research Competition (SRC). Students submitting to the MOBICOM
2005 Poster Program can opt to have their posters considered also by the
SRC committee. Selected competitors will receive up $500USD for their
conference travel, depending on need and eligibility. Competitors should
be prepared to attend the poster session and, if selected for further
competition, give a short talk about their research projects. Winners will
be announced at the conference.
To participate:
The Student Research Competition is open to graduate and undergraduate
students whose submissions are accepted by the SRC committee. To be
considered, complete a submission to the Student Poster Programm by June
20, 2005, and indicate that you would like to participate in the SRC.
Current ACM student membership and student status as of the submission
deadline are required for the lead student.
Contact:
Haiyun Luo, University of Illinois, (haiyun(a)cs.uiuc.edu)
Dirk Westhoff, NEC Research Europe, (dirk.westhoff(a)netlab.nec.de)
Dear colleague,
we are happy to announce the availability of the AVISPA Tool v1.0 for
the Automatic Validation of Internet Security-sensitive Protocols and
Applications. It is downloadable by following the link below:
http://www.avispa-project.org/download.html
For more information about the AVISPA Project, you may look at
http://www.avispa-project.org.
The announcement of this release of the tool is enclosed below.
The AVISPA Team
--------------------------------------------------------------------
XXX X X XXXXX XXXXX XXXXXX XXX
X X X X X X X X X X X
X X X X X X X X X X
X X X X X X X X X X
XXXXXXX X X X XXXXX XXXXXX XXXXXXX
X X X X X X X X X
X X X X X X X X X
X X X X X X X X X
X X X XXXXX XXXXX X X X
V E R S I O N 1 . 0
(June 14, 2005)
We are happy to announce the availability of the AVISPA Tool v1.0, a
push-button tool for the Automatic Validation of Internet
Security-sensitive Protocols and Applications. The AVISPA Tool v1.0
is available at
http://www.avispa-project.org
===========================
Overview of the AVISPA Tool
===========================
The AVISPA Tool is a push-button tool for the automated validation of
Internet security-sensitive protocols and applications. It provides a
modular and expressive formal language (called HLPSL) for specifying
protocols and their security properties, and integrates different
back-ends that implement a variety of state-of-the-art automatic
analysis techniques ranging from protocol falsification (by finding an
attack on the input protocol) to abstraction-based verification
methods for both finite and infinite numbers of sessions.
The HLPSL is an expressive, modular, role-based, formal language that
allows for the specification of control flow patterns,
data-structures, alternative intruder models, complex security
properties, as well as different cryptographic primitives and their
algebraic properties. These features make HLPSL well suited for
specifying modern, industrial-scale protocols. Moreover, the HLPSL
enjoys both a declarative semantics based on a fragment of the
Temporal Logic of Actions and an operational semantics based on a
translation into the rewrite-based formalism Intermediate Format IF.
The AVISPA Tool automatically translates HLPSL specifications into
equivalent IF specifications which are in turn fed to the back-ends.
Currently the following back-ends are integrated in the AVISPA Tool:
* The On-the-fly Model-Checker (OFMC) performs protocol falsification
and bounded verification by exploring the transition system
described by an IF specification in a demand-driven way. OFMC
implements a number of correct and complete symbolic techniques. It
supports the specification of algebraic properties of cryptographic
operators, and typed and untyped protocol models.
* The Constraint-Logic-based Attack Searcher (CL-AtSe) applies
constraint solving with some powerful simplification heuristics and
redundancy elimination techniques. CL-AtSe is built in a modular
way and is open to extensions for handling algebraic properties of
cryptographic operators. It supports type-flaw detection and handles
associativity of message concatenation.
* The SAT-based Model-Checker (SATMC) builds a propositional formula
encoding a bounded unrolling of the transition relation specified by
the IF, the initial state and the set of states representing a
violation of the security properties. The propositional formula is
then fed to a state-of-the-art SAT solver and any model found is
translated back into an attack.
* The TA4SP (Tree Automata based on Automatic Approximations for the
Analysis of Security Protocols) back-end approximates the intruder
knowledge by using regular tree languages and rewriting. For
secrecy properties, TA4SP can show whether a protocol is flawed (by
under-approximation) or whether it is safe for any number of
sessions (by over-approximation).
In order to demonstrate the effectiveness of the AVISPA Tool on a
large collection of practically relevant, industrial protocols, we
have selected a substantial set of security problems associated with
protocols that have recently been or are currently being standardized
by organizations like the Internet Engineering Task Force IETF. We
have then formalized in HLPSL a large subset of these protocols, and
the result of this specification effort is the AVISPA Library
(publicly available at the AVISPA web-page), which at present
comprises 112 security problems derived from 33 protocols.
Further details on the AVISPA Tool v1.0 and on the AVISPA project can
be found in the paper:
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna,
J. Cuellar, P. Hankes Drielsma, P.C. Heam, O. Kouchnarenko,
J. Mantovani, S. Moedersheim, D. von Oheimb, M. Rusinowitch,
J. Santiago, M. Turuani, L. Vigano`, L. Vigneron. "The AVISPA Tool
for the Automated Validation of Internet Security Protocols and
Applications." In Proc. CAV'05, LNCS. Springer Verlag, 2005,
Available at the URL http://www.avispa-project.org/avispa-cav05.ps
========
PARTNERS
========
The following research groups have contribute to the development of
the AVISPA Tool v1.0:
* Artificial Intelligence Laboratory,
Dipartimento di Informatica, Sistemistica e Telematica (DIST),
University of Genova, Italy
* Laboratoire Lorrain de Recherche en Informatique et ses Applications
(LORIA UMR 7503) with partners INRIA, CNRS, Universite' Henri Poincare' (UHP)
Université Nancy 2 AND
Laboratoire d'Informatique de l'Universite' de Franche-Comte',
France
* Eidgenoessische Technische Hochschule Zuerich (ETHZ),
Information Security Group, Department of Computer Science,
Zuerich, Switzerland
* Siemens Aktiengesellschaft, Munich, Germany
================
GETTING IN TOUCH
================
The home page of the AVISPA project is <http://www.avispa-project.org>.
A mailing list <avispa-users(a)avispa-project.org> for general
questions, bugs and bug fixes, possible extensions, and user requests
on the AVISPA Tool is available. To register please send an empty
message to
<avispa-users-join(a)avispa-project.org>
New releases and other important events for AVISPA will be also
announced on this list.
--
The AVISPA Team
http://www.avispa-project.org
--------------------------------------------------------------------
Please distribute as widely as you can! See for more details the attached
document.
Thank you for your help!
Best regards
Dominique
CALL FOR PAPERS AND TUTORIALS
Net-Con2005
Network Control and Engineering for QoS, Security and Mobility
IFIP TC6 Conference, sponsored by WG6.2 (Network and Internetwork
Architectures), WG6.6 (Management of Networks and Distributed Systems),
WG6.7 (Smart Networks) and WG6.8 (Mobile and Wireless Comm)
France Télécom - Lannion, France - November 14 18, 2005
CALL FOR PAPERS
INFORMATION SCIENCES
Special Issue:AMBIENT INTELLIGENCE
Ambient Intelligence (AmI) is an innovative paradigm of invisible adaptive network technologies that integrates concepts ranging from ubiquitous computing to autonomous and intelligent systems. AmI supports the vision that technology will become invisible, embedded in our natural surroundings, present whenever we need it, attuned to all our senses, adaptive to users and context and autonomously acting. High quality information and content must be available to any user, anywhere, at any time, and on any device.
In an ambient intelligent environment ,people are surrounded with networks of embedded intelligent devices that deliver ubiquitous information, communication, services, and entertainment. Furthermore, the devices adapt themselves to users, and even anticipate their needs. Ambient intelligent environments present themselves quite differently compared to contemporary handheld or stationary electronic boxes and devices. Electronics will be integrated into clothing, furniture, cars, houses, offices, and public places, introducing the problem of developing new user interface concepts that allow natural interaction with these environments. A promising approach is the one in which users interact with their digital environments in the same way as they interact with each other.
In the context of this theme,original contributions are solicited in all relevant areas, including but not limited to
·
Mobile and Wireless Networking in Ambient Intelligence Environment
·
Robotics platforms for AmI
·
Information fusion
·
Real-time Knowledge Management for AmI
·
Speech Recognition
·
Sensor Networking
·
Machine Vision algorithms for scene interpretation and HCI
·
Computational Intelligence and Machine Learning algorithms
·
Design and deployment of innovative infrastructures
·
Mobile Learning in AmI environment
·
Peer-to-Peer and Grid-Based Services for Mobile Users
·
Networking in Miniature Wearable Computers and Embedded Systems Software
·
Arts and Entertainment in AmI environment
Prospective authors should prepare their manuscript in accordance with the requirements of the Information Sciences presented in detail in the Information for Authors.Authors should submit an electronic version(PDF) format to vasilako(a)ath.forthnet.gr adhering to the following schedule:
Manuscript Submissions Nov 1, 2005
Acceptance Notification Febr 1,2006
Final Manuscript Due May 1,2006
Publication 3rd Quarter 2006
Guest Editor: Dr.Athanasios Vasilakos, University of Thessaly,Greece.
PERFORMANCE 2005
IFIP WG 7.3 International Symposium on
Computer Performance, Modeling, Measurements and Evaluation
Oct. 3-7, Juan-les-Pins, France
http://www-sop.inria.fr/maestro/performance2005/
CALL FOR POSTERS
The PERFORMANCE 2005 conference solicits posters on recent or ongoing
research in the areas of:
* Performance-oriented design and evaluation of: communication
networks, mobile and wireless systems, Internet servers and E-commerce
systems, Web services, Web architectures, peer-to-peer systems, grid
computing, computer architectures, database systems, operating systems,
software systems, distributed systems, multimedia systems, file and I/O
systems, memory systems, real-time systems, and fault-tolerant systems.
* Techniques and algorithms: analytic modeling, performance
optimization, queueing analysis, stochastic scheduling, model
verification and validation, power analysis, hybrid models, experimental
design, system or network measurement and monitoring, workload
characterization, simulation, and statistical analysis.
The poster session is intended to present and discuss innovative
research work in an informal setting. The submission by students is
especially encouraged.
SUBMISSION GUIDELINES
A poster submission consists of an extended abstract of up to 2 pages
(double column, 9-point or larger fonts) including the names and
affiliations of the authors. Poster submissions must be sent by email to
posters.perf2005(at)sophia.inria.fr as Postscript or Adobe PDF files.
Posters will be selected by the Poster Committee. The extended abstracts
of accepted posters will be published in a special issue of the
Performance Evaluation Review. Any question must be directed to the
Poster Committee Chair at posters.perf2005(at)sophia.inria.fr
IMPORTANT DATES
Submission due: July 7, 2005
Notification to authors: July 22, 2005
Camera ready extended abstract due: August 19, 2005
POSTER COMMITTEE
Thomas Bonald, France Telecom (chair)
Sem Borst, Bell Labs and CWI
Alain Jean-Marie, U. Montpellier and INRIA
(other members to be announced)
--
Sara Alouf
Publicity Chair of Performance 2005
Dear all,
today I have distributed the minutes of meeting 2005/1 in Toronto
(they have been prepared by Jan Slavik).
Something strange must have happened:
Whereas some of you have already confirmed and have even
indicated some necessary modifications
others haven't apparently received the attachments.
Could you please indicates whether you got
- my email message
- the minutes as attachment
- the new IFIP publication policy as attachment?
Best regards
Otto