(Apologies if you receive this call multiple times.)
***********************************************************************
CALL FOR POSTERS and DEMOS
*** NEW DEADLINE: July 16, 2006, 5 pm EDT***
IEEE SECON 2006
The Third IEEE International Conference on
Sensors, Mesh and Ad Hoc Communications and Networks
http://www.ieee-secon.org/2006/
Sponsored by IEEE Communications Society (www.comsoc.org)
Technically Co-Sponsored by AFCEA (www.afcea.org)
September 25-28, 2006
Reston, Virginia, USA (Near Washington DC's Dulles airport)
************************************************************************
To provide a forum for discussion and personal interaction between
presenter and participants, IEEE SECON 2006 will include poster and
demonstration sessions: works in progress, industry demonstrations of
new applications and techniques, practical implementations, military,
industrial and commercial developments, research testbeds and
demonstrations, recent research/implementation results, upcoming
research challenges, future directions, and novel approaches in the
fields of sensor, mesh and ad hoc communications and networks. One of
the key goals of this conference is to foster collaboration between
industry, government agencies and academia. Hence, participation of
researchers/developers from industry or governement agencies and
posters/demonstrations reporting joint work are especially encouraged.
Topics considered for posters and demo are, but not limited
to:
* New architectures and protocols to support
communication, localization, time synchronization,
routing, data dissemination, and other distributed
services in heterogeneous, large-scale distributed,
mesh networks and sensor networks
* Novel algorithms and theories for management,
supervisory control, and monitoring of distributed ad
hoc networks, and techniques for the interpretation
and use of sensor data in decision-making processes
* Modeling and performance evaluation of large-scale
distributed ad hoc and sensor networks, practical
implementations and deployments, and real-world
experiences
* Theories and models on fundamental information and
communication aspects of wireless mesh and sensor
networks
* Mechanisms for authenticated, secure communication and
data dissemination in sensor and mesh networks
* Algorithms and protocols to support quality of service
in mesh and sensor networks, including admission
control, resource allocation and fairness, and
capacity planning
* Integration of sensors into engineered systems,
including novel techniques for on-sensor renewable
power sources, mechanisms for on-sensor
self-calibration and self-testing, and efficient
schemes to maximize accuracy and minimize false alarms
* Hardware platforms incorporating multiple sensors,
computation, actuation, and wireless interfaces
* Software platforms, middleware, and tools for mesh and
sensor network applications development, deployment,
and management
Submissions should be in the form of a proposal describing the main
contributions of the poster/demo and the merits of the proposed ideas.
If available, preliminary results can also be included. Proposals will
be evaluated mainly based on their potential to stimulate interesting
discussions, exchange of ideas and promote collaborations.
A prize will be awarded to the best demo by a jury composed of academic
and/or venture capital participants.
Submissions should not be more than three pages (preferably IEEE
conference format, 2-column) in length. Demonstration submissions should
include the space requirements and/or any other equipment-specific
requirements. The documents must contain the authors' names,
affiliations, and contact information and the designated corresponding
author.
Accepted authors of posters/demos will have a space in the poster/demo
session room to display their posters or exhibit their demos and
describe their work in discussions with interested attendees.
IEEE Communications Society policy states that all accepted SECON 2006
posters/demos must have at least one registration at the regular rate.
For authors co-authoring multiple posters/demos, one regular
registration is valid for up to three presentations.
Submission will be accepted until Sunday July 16 2006, 5 pm EDT for
demos and for posters. Please send the submission material to the
poster/demo chairs in pdf format, and make sure to include the first
author name and either POSTER or DEMO in the name of the pdf file:
Stefano Basagni Cedric Westphal
Northeastern University Nokia
basagni(a)ece.neu.edu cedric.westphal(a)nokia.com
Notification of Poster/Demo decisions: August 7, 2006. Accepted
Poster/Demo Presenters MUST register by August 31, 2006.
************************************************************************
Dear all,
as agreed upon in Coimbra I have made the following actions:
- inviting Pedro Cuenca (Spain) + Jozef Woniak (Poland)
to submit proposals for 6.8 and to present the ideas
at the occasion of the next meeting in Paris
- inviting Josep Sole Pareta (Spain) + Ioannis Tomkos (Poland)
to submit proposals for 6.10 and to present the ideas
at the occasion of the next meeting in Paris.
Thanks a lot to Ramon Puigjaner and to Jan Slavik who
established the first contacts.
Josep and Ioannis have already agreed to come to Paris.
For 6.8 we had a suggestion for a third candidate (Mario Gerla
or somebody else from the US scene); Guy Pujolle promised
to establsih a contact. No response received yet.
Guy Pujolle has started the nomination phase for a new
chairman of 6.2 (as you knw, Guy has become the TC6
delegate of France as successor of Samir Tohme).
Another topic is Networking 2008 (as you know, Networking
2007 will be held in Atlanta).
We had initially suggested to have Networking 2008 in London.
In the last meeting, however, it was decided to leave that
decision open. Condidates should be invited to present
their concepts in September in Paris.
Guy Pujolle promised to ask Erol Gelenbe (London) about that.
No response received thus far.
I took the responsibility to contact Francis Lee (Singapore)
who had submitted a bid for 2007 not knowing that the
decision for Atlanta was already made long ago.
Thus I wrote a message to Francis Lee.
He reacted prompty saying that he is still very interested
but that he has to discuss that in more detail with
the organisation committee.
Best regards
Otto
Dear all,
until now (approx. four hours since sending my corresonding
message) only one -but very detailed and constructive - answer
has been obtained concerning the IFIP strategy document.
We need an earlier deadine since
Basie von Solms leaves for Europe already on June 6 and needs
the comments by June 5.
Thus either you send your comments directly to him
or send it to me *** until June 1 ***. (June 4 + 5 are holidays
in catholic countries).
Best regards
Otto
IEEE Wireless Communications and Networking Conference (WCNC 2007)
11 – 15 March 2007 / Hong Kong / http://www.ieee-wcnc.org
CALL FOR PAPERS: DEADLINE DATE OF 20 SEPTEMBER 2006
IEEE Wireless Communications and Networking Conference (WCNC) is one of the world's foremost international technical conferences for engineers and researchers at the forefront of development and deployment of wireless technologies.
In 2007, for the first time ever, WCNC will be held outside North America in Asia's world city, Hong Kong.
IMPORTANT DATES
Full paper submissions: 20 September 2006
Notification of acceptance: 8 December 2006
Camera ready submission: 5 January 2007
CALL FOR PROPOSALS
The WCNC 2007 organizing committee invites you to submit proposals for tutorials, technical papers and Technology/Business Applications Panels.
Deadline: 20 September 2006
ORGANIZATION
General Chairs Technical Program Chair
Khaled B. Letaief, Chih-Lin I Ross D. Murch
For more WCNC 2007 details & updates, visit: http://www.ieee-wcnc.org
FCS-ARSPA'06
Joint Workshop on
Foundations of Computer Security
and
Automated Reasoning for Security Protocol Analysis
co-located with LICS'06 as part of FLoC'06
Seattle, August 15 - 16, 2006
http://www.easychair.org/FLoC-06/FCS-ARSPA.html
******************************
*** CALL FOR PARTICIPATION ***
******************************
Overview
Computer security is an established field of computer science of both
theoretical and practical significance. In recent years, there has been
increasing interest in logic-based foundations for various methods in
computer security, including the formal specification, analysis and
design of security protocols and their applications, the formal
definition of various aspects of security such as access control
mechanisms, mobile code security and denial-of-service attacks, and the
modeling of information flow and its application to confidentiality
policies, system composition, and covert channel analysis.
The workshop FCS-ARSPA'06 is the fusion of two workshops. The workshop
FCS continues a tradition, initiated with the Workshops on Formal
Methods and Security Protocols (FMSP) in 1998 and 1999, then with the
Workshop on Formal Methods and Computer Security (FMCS) in 2000, and
finally with the LICS satellite Workshop on Foundations of Computer
Security (FCS) in 2002 through 2005, of bringing together formal methods
and the security community. The ARSPA workshop is the third in a series
of successful workshops on Automated Reasoning for Security Protocol
Analysis, bringing together researchers and practitioners from both the
security and the formal methods communities, from academia and industry,
who are working on developing and applying automated reasoning
techniques and tools for the formal specification and analysis of
security protocols.
The aim of the joint workshop FCS-ARSPA'06 is to provide a forum for
continued activity in these areas, to bring computer security
researchers in closer contact with the LICS community, and to give LICS
attendees an opportunity to talk to experts in computer security.
INVITED SPEAKERS
================
- Andy Gordon (Microsoft Research)
Provable Implementations of Security Protocols
(Lics invited talk)
- Martin Abadi (University of California at Santa Cruz)
Access Control in a Core Calculus of Dependency
ACCEPTED PAPERS
===============
- Veronique Cortier, Graham Steel
On the Decidability of a Class of XOR-based Key-management APIs
- Mathieu Jaume, Charles Morisset
Towards a formal specification of access control
- Amit Walvekar, Manasi Kelkar, Melanie Smith, and Rose Gamble
Determining Conflicts in Interdomain Mappings for Access Control
- Massimo Benerecetti, Nicola Cuomo, and Adriano Peron
Timed HLPSL for specification and verification of time sensitive protocols
- Matthias Anlauff, Dusko Pavlovic, Richard Waldinger, and Stephen Westfold
Proving Authentication Properties in the Protocol Derivation Assistant
- Long Nguyen, Bill Roscoe
Efficient group authentication protocols based on human interaction
- Alan Jeffrey, Ruy Ley-Wild
Dynamic Model Checking of C Cryptographic Protocol Implementations
- Jonathan Millen, Joshua Guttman, John Ramsdell, Justin Sheehy, and
Brian Sniffen
Call by Contract for Cryptographic Protocols
- DongGook Park, Colin Boyd, Byoungcheon Lee, and Hwankoo Kim
Responsibility and Credit: New Members of the Authentication Family?
- Romain Janvier, Yassine Lakhnech, and Laurent Mazare'
Relating the Symbolic and Computational Models of Security Protocols
Using Hashes
- Philippe Balbiani, Yannick Chevalier, and mounira kourjieh
Reasoning about Actions and Obligations
- Prateek Gupta, Vitaly Shmatikov
Key confirmation and adaptive corruptions in the protocol security logic
- Johannes Borgstroem, Simon Kramer, and Uwe Nestmann
Calculus of Cryptographic Communication
- Aybek Mukhamedov, Mark Ryan
On Asynchronous Multi-party Contract-Signing
- Chamseddine Talhi, Nadia Tawbi, and Mourad Debbabi
Execution Monitoring Enforcement Under Memory-Limitation Constraints
- A. Prasad Sistla, Min Zhou
Analysis of Dynamic Policies
Further information about registration and accomodation can be found on
the workshop's webpage
http://www.easychair.org/FLoC-06/FCS-ARSPA.html
We hope to see you all in Seattle!
Pierpaolo Degano, Ralf Kuesters, Luca Vigano`, Steve Zdancewic
(FCS-ARSPA'06 co-chairs)
Dear all,
since some of you ask about the meeting dates... here they come:
Special TC-6 meeting 2006/2 on Developing Country Problems; TC-6;
25 August 2006; Santiago de Chile, Chile;
TC-6 meeting 2006/2;
29 + 30 September, 2006, Paris (France).
See also the invitation for Autonomic Networking.
Best regards
Otto
------------------
Message received from Guy Pujolle:
Dear TC6 member,
We would like to invite you to participate in the Autonomic Networking
Conference, 27-29 September 2006, Paris, France. We are expecting a very
great event with top-level keynote speakers and an outstanding program.
Please visit http://www.autonomic-net.org for more info.
The IFIP TC6 meeting will be held on the 29 and 30 of September.
Best regards,
Guy.
Dear All,
I would be most grateful if you would share this announcement
with those who may have interest in submitting paper(s) or participating in UbiSafe-07.
Kind regards,
/Daniel
----------------
Daniel N. Xiong,
Publicity Chair, UbiSafe-07
Japan Advanced Inst. of Science & Technology
Asahidai, Nomi, Ishikawa, 923-1211, JAPAN
----------------
CALL FOR PAPERS
The 2007 IEEE International Symposium on Ubisafe Computing (UbiSafe-07)
Niagara Falls, Canada, May 21-23, 2007
http://www.ubisafe.org/2007/ or http://www.cs.okstate.edu/ubisafe07
In conjunction with AINA-07: http://www.aina-conference.org/2007/
IMPORTANT DEADLINES:
Paper Submission: November 30, 2006
Author Notification: January 22, 2007
Camera-Ready Papers: February 17, 2007
SYMPOSIUM INFORMATION:
Computers are now available anytime, anywhere, by different means, and
distributed unobtrusively throughout the everyday environments in which
physical objects/artifacts embedded with invisible computers are sensible and
networked locally and globally. Such "any" computers open tremendous
opportunities to provide numerous novel services/applications in both real
world and cyber spaces, and exist ubiquitously in our daily life, working,
learning, traveling, entertainment, medicine, etc. Although it is yet unclear
what exactly the real-cyber integrated worlds would be, there is no doubt that
they must be safe.
UbiSafe emphasizes the SAFE aspects for ubiquitous, pervasive, AmI, mobile,
universal, embedded, wearable, augmented, invisible, hidden, context-aware,
sentient, proactive, autonomic, or whatever it is called, computing. UbiSafe
computing is focused on theories and technologies for ubiquitous artifacts to
function safely for different purposes; for ubiquitous systems to work safely
in various situations; and for ubiquitous environments to behave safely with
all people. A series of challenges exist to let people benefit from ubiquitous
services, and simultaneously guarantee their safety in making ubiquitous safe
artifacts, systems, and environments.
The UbiSafe-07 Symposium provides a forum for engineers and scientists in
academia, industry, and government to address all safety related profound
challenges including technical, social, legal and ethical issues, and to
present and discuss their ideas, theories, technologies, systems, tools,
applications, work in progress and experience on all aspects of UbiSafe
computing.
Topics of particular interest include, but are not limited to:
* Fundamentals
- UbiSafe concepts, definitions, basic elements, models, frameworks and
methodologies, human-centric paradigms,
multi-disciplinary/inter-disciplinary/trans-disciplinary approaches, semantics,
ontologies, UbiSafe requirements and formal specifications and validations,
information assurance, etc.
* Technologies
- Security and privacy protection, reliability and fault tolerance, risk
analysis, uncertainty and exception handling, socially intelligent agents,
intuitive/natural user interface, interaction design, context-awareness,
intelligent computing, service-oriented computing, hardware, software,
middleware, etc.
* Systems
- Embedded systems, wearable systems, augmented systems, context-based systems,
communication systems, safety-critical systems, survivable systems, persistent
systems, autonomous/autonomic systems, proactive systems, network
infrastructure, sensor networks, etc.
* Applications
- Smart objects, smart environments, information appliance and artifacts,
everyday gadgets, robots, safety care, healthcare, medical care and services,
working, learning, traveling, entertainment, case studies, etc.
* Measures and Assessments
- UbiSafe attributes and measures for safety, trust, faith, amenity, easiness,
comfort, satisfaction and worryness, UbiSafe levels and relations, UbiSafe
quality, assessment criteria and authority, subjective and objective assessment
standards, evaluation methodologies, testing, measuring and monitoring tools,
etc.
* Human Factors and Social Issues
- Human and social aspects of UbiSafe, UbiSafe sources and factors, social
rules, regulations and laws, human factors, human behavior analysis, modeling
of human feelings, traditional and cultural issues, ethical issues, etc.
SUBMISSION INFORMATION:
Submit full papers not exceeding 20 pages in PDF format (IEEE Computer Society
Proceedings Manuscripts style: two columns, single-spaced), including figures
and references, using 10 fonts, and number each page. You can download the IEEE
CS Proceedings Author Guidelines from the following web site
ftp://pubftp.computer.org/press/outgoing/proceedings/. UbiSafe-07 submission
web site is at http://ehpclab.stfx.ca/~ubisafe07/.
PAPER PUBLICATION:
Authors of accepted papers will receive guidelines on preparing and submitting
the final manuscript(s) together with the notification of acceptance. The
proceedings will be published by IEEE Computer Society Press. Authors of
accepted papers, or at least one of them, are required to register and present
their work at the conference, otherwise their papers will be removed from the
digital library after the conference.
Distinguished papers, after further revisions, will be published in the Journal
of Autonomic and Trusted Computing (JoATC), and the Journal of Ubiquitous
Computing and Intelligence (JUCI). A set of high quality papers of the
conference, after further revisions, also will be published in an edited book
published by IDEA Publishing Group, USA.
GENERAL INFORMATION:
ADVISORY CHAIRS:
Jingde Cheng, Saitama University, Japan
Jianhua Ma, Hosei University, Japan
GENERAL CHAIRS:
Laurence T. Yang, St. Francis Xavier University, Canada
Vipin Chaudhary, Wayne State University, USA
Runhe Huang, Hosei University, Japan
PROGRAM CHAIRS:
Qiangfu Zhao, The University of Aizu, Japan
Qun Jin, Waseda University, Japan
Xiaolin (Andy) Li, Oklahoma State University, USA
PROGRAM VICE CHAIRS:
Evi Syukur, Monash University, Australia
Geyong Min, University of Bradford, UK
Zhiwen Yu, Nagoya University, Japan
PUBLICITY CHAIRS:
Guojun Wang, Central South University, China
Daniel N. Xiong, JAIST, Japan
Weisong Shi, Wayne State University, USA
Emmanuelle Anceaume, IRISA, France
PROGRAM COMMITTEE MEMBERS:
TBD
For further information please email to: ubisafe07(a)googlegroups.com
Dear All,
I would be most grateful if you would share this announcement
with those who may have interest in submitting paper(s) or participating in UbiSafe-07.
Kind regards,
/Daniel
----------------
Daniel N. Xiong,
Publicity Chair, UbiSafe-07
Japan Advanced Inst. of Science & Technology
Asahidai, Nomi, Ishikawa, 923-1211, JAPAN
----------------
CALL FOR PAPERS
The 2007 IEEE International Symposium on Ubisafe Computing (UbiSafe-07)
Niagara Falls, Canada, May 21-23, 2007
http://www.ubisafe.org/2007/ or http://www.cs.okstate.edu/ubisafe07
In conjunction with AINA-07: http://www.aina-conference.org/2007/
IMPORTANT DEADLINES:
Paper Submission: November 30, 2006
Author Notification: January 22, 2007
Camera-Ready Papers: February 17, 2007
SYMPOSIUM INFORMATION:
Computers are now available anytime, anywhere, by different means, and
distributed unobtrusively throughout the everyday environments in which
physical objects/artifacts embedded with invisible computers are sensible and
networked locally and globally. Such "any" computers open tremendous
opportunities to provide numerous novel services/applications in both real
world and cyber spaces, and exist ubiquitously in our daily life, working,
learning, traveling, entertainment, medicine, etc. Although it is yet unclear
what exactly the real-cyber integrated worlds would be, there is no doubt that
they must be safe.
UbiSafe emphasizes the SAFE aspects for ubiquitous, pervasive, AmI, mobile,
universal, embedded, wearable, augmented, invisible, hidden, context-aware,
sentient, proactive, autonomic, or whatever it is called, computing. UbiSafe
computing is focused on theories and technologies for ubiquitous artifacts to
function safely for different purposes; for ubiquitous systems to work safely
in various situations; and for ubiquitous environments to behave safely with
all people. A series of challenges exist to let people benefit from ubiquitous
services, and simultaneously guarantee their safety in making ubiquitous safe
artifacts, systems, and environments.
The UbiSafe-07 Symposium provides a forum for engineers and scientists in
academia, industry, and government to address all safety related profound
challenges including technical, social, legal and ethical issues, and to
present and discuss their ideas, theories, technologies, systems, tools,
applications, work in progress and experience on all aspects of UbiSafe
computing.
Topics of particular interest include, but are not limited to:
* Fundamentals
- UbiSafe concepts, definitions, basic elements, models, frameworks and
methodologies, human-centric paradigms,
multi-disciplinary/inter-disciplinary/trans-disciplinary approaches, semantics,
ontologies, UbiSafe requirements and formal specifications and validations,
information assurance, etc.
* Technologies
- Security and privacy protection, reliability and fault tolerance, risk
analysis, uncertainty and exception handling, socially intelligent agents,
intuitive/natural user interface, interaction design, context-awareness,
intelligent computing, service-oriented computing, hardware, software,
middleware, etc.
* Systems
- Embedded systems, wearable systems, augmented systems, context-based systems,
communication systems, safety-critical systems, survivable systems, persistent
systems, autonomous/autonomic systems, proactive systems, network
infrastructure, sensor networks, etc.
* Applications
- Smart objects, smart environments, information appliance and artifacts,
everyday gadgets, robots, safety care, healthcare, medical care and services,
working, learning, traveling, entertainment, case studies, etc.
* Measures and Assessments
- UbiSafe attributes and measures for safety, trust, faith, amenity, easiness,
comfort, satisfaction and worryness, UbiSafe levels and relations, UbiSafe
quality, assessment criteria and authority, subjective and objective assessment
standards, evaluation methodologies, testing, measuring and monitoring tools,
etc.
* Human Factors and Social Issues
- Human and social aspects of UbiSafe, UbiSafe sources and factors, social
rules, regulations and laws, human factors, human behavior analysis, modeling
of human feelings, traditional and cultural issues, ethical issues, etc.
SUBMISSION INFORMATION:
Submit full papers not exceeding 20 pages in PDF format (IEEE Computer Society
Proceedings Manuscripts style: two columns, single-spaced), including figures
and references, using 10 fonts, and number each page. You can download the IEEE
CS Proceedings Author Guidelines from the following web site
ftp://pubftp.computer.org/press/outgoing/proceedings/. UbiSafe-07 submission
web site is at http://ehpclab.stfx.ca/~ubisafe07/.
PAPER PUBLICATION:
Authors of accepted papers will receive guidelines on preparing and submitting
the final manuscript(s) together with the notification of acceptance. The
proceedings will be published by IEEE Computer Society Press. Authors of
accepted papers, or at least one of them, are required to register and present
their work at the conference, otherwise their papers will be removed from the
digital library after the conference.
Distinguished papers, after further revisions, will be published in the Journal
of Autonomic and Trusted Computing (JoATC), and the Journal of Ubiquitous
Computing and Intelligence (JUCI). A set of high quality papers of the
conference, after further revisions, also will be published in an edited book
published by IDEA Publishing Group, USA.
GENERAL INFORMATION:
ADVISORY CHAIRS:
Jingde Cheng, Saitama University, Japan
Jianhua Ma, Hosei University, Japan
GENERAL CHAIRS:
Laurence T. Yang, St. Francis Xavier University, Canada
Vipin Chaudhary, Wayne State University, USA
Runhe Huang, Hosei University, Japan
PROGRAM CHAIRS:
Qiangfu Zhao, The University of Aizu, Japan
Qun Jin, Waseda University, Japan
Xiaolin (Andy) Li, Oklahoma State University, USA
PROGRAM VICE CHAIRS:
Evi Syukur, Monash University, Australia
Geyong Min, University of Bradford, UK
Zhiwen Yu, Nagoya University, Japan
PUBLICITY CHAIRS:
Guojun Wang, Central South University, China
Daniel N. Xiong, JAIST, Japan
Weisong Shi, Wayne State University, USA
Emmanuelle Anceaume, IRISA, France
PROGRAM COMMITTEE MEMBERS:
TBD
For further information please email to: ubisafe07(a)googlegroups.com
Dear TC6 member,
We would like to invite you to participate in the Autonomic Networking Conference, 27-29 September 2006, Paris, France. We are expecting a very great event with top-level keynote speakers and an outstanding program.
Please visit http://www.autonomic-net.org for more info.
The IFIP TC6 meeting will be held on the 29 and 30 of September.
Best regards,
Guy.
_____________________________________
Guy Pujolle Guy.Pujolle(a)lip6.fr
Université Pierre et Marie Curie
8 rue du Capitaine Scott, 75015 Paris, France
Assistante: Laetitia Jacquey, Laetitia.jacquey(a)lip6.fr
tel: +33 1 44 27 87 74 fax +33 1 44 27 87 83
CALL FOR PAPERS
2nd International Workshop on Software for Sensor Networks (SensorWare)
To be held with Comsware 2007 ([ http://www.comsware.org ]www.comsware.org)
8th January 2007, CityBangalore country-regionplaceIndia
www.sensorware.org
Advances in technology have made deployment of miniature sensors a realistic proposition. Low-power, inexpensive smart devices with multiple on-board sensors are connected through wireless links so as to form a collaborative sensor network to perform a
specific task. As a result, it opens up a new paradigm of ubiquitous computing and enables a range of applications that are previously unrealizable or too costly to be realized. However, given the limitation of on-board hardware, one of the key areas
towards achieving superior performance is through software implementation. The workshop is intended to bring together industry experts and researchers to share novel techniques, algorithms and software implementation for sensor networks, and to discuss
the current status, technical challenges, standards, fundamental issues, and future services and applications in the form of panels and technical presentation. Topics of interest include but are not limited to the following:
1. Operating System
2. Efficient algorithms
3. Protocol design considerations
4. Performance analysis
5. Performance related issues
6. Cross-layered design considerations
7. Sensor applications and their impact on sensor network architectures
8. Deployment issues and scenarios
9. Middleware
10. Sensor network security
11. Sensor network design and modeling
Workshop co-chairs:
Nirmala Shenoy ([ mailto:ns@rit.edu ]ns(a)rit.edu), Rochester Institute of Technology, placecountry-regionUSA
Paul Chou, ([ mailto:pchou@us.ibm.com ]pchou(a)us.ibm.com), placeCityIBM Thomas J Watson Research Center, country-regionUSA
Workshop technical co-chairs:
Naoki Wakamiya, ([ mailto:Wakamiya@ist.osaka-u.ac.jp ]Wakamiya(a)ist.osaka-u.ac.jp), CityplaceOsaka University, country-regionJapan
Falko Dressler, (dressler(a)informatik.uni-erlangen.de), CityplaceUniversity of Erlangen-Nuremberg, country-regionGermany
Important Dates:
Paper Submission Deadline: 30th August 2006
Notification Acceptance/Rejection: 20th November 2006
Final Camera-Ready Paper Submission: 30th November 2006
****************************************************************************
Nirmala Shenoy PhD, Associate Professor
Information Technology, Rochester Institute of Technology,
102 Lomb Memorial Drive,
Rochester, New York 14623
585-475-4887 585-475-2181 Fax ns(a)it.rit.edu
www.it.rit.edu/~ns
****************************************************************************