
From mounir.kellil@cea.fr  Thu Apr  1 06:03:33 2010
Return-Path: <mounir.kellil@cea.fr>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 906243A6912 for <sam@core3.amsl.com>; Thu,  1 Apr 2010 06:03:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.481
X-Spam-Level: *
X-Spam-Status: No, score=1.481 tagged_above=-999 required=5 tests=[BAYES_50=0.001, DNS_FROM_OPENWHOIS=1.13, HELO_EQ_FR=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IAA0FoaIxm3H for <sam@core3.amsl.com>; Thu,  1 Apr 2010 06:03:32 -0700 (PDT)
Received: from cirse-out.extra.cea.fr (cirse-out.extra.cea.fr [132.166.172.106]) by core3.amsl.com (Postfix) with ESMTP id 32A733A686D for <sam@irtf.org>; Thu,  1 Apr 2010 06:03:32 -0700 (PDT)
Received: from pisaure.intra.cea.fr (pisaure.intra.cea.fr [132.166.88.21]) by cirse.extra.cea.fr (8.14.2/8.14.2/CEAnet-Internet-out-2.0) with ESMTP id o31D40CM012338 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 1 Apr 2010 15:04:00 +0200
Received: from muguet2.intra.cea.fr (muguet2.intra.cea.fr [132.166.192.7]) by pisaure.intra.cea.fr (8.14.4/8.14.4) with ESMTP id o31D40r1019613; Thu, 1 Apr 2010 15:04:00 +0200 (envelope-from mounir.kellil@cea.fr)
Received: from mansart.intra.cea.fr (mansart.intra.cea.fr [132.166.88.54]) by muguet2.intra.cea.fr (8.13.8/8.13.8/CEAnet-Intranet-out-1.1) with ESMTP id o31D40sG029659; Thu, 1 Apr 2010 15:04:00 +0200
Received: from LODERI.intra.cea.fr ([132.166.64.44]) by mansart.intra.cea.fr with Microsoft SMTPSVC(6.0.3790.3959);  Thu, 1 Apr 2010 15:03:59 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Thu, 1 Apr 2010 15:04:03 +0200
Message-ID: <A2408947975D7A4C95A0DD337F63825801B2E8F6@LODERI.intra.cea.fr>
In-Reply-To: <Pine.WNT.4.64.1003312209170.4220@mw-thinkpad>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [SAM] draft-kellil-sam-mtocp
Thread-Index: AcrRYC+pIfRfDQ/pQJSrhj3pOgXBGQAOmvWw
References: <Pine.WNT.4.64.1003261040590.4220@mw-thinkpad> <A2408947975D7A4C95A0DD337F63825801B2E80A@LODERI.intra.cea.fr> <Pine.WNT.4.64.1003312209170.4220@mw-thinkpad>
From: "KELLIL Mounir" <mounir.kellil@cea.fr>
To: "Matthias Waehlisch" <waehlisch@ieee.org>
X-OriginalArrivalTime: 01 Apr 2010 13:03:59.0955 (UTC) FILETIME=[CB9B0230:01CAD19B]
Cc: sam@irtf.org, JANNETEAU Christophe <christophe.janneteau@cea.fr>, ROUX Pierre <pierre.roux@cea.fr>
Subject: Re: [SAM] draft-kellil-sam-mtocp
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Apr 2010 13:03:33 -0000

Dear Matthias,


Thanks a lot for your valuable comments. Please see below my answers.

> > >   * How does the MTO-Ctrl knows other MTO entities? Must all MTOCP
> > > entities have to register at the MTO-Ctrl?
> > >
> > [MK] Currently (or in the current implementation if you want),
> > MTO-Ctrl gets the list of overlay nodes and connection descriptions
> > from an external module defined in a deliverable of the FP7 CCAST
> > project work, which MTOCP is part of.  Actually, the current MTOCP
> > draft focuses on the "enforcement/configuration" of the overlay tree
> > in the network. The "generation" of the topology/form of the overlay
> > tree is out of the scope of the draft. In our project
implementation,
> > the generation of the overlay topology is handled by a specific
> > network context-aware component interacting with (but could be
> > integrated in) the MTO-Ctrl; but this is external to the MTOCP
> > protocol.
> >
> [MW] OK ... The MTO-Ctrl is an entity to establish centrally multicast
> states. The topolog creation should probably be integrated within the
> MTO-Ctrl as topologies will be constructed depending on the receivers.
> On ther other hand, one can collect, maybe aggregate, and delegate
> receiver subscriptions to the specific topology component.
>=20
[MK] The MTO_Ctrl establishes both multicast and unicast states when it
is provisioned with such states. In the demo/current implementation the
states are provided by an external component ("the topology component").
For receiver subscription, please see my comments below.



>   Nevertheless, the receivers have to register at the MTO-Ctrl - or at
> the topology component.
>=20
[MK] If it is a multicast receiver, it registers via standard IGMP/MLD
(besides, in the current implementation, it uses SIP to get information
on the session, e.g., multicast addresses and ports). If the receiver is
unicast, it uses an out of band mechanism to register. On key
requirement for such a case is that the out of band mechanism should not
modify receiver's TCP/IP stack (this is also true for multicast
receivers, actually). In the current implementation, the out of band
mechanism is SIP. So, the SIP server contacts the receiver to provide
him with the session description (in particular, the IP address of the
L-ON the receiver will be attached to). In addition, the SIP server
informs the topology component about receiver's unicast address and
listening port. The topology component then forwards the information to
MTO-Ctrl, which then pushes it to the L-ON through MTOCP. Of course such
an out-of-band mechanism ("SIP + topology component") is not the only
possible one. And, providing other alternatives is not a critical issue
per se. =20


> > * The forwarding process is a bit unclear to me: By which means does
> > > an overlay node to unicast or to multicast?
> > >
> > [MK] An ON receives forwarding information from the MTO-CTRL (via
the
> > MTCOP protocol) in the form of one input transport connection and
one
> > or multiple output transport connections (for a given MTO Tree ID).
> > These input/output connections are bound together in the ON "MTO
> > forwarding table". When the overlay node receives data on the input
> > transport connection, it then just forwards the data onto the output
> > connections indicated in its "MTO forwarding table". Of course, the
> > destination address of transport connections could be multicast or
> > unicast, IPv4 or IPv6.
> >
> [MW] OK, an ON decides on multicast or unicast based on the
destination
> address in its local MTOCP state table.
>
[MK] Yes.



>   How do you map the destination address to an actual IP forwarding
> interface at an ON? Is this based on the local unicast routing table?
>
[MK] Yes, this is true for unicast connections.



> And what does this mean for a multicast destination address: multicast
> addresses are not included in unicast routing tables. Thus, you cannot
> easily replicate packets and require an addition multicast
> routing/signaling, right?
>=20
[MK] This is a good point. To receive or send multicast traffic, the ON
uses the source address of the multicast input (respectively, output)
connection to select the downstream (respectively upstream) interface.
Of course, the source address of the multicast input/output connection
is mentioned by MTO-Ctrl. Also, in our specification (not indicated in
the draft, but we will mention this in a future version), ON is also an
IGMP/MLD listener. So, as such, it sends an IGMP/MLD report whenever it
should receive multicast packets from other ONs or from the source.


  Btw: Do you assume a global topology view - at least with respect to
> the overlay nodes? Otherwise it seems hard to determine appropriately
> the destination address for ON state tables.
>
[MK] Yes, there is a global topology view at MTO-Ctrl (this is quite
realistic in an operator network scenario), not at ON. ON needs only to
know its input and output connections.

Your comments are welcome

Best regards

Mounir

From jlloret@dcom.upv.es  Thu Apr  1 10:53:39 2010
Return-Path: <jlloret@dcom.upv.es>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2B2573A66B4 for <sam@core3.amsl.com>; Thu,  1 Apr 2010 10:53:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.63
X-Spam-Level: **
X-Spam-Status: No, score=2.63 tagged_above=-999 required=5 tests=[BAYES_99=3.5, DNS_FROM_OPENWHOIS=1.13, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7bLmHP4H4g5f for <sam@core3.amsl.com>; Thu,  1 Apr 2010 10:53:37 -0700 (PDT)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.21]) by core3.amsl.com (Postfix) with ESMTP id 00A203A69FE for <sam@irtf.org>; Thu,  1 Apr 2010 10:53:35 -0700 (PDT)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id o31Hs6Aw012849 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Thu, 1 Apr 2010 19:54:06 +0200
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id o31Hs57Q009050 for <sam@irtf.org>; Thu, 1 Apr 2010 19:54:06 +0200
Received: from JLLORET (vpn245-15.vpns.upv.es [158.42.245.15]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id o31Hs4Fj030684 for <sam@irtf.org>; Thu, 1 Apr 2010 19:54:05 +0200
Date: Thu, 1 Apr 2010 19:54:05 +0200
Message-Id: <201004011754.o31Hs4Fj030684@smtp.upv.es>
From: Jaime Lloret Mauri<jlloret@dcom.upv.es>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] 3rd CfP: ICWMC 2010 || September 20-25, 2010 - Valencia, Spain
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Apr 2010 17:53:39 -0000

INVITATION:

=================
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.
=================


============== ICWMC 2010 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ICWMC 2010: The Sixth International Conference on Wireless and Mobile Communications 
September 20-25, 2010 - Valencia, Spain

General page: http://www.iaria.org/conferences2010/ICWMC10.html
Call for Papers: http://www.iaria.org/conferences2010/CfPICWMC10.html

Submission deadline: April 20, 2010

Sponsored by IARIA, www.iaria.org
Co-sponsored by: IEEE Spain, University 'Politehnica' Bucharest, La Machinista Valenciana, Universidad Politecnica de Valencia, IGIC 

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org
Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )
Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore
Submitted for indexing: Elsevier's EI Compendex Database, EI's Engineering Information Index
Other indexes are being considered: INSPEC, DBLP, Thomson Reuters Conference Proceedings Citation Index

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. 

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

ICWMC 2010 Tracks (tracks' topics and submission details: see CfP on the site)

Wireless Communications Basics
Coding & modulation & equalization; Channel modeling and characterization; Equalization/Synchronization; Transform-domain communication; Multiple access algorithms and schemes; Antenna and RF subsystems; Smart antennas, adaptive antennas, MIMO and beam forming; MIMO and OFDM Based PHY Layer technologies; CDMA Systems

Radio Interfaces and Systems
Radio communications systems; Radio resource management; Radio transmission technologies; Power and interference control; Interference Cancellation for Wireless Mobile Systems; Power management for small terminals; Energy map; Channel Measurement and Characterization

Spectrum Allocation and Management
Spectrum efficiency analyses; Dynamic spectrum access networks; Spectrum management; Interference mitigation and management techniques 

Circuits for Wireless Communications
Wireless ASICs; Wireless technologies; RF Design issues

Wireless and Mobility
Mobility management; Location-based services and positioning; Micro and macro-mobility; Mobility, location and handoff management; Mobile and wireless IP; Wireless broadband mobile access; Routing in multihop, ad hoc and sensor networks; Wireless multicasting; Wireless mesh networks; Topology control in wireless

Protocols for wireless and mobility
Wireless protocols, architectural and design concepts; Protocols for air interfaces and networks; Wireless MAC protocols: Design and analysis; Transport layer issues in mobile and wireless networks; Middleware for handhelds and mobile services nodes; Proxies and middleware for wireless networks 

Traffic and congestion control, QoS, Resource Management
Traffic Modeling and Analysis; 3G/4G Bandwidth on Demand; QoS and mobility; End-to-end QoS; QoS profiling and pricing; Traffic Engineering; Congestion and admission control 

Wireless and mobile technologies
Wireless LANs; Home and Personal Area Networks: Bluetooth, ZigBeee, etc; Wireless MANs:802.16, 802.20; Wireless WANs: 2G/3G/4G; Mobile ad hoc networks and multi-hop wireless; Sensor networks and applications; Ultra-wideband and short-range networks; High altitude platforms and satellites; Emergency wireless communications; Wireless real-time communications 

Performance Evaluation, Simulation and Modeling of wireless networks and systems
Performance and QoS in wireless networks; Radio channel modeling (wave propagation and measurements); Mobile/wireless networks modeling and simulation; Performance of end-to-end protocols over wireless networks 

Management of wireless and mobile networks 
Mobility and QoS management; Billing technologies and tools; Policy Based Management in wireless LANS and MANs; Wireless and Mobile Network Planning; Mobile Database Access and Design

Security in wireless and mobile environment
Security and robustness in wireless networks; Privacy, Authentication Authorization and Accounting (AAA); Encryption and Cryptography; Key Management Protocols; Digital Rights Management and Multimedia Protection

Networks convergence and integration
2G/3G/4G integration; Convergence of 3G wireless and Internet cross-layer design in wireless networks; WLAN/3G/4G integration; Wireless-wireline convergence; Heterogeneous Networks (WAN, Wireless MAN, WLAN); IP Multimedia subsystems (IMS); Next Generation Network Architecture- mobility issues; Coexistence of mobile radio networks; End to End QoS in Heterogeneous environment; Signaling for integrated wireline/wireless networks 

Applications and services based on wireless infrastructures
Mobile & Wireless applications & services; Service discovery: protocols and frameworks; Personalized services and applications; Audio-visual and mobile multimedia applications; Media and content distribution over wireless networks 

Standardization and regulations
Position on standards & fora on wireless and mobile networks; Wireless Networks Standards and Protocols; Communications regulations; 802.11 WLAN Standards; 802.16 WMAN Standards; 3GPP and 3GPP2 standards; HSDPA Technology and Standards; Next Generation Network standards 

Design and implementation 
Emerging wireless technologies; Cross-layer optimizations in wireless networks; Design and implementation of mobile information systems; Software defined radio and re-configurability; Joint PHY/MAC design 

Wireless and mobile network deployment
Business models on wireless networks; Market trends and regional developments; M-commerce; Lessons learnt for wireless deployment in schools Lessons learnt for wireless deployment in special regions; Specialized wireless networks; Heterogeneous wireless network deployment (e.g., combining 802.11, 802.16 and 3G networks)

Cooperative and Cognitive Vehicular Networks
Architectures and platforms of cognitive vehicular network; Distributed artificial intelligence techniques for cognitive networks; Cognitive vehicular routing metrics and supporting protocols; Reduced complexity cognitive networks; Physical and MAC layer issues; Protocols design for cognitive vehicular networks; Cross-layer optimization in cognitive networks; Security issues for vehicular and cognitive networks; Testbed experiment, applications and new advances; Cooperative vehicular networks; QoS provisioning in heterogeneous networks ; Managing vertical handover; Multihoming; IPv6 GeoNetworking; Vehicular network architectures and protocols ; Cross-layer design and optimization for vehicular networks and cognitive networks; Mobility management and topology control; Standardization and Development of vehicular networks

Convergence and social mobility
Convergence of mobile networks with the Web 2.0; Convergence on architecture and services; Open service capabilities; Open exposure of telco capabilities; Open Web APIs, SOA and SDP); Interworking strategies; Mobile terminals as sources for User-generated content; Architecture and services for user-generated content; Auto-description and metadata synthesis for telecom-generated for user-generated content; Social mobile networks; User behavior profiling; Social connections (social graphs, contacts, etc); Services and architectures/solutions for social mobile services

==========
ICWMC GENERAL CHAIR
Jaime Lloret Mauri, Polytechnic University of Valencia, Spain 

ICWMC Advisory Chairs
Silviu Ciochina, University 'Politehnica' Bucharest, Romania 
Petre Dini, Concordia University, Canada / IARIA, USA
Jonathan Loo, Brunel University West London, UK 
Tudor Palade, Technical University of Cluj-Napoca, Romania 
Francisco Ramos, Polytechnic University of Valencia, Spain 
Manuel Sierra Pérez, Universidad Politécnica de Madrid / IEEE Spain, Spain 

ICWMC 2010 Research Institute Liaison Chairs
Nicolae Crisan, Technical University of Cluj-Napoca, Romania 
Adrian Matei, Politehnica University of Bucharest / Orange Romania S.A., Romania 
Jyrki Penttinen, Nokia Siemens Networks - Madrid, Spain / Helsinki University of Technology, Finland 
Tomi Räty, VTT Technical Research Centre of Finland, Finland 
Javier Del Ser Lorente, Tecnalia, Spain 

ICWMC 2010 Industry/Research Chairs
José García, La Maquinista Valenciana, Spain 
Jingli Li, TopWorx - Emerson, USA 
Christopher Nguyen, Intel Corp., USA 
Horia Stefanescu, Orange, Romania 

ICWMC 2010 Special Area Chairs
Cooperative and Cognitive Vehicular Networks Area Chairs:
Yacine Khaled, Geenov, France
Jong-Hyouk Lee, Sungkyunkwan University, Korea // INRIA, France

Committee members: http://www.iaria.org/conferences2010/ComICWMC10.html
==========

From mko@cs.stir.ac.uk  Fri Apr  2 02:17:38 2010
Return-Path: <mko@cs.stir.ac.uk>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 90ADC3A6810 for <sam@core3.amsl.com>; Fri,  2 Apr 2010 02:17:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.131
X-Spam-Level: *
X-Spam-Status: No, score=1.131 tagged_above=-999 required=5 tests=[BAYES_50=0.001, DNS_FROM_OPENWHOIS=1.13]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id buAztYQQBvyf for <sam@core3.amsl.com>; Fri,  2 Apr 2010 02:17:36 -0700 (PDT)
Received: from mailscanner2.stir.ac.uk (mailscanner2.stir.ac.uk [139.153.13.35]) by core3.amsl.com (Postfix) with ESMTP id 9514F3A67A6 for <sam@irtf.org>; Fri,  2 Apr 2010 02:17:36 -0700 (PDT)
Received: from yen.cs.stir.ac.uk ([139.153.254.70]) by mailscanner2.stir.ac.uk with esmtp (Exim 4.69) (envelope-from <mko@cs.stir.ac.uk>) id 1Nxd0c-0000UY-GP for sam@irtf.org; Fri, 02 Apr 2010 10:17:50 +0100
Received: from [139.153.48.30] by yen.cs.stir.ac.uk (8.9.3) id JAA13541; Fri, 2 Apr 2010 09:17:46 GMT
Message-ID: <4BB5B639.1030505@cs.stir.ac.uk>
Date: Fri, 02 Apr 2010 10:17:45 +0100
From: Dr Mario Kolberg <mko@cs.stir.ac.uk>
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: sam <sam@irtf.org>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by yen.cs.stir.ac.uk id JAA13541
X-MailScanner-ID: 1Nxd0c-0000UY-GP
X-stir.ac.uk-MailScanner: Found to be clean
X-stir.ac.uk-MailScanner-From: mko@cs.stir.ac.uk
MailScanner-NULL-Check: 1270804671.99615@aIFIKidf9ZDbVrO/1eL7uw
Subject: [SAM] IEEE CCNC Call for Workshop proposals
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Apr 2010 09:17:38 -0000

Call for IEEE CCNC 2011 Workshop Proposals

***********************************************************************
8th Annual IEEE Consumer Communications and Networking Conference

Las Vegas, Nevada USA
January 8 =96 11, 2011
http://www.ieee-ccnc.org/

CALL FOR WORKSHOP PROPOSALS

***********************************************************************

INTRODUCTION

The IEEE CCNC organizing committee invite proposals for the CCNC
Workshops to be held either on 8 or 11 January, 2011, Las Vegas, USA, in
conjunction with the main technical program of the CCNC 2011 conference
(http://www.ieee-ccnc.org/). All researchers and practitioners
interested in organizing workshops are invited to submit workshop
proposals. The purpose of the CCNC Workshops 2011 is to provide
participants with an international forum and opportunity to discuss
novel research ideas and challenges in a wide range of networked
consumer systems. The workshop proceedings will be published by IEEE
(and will be indexed accordingly).

Workshop manuscripts should be written in English conforming to the IEEE
standard conference format (8.5" x 11", Two-Column) and not exceed 5
pages in length. Submission of papers should be regarded as a commitment
such that, if accepted, at least one author of the paper will register
and attend the conference; otherwise it will be removed from the IEEE
Digital Library after the conference.

SUBMISSION GUIDELINES

To propose a workshop in conjunction with CCNC 2011, please submit a
workshop proposal including the following information:

- The title of the workshop;
- The workshop scope and the introduction of the technical issues that
the workshop will address;
- The important anticipated deadlines of the workshop;
- The detailed contact information of the workshop organizers, such as
names, titles, affiliations, postal code and address, phone and fax
numbers, and e-mail addresses;
- A one paragraph overview of the organizers' experience of
conference/workshop organization, and one paragraph describing how you
will advertise and distribute information to attract more papers for
your workshop.

For better management, the CCNC workshop organizers are required to use
EDAS to manage their papers.


IMPORTANT DATES

Workshop proposals deadline:        April 15, 2010
Notification of proposal decision:  April 29, 2010
Deadline for workshop papers:       August 24, 2010
Acceptance of workshop papers:      September 15, 2010
Camera-ready version (hard):        October 1, 2010
Workshop presentations:             January 8 or 11, 2011

WORKSHOPS CONTACT

All workshop proposals should be submitted by e-mail to the CCNC
Workshops 2011 Chair,
Dr David Llewellyn-Jones (D.Llewellyn-Jones@ljmu.ac.uk), Liverpool John
Moores University, Liverpool, UK.




--=20
The Sunday Times Scottish University of the Year 2009/2010
The University of Stirling is a charity registered in Scotland,=20
 number SC 011159.


From m.garcia.upv@gmail.com  Fri Apr  2 12:21:08 2010
Return-Path: <m.garcia.upv@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 446F33A6CF2 for <sam@core3.amsl.com>; Fri,  2 Apr 2010 12:21:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.869
X-Spam-Level: 
X-Spam-Status: No, score=-0.869 tagged_above=-999 required=5 tests=[BAYES_50=0.001, DNS_FROM_OPENWHOIS=1.13, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fSQWKZ+3YR5v for <sam@core3.amsl.com>; Fri,  2 Apr 2010 12:20:59 -0700 (PDT)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.21]) by core3.amsl.com (Postfix) with ESMTP id 98AE33A6C21 for <sam@irtf.org>; Fri,  2 Apr 2010 11:47:02 -0700 (PDT)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id o32IlX5U001863 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Fri, 2 Apr 2010 20:47:34 +0200
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id o32IlXVH022151 for <sam@irtf.org>; Fri, 2 Apr 2010 20:47:33 +0200
Received: from JLLORET (osiris1.gnd.upv.es [158.42.148.63]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id o32IlXs4015796 for <sam@irtf.org>; Fri, 2 Apr 2010 20:47:33 +0200
Date: Fri, 2 Apr 2010 20:47:33 +0200
Message-Id: <201004021847.o32IlXs4015796@smtp.upv.es>
From: Miguel Garcia<m.garcia.upv@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] 3rd CfP: ICCGI 2010 || September 20-25, 2010 - Valencia, Spain
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Apr 2010 19:21:08 -0000

3rd CfP: ICCGI 2010 || September 20-25, 2010 - Valencia, Spain

INVITATION:

=================
Please consider to contribute to and/or forward to the appropriate 
groups the following opportunity to submit and publish original 
scientific results.
=================


============== ICCGI 2010 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ICCGI 2010: The Fifth International Multi-Conference on Computing in the 
Global Information Technology
September 20-25, 2010 - Valencia, Spain

General page: http://www.iaria.org/conferences2010/ICCGI10.html
Call for Papers: http://www.iaria.org/conferences2010/CfPICCGI10.html

Submission deadline: April 20, 2010

Sponsored by IARIA, www.iaria.org
Co-sponsored by IEEE Spain, Illinois State University, University 
Politehnica Bucharest, Universidad Politecnica de Valencia, La 
Machinista Valenciana, IGIC, Hydro-Quebec, Ruder Boskovic Institute,
Orange, Universidad Complutense Madrid

Extended versions of selected papers will be published in IARIA 
Journals: http://www.iariajournals.org
Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )
Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore
Submitted for indexing: Elsevier's EI Compendex Database, EI's 
Engineering Information Index
Other indexes are being considered: INSPEC, DBLP, Thomson Reuters 
Conference Proceedings Citation Index

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of 
concepts, state of the art, research, standards, implementations, 
running experiments, applications, and industrial case studies. Authors 
are invited to submit complete unpublished papers, which are not under 
review in any other conference or journal in the following, but not 
limited to, topic areas.

All tracks are open to both research and industry contributions, in 
terms of Regular papers, Posters, Work in progress, 
Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: 
http://www.iaria.org/editorialrules.html

ICCGI 2010 Tracks (tracks' topics and submission details: see CfP on the 
site)

Industrial systems
Control theory and systems; Fault-tolerance and reliability; Data 
engineering; Enterprise computing and evaluation; Electrical and 
electronics engineering; Economic decisions and information systems; 
Advanced robotics; Virtual reality systems; Industrial systems and 
applications; Industrial and financial systems; Industrial control 
electronics; Industrial IT solutions

Evolutionary computation
Algorithms, procedures, mechanisms and applications; Computer 
architecture and systems; Computational sciences; Computation in complex 
systems; Computer and communication systems; Computer networks; Computer 
science theory; Computation and computer security; Computer simulation; 
Digital telecommunications; Distributed and parallel computing; 
Computation in embedded and real-time systems; Soft computing; 
User-centric computation

Autonomic and autonomous systems
Automation and autonomous systems; Theory of Computing; Autonomic 
computing; Autonomic networking; Network computing; Protecting 
computing; Theories of agency and autonomy; Multi-agent evolution, 
adaptation and learning; Adjustable and self-adjustable autonomy; 
Pervasive systems and computation; Computing with locality principles; 
GRID networking and services; Pervasive computing; Cluster computing and 
performance; Artificial intelligence Computational linguistics; 
Cognitive technologies; Decision making; Evolutionary computation; 
Expert systems; Computational biology

Bio-technologies
Models and techniques for biometric technologies; Bioinformatics; 
Biometric security; Computer graphics and visualization; Computer vision 
and image processing; Computational biochemistry; Finger, facial, iris, 
voice, and skin biometrics; Signature recognition; Multimodal 
biometrics; Verification and identification techniques; Accuracy of 
biometric technologies; Authentication smart cards and biometric 
metrics; Performance and assurance testing; Limitations of biometric 
technologies; Biometric card technologies; Biometric wireless 
technologies; Biometric software and hardware; Biometric standards

Knowledge data systems
Data mining and Web mining; Knowledge databases and systems; Data 
warehouse and applications; Data warehousing and information systems; 
Database performance evaluation; Semantic and temporal databases; 
Database systems Databases and information retrieval; Digital library 
design; Meta-data modeling

Mobile and distance education
Human computer interaction; Educational technologies; Computer in 
education; Distance learning; E-learning; Mobile learning Cognitive 
support for learning; Internet-based education; Impact of ICT on 
education and society; Group decision making and software; Habitual 
domain and information technology; Computer-mediated communications; 
Immersing authoring; Contextual and cultural challenges in user mobility

Intelligent techniques, logics, and systems
Intelligent agent technologies; Intelligent and fuzzy information 
processing; Intelligent computing and knowledge management; Intelligent 
systems and robotics; Fault-tolerance and reliability; Fuzzy logic & 
systems; Genetic algorithms; Haptic phenomena; Graphic recognition; 
Neural networks; Symbolic and algebraic computation; Modeling, 
simulation and analysis of business processes and systems

Knowledge processing
Knowledge representation models; Knowledge languages; Cognitive science; 
Knowledge acquisition; Knowledge engineering; Knowledge processing under 
uncertainty; Machine intelligence; Machine learning; Making decision 
through Internet; Networking knowledge plan

Information technologies
Information technology and organizational behavior; Agents, data mining 
and ontologies; Information retrieval systems; Information and network 
security; Information ethics and legal evaluations; Optimization and 
information technology; Organizational information systems; Information 
fusion; Information management systems; Information overload; 
Information policy making; Information security; Information systems; 
Information discovery

Internet and web technologies
Internet and WWW-based computing; Web and Grid computing; Internet 
service and training; IT and society; IT in education and health; 
Management information systems; Visualization and group decision making; 
Web based language development; Web search and decision making; Web 
service ontologies; Scientific web intelligence; Online business and 
decision making; Business rule language; E-Business; E-Commerce; Online 
and collaborative work; Social eco-systems and social networking; Social 
decisions on Internet; Computer ethics

Digital information processing
Mechatronics; Natural language processing; Medical imaging; Image 
processing; Signal processing; Speech processing; Video processing; 
Pattern recognition; Pattern recognition models; Graphics & computer 
vision; Medical systems and computing

Cognitive science and knowledge agent-based systems
Cognitive support for e-learning and mobile learning; Agents and 
cognitive models; Agents & complex systems; computational ecosystems; 
Agent architectures, perception, action & planning in agents; Agent 
communication: languages, semantics, pragmatics & protocols; Agent-based 
electronic commerce and trading systems Multi-agent constraint 
satisfaction; Agent programming languages, development environments and 
testbeds; Computational complexity in autonomous agents; Multi-agent 
planning and cooperation; Logics and formal models of for agency 
verification; Nomadic agents; Negotiation, auctions, persuasion; Privacy 
and security issues in multi-agent systems

Mobility and multimedia systems
Mobile communications; Multimedia and visual programming; Multimedia and 
decision making; Multimedia systems; Mobile multimedia systems; 
User-centered mobile applications; Designing for the mobile devices; 
Contextual user mobility; Mobile strategies for global market; 
Interactive television and mobile commerce

Systems performance
Performance evaluation; Performance modeling; Performance of parallel 
computing; Reasoning under uncertainty; Reliability and fault-tolerance; 
Performance instrumentation; Performance monitoring and corrections; 
Performance in entity-dependable systems; Real-time performance and 
near-real time performance evaluation; Performance in software systems; 
Performance and hybrid systems; Measuring performance in embedded systems

Networking and telecommunications
Telecommunication and Networking; Telecommunication Systems and 
Evaluation; Multiple Criteria Decision Making in Information Technology; 
Network and Decision Making; Networks and Security; Communications 
protocols (SIP/H323/MPLS/IP); Specialized networks (GRID/P2P/Overlay/Ad 
hoc/Sensor); Advanced services (VoIP/IPTV/Video-on-Demand; Network and 
system monitoring and management; Feature interaction detection and 
resolution; Policy-based monitoring and managements systems; Traffic 
modeling and monitoring; Traffic engineering and management; 
Self-monitoring, self-healing and self-management systems; 
Man-in-the-loop management paradigm

Software development and deployment
Software requirements engineering; Software design, frameworks, and 
architectures; Software interactive design; Formal methods for software 
development, verification and validation; Neural networks and 
performance; Patterns/Anti-patterns/Artifacts/Frameworks; 
Agile/Generic/Agent-oriented programming; Empirical software evaluation 
metrics; Software vulnerabilities; Reverse engineering; Software reuse; 
Software security, reliability and safety; Software economics; Software 
testing and debugging; Tracking defects in the OO design; Distributed 
and parallel software; Programming languages; Declarative programming; 
Real-time and embedded software; Open source software development 
methodologies; Software tools and deployment environments; Software 
Intelligence; Software Performance and Evaluation

Knowledge virtualization
Modeling techniques, tools, methodologies, languages; Model-driven 
architectures (MDA); Service-oriented architectures (SOA); Utility 
computing frameworks and fundamentals; Enabled applications through 
virtualization; Small-scale virtualization methodologies and techniques; 
Resource containers, physical resource multiplexing, and segmentation; 
Large-scale virtualization methodologies and techniques; Management of 
virtualized systems; Platforms, tools, environments, and case studies; 
Making virtualization real; On-demand utilities Adaptive enterprise; 
Managing utility-based systems; Development environments, tools, prototypes

Systems and networks on the chip
Microtechnology and nanotechnology; Real-time embedded systems; 
Programming embedded systems; Controlling embedded systems; High speed 
embedded systems; Designing methodologies for embedded systems; 
Performance on embedded systems; Updating embedded systems; 
Wireless/wired design of systems-on-the-chip; Testing embedded systems; 
Technologies for systems processors; Migration to single-chip systems

Context-aware systems
Context-aware autonomous entities; Context-aware fundamental concepts, 
mechanisms, and applications; Modeling context-aware systems; 
Specification and implementation of awareness behavioral contexts; 
Development and deployment of large-scale context-aware systems and 
subsystems; User awareness requirements Design techniques for interfaces 
and systems; Methodologies, metrics, tools, and experiments for 
specifying context-aware systems; Tools evaluations, Experiment evaluations

Networking technologies
Next generation networking; Network, control and service architectures; 
Network signalling, pricing and billing; Network middleware; 
Telecommunication networks architectures; On-demand networks, utility 
computing architectures; Next generation networks [NGN] principles; 
Storage area networks [SAN]; Access and home networks; High-speed 
networks; Optical networks; Peer-to-peer and overlay networking; Mobile 
networking and systems; MPLS-VPN, IPSec-VPN networks; GRID networks; 
Broadband networks

Security in network, systems, and applications
IT in national and global security; Formal aspects of security; Systems 
and network security; Security and cryptography; Applied cryptography; 
Cryptographic protocols; Key management; Access control; Anonymity and 
pseudonymity management; Security management; Trust management; 
Protection management; Certification and accreditation; Virii, worms, 
attacks, spam; Intrusion prevention and detection; Information hiding; 
Legal and regulatory issues

Knowledge for global defense
Business continuity and availability; Risk assessment; Aerospace 
computing technologies; Systems and networks vulnerabilities; Developing 
trust in Internet commerce; Performance in networks, systems, and 
applications; Disaster prevention and recovery; IT for anti-terrorist 
technology innovations (ATTI); Networks and applications emergency 
services; Privacy and trust in pervasive communications; Digital rights 
management; User safety and protection

Information Systems [IS]
Management Information Systems; Decision Support Systems; Innovation and 
IS; Enterprise Application Integration; Enterprise Resource Planning; 
Business Process Change; Design and Development Methodologies and 
Frameworks; Iterative and Incremental Methodologies; Agile 
Methodologies; IS Standards and Compliance Issues; Risk Management in IS 
Design and Development; Research Core Theories; Conceptualisations and 
Paradigms in IS; Research Ontological Assumptions in IS Research; IS 
Research Constraints, Limitations and Opportunities; IS vs Computer 
Science Research; IS vs Business Studies

IPv6 Today - Technology and deployment
IP Upgrade - An Engineering Exercise or a Necessity?; Worldwide IPv6 
Adoption - Trends and Policies; IPv6 Programs, from Research to 
Knowledge Dissemination; IPv6 Technology - Practical Information; 
Advanced Topics and Latest Developments in IPv6; IPv6 Deployment 
Experiences and Case Studies; IPv6 Enabled Applications and Devices

Modeling
Continuous and Discrete Models; Optimal Models; Complex System Modeling; 
Individual-Based Models; Modeling Uncertainty; Compact Fuzzy Models; 
Modeling Languages; Real-time modeling; Peformance modeling

Optimization
Multicriteria Optimization; Multilervel Optimization; Goal Programming; 
Optimization and Efficiency; Optimization-based decisions; Evolutionary 
Optimization; Self-Optimization; Extreme Optimization; Combinatorial 
Optimization; Disccrete Optimization; Fuzzy Optimization; Lipschitzian 
Optimization; Non-Convex Optimization; Convexity; Continuous 
Optimization; Interior point methods; Semidefinite and Conic Programming

Complexity
Complexity Analysis; Computational Complexity; Complexity Reduction; 
Optimizing Model Complexity; Communication Complexity; Managing 
Complexity; Modeling Complexity in Social Systems; Low-complexity Global 
Optimization; Software Development for Modeling and Optimization; 
Industrial applications

==========
ICCGI 2010 General Chair
Jordi Bataller, Polytechnic University of Valencia, Spain

ICCGI Advisory Chairs
Mirela Danubianu, "Stefan cel Mare" University of Suceava, Romania
Petre Dini, Concordia University, Canada / IARIA
Tibor Gyires, Technology Illinois State University, USA
José Valerdi, France Telecom R&D (Orange Labs), Spain

ICCGI 2010 Research Institute Liaison Chairs
Robert Chew, Lien Centre for Social Innovation, Singapore
Matjaz Gams, Jozef Stefan Institute - Ljubljana, Slovenia
Karolj Skala, Rudjer Bokovic Institute - Zagreb, Croatia
Mauro Teófilo, Nokia Technology Institute, Brazil

ICCGI 2010 Industry/Research Chairs
Kemal A. Delic, Hewlett-Packard Co. France
José García Escudero, La Maquinista Valenciana, Spain
Jivesh Govil, Cisco Systems, Inc., USA
Liviu Panait, Google Inc., USA
Jean-Denis Mathias, CEMAGREF - Clermont-Ferrand, France
Hoo Chong Wei, Motorola Inc., Malaysia

Committee members: http://www.iaria.org/conferences2010/ComICCGI10.html
=============

From m.garcia.upv@gmail.com  Fri Apr  2 12:23:24 2010
Return-Path: <m.garcia.upv@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D0AD03A6A8C for <sam@core3.amsl.com>; Fri,  2 Apr 2010 12:23:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.169
X-Spam-Level: 
X-Spam-Status: No, score=-2.169 tagged_above=-999 required=5 tests=[AWL=1.300,  BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pZJ-Pn1lMo2L for <sam@core3.amsl.com>; Fri,  2 Apr 2010 12:23:23 -0700 (PDT)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.21]) by core3.amsl.com (Postfix) with ESMTP id 1433D3A6B0E for <sam@irtf.org>; Fri,  2 Apr 2010 11:50:25 -0700 (PDT)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id o32IowM7002339 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Fri, 2 Apr 2010 20:50:58 +0200
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id o32IoweX023165 for <sam@irtf.org>; Fri, 2 Apr 2010 20:50:58 +0200
Received: from JLLORET (osiris1.gnd.upv.es [158.42.148.63]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id o32IowkI016623 for <sam@irtf.org>; Fri, 2 Apr 2010 20:50:58 +0200
Date: Fri, 2 Apr 2010 20:50:58 +0200
Message-Id: <201004021850.o32IowkI016623@smtp.upv.es>
From: Miguel Garcia<m.garcia.upv@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] 3rd CfP: ACCESS 2010 || September 20-25, 2010 - Valencia, Spain
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Apr 2010 19:23:24 -0000

3rd CfP: ACCESS 2010 || September 20-25, 2010 - Valencia, Spain

INVITATION:

=================
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.
=================


============== ACCESS 2010 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ACCESS 2010: The First International Conferences on Access Networks, Services and Technologies
September 20-25, 2010 - Valencia, Spain

General page: http://www.iaria.org/conferences2010/ACCESS10.html
Call for Papers: http://www.iaria.org/conferences2010/CfPACCESS10.html

Submission deadline: April 20, 2010

Sponsored by IARIA, www.iaria.org
Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org
Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )
Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore
Submitted for indexing: Elsevier's EI Compendex Database, EI's Engineering Information Index
Other indexes are being considered: INSPEC, DBLP, Thomson Reuters Conference Proceedings Citation Index

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. 

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

ACCESS 2010 Tracks (tracks' topics and submission details: see CfP on the site)

NEXTACCESS: Next generation access technologies
Interactivity, unlimited access and full-scale media support; Energy-aware and efficiency-oriented technologies; Sustainable access network business (standard DSL vs. fiber vs. wireless access); 3G/4G wireless technologies; Multiservice access (DSL, fiber, WiMAX, POTS); FTTH; Ethernet P2P vs. xPON; FTTx with VDSL2, or Ethernet, or DOCSIS 3.0; Radio extension, 802.xx (Wi-Fi, WiMax, etc.); LTE, LTE-advanced; IMT-advanced networks; Mesh and relay networks (IEEE 802.11s, IEEE802.16j, etc.); Quality of experience (QoE)

FEMTO: Femtocells-based access
Femtocells architectures; Femtocells requirements ands specifications; Femtocells protocols; Femtocells services and applications; Traffic and QoS in Femtocells; Performance analysis in Femtocells; Femtocells control and management; Interoperability of Femtocells devices; Femtocells operation optimization; Femtocells specific solutions for mobility; OFDMA Femtocells: interference avoidance; Macrocell-Femto cell interference issues and mitigation; Macrocell-Femto cell handover strategies; WiMAX Fentocells; Standardization of Femtocells

BROADBAND: Broadband wireless Internet access
New architectures, technologies, protocols for broadband wireless access; QoS in mobile and broadband wireless access networks; Broadcast and multicast support; Physical and data link layer issues; Medium access control, SLA and QoS; Radio resource management and call admission control; Space-time coding for broadband wireless Internet; Modulation, coding and antennas (MIMO); Spectrum management; Scalability and reliability issues; Wireless mesh networks; Capacity planning and traffic engineering; Security and privacy issues; Interoperability aspects (fixed/mobile LANs/MANs, WANs); Experiences/lessons from recent deployments

OPTICAL: Optical access networks
Optical access network architecture design; Optical access network components and systems; New PON developments and testbeds; WDM and OFDM PON technologies; MAC and bandwidth allocation; RoF network architecture and MAC; RoF components and systems; Signal processing for new modulation formats; Optical spectral management; Multimode fiber technology and applications; Performance monitoring and diagnosis; Deployment and economic analysis

MOBILE WIRELESS: Mobile wireless access
Mobile Broadband Wireless Access; Wireless/Mobile Access Protocols; Wireless/Mobile Web Access; Ubiquitous and mobile access; Mobile/vehicular environment access; Multi-Homing and Vertical Handoff; Localization and tracking; Context-aware services and applications; Context-aware protocols and protocol architectures; Interactive applications; Mobile and Wireless Entertainment; Mobile Info-services; Wireless ad hoc and sensor networks

DYNAMIC: Dynamic and cognitive access
Dynamic spectrum access; Architectures and platforms for dynamic spectrum access networks; Spectrum sensing, measurement and models; Efficient and broadband spectrum sensing; Interference metrics and measurements; New spectrum protocols and models; Cognitive radio (cross-layer optimization); Multiple access schemes for cognitive radio networks; Radio resource management and dynamic spectrum access networks; Dynamic spectrum auction and economics; Business model, pricing, and regulations for dynamic spectrum

HOWAN: Hybrid optical and wireless access networks
Multi-hop wireless mesh networks; Passive optical networks; Node architecture and design of hybrid optical and wireless networks; Emerging wireless/optical applications QoS management for hybrid access networks; PON and WDM-PON network experiments; Radio over Fiber (RoF); FTTx network architecture and applications; Routing and multicast over hybrid optical and wireless networks; Service resilience and availability of hybrid optical and wireless networks; Applications and evolutions of hybrid access networks; Network design, control, and performance in HOWANs; Capacity analysis, flow and congestion control in HOWANs; Optimization of hybrid optical and wireless networks; Evolution of HOWAN access networks Broadband wireless access in HOWANs; Security and privacy in HOWANs; New services and applications; Test-bed and prototype implementation; Standardization issues

COPPER: Copper Access
Ubiquity via phone lines; Speed reaching 100 Mbps; DSL broadband access; Dynamic and joint optimization of resources (frequency, amplitude, space, and time); Attenuation and crosstalk bottlenecks; Management and control for the multi-user twisted pair networks

GIGATERA: Giga/Tera Access
Multi-antenna technologies (MIMO, Beamforming, Antenna Selection, etc); RF/Antenna propagation (RF beamforming, Tera-Hz signal generation, Propagation); Interoperability aspects (fixed/mobile LANs/MANs, WANs); Signal processing for millimeter and Tera-Hz wireless systems; NLOS avoidance techniques; Cooperative networks, repeaters and relaying; Error correction, equalization; Space division multiple access; Coexistence and interoperability; OFDM versus single-carrier systems; MIMO in mm-wave and Tera-Hz systems; OFDMA processing; Spread spectrum techniques; High-efficiency medium access control (MAC) protocol; Neighbor discovery in directional wireless networks

CONTROL: Access Control 
Foundations for access control; Models for access control; Mechanisms for access control; Policy-driven and role-driven access control; Delegation and identity management; Privacy-drive control; Access control for advanced applications (cloud, autonomic, sensor, social networks, etc.); Standards for accesses control

NEUTRAL: Neutral Access Networks
Open access networks; Network neutrality; Operator-neutral residential access technologies; Operator-neutral nomadic access technologies; Operator-neutral mobile access technologies; Operator-neutral CPEs; Internet access regulation; NANs design and management; Multi-gateway traffic management; QoS management in shared infrastructures; Routing and multicast in NANs; Broadband business models for NANs; Broadband pricing models for NANs; Broadband market analysis for NANs; IP traffic models for NANs; Edge routers for NANs; Identity management in NANs; NANS and Digital divide; NANs and Digital inclusion; Inclusive services and applications; NAN testbeds and case studies

LEGAL: Legal aspects on network and service access
Network neutrality principle; Security and privacy rights; Institutional implications; Accessibility and social affordability; User responsibility

==========
ACCESS 2010 General Chairs
Elsa María Macías López, University of Las Palmas de Gran Canaria, Spain
Álvaro Suárez Sarmiento, University of Las Palmas de Gran Canaria, Spain

ACCESS Advisory Committee
Alessandro Bogliolo, Università di Urbino, Italy
Fabio M. Chiussi, Airvana, Inc., USA 
Mark Perry, University of Western Ontario/Faculty of Law/ Faculty of Science - London, Canada 
Shing-Wa Wong, Stanford University, USA 

ACCESS 20101 Research Institute Liaison Chairs
Sradhi Chava, CREATE-NET, Italy 
Moshe Ran, H.I.T - Holon Institute of Technology, Israel 

ACCESS 2010 Industry/Research Chairs
Alexander Klein, Technische Universität München, Germany 

ACCESS 2010 Special Area Chairs
FEMTO Chair 
    Fabio M. Chiussi, Airvana, Inc., USA 

Committee members: http://www.iaria.org/conferences2010/ComACCESS10.html
====================

From jlloret@dcom.upv.es  Wed Apr  7 07:29:46 2010
Return-Path: <jlloret@dcom.upv.es>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 460533A689B for <sam@core3.amsl.com>; Wed,  7 Apr 2010 07:29:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.5
X-Spam-Level: ***
X-Spam-Status: No, score=3.5 tagged_above=-999 required=5 tests=[BAYES_99=3.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Al4nD0l8+j6y for <sam@core3.amsl.com>; Wed,  7 Apr 2010 07:29:45 -0700 (PDT)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.21]) by core3.amsl.com (Postfix) with ESMTP id D2AD43A6870 for <sam@irtf.org>; Wed,  7 Apr 2010 07:29:43 -0700 (PDT)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id o37ETc5o015922 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Wed, 7 Apr 2010 16:29:38 +0200
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id o37ETcun015911 for <sam@irtf.org>; Wed, 7 Apr 2010 16:29:38 +0200
Received: from JLLORET (vpn245-26.vpns.upv.es [158.42.245.26]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id o37ETbZg006746 for <sam@irtf.org>; Wed, 7 Apr 2010 16:29:37 +0200
Date: Wed, 7 Apr 2010 16:29:37 +0200
Message-Id: <201004071429.o37ETbZg006746@smtp.upv.es>
From: Jaime Lloret Mauri<jlloret@dcom.upv.es>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] IET COM journal, CFP: Special Issue on Sensor Intelligence & Data Fusion
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Apr 2010 14:29:46 -0000

(Please accept our apologies if you receive multiple copies of this CFP.)

===========================================================

Call for Papers

Special Issue on:
Distributed Intelligence and Data Fusion for Sensor Systems

in IET Communications (SCI Indexed)
http://scitation.aip.org/IET-COM

===========================================================

Scope

Use of intelligence, data mining and data fusion has provided new momentum in 
the use of sensors and converted WSNs into a new brand of dynamic, autonomous 
and intelligent Distributed Sensor Systems. These features enable new smart 
sensors to play new roles as intelligent nodes gathering, manipulating and 
decimating data for more reliable and secure communication whilst performing 
more efficiently using less energy and number crunching.

This special issue aims at presenting innovative and signifi cant research 
papers on the design, implementation and evaluation of wireless sensors, 
especially for use of distributed intelligence and data fusion. 



Topics of primaryinterest include, but are not limited to:
 
* applications and deployment of intelligence in sensor systems and distributed 
  data fusion
* sensor networking protocols and algorithms
* sensor network management protocol and systems
* cross-layer design and sensor network management protocols
* security of distributed intelligence in sensor networks
* inter-connection between distributed sensor systems
* testbed, experimental measurements & performance analysis
* systems for context sensing and context awareness
* tools and methodologies for sensory data fusion
* QoS provisioning protocols with data fusion technology
* collaborative in-network processing and data sharing
* use of Intelligence and data in energy harvesting



IMPORTANT DATES

* Deadline for Submission of Paper:   01 July 2010
* Authors to receive a 1st decision:  30 September  2010
* Final notification of acceptance:   31 January 2011
* On-line and print publication:      Q1/Q2 2011



Paper Submission:
All papers must be submitted through the journal's Manuscript Central system:
<http://mc.manuscriptcentral.com/iet-com>



Guest editors:
 
 Dr. Lei Shu (Corresponding)
 Nishio Lab., Department of Multimedia Engineering
 Graduate School of Information Science and Technology
 Osaka University, Japan
 E-mail: lei.shu@ieee.org
 
 Prof. Jaime Lloret Mauri
 Polytechnic University of Valencia, Spain
 E-mail: jlloret@dcom.upv.es

 Prof. Joel Rodrigues
 University of Beira Interior, Portugal
 E-mail: joeljr@ieee.org

 Prof. Min Chen
 Seoul National University, Korea
 E-mail: minchen@ieee.org



IET Publishing Dept. contact:
 Paul Rowley
 Editorial Assistant
 IET Communications
 E-mail: prowley@theiet.org
 
 Professor Habib F. Rashvand
 Series Editor
 IET Communications
 E-mail: h.rashvand@warwick.ac.uk

From gjcarneiro@gmail.com  Wed Apr  7 10:54:17 2010
Return-Path: <gjcarneiro@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2062B3A69BE for <sam@core3.amsl.com>; Wed,  7 Apr 2010 10:54:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.202
X-Spam-Level: *
X-Spam-Status: No, score=1.202 tagged_above=-999 required=5 tests=[BAYES_50=0.001, HTML_MESSAGE=0.001, J_CHICKENPOX_42=0.6, J_CHICKENPOX_43=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id evDQoXycd9Yk for <sam@core3.amsl.com>; Wed,  7 Apr 2010 10:54:15 -0700 (PDT)
Received: from fg-out-1718.google.com (fg-out-1718.google.com [72.14.220.157]) by core3.amsl.com (Postfix) with ESMTP id 9D8263A6938 for <sam@irtf.org>; Wed,  7 Apr 2010 10:54:14 -0700 (PDT)
Received: by fg-out-1718.google.com with SMTP id d23so568628fga.1 for <sam@irtf.org>; Wed, 07 Apr 2010 10:54:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:date:received:message-id :subject:from:to:content-type; bh=Yw2feSPtLTsajnHvL13+lzx7aymjesJVdDkI66Sz65I=; b=oHyDc4huRwSW1N5eWD+G7/MZiyaT+3lvxrtK3LxDowuuPTr/5kW8fgPVV3YCOxZ6X6 flvkcPPZYbSqR5q7+tH5nB3h0i5YRHVFYWe2pjxba+tipQA86L8NpscbeVr4YN9lCJC8 c7u9hJ+8EGjuIlSTVIHk8mQV5YXhuLj9aszb8=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=TC/y3l/90IGIdMlDdAs/3TpFhKQG5Kiqb4vsOR6nUnpH4kVg3JeDTadhSb5Vb5IULU e/UNTDd/8J3AFtyWKHYqXm3FUpD5ACH/uNuSMtjhXYhKyWiFG1zaYszs8YvbrwZGgX42 XUSYNd02EohwsRFEauPVib0dQSyhnip+HJKW8=
MIME-Version: 1.0
Received: by 10.239.149.129 with HTTP; Wed, 7 Apr 2010 10:54:10 -0700 (PDT)
Date: Wed, 7 Apr 2010 18:54:10 +0100
Received: by 10.239.188.129 with SMTP id p1mr809338hbh.190.1270662850365; Wed,  07 Apr 2010 10:54:10 -0700 (PDT)
Message-ID: <y2wa467ca4f1004071054v35602b3axacd6b774e16da524@mail.gmail.com>
From: Gustavo Carneiro <gjcarneiro@gmail.com>
To: sam@irtf.org
Content-Type: multipart/alternative; boundary=001485f6cecad3490c0483a93fa9
Subject: [SAM] draft-kolberg-sam-baseline-protocol-00
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Apr 2010 17:54:17 -0000

--001485f6cecad3490c0483a93fa9
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi,

I am trying to understand
draft-kolberg-sam-baseline-protocol-00<http://tools.ietf.org/html/draft-kol=
berg-sam-baseline-protocol-00>

<http://tools.ietf.org/html/draft-kolberg-sam-baseline-protocol-00>One thin=
g
that confuses me is in Sec. 5.  Group Management API.  First it says,

While native multicast is bound to IP addresses, ALM uses arbitrary strings
> as multicast names, which will be mapped to the overlay identifier space.

The aim of this API is to implement group-oriented data
> communication independent of the underlying distribution technologies.


But then the API described is based on Address types, which are described
as:

Address is any address structure suitable with respect to the technology
> available at the host. This may be an IPv4 or an IPv6 address, or any
> overlay identifier.


So it seems that the Group Management API does not work with high-level
abstract identifiers, it already works with transport-specific identifiers.
 This is contrary to what was show in the  presentation
http://www.ietf.org/proceedings/10mar/slides/SAMRG-1.pdf

In page 11 of the slides:
             Sec 5. Group Management API
=E2=80=A2 API between Application and Group stack
=E2=80=A2 init(out Handle s)
    =E2=80=93 This call creates a multicast socket that is bound to some vi=
rtual
multicast
       interface and provides a corresponding handle to the application
programmer,
       which will be used for subsequent communication.
=E2=80=A2 join(in Handle s, in URL g)
    =E2=80=93 This operation initiates a group subscription for the name g,
including the
       corresponding tree access.

Here we see a different API, where URLs are used instead of identifiers.

Another not so clear item is how the API in Sec. 5 articulates with Sec. 6.
 Sec.6 starts like this:

In this document we define messages for hybrid overlay multicast
> tree creation...


I get the feeling this used to be a separate draft that was converted to a
section of another draft.  I suppose that the Protocol described is
triggered by API calls of the Sec. 5 API, but I get the feeling I am
guessing what should be explicitly stated in the document.  In that
sense, draft-waehlisch-sam-common-api-02 (Fig. 2) is clearer.

And what is exactly the relationship
between draft-waehlisch-sam-common-api-02
and draft-kolberg-sam-baseline-protocol-00.  They were published almost at
the same time (for the meeting?); are they competing proposals?

Thanks,
--=20
Gustavo J. A. M. Carneiro
INESC Porto, UTM, WiN, http://win.inescporto.pt/gjc
"The universe is always one step beyond logic." -- Frank Herbert

--001485f6cecad3490c0483a93fa9
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi,<div><br></div><div>I am trying to understand=C2=A0<span class=3D"Apple-=
style-span" style=3D"font-family: arial, sans-serif; font-size: 13px; borde=
r-collapse: collapse; "><a href=3D"http://tools.ietf.org/html/draft-kolberg=
-sam-baseline-protocol-00" target=3D"_blank" style=3D"color: rgb(42, 93, 17=
6); ">draft-kolberg-sam-baseline-protocol-00</a></span></div>
<div><font class=3D"Apple-style-span" face=3D"arial, sans-serif"><span clas=
s=3D"Apple-style-span" style=3D"border-collapse: collapse;"><br></span></fo=
nt></div><div><a href=3D"http://tools.ietf.org/html/draft-kolberg-sam-basel=
ine-protocol-00" target=3D"_blank" style=3D"color: rgb(42, 93, 176); "></a>=
<font class=3D"Apple-style-span" face=3D"arial, sans-serif"><span class=3D"=
Apple-style-span" style=3D"border-collapse: collapse;">One thing that confu=
ses me is in Sec. 5. =C2=A0Group Management API. =C2=A0First it says,</span=
></font></div>
<div><font class=3D"Apple-style-span" face=3D"arial, sans-serif"><br></font=
></div><div><blockquote class=3D"gmail_quote" style=3D"margin-top: 0px; mar=
gin-right: 0px; margin-bottom: 0px; margin-left: 0.8ex; border-left-width: =
1px; border-left-color: rgb(204, 204, 204); border-left-style: solid; paddi=
ng-left: 1ex; ">
While native multicast=C2=A0is bound to IP addresses, ALM uses arbitrary st=
rings as multicast=C2=A0names, which will be mapped to the overlay identifi=
er space.=C2=A0</blockquote><blockquote class=3D"gmail_quote" style=3D"marg=
in-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0.8ex; bor=
der-left-width: 1px; border-left-color: rgb(204, 204, 204); border-left-sty=
le: solid; padding-left: 1ex; ">
<span class=3D"Apple-style-span" style=3D"font-family: arial, sans-serif; "=
>The aim of this API is to implement group-oriented data communication=C2=
=A0independent of the underlying distribution technologies.</span></blockqu=
ote></div>
<div><font class=3D"Apple-style-span" face=3D"arial, sans-serif"><span clas=
s=3D"Apple-style-span" style=3D"border-collapse: collapse; "><br></span></f=
ont></div><div><font class=3D"Apple-style-span" face=3D"arial, sans-serif">=
<span class=3D"Apple-style-span" style=3D"border-collapse: collapse;">But t=
hen the API described is based on Address types, which are described as:</s=
pan></font></div>
<div><font class=3D"Apple-style-span" face=3D"arial, sans-serif"><span clas=
s=3D"Apple-style-span" style=3D"border-collapse: collapse;"><br></span></fo=
nt></div><div><blockquote class=3D"gmail_quote" style=3D"margin-top: 0px; m=
argin-right: 0px; margin-bottom: 0px; margin-left: 0.8ex; border-left-width=
: 1px; border-left-color: rgb(204, 204, 204); border-left-style: solid; pad=
ding-left: 1ex; ">
Address is any address structure suitable with respect to the technology av=
ailable at the host. This may be an IPv4 or an IPv6 address, or any overlay=
 identifier.</blockquote><div><br></div><div>So it seems that the Group Man=
agement API does not work with high-level abstract identifiers, it already =
works with transport-specific identifiers. =C2=A0This is contrary to what w=
as show in the =C2=A0presentation=C2=A0<span class=3D"Apple-style-span" sty=
le=3D"font-family: arial, sans-serif; font-size: 13px; border-collapse: col=
lapse; "><a href=3D"http://www.ietf.org/proceedings/10mar/slides/SAMRG-1.pd=
f" target=3D"_blank" style=3D"color: rgb(42, 93, 176); ">http://www.ietf.or=
g/proceedings/10mar/slides/SAMRG-1.pdf</a></span></div>
<div><br></div><div>In page 11 of the slides:</div><div><div>=C2=A0=C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Sec 5. Group Management API</div><div>=
=E2=80=A2 API between Application and Group stack</div><div>=E2=80=A2 init(=
out Handle s)</div><div>=C2=A0=C2=A0 =C2=A0=E2=80=93 This call creates a mu=
lticast socket that is bound to some virtual multicast</div>
<div>=C2=A0=C2=A0 =C2=A0 =C2=A0 interface and provides a corresponding hand=
le to the application programmer,</div><div>=C2=A0=C2=A0 =C2=A0 =C2=A0 whic=
h will be used for subsequent communication.</div><div>=E2=80=A2 join(in Ha=
ndle s, in URL g)</div><div>=C2=A0=C2=A0 =C2=A0=E2=80=93 This operation ini=
tiates a group subscription for the name g, including the</div>
<div>=C2=A0=C2=A0 =C2=A0 =C2=A0 corresponding tree access.</div></div><div>=
<br></div><div>Here we see a different API, where URLs are used instead of =
identifiers.</div><div><br></div><div>Another not so clear item is how the =
API in Sec. 5 articulates with Sec. 6. =C2=A0Sec.6 starts like this:</div>
<div><br></div><blockquote class=3D"gmail_quote" style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0.8ex; border-left-widt=
h: 1px; border-left-color: rgb(204, 204, 204); border-left-style: solid; pa=
dding-left: 1ex; ">
In this document we define messages for hybrid overlay multicast tree=C2=A0=
creation...</blockquote><div><br></div><div>I get the feeling this used to =
be a separate draft that was converted to a section of another draft. =C2=
=A0I suppose that the Protocol described is triggered by API calls of the S=
ec. 5 API, but I get the feeling I am guessing what should be explicitly st=
ated in the document. =C2=A0In that sense,=C2=A0draft-waehlisch-sam-common-=
api-02 (Fig. 2) is clearer.</div>
<div><br></div><div>And what is exactly the relationship between=C2=A0draft=
-waehlisch-sam-common-api-02 and=C2=A0draft-kolberg-sam-baseline-protocol-0=
0. =C2=A0They were published almost at the same time (for the meeting?); ar=
e they competing proposals?</div>
<div><br></div><div>Thanks,</div>-- <br>Gustavo J. A. M. Carneiro<br>INESC =
Porto, UTM, WiN, <a href=3D"http://win.inescporto.pt/gjc">http://win.inescp=
orto.pt/gjc</a><br>&quot;The universe is always one step beyond logic.&quot=
; -- Frank Herbert<br>

</div>

--001485f6cecad3490c0483a93fa9--

From waehlisch@ieee.org  Wed Apr  7 20:48:59 2010
Return-Path: <waehlisch@ieee.org>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9223B3A68A5 for <sam@core3.amsl.com>; Wed,  7 Apr 2010 20:48:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.649
X-Spam-Level: 
X-Spam-Status: No, score=-99.649 tagged_above=-999 required=5 tests=[BAYES_50=0.001, HELO_EQ_DE=0.35, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fDPwamg6tZ2d for <sam@core3.amsl.com>; Wed,  7 Apr 2010 20:48:58 -0700 (PDT)
Received: from mail2.rz.htw-berlin.de (mail2.rz.htw-berlin.de [141.45.10.102]) by core3.amsl.com (Postfix) with ESMTP id 343C43A6827 for <sam@irtf.org>; Wed,  7 Apr 2010 20:48:58 -0700 (PDT)
Envelope-to: sam@irtf.org
Received: from adsl-76-231-184-62.dsl.pltn13.sbcglobal.net ([76.231.184.62] helo=mw-thinkpad) by mail2.rz.htw-berlin.de with esmtpsa (TLSv1:RC4-MD5:128) (Exim 4.68 (FreeBSD)) (envelope-from <waehlisch@ieee.org>) id 1Nzijd-0002Ej-Gg; Thu, 08 Apr 2010 05:48:54 +0200
Date: Wed, 7 Apr 2010 20:48:45 -0700 (Pazifik Sommerzeit)
From: Matthias Waehlisch <waehlisch@ieee.org>
To: Gustavo Carneiro <gjcarneiro@gmail.com>
In-Reply-To: <y2wa467ca4f1004071054v35602b3axacd6b774e16da524@mail.gmail.com>
Message-ID: <Pine.WNT.4.64.1004071958180.5636@mw-thinkpad>
References: <y2wa467ca4f1004071054v35602b3axacd6b774e16da524@mail.gmail.com>
X-X-Sender: mw@mail2.rz.fhtw-berlin.de
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
X-HTW-SPAMINFO: this message was scanned by eXpurgate (http://www.eleven.de)
Cc: sam@irtf.org
Subject: Re: [SAM] draft-kolberg-sam-baseline-protocol-00
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Apr 2010 03:48:59 -0000

Hi Gustavo,

  many thanks for your valuable feedback!

  Please see my reply inline.

On Wed, 7 Apr 2010, Gustavo Carneiro wrote:

> I am trying to understand draft-kolberg-sam-baseline-protocol-00
> 
> One thing that confuses me is in Sec. 5.  Group Management API.  
> First it says,
> 
> While native multicast is bound to IP addresses, ALM uses arbitrary 
> strings as multicast names, which will be mapped to the overlay 
> identifier space.
> 
> The aim of this API is to implement group-oriented data communication 
> independent of the underlying distribution technologies.
> 
> But then the API described is based on Address types, which are described
> as:
> 
> Address is any address structure suitable with respect to the 
> technology available at the host. This may be an IPv4 or an IPv6 
> address, or any overlay identifier.
> 
> So it seems that the Group Management API does not work with 
> high-level abstract identifiers, it already works with 
> transport-specific identifiers. 
>
  Yes, this is misleading presented in the current version. We updated 
this to mention explicit naming using the URI scheme with respect to 
draft-waehlisch-sam-common-api. However, this update has not been 
published yet, as we want to add some further extensions in the 
draft-kolberg-sam-baseline-protocol.

[...]

> And what is exactly the relationship between 
> draft-waehlisch-sam-common-api-02 and 
> draft-kolberg-sam-baseline-protocol-00.  They were published almost at 
> the same time (for the meeting?); are they competing proposals?
> 
  No, they are not competing proposals. From the perspective of 
draft-waehlisch-sam-common-api the baseline protocol is a special use 
case for the common API. In contrast, from the perspective of 
draft-kolberg-sam-baseline-protocol the common API fills the gap to 
develop hybrid group communication applications.


Thanks
  matthias


-- 
Matthias Waehlisch
.  FU Berlin, Inst. fuer Informatik, AG CST
.  Takustr. 9, D-14195 Berlin, Germany
.. mailto:waehlisch@ieee.org .. http://www.inf.fu-berlin.de/~waehl
:. Also: http://inet.cpt.haw-hamburg.de .. http://www.link-lab.net

From mko@cs.stir.ac.uk  Thu Apr  8 02:39:55 2010
Return-Path: <mko@cs.stir.ac.uk>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6A7EC3A6825 for <sam@core3.amsl.com>; Thu,  8 Apr 2010 02:39:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.001
X-Spam-Level: 
X-Spam-Status: No, score=0.001 tagged_above=-999 required=5 tests=[BAYES_50=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nT-VQOQGS1Ox for <sam@core3.amsl.com>; Thu,  8 Apr 2010 02:39:54 -0700 (PDT)
Received: from mailscanner1.stir.ac.uk (mailscanner1.stir.ac.uk [139.153.12.54]) by core3.amsl.com (Postfix) with ESMTP id 8F7F83A6407 for <sam@irtf.org>; Thu,  8 Apr 2010 02:39:54 -0700 (PDT)
Received: from yen.cs.stir.ac.uk ([139.153.254.70]) by mailscanner1.stir.ac.uk with esmtp (Exim 4.69) (envelope-from <mko@cs.stir.ac.uk>) id 1NzoCg-0002pM-0T; Thu, 08 Apr 2010 10:39:15 +0100
Received: from [139.153.48.14] by yen.cs.stir.ac.uk (8.9.3) id KAA12186; Thu, 8 Apr 2010 10:38:53 +0100 (BST)
Message-ID: <4BBDA42D.8000602@cs.stir.ac.uk>
Date: Thu, 08 Apr 2010 10:38:53 +0100
From: Dr Mario Kolberg <mko@cs.stir.ac.uk>
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: Gustavo Carneiro <gjcarneiro@gmail.com>
References: <y2wa467ca4f1004071054v35602b3axacd6b774e16da524@mail.gmail.com>
In-Reply-To: <y2wa467ca4f1004071054v35602b3axacd6b774e16da524@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-MailScanner-ID: 1NzoCg-0002pM-0T
X-stir.ac.uk-MailScanner: Found to be clean
X-stir.ac.uk-MailScanner-From: mko@cs.stir.ac.uk
MailScanner-NULL-Check: 1271324357.60579@Vb6v0l7hZ+2gkiUV1sqp/g
Cc: sam@irtf.org
Subject: Re: [SAM] draft-kolberg-sam-baseline-protocol-00
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Apr 2010 09:39:55 -0000

Dear Gustavo,

many thanks for your comments.

> Another not so clear item is how the API in Sec. 5 articulates with Sec. 
> 6.  Sec.6 starts like this:
> 
>     In this document we define messages for hybrid overlay multicast
>     tree creation...
> 
> 
> I get the feeling this used to be a separate draft that was converted to 
> a section of another draft.  I suppose that the Protocol described is 
> triggered by API calls of the Sec. 5 API, but I get the feeling I am 
> guessing what should be explicitly stated in the document.  In that 
> sense, draft-waehlisch-sam-common-api-02 (Fig. 2) is clearer.

Yes section 5 is the API to the application, whereas section 6 describes 
the API between nodes. And yes this draft is based on a number of 
previous drafts. The aim is to align them and to form a base document 
for the WG. I accept there is still some work to be done.

Mario



-- 
The Sunday Times Scottish University of the Year 2009/2010
The University of Stirling is a charity registered in Scotland, 
 number SC 011159.


From gjcarneiro@gmail.com  Thu Apr  8 05:37:03 2010
Return-Path: <gjcarneiro@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 65B5028C13B for <sam@core3.amsl.com>; Thu,  8 Apr 2010 05:37:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.184
X-Spam-Level: 
X-Spam-Status: No, score=-0.184 tagged_above=-999 required=5 tests=[BAYES_40=-0.185, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HnYo+ebovtaQ for <sam@core3.amsl.com>; Thu,  8 Apr 2010 05:37:02 -0700 (PDT)
Received: from mail-fx0-f218.google.com (mail-fx0-f218.google.com [209.85.220.218]) by core3.amsl.com (Postfix) with ESMTP id 0D28528C130 for <sam@irtf.org>; Thu,  8 Apr 2010 05:37:01 -0700 (PDT)
Received: by fxm10 with SMTP id 10so1730300fxm.7 for <sam@irtf.org>; Thu, 08 Apr 2010 05:36:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:received:message-id:subject:from:to:content-type; bh=vGgPw7Bb/N0Vok0qwQA441eGeXh8/GMJhRddF4LE2Ok=; b=c4PvVOKwcxhgB5tR+8EF6oQBhEWMKCDYaPh3CSDtzK2cpwIMXLjTC0AOE/UXEIixWH lRtZzNFnjNmn7QAxgLJtqhKeXDf8hlYeMIaOhO5b/oh8i+5+T5aX1TP3AyI795LLGCCX vqiNLZGmD7RJB9qajn1QGZu3PMArVCNYwlv5Y=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; b=ulO9R+oFCEmh9JO+J/9O94Awu9atG+I20SLPlxXIgChWdkVrMtp+WPwQ1Vojsq8AfF iqbb7P5Krj4aPZ+9D9041519Yt6hM9bIAv3MLKOob6tTx94DTNiaMrgjWwfaR8aCFD+j yL+bg7WYLwznb8xSdfqpl/Y+nl9cxdLZF6ReI=
MIME-Version: 1.0
Received: by 10.239.149.129 with HTTP; Thu, 8 Apr 2010 05:36:55 -0700 (PDT)
In-Reply-To: <4BBDA42D.8000602@cs.stir.ac.uk>
References: <y2wa467ca4f1004071054v35602b3axacd6b774e16da524@mail.gmail.com> <4BBDA42D.8000602@cs.stir.ac.uk>
Date: Thu, 8 Apr 2010 13:36:55 +0100
Received: by 10.239.187.212 with SMTP id m20mr9725hbh.51.1270730215474; Thu,  08 Apr 2010 05:36:55 -0700 (PDT)
Message-ID: <u2va467ca4f1004080536uae4fcefbv5f2cb130fd093cfc@mail.gmail.com>
From: Gustavo Carneiro <gjcarneiro@gmail.com>
To: sam@irtf.org
Content-Type: multipart/alternative; boundary=001485f7d24019467e0483b8ef3e
Subject: Re: [SAM] draft-kolberg-sam-baseline-protocol-00
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Apr 2010 12:37:03 -0000

--001485f7d24019467e0483b8ef3e
Content-Type: text/plain; charset=UTF-8

On Thu, Apr 8, 2010 at 10:38 AM, Dr Mario Kolberg <mko@cs.stir.ac.uk> wrote:

> Dear Gustavo,
>
> many thanks for your comments.
>
>
>  Another not so clear item is how the API in Sec. 5 articulates with Sec.
>> 6.  Sec.6 starts like this:
>>
>>    In this document we define messages for hybrid overlay multicast
>>    tree creation...
>>
>>
>> I get the feeling this used to be a separate draft that was converted to a
>> section of another draft.  I suppose that the Protocol described is
>> triggered by API calls of the Sec. 5 API, but I get the feeling I am
>> guessing what should be explicitly stated in the document.  In that sense,
>> draft-waehlisch-sam-common-api-02 (Fig. 2) is clearer.
>>
>
> Yes section 5 is the API to the application, whereas section 6 describes
> the API between nodes. And yes this draft is based on a number of previous
> drafts. The aim is to align them and to form a base document for the WG. I
> accept there is still some work to be done.
>

OK, that is understandable in the first versions.

Still I was wondering if the plan is for the sam-common-api will continue to
evolve alongside sam-baseline-protocol, or whether it will be merged
into sam-baseline-protocol.

Many thanks for your answers (Matthias as well).

Regards,

-- 
Gustavo J. A. M. Carneiro
INESC Porto, UTM, WiN, http://win.inescporto.pt/gjc
"The universe is always one step beyond logic." -- Frank Herbert

--001485f7d24019467e0483b8ef3e
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Thu, Apr 8, 2010 at 10:38 AM, Dr Mari=
o Kolberg <span dir=3D"ltr">&lt;<a href=3D"mailto:mko@cs.stir.ac.uk">mko@cs=
.stir.ac.uk</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
Dear Gustavo,<br>
<br>
many thanks for your comments.<div class=3D"im"><br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
Another not so clear item is how the API in Sec. 5 articulates with Sec. 6.=
 =C2=A0Sec.6 starts like this:<br>
<br>
 =C2=A0 =C2=A0In this document we define messages for hybrid overlay multic=
ast<br>
 =C2=A0 =C2=A0tree creation...<br>
<br>
<br>
I get the feeling this used to be a separate draft that was converted to a =
section of another draft. =C2=A0I suppose that the Protocol described is tr=
iggered by API calls of the Sec. 5 API, but I get the feeling I am guessing=
 what should be explicitly stated in the document. =C2=A0In that sense, dra=
ft-waehlisch-sam-common-api-02 (Fig. 2) is clearer.<br>

</blockquote>
<br></div>
Yes section 5 is the API to the application, whereas section 6 describes th=
e API between nodes. And yes this draft is based on a number of previous dr=
afts. The aim is to align them and to form a base document for the WG. I ac=
cept there is still some work to be done.<br>
</blockquote><div><br></div><div>OK, that is understandable in the first ve=
rsions.</div><div><br></div><div>Still I was wondering if the plan is for t=
he=C2=A0sam-common-api will continue to evolve alongside=C2=A0sam-baseline-=
protocol, or whether it will be merged into=C2=A0sam-baseline-protocol.</di=
v>
<div>=C2=A0</div><div>Many thanks for your answers (Matthias as well).</div=
><div><br></div><div>Regards,</div><div><br></div></div>-- <br>Gustavo J. A=
. M. Carneiro<br>INESC Porto, UTM, WiN, <a href=3D"http://win.inescporto.pt=
/gjc">http://win.inescporto.pt/gjc</a><br>
&quot;The universe is always one step beyond logic.&quot; -- Frank Herbert<=
br>

--001485f7d24019467e0483b8ef3e--

From waehlisch@ieee.org  Thu Apr  8 14:38:20 2010
Return-Path: <waehlisch@ieee.org>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AC6CB3A67F5 for <sam@core3.amsl.com>; Thu,  8 Apr 2010 14:38:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.649
X-Spam-Level: 
X-Spam-Status: No, score=-99.649 tagged_above=-999 required=5 tests=[BAYES_50=0.001, HELO_EQ_DE=0.35, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id scaqaDkD1IUJ for <sam@core3.amsl.com>; Thu,  8 Apr 2010 14:38:19 -0700 (PDT)
Received: from mail2.rz.htw-berlin.de (mail2.rz.htw-berlin.de [141.45.10.102]) by core3.amsl.com (Postfix) with ESMTP id D857528C165 for <sam@irtf.org>; Thu,  8 Apr 2010 14:38:18 -0700 (PDT)
Envelope-to: sam@irtf.org
Received: from adsl-76-231-184-62.dsl.pltn13.sbcglobal.net ([76.231.184.62] helo=mw-thinkpad) by mail2.rz.htw-berlin.de with esmtpsa (TLSv1:RC4-MD5:128) (Exim 4.68 (FreeBSD)) (envelope-from <waehlisch@ieee.org>) id 1NzzQT-000HXy-GL; Thu, 08 Apr 2010 23:38:14 +0200
Date: Thu, 8 Apr 2010 14:38:06 -0700 (Pazifik Sommerzeit)
From: Matthias Waehlisch <waehlisch@ieee.org>
To: Gustavo Carneiro <gjcarneiro@gmail.com>
In-Reply-To: <u2va467ca4f1004080536uae4fcefbv5f2cb130fd093cfc@mail.gmail.com>
Message-ID: <Pine.WNT.4.64.1004081420180.5636@mw-thinkpad>
References: <y2wa467ca4f1004071054v35602b3axacd6b774e16da524@mail.gmail.com> <4BBDA42D.8000602@cs.stir.ac.uk> <u2va467ca4f1004080536uae4fcefbv5f2cb130fd093cfc@mail.gmail.com>
X-X-Sender: mw@mail2.rz.fhtw-berlin.de
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
X-HTW-SPAMINFO: this message was scanned by eXpurgate (http://www.eleven.de)
Cc: sam@irtf.org
Subject: Re: [SAM] draft-kolberg-sam-baseline-protocol-00
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Apr 2010 21:38:20 -0000

Hi Gustavo,

On Thu, 8 Apr 2010, Gustavo Carneiro wrote:

> OK, that is understandable in the first versions.
> 
> Still I was wondering if the plan is for the sam-common-api will 
> continue to evolve alongside sam-baseline-protocol, or whether it will 
> be merged into sam-baseline-protocol.
> 
  we also working on an update of the common API draft. The common API 
described in draft-waehlisch is not bound to the baseline protocol.


Best regards
  matthias

-- 
Matthias Waehlisch
.  FU Berlin, Inst. fuer Informatik, AG CST
.  Takustr. 9, D-14195 Berlin, Germany
.. mailto:waehlisch@ieee.org .. http://www.inf.fu-berlin.de/~waehl
:. Also: http://inet.cpt.haw-hamburg.de .. http://www.link-lab.net

From buford@samrg.org  Thu Apr  8 17:33:02 2010
Return-Path: <buford@samrg.org>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0E6B33A67D3 for <sam@core3.amsl.com>; Thu,  8 Apr 2010 17:33:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.15
X-Spam-Level: 
X-Spam-Status: No, score=0.15 tagged_above=-999 required=5 tests=[BAYES_40=-0.185, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 09-gOKNC8Uky for <sam@core3.amsl.com>; Thu,  8 Apr 2010 17:33:00 -0700 (PDT)
Received: from outbound-mail-01.bluehost.com (cpoproxy1-pub.bluehost.com [69.89.21.11]) by core3.amsl.com (Postfix) with SMTP id 389EE3A6840 for <sam@irtf.org>; Thu,  8 Apr 2010 17:33:00 -0700 (PDT)
Received: (qmail 8830 invoked by uid 0); 9 Apr 2010 00:32:56 -0000
Received: from unknown (HELO host181.hostmonster.com) (74.220.207.181) by cpoproxy1.bluehost.com with SMTP; 9 Apr 2010 00:32:56 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=samrg.org; h=Received:From:To:Cc:References:Subject:Date:Message-ID:MIME-Version:Content-Type:X-Mailer:In-Reply-To:Thread-Index:X-MimeOLE:X-Identified-User; b=QIaygtnBaozUTlnk7mROsNd/30CuCUgFElZAHA2cZLoUuOS90T2054VNi8j/FLQhKdHZBAPmFm1i+Bp5h07oOcxuAiEpPZYIjb9HjWWBWrBM7+dthStBZVTqaZ/OD3c/;
Received: from [66.206.216.145] (helo=mobilon) by host181.hostmonster.com with esmtpsa (TLSv1:RC4-MD5:128) (Exim 4.69) (envelope-from <buford@samrg.org>) id 1O029Y-0005Gk-CY; Thu, 08 Apr 2010 18:32:56 -0600
From: "John Buford" <buford@samrg.org>
To: "'Gustavo Carneiro'" <gjcarneiro@gmail.com>, <sam@irtf.org>
References: <y2wa467ca4f1004071054v35602b3axacd6b774e16da524@mail.gmail.com><4BBDA42D.8000602@cs.stir.ac.uk> <u2va467ca4f1004080536uae4fcefbv5f2cb130fd093cfc@mail.gmail.com>
Date: Thu, 8 Apr 2010 20:32:54 -0400
Message-ID: <3C1D6ECE742246A1AA64041D9915518D@mobilon>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00B9_01CAD75A.AC6C2F00"
X-Mailer: Microsoft Office Outlook 11
In-Reply-To: <u2va467ca4f1004080536uae4fcefbv5f2cb130fd093cfc@mail.gmail.com>
Thread-Index: AcrXGDAe1rh7zTVZTYe7Vb2q7MVuYAAL20cg
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579
X-Identified-User: {2055:host181.hostmonster.com:samrgorg:samrg.org} {sentby:smtp auth 66.206.216.145 authed with buford@samrg.org}
Subject: Re: [SAM] draft-kolberg-sam-baseline-protocol-00
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Apr 2010 00:33:02 -0000

This is a multi-part message in MIME format.

------=_NextPart_000_00B9_01CAD75A.AC6C2F00
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

I think that the API ID could be adopted as an RG work item by itself, and
the section in the baseline document could focus on how the API works
specifically with the RELOAD extensions we are describing.

John


  _____  

From: sam-bounces@irtf.org [mailto:sam-bounces@irtf.org] On Behalf Of
Gustavo Carneiro
Sent: Thursday, April 08, 2010 8:37 AM
To: sam@irtf.org
Subject: Re: [SAM] draft-kolberg-sam-baseline-protocol-00




On Thu, Apr 8, 2010 at 10:38 AM, Dr Mario Kolberg <mko@cs.stir.ac.uk> wrote:


Dear Gustavo,

many thanks for your comments. 



Another not so clear item is how the API in Sec. 5 articulates with Sec. 6.
Sec.6 starts like this:

   In this document we define messages for hybrid overlay multicast
   tree creation...


I get the feeling this used to be a separate draft that was converted to a
section of another draft.  I suppose that the Protocol described is
triggered by API calls of the Sec. 5 API, but I get the feeling I am
guessing what should be explicitly stated in the document.  In that sense,
draft-waehlisch-sam-common-api-02 (Fig. 2) is clearer.



Yes section 5 is the API to the application, whereas section 6 describes the
API between nodes. And yes this draft is based on a number of previous
drafts. The aim is to align them and to form a base document for the WG. I
accept there is still some work to be done.



OK, that is understandable in the first versions.

Still I was wondering if the plan is for the sam-common-api will continue to
evolve alongside sam-baseline-protocol, or whether it will be merged into
sam-baseline-protocol.
 
Many thanks for your answers (Matthias as well).

Regards,

-- 
Gustavo J. A. M. Carneiro
INESC Porto, UTM, WiN, http://win.inescporto.pt/gjc
"The universe is always one step beyond logic." -- Frank Herbert


------=_NextPart_000_00B9_01CAD75A.AC6C2F00
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.6000.16945" name=3DGENERATOR></HEAD>
<BODY>
<DIV dir=3Dltr align=3Dleft><SPAN lang=3DEN>
<P>I think that the API ID could be adopted as an RG work item by =
itself, and=20
the section in the baseline document could focus on how the API works=20
specifically with the RELOAD extensions we are describing.</P>
<P>John</P></SPAN></DIV><BR>
<DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr align=3Dleft>
<HR tabIndex=3D-1>
<FONT face=3DTahoma size=3D2><B>From:</B> sam-bounces@irtf.org=20
[mailto:sam-bounces@irtf.org] <B>On Behalf Of </B>Gustavo=20
Carneiro<BR><B>Sent:</B> Thursday, April 08, 2010 8:37 AM<BR><B>To:</B>=20
sam@irtf.org<BR><B>Subject:</B> Re: [SAM]=20
draft-kolberg-sam-baseline-protocol-00<BR></FONT><BR></DIV>
<DIV></DIV><BR><BR>
<DIV class=3Dgmail_quote>On Thu, Apr 8, 2010 at 10:38 AM, Dr Mario =
Kolberg <SPAN=20
dir=3Dltr>&lt;<A =
href=3D"mailto:mko@cs.stir.ac.uk">mko@cs.stir.ac.uk</A>&gt;</SPAN>=20
wrote:<BR>
<BLOCKQUOTE class=3Dgmail_quote=20
style=3D"PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc =
1px solid">Dear=20
  Gustavo,<BR><BR>many thanks for your comments.
  <DIV class=3Dim><BR><BR>
  <BLOCKQUOTE class=3Dgmail_quote=20
  style=3D"PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: =
#ccc 1px solid">Another=20
    not so clear item is how the API in Sec. 5 articulates with Sec. 6.=20
    &nbsp;Sec.6 starts like this:<BR><BR>&nbsp; &nbsp;In this document =
we define=20
    messages for hybrid overlay multicast<BR>&nbsp; &nbsp;tree=20
    creation...<BR><BR><BR>I get the feeling this used to be a separate =
draft=20
    that was converted to a section of another draft. &nbsp;I suppose =
that the=20
    Protocol described is triggered by API calls of the Sec. 5 API, but =
I get=20
    the feeling I am guessing what should be explicitly stated in the =
document.=20
    &nbsp;In that sense, draft-waehlisch-sam-common-api-02 (Fig. 2) is=20
    clearer.<BR></BLOCKQUOTE><BR></DIV>Yes section 5 is the API to the=20
  application, whereas section 6 describes the API between nodes. And =
yes this=20
  draft is based on a number of previous drafts. The aim is to align =
them and to=20
  form a base document for the WG. I accept there is still some work to =
be=20
  done.<BR></BLOCKQUOTE>
<DIV><BR></DIV>
<DIV>OK, that is understandable in the first versions.</DIV>
<DIV><BR></DIV>
<DIV>Still I was wondering if the plan is for the&nbsp;sam-common-api =
will=20
continue to evolve alongside&nbsp;sam-baseline-protocol, or whether it =
will be=20
merged into&nbsp;sam-baseline-protocol.</DIV>
<DIV>&nbsp;</DIV>
<DIV>Many thanks for your answers (Matthias as well).</DIV>
<DIV><BR></DIV>
<DIV>Regards,</DIV>
<DIV><BR></DIV></DIV>-- <BR>Gustavo J. A. M. Carneiro<BR>INESC Porto, =
UTM, WiN,=20
<A =
href=3D"http://win.inescporto.pt/gjc">http://win.inescporto.pt/gjc</A><BR=
>"The=20
universe is always one step beyond logic." -- Frank =
Herbert<BR></BODY></HTML>

------=_NextPart_000_00B9_01CAD75A.AC6C2F00--


From buford@samrg.org  Sat Apr 10 18:34:57 2010
Return-Path: <buford@samrg.org>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E7CBC3A687C for <sam@core3.amsl.com>; Sat, 10 Apr 2010 18:34:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.335
X-Spam-Level: 
X-Spam-Status: No, score=0.335 tagged_above=-999 required=5 tests=[BAYES_50=0.001, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9T89JjN6JBCj for <sam@core3.amsl.com>; Sat, 10 Apr 2010 18:34:55 -0700 (PDT)
Received: from outbound-mail-313.bluehost.com (cpoproxy3-pub.bluehost.com [67.222.54.6]) by core3.amsl.com (Postfix) with SMTP id F31F53A67D7 for <sam@irtf.org>; Sat, 10 Apr 2010 18:34:54 -0700 (PDT)
Received: (qmail 8345 invoked by uid 0); 11 Apr 2010 01:34:49 -0000
Received: from unknown (HELO host181.hostmonster.com) (74.220.207.181) by cpoproxy3.bluehost.com with SMTP; 11 Apr 2010 01:34:49 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=samrg.org; h=Received:From:To:Subject:Date:Message-ID:MIME-Version:Content-Type:Content-Transfer-Encoding:X-Mailer:Thread-Index:X-MimeOLE:X-Identified-User; b=s1wLBj2gG4OzNVhb71sfsUUpfhrgLCdNbs0RfMrQ7ET3rFZ93hxdfOhvSQcMqI4MB8HwVoPE03f+Rc5QTV4gZPc41ybM7mdKvWjVvU1QbHeBbsAX8VvAQF20JbDVvxk/;
Received: from [207.190.12.50] (helo=mobilon) by host181.hostmonster.com with esmtpsa (TLSv1:RC4-MD5:128) (Exim 4.69) (envelope-from <buford@samrg.org>) id 1O0m4X-00061d-Dh for sam@irtf.org; Sat, 10 Apr 2010 19:34:50 -0600
From: "John Buford" <buford@samrg.org>
To: <sam@irtf.org>
Date: Sat, 10 Apr 2010 21:34:47 -0400
Message-ID: <49C8CB14321F436A9919AC4182DEFC37@mobilon>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 11
Thread-Index: AcocQFCl+Xw9u23BSsyHHTwL1uCr5y8Y6a1AABzAXiA=
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579
X-Identified-User: {2055:host181.hostmonster.com:samrgorg:samrg.org} {sentby:smtp auth 207.190.12.50 authed with buford@samrg.org}
Subject: [SAM] CFP - Scalable Adaptive Multicast on P2P Overlays (Deadline Aug 1)--special session at IEEE CCNC 2011
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sun, 11 Apr 2010 01:34:58 -0000

CALL FOR PAPERS
===============

Special Session on Scalable Adaptive Multicast in P2P Overlays 

at IEEE Consumer Comunications and Networking Conference 

www.ieee-ccnc.org 

IEEE CCNC 2011  

Jan 8-11 Las Vegas

The emergence of peer-to-peer networking enables new applications that
require efficient multicast communication. These applications include
peercasting of multimedia streams, multi-party conferencing, multi-player
games, and group chat. Many consumer applications of multicasting involve
small groups of users, content streaming, mobility, hybrid transport and
other requirements not considered in previous systems.

Due to delayed deployment of native multicast, various end-system,
application layer (ALM) and overlay multicast (OM) designs have been
proposed. In the future, these protocols are expected to coexist and
integrate with native IP multicast protocols while offering more flexible
deployment options and scaling to support a greater number of simultaneous
multicast groups. In addition these protocols need to adapt to device
capabilities and mobility.

The goal of this special session is to provide a forum for engineers,
architects, and researchers to share knowledge and innovation in hybrid and
adaptive P2P multicast techniques.
We solicit papers covering various topics of interest that include (but are
not limited to) the following:

Peer-to-peer overlays with multicast support Small group multicast
Application Layer Multicast (ALM) techniques Hybrid multicasting
architectures Comparitive analysis of ALM and OM architectures Scalable
integration of QoS mechanisms Adaptive content distribution over P2P overlay
multicast Methods for large-scale group formation and discovery Support for
highly dynamic group membership Support for mobility in P2P overlay
multicast

All accepted submissions will be published in the proceedings of IEEE CCNC
2011.  More information about the special session is available at
http://www.ieee-ccnc.org 


Submission Instructions

Submissions are through EDAS.

Papers due:              August 1, 2010
Acceptance notification: Sept 15, 2010
Camera-ready version:    Oct 1, 2010

Submission details can be found under
Author Information on the CCNC web site.

Session Organizers

Thomas C. Schmidt, Hamburg University of Applied Sciences, Germany 

Matthias Waehlisch, Freie Universitaet Berlin, Germany 

John Buford, Avaya Labs Research, USA

 






From mko@cs.stir.ac.uk  Mon Apr 12 04:16:15 2010
Return-Path: <mko@cs.stir.ac.uk>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 98FBB3A69AD for <sam@core3.amsl.com>; Mon, 12 Apr 2010 04:16:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.75
X-Spam-Level: *
X-Spam-Status: No, score=1.75 tagged_above=-999 required=5 tests=[AWL=-1.750,  BAYES_99=3.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 04FiQKWS7jEN for <sam@core3.amsl.com>; Mon, 12 Apr 2010 04:16:15 -0700 (PDT)
Received: from mailscanner2.stir.ac.uk (mailscanner2.stir.ac.uk [139.153.13.35]) by core3.amsl.com (Postfix) with ESMTP id 569F23A69A4 for <sam@irtf.org>; Mon, 12 Apr 2010 04:16:10 -0700 (PDT)
Received: from yen.cs.stir.ac.uk ([139.153.254.70]) by mailscanner2.stir.ac.uk with esmtp (Exim 4.69) (envelope-from <mko@cs.stir.ac.uk>) id 1O1HcC-0007DS-FP for sam@irtf.org; Mon, 12 Apr 2010 12:15:45 +0100
Received: from [139.153.253.90] by yen.cs.stir.ac.uk (8.9.3) id MAA12012; Mon, 12 Apr 2010 12:15:33 +0100 (BST)
Message-ID: <4BC300D4.3030405@cs.stir.ac.uk>
Date: Mon, 12 Apr 2010 12:15:32 +0100
From: Dr Mario Kolberg <mko@cs.stir.ac.uk>
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: sam <sam@irtf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-MailScanner-ID: 1O1HcC-0007DS-FP
X-stir.ac.uk-MailScanner: Found to be clean
X-stir.ac.uk-MailScanner-From: mko@cs.stir.ac.uk
MailScanner-NULL-Check: 1271675749.09464@c49mIjfZq8jRr6paB0gCdQ
Subject: [SAM] CFP: IEEE Consumer Communications and Networking Conference (CCNC) 2011
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Apr 2010 11:16:15 -0000

First Call for Papers

IEEE CCNC 2011
January 8 - 11, 2011, Las Vegas, Nevada, USA
http://www.ieee-ccnc.org/

IEEE Consumer Communications and Networking Conference, sponsored by the
IEEE Communications Society, is a major annual international conference
organized with the objective of bringing together researchers,
developers, and practitioners from academia and industry working in all
areas of consumer communications and networking.

IEEE CCNC 2011 will present the latest developments and technical
solutions in the areas of home networking, consumer networking, enabling
technologies (such as middleware), and novel applications and services.
The conference will include a peer-reviewed program of technical
sessions, special sessions, business application sessions, tutorials,
and demonstration sessions.

Technical Program features presentations in all areas of consumer
communications and networking, including
- Wireless Consumer Communications and Networking
- Smart Spaces and Personal Area Networks
- Multimedia & Entertainment Networking and Services
- Peer-to-Peer Networking and Content Distribution
- Security and Content Protection
- Emerging and Innovative Consumer Technologies and Applications

For a list of potential topics and submission requirements, visit
http://www.ieee-ccnc.org/

TECHNICAL PAPERS DUE: June 4, 2010
ACCEPTANCE NOTIFICATION: August 16, 2010
FINAL CAMERA READY ARTWORK October 1, 2010

Selected papers from the conference will be published in the Consumer
Communications and Networking Series in the IEEE Communications Magazine.

Submissions are also welcomed for Special Sessions, Workshops,
Tutorials, Demonstrations, Short Papers, and Industry Technical Panels.

Workshop Proposals Due: April 15, 2010
Special Session Proposals Due: June 1, 2010
Special Session Papers Due: August 1, 2010
Tutorials Due: September 1, 2010
Demonstrations Due: September 1, 2010
Work in Progress Papers Due: September 1, 2010
Industry Technical Panels Due: September 17, 2010

For more information on these specialized tracks, visit
http://www.ieee-ccnc.org/

Mario Kolberg
TPC Chair




-- 
The Sunday Times Scottish University of the Year 2009/2010
The University of Stirling is a charity registered in Scotland, 
 number SC 011159.


From jlloret@dcom.upv.es  Sun Apr 18 17:45:53 2010
Return-Path: <jlloret@dcom.upv.es>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 553063A6A2F for <sam@core3.amsl.com>; Sun, 18 Apr 2010 17:45:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.5
X-Spam-Level: **
X-Spam-Status: No, score=2.5 tagged_above=-999 required=5 tests=[AWL=1.000, BAYES_99=3.5, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pIVkOu1eAhgS for <sam@core3.amsl.com>; Sun, 18 Apr 2010 17:45:51 -0700 (PDT)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.21]) by core3.amsl.com (Postfix) with ESMTP id 5CADA3A6A1A for <sam@irtf.org>; Sun, 18 Apr 2010 17:45:50 -0700 (PDT)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id o3J0jdDZ028235 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Mon, 19 Apr 2010 02:45:40 +0200
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id o3J0jduc017333 for <sam@irtf.org>; Mon, 19 Apr 2010 02:45:39 +0200
Received: from JLLORET (vpn245-10.vpns.upv.es [158.42.245.10]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id o3J0jcOj025017 for <sam@irtf.org>; Mon, 19 Apr 2010 02:45:38 +0200
Date: Mon, 19 Apr 2010 02:45:38 +0200
Message-Id: <201004190045.o3J0jcOj025017@smtp.upv.es>
From: Jaime Lloret Mauri<jlloret@dcom.upv.es>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] Deadline Extension: ICWMC 2010 || September 20-25, 2010 - Valencia, Spain
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Apr 2010 00:45:53 -0000

INVITATION:

=================

Note that the submission deadline has been moved to April 30, 2010.

Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.

=================


============== ICWMC 2010 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ICWMC 2010: The Sixth International Conference on Wireless and Mobile Communications 

September 20-25, 2010 - Valencia, Spain


General page: http://www.iaria.org/conferences2010/ICWMC10.html

Call for Papers: http://www.iaria.org/conferences2010/CfPICWMC10.html


Submission deadline: April 30, 2010

Sponsored by IARIA, www.iaria.org


Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )

Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore

Submitted for indexing: Elsevier's EI Compendex Database, EI's Engineering Information Index

Other indexes are being considered: INSPEC, DBLP, Thomson Reuters Conference Proceedings Citation Index


Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. 

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html
 

ICWMC 2010 Tracks (tracks' topics and submission details: see CfP on the site)

Wireless Communications Basics

Coding & modulation & equalization; Channel modeling and characterization; Equalization/Synchronization; Transform-domain communication; Multiple access algorithms and schemes; Antenna and RF subsystems; Smart antennas, adaptive antennas, MIMO and beam forming; MIMO and OFDM Based PHY Layer technologies; CDMA Systems

Radio Interfaces and Systems

Radio communications systems; Radio resource management; Radio transmission technologies; Power and interference control; Interference Cancellation for Wireless Mobile Systems; Power management for small terminals; Energy map; Channel Measurement and Characterization

Spectrum Allocation and Management

Spectrum efficiency analyses; Dynamic spectrum access networks; Spectrum management; Interference mitigation and management techniques 

Circuits for Wireless Communications

Wireless ASICs; Wireless technologies; RF Design issues

Wireless and Mobility

Mobility management; Location-based services and positioning; Micro and macro-mobility; Mobility, location and handoff management; Mobile and wireless IP; Wireless broadband mobile access; Routing in multihop, ad hoc and sensor networks; Wireless multicasting; Wireless mesh networks; Topology control in wireless

Protocols for wireless and mobility

Wireless protocols, architectural and design concepts; Protocols for air interfaces and networks; Wireless MAC protocols: Design and analysis; Transport layer issues in mobile and wireless networks; Middleware for handhelds and mobile services nodes; Proxies and middleware for wireless networks 

Traffic and congestion control, QoS, Resource Management

Traffic Modeling and Analysis; 3G/4G Bandwidth on Demand; QoS and mobility; End-to-end QoS; QoS profiling and pricing; Traffic Engineering; Congestion and admission control 

Wireless and mobile technologies

Wireless LANs; Home and Personal Area Networks: Bluetooth, ZigBeee, etc; Wireless MANs:802.16, 802.20; Wireless WANs: 2G/3G/4G; Mobile ad hoc networks and multi-hop wireless; Sensor networks and applications; Ultra-wideband and short-range networks; High altitude platforms and satellites; Emergency wireless communications; Wireless real-time communications 

Performance Evaluation, Simulation and Modeling of wireless networks and systems

Performance and QoS in wireless networks; Radio channel modeling (wave propagation and measurements); Mobile/wireless networks modeling and simulation; Performance of end-to-end protocols over wireless networks 

Management of wireless and mobile networks 

Mobility and QoS management; Billing technologies and tools; Policy Based Management in wireless LANS and MANs; Wireless and Mobile Network Planning; Mobile Database Access and Design

Security in wireless and mobile environment

Security and robustness in wireless networks; Privacy, Authentication Authorization and Accounting  (AAA); Encryption and Cryptography; Key Management Protocols; Digital Rights Management and Multimedia Protection

Networks convergence and integration

2G/3G/4G integration; Convergence of 3G wireless and Internet cross-layer design in wireless networks; WLAN/3G/4G integration; Wireless-wireline convergence; Heterogeneous Networks (WAN, Wireless MAN, WLAN); IP Multimedia subsystems (IMS); Next Generation Network Architecture- mobility issues; Coexistence of mobile radio networks; End to End QoS in Heterogeneous environment; Signaling for integrated wireline/wireless networks 

Applications and services based on wireless infrastructures

Mobile & Wireless applications & services; Service discovery: protocols and frameworks; Personalized services and applications; Audio-visual and mobile multimedia applications; Media and content distribution over wireless networks 

Standardization and regulations

Position on standards & fora on wireless and mobile networks; Wireless Networks Standards and Protocols; Communications regulations; 802.11 WLAN Standards; 802.16 WMAN Standards; 3GPP and 3GPP2 standards; HSDPA Technology and Standards; Next Generation Network standards 

Design and  implementation 

Emerging wireless technologies; Cross-layer optimizations in wireless networks; Design and implementation of mobile information systems; Software defined radio and re-configurability; Joint PHY/MAC design 

Wireless and mobile network deployment

Business models on wireless networks; Market trends and regional developments; M-commerce; Lessons learnt for wireless deployment in schools Lessons learnt for wireless deployment in special regions; Specialized wireless networks; Heterogeneous wireless network deployment (e.g., combining 802.11, 802.16 and 3G networks)

Cooperative and Cognitive Vehicular Networks

Architectures and platforms of cognitive vehicular network; Distributed artificial intelligence techniques for cognitive networks; Cognitive vehicular routing metrics and supporting protocols; Reduced complexity cognitive networks; Physical and MAC layer issues; Protocols design for cognitive vehicular networks; Cross-layer optimization in cognitive networks; Security issues for vehicular and cognitive networks; Testbed experiment, applications and new advances; Cooperative vehicular networks; QoS provisioning in heterogeneous networks ; Managing vertical handover; Multihoming; IPv6 GeoNetworking; Vehicular network architectures and protocols ; Cross-layer design and optimization for vehicular networks and cognitive networks; Mobility management and topology control; Standardization and Development of vehicular networks

Convergence and social mobility

Convergence of mobile networks with the Web 2.0; Convergence on architecture and services; Open service capabilities; Open exposure of telco capabilities; Open Web APIs, SOA and SDP); Interworking strategies; Mobile terminals as sources for User-generated content; Architecture and services for user-generated content; Auto-description and metadata synthesis for telecom-generated for user-generated content; Social mobile networks; User behavior profiling; Social connections (social graphs, contacts, etc); Services and architectures/solutions for social mobile services


==========

ICWMC GENERAL CHAIR

Jaime Lloret Mauri, Polytechnic University of Valencia, Spain 


ICWMC Advisory Chairs

Silviu Ciochina, University ?Politehnica? Bucharest, Romania 

Petre Dini, Concordia University, Canada / IARIA, USA

Jonathan Loo, Brunel University West London, UK

Tudor Palade, Technical University of Cluj-Napoca, Romania 

Francisco Ramos, Polytechnic University of Valencia, Spain

Manuel Sierra Pérez, Universidad Politécnica de Madrid, Spain


ICWMC 2010 Research Institute Liaison Chairs

Nicolae Crisan, Technical University of Cluj-Napoca, Romania 

Javier Del Ser Lorente, Tecnalia, Spain 

Adrian Matei, Politehnica University of Bucharest / Orange Romania S.A., Romania 

Jyrki Penttinen, Nokia Siemens Networks - Madrid, Spain / Helsinki University of Technology, Finland 

Tomi Räty, VTT Technical Research Centre of Finland, Finland 


ICWMC 2010 Industry/Research Chairs

José García, La Maquinista Valenciana, Spain 

Jingli Li, TopWorx - Emerson, USA 

Christopher Nguyen, Intel Corp., USA 

Horia Stefanescu, Orange, Romania  


Special Area Chairs

Cooperative and Cognitive Vehicular Networks Area Chairs:

Yacine Khaled, Geenov, France

Jong-Hyouk Lee, Sungkyunkwan University, Korea // INRIA, France


Committee members: http://www.iaria.org/conferences2010/ComICWMC10.html

====================

From m.garcia.upv@gmail.com  Mon Apr 19 02:57:03 2010
Return-Path: <m.garcia.upv@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 629223A69D9 for <sam@core3.amsl.com>; Mon, 19 Apr 2010 02:57:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.127
X-Spam-Level: 
X-Spam-Status: No, score=0.127 tagged_above=-999 required=5 tests=[AWL=-1.373,  BAYES_99=3.5, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1o8oCulDKEte for <sam@core3.amsl.com>; Mon, 19 Apr 2010 02:57:01 -0700 (PDT)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.21]) by core3.amsl.com (Postfix) with ESMTP id 6403C3A68BB for <sam@irtf.org>; Mon, 19 Apr 2010 02:56:51 -0700 (PDT)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id o3J9ueaV005179 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Mon, 19 Apr 2010 11:56:41 +0200
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id o3J9ufd8031112 for <sam@irtf.org>; Mon, 19 Apr 2010 11:56:41 +0200
Received: from JLLORET (osiris1.gnd.upv.es [158.42.148.63]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id o3J9uevh010563 for <sam@irtf.org>; Mon, 19 Apr 2010 11:56:40 +0200
Date: Mon, 19 Apr 2010 11:56:40 +0200
Message-Id: <201004190956.o3J9uevh010563@smtp.upv.es>
From: Miguel Garcia<m.garcia.upv@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] Deadline Extension: ICCGI 2010 || September 20-25, 2010 - Valencia, Spain
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Apr 2010 09:57:03 -0000

Deadline Extension: ICCGI 2010 || September 20-25, 2010 - Valencia, Spain

INVITATION:

=================

Note that the submission deadline has been moved to April 30, 2010.

Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.

=================

============== ICCGI 2010 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ICCGI 2010: The Fifth International Multi-Conference on Computing in the 
Global Information Technology
September 20-25, 2010 - Valencia, Spain

General page: http://www.iaria.org/conferences2010/ICCGI10.html
Call for Papers: http://www.iaria.org/conferences2010/CfPICCGI10.html

Submission deadline: April 30, 2010

Sponsored by IARIA, www.iaria.org
Co-sponsored by IEEE Spain, Illinois State University, University 
Politehnica Bucharest, Universidad Politecnica de Valencia, La 
Machinista Valenciana, IGIC, Hydro-Quebec, Ruder Boskovic Institute,
Orange, Universidad Complutense Madrid

Extended versions of selected papers will be published in IARIA 
Journals: http://www.iariajournals.org
Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )
Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore
Submitted for indexing: Elsevier's EI Compendex Database, EI's 
Engineering Information Index
Other indexes are being considered: INSPEC, DBLP, Thomson Reuters 
Conference Proceedings Citation Index

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of 
concepts, state of the art, research, standards, implementations, 
running experiments, applications, and industrial case studies. Authors 
are invited to submit complete unpublished papers, which are not under 
review in any other conference or journal in the following, but not 
limited to, topic areas.

All tracks are open to both research and industry contributions, in 
terms of Regular papers, Posters, Work in progress, 
Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: 
http://www.iaria.org/editorialrules.html

ICCGI 2010 Tracks (tracks' topics and submission details: see CfP on the 
site)

Industrial systems
Control theory and systems; Fault-tolerance and reliability; Data 
engineering; Enterprise computing and evaluation; Electrical and 
electronics engineering; Economic decisions and information systems; 
Advanced robotics; Virtual reality systems; Industrial systems and 
applications; Industrial and financial systems; Industrial control 
electronics; Industrial IT solutions

Evolutionary computation
Algorithms, procedures, mechanisms and applications; Computer 
architecture and systems; Computational sciences; Computation in complex 
systems; Computer and communication systems; Computer networks; Computer 
science theory; Computation and computer security; Computer simulation; 
Digital telecommunications; Distributed and parallel computing; 
Computation in embedded and real-time systems; Soft computing; 
User-centric computation

Autonomic and autonomous systems
Automation and autonomous systems; Theory of Computing; Autonomic 
computing; Autonomic networking; Network computing; Protecting 
computing; Theories of agency and autonomy; Multi-agent evolution, 
adaptation and learning; Adjustable and self-adjustable autonomy; 
Pervasive systems and computation; Computing with locality principles; 
GRID networking and services; Pervasive computing; Cluster computing and 
performance; Artificial intelligence Computational linguistics; 
Cognitive technologies; Decision making; Evolutionary computation; 
Expert systems; Computational biology

Bio-technologies
Models and techniques for biometric technologies; Bioinformatics; 
Biometric security; Computer graphics and visualization; Computer vision 
and image processing; Computational biochemistry; Finger, facial, iris, 
voice, and skin biometrics; Signature recognition; Multimodal 
biometrics; Verification and identification techniques; Accuracy of 
biometric technologies; Authentication smart cards and biometric 
metrics; Performance and assurance testing; Limitations of biometric 
technologies; Biometric card technologies; Biometric wireless 
technologies; Biometric software and hardware; Biometric standards

Knowledge data systems
Data mining and Web mining; Knowledge databases and systems; Data 
warehouse and applications; Data warehousing and information systems; 
Database performance evaluation; Semantic and temporal databases; 
Database systems Databases and information retrieval; Digital library 
design; Meta-data modeling

Mobile and distance education
Human computer interaction; Educational technologies; Computer in 
education; Distance learning; E-learning; Mobile learning Cognitive 
support for learning; Internet-based education; Impact of ICT on 
education and society; Group decision making and software; Habitual 
domain and information technology; Computer-mediated communications; 
Immersing authoring; Contextual and cultural challenges in user mobility

Intelligent techniques, logics, and systems
Intelligent agent technologies; Intelligent and fuzzy information 
processing; Intelligent computing and knowledge management; Intelligent 
systems and robotics; Fault-tolerance and reliability; Fuzzy logic & 
systems; Genetic algorithms; Haptic phenomena; Graphic recognition; 
Neural networks; Symbolic and algebraic computation; Modeling, 
simulation and analysis of business processes and systems

Knowledge processing
Knowledge representation models; Knowledge languages; Cognitive science; 
Knowledge acquisition; Knowledge engineering; Knowledge processing under 
uncertainty; Machine intelligence; Machine learning; Making decision 
through Internet; Networking knowledge plan

Information technologies
Information technology and organizational behavior; Agents, data mining 
and ontologies; Information retrieval systems; Information and network 
security; Information ethics and legal evaluations; Optimization and 
information technology; Organizational information systems; Information 
fusion; Information management systems; Information overload; 
Information policy making; Information security; Information systems; 
Information discovery

Internet and web technologies
Internet and WWW-based computing; Web and Grid computing; Internet 
service and training; IT and society; IT in education and health; 
Management information systems; Visualization and group decision making; 
Web based language development; Web search and decision making; Web 
service ontologies; Scientific web intelligence; Online business and 
decision making; Business rule language; E-Business; E-Commerce; Online 
and collaborative work; Social eco-systems and social networking; Social 
decisions on Internet; Computer ethics

Digital information processing
Mechatronics; Natural language processing; Medical imaging; Image 
processing; Signal processing; Speech processing; Video processing; 
Pattern recognition; Pattern recognition models; Graphics & computer 
vision; Medical systems and computing

Cognitive science and knowledge agent-based systems
Cognitive support for e-learning and mobile learning; Agents and 
cognitive models; Agents & complex systems; computational ecosystems; 
Agent architectures, perception, action & planning in agents; Agent 
communication: languages, semantics, pragmatics & protocols; Agent-based 
electronic commerce and trading systems Multi-agent constraint 
satisfaction; Agent programming languages, development environments and 
testbeds; Computational complexity in autonomous agents; Multi-agent 
planning and cooperation; Logics and formal models of for agency 
verification; Nomadic agents; Negotiation, auctions, persuasion; Privacy 
and security issues in multi-agent systems

Mobility and multimedia systems
Mobile communications; Multimedia and visual programming; Multimedia and 
decision making; Multimedia systems; Mobile multimedia systems; 
User-centered mobile applications; Designing for the mobile devices; 
Contextual user mobility; Mobile strategies for global market; 
Interactive television and mobile commerce

Systems performance
Performance evaluation; Performance modeling; Performance of parallel 
computing; Reasoning under uncertainty; Reliability and fault-tolerance; 
Performance instrumentation; Performance monitoring and corrections; 
Performance in entity-dependable systems; Real-time performance and 
near-real time performance evaluation; Performance in software systems; 
Performance and hybrid systems; Measuring performance in embedded systems

Networking and telecommunications
Telecommunication and Networking; Telecommunication Systems and 
Evaluation; Multiple Criteria Decision Making in Information Technology; 
Network and Decision Making; Networks and Security; Communications 
protocols (SIP/H323/MPLS/IP); Specialized networks (GRID/P2P/Overlay/Ad 
hoc/Sensor); Advanced services (VoIP/IPTV/Video-on-Demand; Network and 
system monitoring and management; Feature interaction detection and 
resolution; Policy-based monitoring and managements systems; Traffic 
modeling and monitoring; Traffic engineering and management; 
Self-monitoring, self-healing and self-management systems; 
Man-in-the-loop management paradigm

Software development and deployment
Software requirements engineering; Software design, frameworks, and 
architectures; Software interactive design; Formal methods for software 
development, verification and validation; Neural networks and 
performance; Patterns/Anti-patterns/Artifacts/Frameworks; 
Agile/Generic/Agent-oriented programming; Empirical software evaluation 
metrics; Software vulnerabilities; Reverse engineering; Software reuse; 
Software security, reliability and safety; Software economics; Software 
testing and debugging; Tracking defects in the OO design; Distributed 
and parallel software; Programming languages; Declarative programming; 
Real-time and embedded software; Open source software development 
methodologies; Software tools and deployment environments; Software 
Intelligence; Software Performance and Evaluation

Knowledge virtualization
Modeling techniques, tools, methodologies, languages; Model-driven 
architectures (MDA); Service-oriented architectures (SOA); Utility 
computing frameworks and fundamentals; Enabled applications through 
virtualization; Small-scale virtualization methodologies and techniques; 
Resource containers, physical resource multiplexing, and segmentation; 
Large-scale virtualization methodologies and techniques; Management of 
virtualized systems; Platforms, tools, environments, and case studies; 
Making virtualization real; On-demand utilities Adaptive enterprise; 
Managing utility-based systems; Development environments, tools, prototypes

Systems and networks on the chip
Microtechnology and nanotechnology; Real-time embedded systems; 
Programming embedded systems; Controlling embedded systems; High speed 
embedded systems; Designing methodologies for embedded systems; 
Performance on embedded systems; Updating embedded systems; 
Wireless/wired design of systems-on-the-chip; Testing embedded systems; 
Technologies for systems processors; Migration to single-chip systems

Context-aware systems
Context-aware autonomous entities; Context-aware fundamental concepts, 
mechanisms, and applications; Modeling context-aware systems; 
Specification and implementation of awareness behavioral contexts; 
Development and deployment of large-scale context-aware systems and 
subsystems; User awareness requirements Design techniques for interfaces 
and systems; Methodologies, metrics, tools, and experiments for 
specifying context-aware systems; Tools evaluations, Experiment evaluations

Networking technologies
Next generation networking; Network, control and service architectures; 
Network signalling, pricing and billing; Network middleware; 
Telecommunication networks architectures; On-demand networks, utility 
computing architectures; Next generation networks [NGN] principles; 
Storage area networks [SAN]; Access and home networks; High-speed 
networks; Optical networks; Peer-to-peer and overlay networking; Mobile 
networking and systems; MPLS-VPN, IPSec-VPN networks; GRID networks; 
Broadband networks

Security in network, systems, and applications
IT in national and global security; Formal aspects of security; Systems 
and network security; Security and cryptography; Applied cryptography; 
Cryptographic protocols; Key management; Access control; Anonymity and 
pseudonymity management; Security management; Trust management; 
Protection management; Certification and accreditation; Virii, worms, 
attacks, spam; Intrusion prevention and detection; Information hiding; 
Legal and regulatory issues

Knowledge for global defense
Business continuity and availability; Risk assessment; Aerospace 
computing technologies; Systems and networks vulnerabilities; Developing 
trust in Internet commerce; Performance in networks, systems, and 
applications; Disaster prevention and recovery; IT for anti-terrorist 
technology innovations (ATTI); Networks and applications emergency 
services; Privacy and trust in pervasive communications; Digital rights 
management; User safety and protection

Information Systems [IS]
Management Information Systems; Decision Support Systems; Innovation and 
IS; Enterprise Application Integration; Enterprise Resource Planning; 
Business Process Change; Design and Development Methodologies and 
Frameworks; Iterative and Incremental Methodologies; Agile 
Methodologies; IS Standards and Compliance Issues; Risk Management in IS 
Design and Development; Research Core Theories; Conceptualisations and 
Paradigms in IS; Research Ontological Assumptions in IS Research; IS 
Research Constraints, Limitations and Opportunities; IS vs Computer 
Science Research; IS vs Business Studies

IPv6 Today - Technology and deployment
IP Upgrade - An Engineering Exercise or a Necessity?; Worldwide IPv6 
Adoption - Trends and Policies; IPv6 Programs, from Research to 
Knowledge Dissemination; IPv6 Technology - Practical Information; 
Advanced Topics and Latest Developments in IPv6; IPv6 Deployment 
Experiences and Case Studies; IPv6 Enabled Applications and Devices

Modeling
Continuous and Discrete Models; Optimal Models; Complex System Modeling; 
Individual-Based Models; Modeling Uncertainty; Compact Fuzzy Models; 
Modeling Languages; Real-time modeling; Peformance modeling

Optimization
Multicriteria Optimization; Multilervel Optimization; Goal Programming; 
Optimization and Efficiency; Optimization-based decisions; Evolutionary 
Optimization; Self-Optimization; Extreme Optimization; Combinatorial 
Optimization; Disccrete Optimization; Fuzzy Optimization; Lipschitzian 
Optimization; Non-Convex Optimization; Convexity; Continuous 
Optimization; Interior point methods; Semidefinite and Conic Programming

Complexity
Complexity Analysis; Computational Complexity; Complexity Reduction; 
Optimizing Model Complexity; Communication Complexity; Managing 
Complexity; Modeling Complexity in Social Systems; Low-complexity Global 
Optimization; Software Development for Modeling and Optimization; 
Industrial applications

==========
ICCGI 2010 General Chair
Jordi Bataller, Polytechnic University of Valencia, Spain

ICCGI Advisory Chairs
Mirela Danubianu, "Stefan cel Mare" University of Suceava, Romania
Petre Dini, Concordia University, Canada / IARIA
Tibor Gyires, Technology Illinois State University, USA
José Valerdi, France Telecom R&D (Orange Labs), Spain

ICCGI 2010 Research Institute Liaison Chairs
Robert Chew, Lien Centre for Social Innovation, Singapore
Matjaz Gams, Jozef Stefan Institute - Ljubljana, Slovenia
Karolj Skala, Rudjer Bokovic Institute - Zagreb, Croatia
Mauro Teófilo, Nokia Technology Institute, Brazil

ICCGI 2010 Industry/Research Chairs
Kemal A. Delic, Hewlett-Packard Co. France
José García Escudero, La Maquinista Valenciana, Spain
Jivesh Govil, Cisco Systems, Inc., USA
Liviu Panait, Google Inc., USA
Jean-Denis Mathias, CEMAGREF - Clermont-Ferrand, France
Hoo Chong Wei, Motorola Inc., Malaysia

Committee members: http://www.iaria.org/conferences2010/ComICCGI10.html
=============

From m.garcia.upv@gmail.com  Mon Apr 19 04:01:25 2010
Return-Path: <m.garcia.upv@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F0F573A695A for <sam@core3.amsl.com>; Mon, 19 Apr 2010 04:01:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.28
X-Spam-Level: 
X-Spam-Status: No, score=-1.28 tagged_above=-999 required=5 tests=[AWL=0.720,  BAYES_50=0.001, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vFx+e8ffbHLb for <sam@core3.amsl.com>; Mon, 19 Apr 2010 04:01:24 -0700 (PDT)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.21]) by core3.amsl.com (Postfix) with ESMTP id C88753A68E9 for <sam@irtf.org>; Mon, 19 Apr 2010 04:01:23 -0700 (PDT)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id o3JB1D4u018954 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Mon, 19 Apr 2010 13:01:14 +0200
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id o3JB1DdW008159 for <sam@irtf.org>; Mon, 19 Apr 2010 13:01:13 +0200
Received: from JLLORET (osiris1.gnd.upv.es [158.42.148.63]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id o3JB1DBU011008 for <sam@irtf.org>; Mon, 19 Apr 2010 13:01:13 +0200
Date: Mon, 19 Apr 2010 13:01:13 +0200
Message-Id: <201004191101.o3JB1DBU011008@smtp.upv.es>
From: Miguel Garcia<m.garcia.upv@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] Deadline Extension: ACCESS 2010 || September 20-25, 2010 - Valencia, Spain
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Apr 2010 11:01:26 -0000

Deadline Extension: ACCESS 2010 || September 20-25, 2010 - Valencia, Spain

INVITATION:

=================

Note that the submission deadline has been moved to April 30, 2010.

Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.

=================


============== ACCESS 2010 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ACCESS 2010: The First International Conferences on Access Networks, Services and Technologies
September 20-25, 2010 - Valencia, Spain

General page: http://www.iaria.org/conferences2010/ACCESS10.html
Call for Papers: http://www.iaria.org/conferences2010/CfPACCESS10.html

Submission deadline: April 30, 2010

Sponsored by IARIA, www.iaria.org
Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org
Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )
Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore
Submitted for indexing: Elsevier's EI Compendex Database, EI's Engineering Information Index
Other indexes are being considered: INSPEC, DBLP, Thomson Reuters Conference Proceedings Citation Index

Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. 

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

ACCESS 2010 Tracks (tracks' topics and submission details: see CfP on the site)

NEXTACCESS: Next generation access technologies
Interactivity, unlimited access and full-scale media support; Energy-aware and efficiency-oriented technologies; Sustainable access network business (standard DSL vs. fiber vs. wireless access); 3G/4G wireless technologies; Multiservice access (DSL, fiber, WiMAX, POTS); FTTH; Ethernet P2P vs. xPON; FTTx with VDSL2, or Ethernet, or DOCSIS 3.0; Radio extension, 802.xx (Wi-Fi, WiMax, etc.); LTE, LTE-advanced; IMT-advanced networks; Mesh and relay networks (IEEE 802.11s, IEEE802.16j, etc.); Quality of experience (QoE)

FEMTO: Femtocells-based access
Femtocells architectures; Femtocells requirements ands specifications; Femtocells protocols; Femtocells services and applications; Traffic and QoS in Femtocells; Performance analysis in Femtocells; Femtocells control and management; Interoperability of Femtocells devices; Femtocells operation optimization; Femtocells specific solutions for mobility; OFDMA Femtocells: interference avoidance; Macrocell-Femto cell interference issues and mitigation; Macrocell-Femto cell handover strategies; WiMAX Fentocells; Standardization of Femtocells

BROADBAND: Broadband wireless Internet access
New architectures, technologies, protocols for broadband wireless access; QoS in mobile and broadband wireless access networks; Broadcast and multicast support; Physical and data link layer issues; Medium access control, SLA and QoS; Radio resource management and call admission control; Space-time coding for broadband wireless Internet; Modulation, coding and antennas (MIMO); Spectrum management; Scalability and reliability issues; Wireless mesh networks; Capacity planning and traffic engineering; Security and privacy issues; Interoperability aspects (fixed/mobile LANs/MANs, WANs); Experiences/lessons from recent deployments

OPTICAL: Optical access networks
Optical access network architecture design; Optical access network components and systems; New PON developments and testbeds; WDM and OFDM PON technologies; MAC and bandwidth allocation; RoF network architecture and MAC; RoF components and systems; Signal processing for new modulation formats; Optical spectral management; Multimode fiber technology and applications; Performance monitoring and diagnosis; Deployment and economic analysis

MOBILE WIRELESS: Mobile wireless access
Mobile Broadband Wireless Access; Wireless/Mobile Access Protocols; Wireless/Mobile Web Access; Ubiquitous and mobile access; Mobile/vehicular environment access; Multi-Homing and Vertical Handoff; Localization and tracking; Context-aware services and applications; Context-aware protocols and protocol architectures; Interactive applications; Mobile and Wireless Entertainment; Mobile Info-services; Wireless ad hoc and sensor networks

DYNAMIC: Dynamic and cognitive access
Dynamic spectrum access; Architectures and platforms for dynamic spectrum access networks; Spectrum sensing, measurement and models; Efficient and broadband spectrum sensing; Interference metrics and measurements; New spectrum protocols and models; Cognitive radio (cross-layer optimization); Multiple access schemes for cognitive radio networks; Radio resource management and dynamic spectrum access networks; Dynamic spectrum auction and economics; Business model, pricing, and regulations for dynamic spectrum

HOWAN: Hybrid optical and wireless access networks
Multi-hop wireless mesh networks; Passive optical networks; Node architecture and design of hybrid optical and wireless networks; Emerging wireless/optical applications QoS management for hybrid access networks; PON and WDM-PON network experiments; Radio over Fiber (RoF); FTTx network architecture and applications; Routing and multicast over hybrid optical and wireless networks; Service resilience and availability of hybrid optical and wireless networks; Applications and evolutions of hybrid access networks; Network design, control, and performance in HOWANs; Capacity analysis, flow and congestion control in HOWANs; Optimization of hybrid optical and wireless networks; Evolution of HOWAN access networks Broadband wireless access in HOWANs; Security and privacy in HOWANs; New services and applications; Test-bed and prototype implementation; Standardization issues

COPPER: Copper Access
Ubiquity via phone lines; Speed reaching 100 Mbps; DSL broadband access; Dynamic and joint optimization of resources (frequency, amplitude, space, and time); Attenuation and crosstalk bottlenecks; Management and control for the multi-user twisted pair networks

GIGATERA: Giga/Tera Access
Multi-antenna technologies (MIMO, Beamforming, Antenna Selection, etc); RF/Antenna propagation (RF beamforming, Tera-Hz signal generation, Propagation); Interoperability aspects (fixed/mobile LANs/MANs, WANs); Signal processing for millimeter and Tera-Hz wireless systems; NLOS avoidance techniques; Cooperative networks, repeaters and relaying; Error correction, equalization; Space division multiple access; Coexistence and interoperability; OFDM versus single-carrier systems; MIMO in mm-wave and Tera-Hz systems; OFDMA processing; Spread spectrum techniques; High-efficiency medium access control (MAC) protocol; Neighbor discovery in directional wireless networks

CONTROL: Access Control 
Foundations for access control; Models for access control; Mechanisms for access control; Policy-driven and role-driven access control; Delegation and identity management; Privacy-drive control; Access control for advanced applications (cloud, autonomic, sensor, social networks, etc.); Standards for accesses control

NEUTRAL: Neutral Access Networks
Open access networks; Network neutrality; Operator-neutral residential access technologies; Operator-neutral nomadic access technologies; Operator-neutral mobile access technologies; Operator-neutral CPEs; Internet access regulation; NANs design and management; Multi-gateway traffic management; QoS management in shared infrastructures; Routing and multicast in NANs; Broadband business models for NANs; Broadband pricing models for NANs; Broadband market analysis for NANs; IP traffic models for NANs; Edge routers for NANs; Identity management in NANs; NANS and Digital divide; NANs and Digital inclusion; Inclusive services and applications; NAN testbeds and case studies

LEGAL: Legal aspects on network and service access
Network neutrality principle; Security and privacy rights; Institutional implications; Accessibility and social affordability; User responsibility

==========
ACCESS 2010 General Chairs
Elsa María Macías López, University of Las Palmas de Gran Canaria, Spain
Álvaro Suárez Sarmiento, University of Las Palmas de Gran Canaria, Spain

ACCESS Advisory Committee
Alessandro Bogliolo, Università di Urbino, Italy
Fabio M. Chiussi, Airvana, Inc., USA 
Mark Perry, University of Western Ontario/Faculty of Law/ Faculty of Science - London, Canada 
Shing-Wa Wong, Stanford University, USA 

ACCESS 20101 Research Institute Liaison Chairs
Sradhi Chava, CREATE-NET, Italy 
Moshe Ran, H.I.T - Holon Institute of Technology, Israel 

ACCESS 2010 Industry/Research Chairs
Alexander Klein, Technische Universität München, Germany 

ACCESS 2010 Special Area Chairs
FEMTO Chair 
    Fabio M. Chiussi, Airvana, Inc., USA 

Committee members: http://www.iaria.org/conferences2010/ComACCESS10.html
====================

From jlloret@dcom.upv.es  Fri Apr 23 08:51:21 2010
Return-Path: <jlloret@dcom.upv.es>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DC76D3A69D7 for <sam@core3.amsl.com>; Fri, 23 Apr 2010 08:51:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.75
X-Spam-Level: **
X-Spam-Status: No, score=2.75 tagged_above=-999 required=5 tests=[AWL=-0.250,  BAYES_95=3]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5QJDL3SvzTcO for <sam@core3.amsl.com>; Fri, 23 Apr 2010 08:51:20 -0700 (PDT)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.21]) by core3.amsl.com (Postfix) with ESMTP id E4CD13A6972 for <sam@irtf.org>; Fri, 23 Apr 2010 08:51:17 -0700 (PDT)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id o3NFp2up006699 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Fri, 23 Apr 2010 17:51:02 +0200
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id o3NFp1gK008038 for <sam@irtf.org>; Fri, 23 Apr 2010 17:51:02 +0200
Received: from JLLORET (vpn245-59.vpns.upv.es [158.42.245.59]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id o3NFp08Q015424 for <sam@irtf.org>; Fri, 23 Apr 2010 17:51:01 +0200
Date: Fri, 23 Apr 2010 17:51:01 +0200
Message-Id: <201004231551.o3NFp08Q015424@smtp.upv.es>
From: Editor-in-Chief NPA Journal<jlloret@dcom.upv.es>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] Call for reviewers: Journal of Network Protocols and Algorithms
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Apr 2010 15:51:22 -0000

******** Call for Associate Editors and reviewers ********

International Journal of Network Protocols and Algorithms 

ISSN 1943-3581

http://www.macrothink.org/journal/index.php/npa/

Network Protocols and Algorithms is a free online international journal, peer-reviewed and published by Macrothink Institute. It publishes papers focused on network protocols, communication systems, algorithms for communications and any type of protocol and algorithm to communicate network devices in a computer network.

It is expected to publish 4 issues per year. All papers published in this journal will be permanently available online without charge. 

The scope of the journal include, but are not limited to, the following topic areas:

Synchronization Protocols and Algorithms
Security Protocols and Algorithms
QoS Protocols and Algorithms
Ad-Hoc and Sensor Network Protocols and Algorithms
Content Delivery Networks Protocols and Algorithms
P2P Protocols and Algorithms
Routing Protocols and Algorithms
Cluster-Based Protocols and Algorithms
Fault tolerant Protocols and Algorithms
Real-Time Protocols and Algorithms
Wireless Protocols and Algorithms
MAC Protocols and Algorithms for Wired Networks
Tree-based Protocols and Algorithms

If you are interested in be a reviewer of this journal, please find recruitment information at: www.macrothink.org/recruitment.htm and send your application to: npa@macrothink.org

You are welcome to send this call for reviewers to the mailing lists you belong to and any people working in Network Protocols and Algorithms that may be interested in the review of network protocols and algorithms.

I expect your response to this call. You can contact npa@macrothink.org for any information you need or to send your suggestions.

Jaime Lloret Mauri
Editor in Chief of the International Journal of Network Protocols and Algorithms
Associate Professor
Department of Communications
Polytechnic University of Valencia

From mko@cs.stir.ac.uk  Mon Apr 26 01:42:36 2010
Return-Path: <mko@cs.stir.ac.uk>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BA1173A69A1 for <sam@core3.amsl.com>; Mon, 26 Apr 2010 01:42:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.625
X-Spam-Level: **
X-Spam-Status: No, score=2.625 tagged_above=-999 required=5 tests=[AWL=-0.875,  BAYES_99=3.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hEyXMq55A2bK for <sam@core3.amsl.com>; Mon, 26 Apr 2010 01:42:35 -0700 (PDT)
Received: from mailscanner2.stir.ac.uk (mailscanner2.stir.ac.uk [139.153.13.35]) by core3.amsl.com (Postfix) with ESMTP id 9A7BE3A694E for <sam@irtf.org>; Mon, 26 Apr 2010 01:42:32 -0700 (PDT)
Received: from [139.153.254.70] (helo=yen.cs.stir.ac.uk) by mailscanner2.stir.ac.uk with esmtp (Exim 4.69) (envelope-from <mko@cs.stir.ac.uk>) id 1O6JtG-0004HU-S6 for sam@irtf.org; Mon, 26 Apr 2010 09:42:09 +0100
Received: from [139.153.253.90] by yen.cs.stir.ac.uk (8.9.3) id JAA25796; Mon, 26 Apr 2010 09:42:06 +0100 (BST)
Message-ID: <4BD551DD.7070000@cs.stir.ac.uk>
Date: Mon, 26 Apr 2010 09:42:05 +0100
From: Dr Mario Kolberg <mko@cs.stir.ac.uk>
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: sam <sam@irtf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-MailScanner-ID: 1O6JtG-0004HU-S6
X-stir.ac.uk-MailScanner: Found to be clean
X-stir.ac.uk-MailScanner-From: mko@cs.stir.ac.uk
MailScanner-NULL-Check: 1272876131.36266@m4fHbXZAwtS+OOHP+h1c8g
Subject: [SAM] CFP: IEEE Consumer Communications and Networking Conference (CCNC) 2011
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Apr 2010 08:42:36 -0000

Call for Papers

IEEE CCNC 2011
January 8 - 11, 2011, Las Vegas, Nevada, USA
http://www.ieee-ccnc.org/

IEEE Consumer Communications and Networking Conference, sponsored by the
IEEE Communications Society, is a major annual international conference
organized with the objective of bringing together researchers,
developers, and practitioners from academia and industry working in all
areas of consumer communications and networking.

IEEE CCNC 2011 will present the latest developments and technical
solutions in the areas of home networking, consumer networking, enabling
technologies (such as middleware), and novel applications and services.
The conference will include a peer-reviewed program of technical
sessions, special sessions, business application sessions, tutorials,
and demonstration sessions.

Technical Program features presentations in all areas of consumer
communications and networking, including
- Wireless Consumer Communications and Networking
- Smart Spaces and Personal Area Networks
- Multimedia & Entertainment Networking and Services
- Peer-to-Peer Networking and Content Distribution
- Security and Content Protection
- Emerging and Innovative Consumer Technologies and Applications

For a list of potential topics and submission requirements, visit
http://www.ieee-ccnc.org/

TECHNICAL PAPERS DUE: June 4, 2010
ACCEPTANCE NOTIFICATION: August 16, 2010
FINAL CAMERA READY ARTWORK October 1, 2010

Selected papers from the conference will be published in the Consumer
Communications and Networking Series in the IEEE Communications Magazine.

Submissions are also welcomed for Special Sessions, Workshops,
Tutorials, Demonstrations, Short Papers, and Industry Technical Panels.

Workshop Proposals Due: April 15, 2010
Special Session Proposals Due: June 1, 2010
Special Session Papers Due: August 1, 2010
Tutorials Due: September 1, 2010
Demonstrations Due: September 1, 2010
Work in Progress Papers Due: September 1, 2010
Industry Technical Panels Due: September 17, 2010

For more information on these specialized tracks, visit
http://www.ieee-ccnc.org/

Mario Kolberg
TPC Chair





-- 
The Sunday Times Scottish University of the Year 2009/2010
The University of Stirling is a charity registered in Scotland, 
 number SC 011159.


From m.garcia.upv@gmail.com  Tue Apr 27 11:25:16 2010
Return-Path: <m.garcia.upv@gmail.com>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3A86828C1C4 for <sam@core3.amsl.com>; Tue, 27 Apr 2010 11:25:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.123
X-Spam-Level: 
X-Spam-Status: No, score=-1.123 tagged_above=-999 required=5 tests=[AWL=0.276,  BAYES_50=0.001, GB_I_INVITATION=-2, J_CHICKENPOX_21=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2DWinzFlkyb9 for <sam@core3.amsl.com>; Tue, 27 Apr 2010 11:25:15 -0700 (PDT)
Received: from marfik.cc.upv.es (marfik.cc.upv.es [158.42.249.21]) by core3.amsl.com (Postfix) with ESMTP id 7950628C18D for <sam@irtf.org>; Tue, 27 Apr 2010 11:22:21 -0700 (PDT)
Received: from smtpx.upv.es (smtpxv.cc.upv.es [158.42.249.46]) by marfik.cc.upv.es (8.13.6/8.13.6) with ESMTP id o3RIM6ud019206 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Tue, 27 Apr 2010 20:22:06 +0200
Received: from smtp.upv.es (celaeno.cc.upv.es [158.42.249.55]) by smtpx.upv.es (8.14.3/8.14.3) with ESMTP id o3RIM6KX017842 for <sam@irtf.org>; Tue, 27 Apr 2010 20:22:06 +0200
Received: from JLLORET (osiris1.gnd.upv.es [158.42.148.63]) by smtp.upv.es (8.13.6/8.13.6) with SMTP id o3RIM6Lh009452 for <sam@irtf.org>; Tue, 27 Apr 2010 20:22:06 +0200
Date: Tue, 27 Apr 2010 20:22:06 +0200
Message-Id: <201004271822.o3RIM6Lh009452@smtp.upv.es>
From: Miguel Garcia<m.garcia.upv@gmail.com>
To: sam@irtf.org
CC: 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [SAM] Last Mile || InfoWare 2010 [ICCGI, ICWMC, INTERNET, ACCESS] September 20-25, 2010 - Valencia, Spain
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Apr 2010 18:25:16 -0000

INVITATION

Note that we are entering the last few days to submit work to one of the 
InfoWare 2010 events. Please consider to contribute and encourage your 
team members and fellow scientists to contribute to the following 
federated events.

The submission deadline is April 30, 2010.

Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )
Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore
Submitted for indexing: Elsevier's EI Compendex Database, EI?s 
Engineering Information Index

Thanks for forwarding the information on this Call for Submissions to 
those potentially interested to submit.

===== Call for Submissions =======

InfoWare 2010, September 20-25, 2010 - Valencia, Spain
see: http://www.iaria.org/conferences2010/InfoWare10.html

InfoWare 2010 is a federated event focusing on advances topics 
concerning information technology, wireless, mobile communications, 
internet, and network access. InfoWare 2010 continues the tradition of 
well-established conferences ICCGI and ICWMC, while complementing the 
topics with INTERNET and ACCESS.

Submission (full paper) new deadline: April 30, 2010.

Submissions must be electronically done using the 'Submit a Paper' link 
on the entry page of each conference.

Before submission, please check and conform with the Editorial rules:
http://www.iaria.org/editorialrules.html.

For details on the each conference's topics, see the individual Call for 
Papers for each conference.

Unpublished high quality contributions in terms of Regular papers and 
Posters or Work in Progress are welcome. Workshop proposals and Panel 
proposals on challenging topics are encouraged.

Extended versions of selected papers will be published in IARIA on-line 
Journals (http://www.iariajournals.org) and in Special issues of 
different journals mentioned on the entry page of each conference.

Submissions will be peer-reviewed, published by IEEE Computer Society 
Press, posted in IEEE Digital Library, and indexed via all the IEEE 
indexing agreements.

All tracks/topics are open to both research and industry contributions.

-- ICCGI 2010, The Fifth International Multi-Conference on Computing in 
the Global Information Technology
http://www.iaria.org/conferences2010/ICCGI10.html

-- ICWMC 2010, The Sixth International Conference on Wireless and Mobile 
Communications
http://www.iaria.org/conferences2010/ICWMC10.html

-- INTERNET 2010, The Second International Conference on Evolving Internet
http://www.iaria.org/conferences2010/INTERNET10.html

-- ACCESS 2010, The First International Conferences on Access Networks, 
Services and Technologies
http://www.iaria.org/conferences2010/ACCESS10.html


-----------------------
Conferences' Chairs
IARIA Publicity Board
-----------------------

From huebsch@kit.edu  Wed Apr 28 06:22:05 2010
Return-Path: <huebsch@kit.edu>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 15DB228C11A for <sam@core3.amsl.com>; Wed, 28 Apr 2010 06:22:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.15
X-Spam-Level: 
X-Spam-Status: No, score=0.15 tagged_above=-999 required=5 tests=[BAYES_99=3.5, HELO_EQ_DE=0.35, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ntqcqv3ZRVzP for <sam@core3.amsl.com>; Wed, 28 Apr 2010 06:21:58 -0700 (PDT)
Received: from iramx2.ira.uni-karlsruhe.de (iramx2.ira.uni-karlsruhe.de [141.3.10.81]) by core3.amsl.com (Postfix) with ESMTP id 40D2B28C146 for <sam@irtf.org>; Wed, 28 Apr 2010 06:17:03 -0700 (PDT)
Received: from i72mnhuebby.tm.uni-karlsruhe.de ([141.3.71.82] helo=HuebschLaptop) by iramx2.ira.uni-karlsruhe.de with esmtpsa port 25  id 1O7785-00039t-Sk for <sam@irtf.org>; Wed, 28 Apr 2010 15:16:48 +0200
From: =?iso-8859-1?Q?Christian_H=FCbsch?= <huebsch@kit.edu>
To: <sam@irtf.org>
Date: Wed, 28 Apr 2010 15:17:22 +0200
Message-ID: <008d01cae6d5$23636720$6a2a3560$@edu>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Office Outlook 12.0
Thread-index: Acrm1SMuUmlJ9me/S16SoO0LQDF8xw==
Content-language: de
X-ATIS-AV: ClamAV (iramx2.ira.uni-karlsruhe.de)
X-ATIS-AV: Kaspersky (iramx2.ira.uni-karlsruhe.de)
X-ATIS-Timestamp: iramx2.ira.uni-karlsruhe.de  esmtpsa 1272460608.982159000
X-Mailman-Approved-At: Wed, 28 Apr 2010 06:40:12 -0700
Subject: [SAM] Release announcement: SpoVNet Overlay Software
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Apr 2010 13:32:25 -0000

(Apologies if you receive multiple copies)

Dear Colleagues,

the "Spontaneous Virtual Networks" (SpoVNet) project is proud to release =
the
first complete open source implementation of the SpoVNet architecture =
for
spontaneous and flexible creation of overlay-based services and
applications. Details on the architecture and the SpoVNet project can be
found in [1]. SpoVNet is funded by the National Foundation of the State
Baden-W=FCrttemberg, Germany (Baden-W=FCrttemberg Stiftung gGmbH).

The SpoVNet software provides a convenient toolbox for the development =
of
overlay-based services and applications across heterogeneous networks. =
It
comprises base software, three examples for overlay-based services, and =
a
game application for demonstration purposes. Specifically, this initial
software release includes=20

- the award-winning SpoVNet-base "ariba" (successfully demonstrated at =
ACM
SIGCOMM 2009 [2] and IEEE INFOCOM 2010 [3]),
- the multicast service "MCPO" (also part of [2], [3]),
- the event notification service "EONSON" [4], [5],
- the event correlation service "Cordies" [6],
- and the multiplayer game "PlanetPI4" [7].

Software packages and documentation are available from=20

  http://www.spovnet.de/download.

Feedback from the community is highly appreciated.=20

Please report experiences, wishes, and problems to feedback@spovnet.de.

Best regards,
Oliver Waldhorst
(on behalf of the SpoVNet team)


*** References ***

[1] O. Waldhorst, C. Blankenhorn, D. Haage, R. Holz, G. Koch, B. =
Koldehofe,
F. Lampi, C. Mayer, and S. Mies, =93Spontaneous Virtual Networks: On the =
Road
towards the Internet=92s Next Generation,=94 it - Information Technology
(Special Issue on Next Generation Internet), vol. 50, no. 6, pp. =
367=96375,
2008. http://www.atypon-link.com/OLD/doi/pdf/10.1524/itit.2008.0508

[2] C. H=FCbsch, C. P. Mayer, S. Mies, R. Bless, O. P. Waldhorst, and u =
M.
Zitterbart, =93Reconnecting the Internet with ariba - Self-Organizing
Provisioning of End-to-End Connectivity in Heterogeneous Networks,=94 =
ACM
SIGCOMM CCR, vol. 40, no. 1, pp. 131=96132, 2010.
http://doi.acm.org/10.1145/1672308.1672334

[3] C. H=FCbsch, C. Mayer, S. Mies, R. Bless, O. Waldhorst, and M. =
Zitterbart,
u =93Demo Abstract: Using Legacy Applications in Future Heterogeneous =
Networks
with ariba,=94 in Proc. IEEE INFOCOM, San Diego, CA, USA, 2010.
http://www.ieee-infocom.com/2010/demos.html

[4] M. A. Tariq, B. Koldehofe, A. Altaweel, and K. Rothermel,
Providing Basic Security Mechanisms in Broker-less Publish/Subscribe
Systems, Proc. 4th ACM Int. Conference on Distributed Event-Based =
Systems
(DEBS), Cambridge, UK, 2010. (to appear)

[5] A. Tariq, B. Koldehofe, G. Koch, and K. Rothermel, Providing
Probabilistic Latency Bounds for Dynamic Publish/Subscribe Systems,=20
Proc. Kommunikation in Verteilten Systemen (KiVS), Kassel, Germany, =
2009.
http://www.springerlink.com/content/x36578745jv7wr88/

[6] G. Koch, B. Koldehofe, and K. Rothermel, Cordies: Expressive Event
Correlation in Distributed Systems, Proc. 4th ACM Int. Con. on =
Distributed
Event-Based Systems (DEBS), Cambridge, UK, 2010. (to appear)

[7] T. Triebel, B. Guthier, R. Sueselbeck, G. Schiele, and W. =
Effelsberg,
Peer-to-peer Infrastructures for Games, Proc. 18th Int. Workshop on
Network and Operating Systems Support for Digital Audio and Video =
(NOSSDAV),
Braunschweig, Germany, 2008. http://doi.acm.org/10.1145/1496046.1496079


From mko@cs.stir.ac.uk  Thu Apr 29 05:46:01 2010
Return-Path: <mko@cs.stir.ac.uk>
X-Original-To: sam@core3.amsl.com
Delivered-To: sam@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DC6333A6CFA for <sam@core3.amsl.com>; Thu, 29 Apr 2010 05:46:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.917
X-Spam-Level: **
X-Spam-Status: No, score=2.917 tagged_above=-999 required=5 tests=[AWL=-0.583,  BAYES_99=3.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Oaef-fQxIHRP for <sam@core3.amsl.com>; Thu, 29 Apr 2010 05:46:01 -0700 (PDT)
Received: from mailscanner2.stir.ac.uk (mailscanner2.stir.ac.uk [139.153.13.35]) by core3.amsl.com (Postfix) with ESMTP id E25D43A6CFD for <sam@irtf.org>; Thu, 29 Apr 2010 05:42:09 -0700 (PDT)
Received: from [139.153.254.70] (helo=yen.cs.stir.ac.uk) by mailscanner2.stir.ac.uk with esmtp (Exim 4.69) (envelope-from <mko@cs.stir.ac.uk>) id 1O7T3d-0001a8-Qp for sam@irtf.org; Thu, 29 Apr 2010 13:41:37 +0100
Received: from [139.153.48.41] by yen.cs.stir.ac.uk (8.9.3) id NAA18173; Thu, 29 Apr 2010 13:41:33 +0100 (BST)
Message-ID: <4BD97E7D.9060408@cs.stir.ac.uk>
Date: Thu, 29 Apr 2010 13:41:33 +0100
From: Dr Mario Kolberg <mko@cs.stir.ac.uk>
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: sam <sam@irtf.org>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by yen.cs.stir.ac.uk id NAA18173
X-MailScanner-ID: 1O7T3d-0001a8-Qp
X-stir.ac.uk-MailScanner: Found to be clean
X-stir.ac.uk-MailScanner-From: mko@cs.stir.ac.uk
MailScanner-NULL-Check: 1273149698.02404@VSdoT+chAH4tcvK8cvQ39g
Subject: [SAM] CFP: IEEE Communications Magazine, Consumer Communications and Networking Series
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Apr 2010 12:46:02 -0000

Apologies, if you receive multiple copies of the email.

Call for Papers

IEEE Communications Magazine

Consumer Communications and Networking Series

Recent trends in consumer networking are that consumers are both
creators and producers of content (albeit of varying quality!) and peer
distribution is the natural model. This is one of the emerging trends
that impact how consumers can use devices to create, manipulate, store,
and access content =97 and is surely a much different view compared to
only five years ago where most experts still viewed the world in terms
of servers and clients, producers and consumers as distinct and separate
entities=85.indeed, there are still dinosaur organizations out there today
who are fighting a rearguard action to protect their dwindling revenue
streams because they haven=92t been brave enough to embrace this new
model. Trends like this are ones that papers for the consumer
communications and networking series should address.

We have also seen the technological reach of existing solutions being
applied in unconventional ways where all aspects of our digital lives
are being consumed to provide novel platforms where interoperation
between disparate technologies is now possible. For example, the
automotive industry is now producing cars that include ad hoc networks
designed to provide multimedia solutions as well as links to wide area
communications via satellite networks. Using these networking
capabilities and interfaces such as USB we see automobile functionality
being extended. In this sense the boundaries between the car and
conventional consumer devices are beginning to blur.

Perhaps the sole technology responsible for the many technological
advances we see today is communications. Example communications
technologies include the emergence of 3G and 4G, LTE and WiMax,
Bluetooth, Zigbee, Ultrawideband, TV-band, and Powerline and Free space
optical. Applications of these technologies include personal and body
area networking, home networking, game networking, ad-hoc networking,
and sensor networking. These networks may be connected through
networking layers that are cognitive, peer-to-peer enabled, and have the
properties of self organisation and management. These networks will
become key enablers where we are already seeing ubiquitous content
distribution models, for example, television can now be viewed wherever
we are and on any devices capable of connecting to one of the many
networking paradigms defined above. With these networks we can expect a
platform for true innovation where content distribution will overlay
these networks using compression, rights management, delivery, and
appropriate quality of service mechanisms that can be seamlessly moved
over these next generation networks. All of this is made possible by
networking, software and middleware that present to the service designer
the tools to provide ease of use, security, and stunning interactivity
to the end consumer.

With this in mind the IEEE Communications Magazine is seeking papers
that emphasize consumer networking in whatever physical environment it
finds itself. Topics of interest include, but are not limited to the
following:

Scope of Contributions

=95 Wireless Multimedia Networks
=95 Body and Personal Area Networks
=95 Mobile Networks and Multimedia
=95 Emerging Wireless Technologies (UWB, OFDM, RFID, Zigbee, etc.)
=95 Distributed Network Protocols for Multimedia HD Audio/Video Networking
=95 Networked Appliances
=95 Entertainment Networks
=95 P2P Algorithms and Architectures for Consumer Electronics Peer
Streaming, Networking and Applications
=95 Home Networking and Automation
=95 Next Generation Networks
=95 Pervasive Computing and Contextual Systems
=95 Middleware for Networked Consumer Devices
=95 Media and Device Adaptation
=95 Architecture, Platforms and Protocols for Networked Games and Virtual
Worlds.
=95 Social Networking and Home Entertainment
=95 Music and Movie Distribution Models
=95 Augmented Reality
=95 Task Computing and the Home
=95 Home Sensor Networks
=95 Autonomic Home Networking
=95 Zero Configuration Networking
=95 Digital Rights Management
=95 Trust in Social Networks
=95 Voice/Video of IP

Articles should be tutorial in nature, with the intended audience being
all members of the communications technology and spectrum policy
communities. They should be written in a style comprehensible to readers
outside the specialty of the article. Articles should not exceed 4500
words. Figures and tables should be limited to a combined total of six.
Complete guidelines for prospective authors can be found at:
http://www.comsoc.org/pubs/commag/sub_guidelines.html and a brief
summary is available at
http://www.comsoc.org/pubs/edbd-web/reviewformintro.html. Please submit
a PDF (preferred) or MSWORD formatted paper by June 1, 2010 via
Manuscript Central (http://mc.manuscriptcentral.com/commag-ieee).
Register or log in, and go to the Author Center. Follow the instructions
there. Select the topic "Consumer Communications and
Networking Series."

Schedule for Submissions:
Submission Deadline:              June 1, 2010
Notification of Acceptance:       August 15, 2010
Final Manuscript Due:             September 15, 2010
Publication Date:                 December 1, 2010

Series Editors:
Madjid Merabti, Liverpool John Moores University, UK,
M.Merabti@ljmu.ac.uk
Stanley Moyer, Telcordia Technologies, Piscataway, NJ 08854, USA
stanm@research.telcordia.com
Mario Kolberg, University of Stirling, Stirling, UK
mko@cs.stir.ac.uk



--=20
The Sunday Times Scottish University of the Year 2009/2010
The University of Stirling is a charity registered in Scotland,=20
 number SC 011159.

