
From lars.eggert@nokia.com  Tue Aug  2 06:46:38 2011
Return-Path: <lars.eggert@nokia.com>
X-Original-To: sam@ietfa.amsl.com
Delivered-To: sam@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E676321F8770 for <sam@ietfa.amsl.com>; Tue,  2 Aug 2011 06:46:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -104.296
X-Spam-Level: 
X-Spam-Status: No, score=-104.296 tagged_above=-999 required=5 tests=[AWL=1.192, BAYES_00=-2.599, GB_I_INVITATION=-2, RCVD_IN_DNSWL_LOW=-1, SARE_NETPROD=0.111, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BppaWEYScf51 for <sam@ietfa.amsl.com>; Tue,  2 Aug 2011 06:46:37 -0700 (PDT)
Received: from mgw-da01.nokia.com (smtp.nokia.com [147.243.128.24]) by ietfa.amsl.com (Postfix) with ESMTP id 24C9021F8760 for <sam@irtf.org>; Tue,  2 Aug 2011 06:46:37 -0700 (PDT)
Received: from mail.fit.nokia.com (esdhcp030222.research.nokia.com [172.21.30.222]) by mgw-da01.nokia.com (Switch-3.4.4/Switch-3.4.3) with ESMTP id p72Dki53002653 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <sam@irtf.org>; Tue, 2 Aug 2011 16:46:45 +0300
From: Lars Eggert <lars.eggert@nokia.com>
X-Virus-Status: Clean
X-Virus-Scanned: clamav-milter 0.97.2 at fit.nokia.com
Content-Type: multipart/signed; boundary="Apple-Mail=_A677BD8B-9F80-4143-8FF4-99DD811EC3E2"; protocol="application/pkcs7-signature"; micalg=sha1
Date: Tue, 2 Aug 2011 16:46:41 +0300
Message-Id: <F26586E3-6ADA-45BB-8C4A-45D6B4B97356@nokia.com>
To: sam@irtf.org
Mime-Version: 1.0 (Apple Message framework v1244.3)
X-Mailer: Apple Mail (2.1244.3)
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.2.7 (mail.fit.nokia.com); Tue, 02 Aug 2011 16:46:41 +0300 (EEST)
X-Nokia-AV: Clean
Subject: [SAM] Call for Nominations: Applied Networking Research Prize (ANRP) for IETF-82
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: anrp@isoc.org
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2011 13:46:38 -0000

--Apple-Mail=_A677BD8B-9F80-4143-8FF4-99DD811EC3E2
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252



               CALL FOR NOMINATIONS:

      APPLIED NETWORKING RESEARCH PRIZE (ANRP)
     =20
               http://irtf.org/anrp


*** Submit nominations until August 28 for the ANRP for IETF-82,
*** November 13-18, 2011 in Taipei, Taiwan:
*** http://fit.nokia.com/anrp/82/

The Applied Networking Research Prize (ANRP) is awarded for
recent results in applied networking research that are relevant
for transitioning into shipping Internet products and related
standardization efforts. Researchers with relevant, recently
published results are encouraged to apply for this prize, which
will offer them the opportunity to present and discuss their work
with the engineers, network operators, policy makers and
scientists that participate in the Internet Engineering Task
Force (IETF) and its research arm, the Internet Research Task
Force (IRTF). Third-party nominations for this prize are also
encouraged. The goal of the Applied Networking Research Prize
(ANRP) is to recognize the best new ideas in networking, and
bring them to the IETF and IRTF especially in cases where they
would not otherwise see much exposure or discussion.

The Applied Networking Research Prize (ANRP) consists of:

* cash prize of $500 (USD)

* invited talk at the IRTF Open Meeting

* travel grant to attend the week-long IETF meeting
  (airfare, hotel, registration, stipend)

* recognition at the IETF plenary

* invitation to related social activities

* potential for additional travel grants to future IETF
  meetings, based on community feedback


HOW TO APPLY

Only a single person can be nominated based on a peer-reviewed,
recently-published, original journal, conference or workshop paper
they authored. The nominee must be one of the main authors of the
nominated paper. Both self nominations (nominating one=92s own paper)
and third-party nominations (nominating someone else=92s paper) are
encouraged.

The nominated paper should provide a scientific foundation for
possible future IETF engineering work or IRTF experimentation,
analyze the behavior of Internet protocols in operational
deployments or realistic testbeds, make an important contribution
to the understanding of Internet scalability, performance,
reliability, security or capability, or otherwise be of relevance
to ongoing or future IETF or IRTF activities.

Applicants must briefly describe how the nominated paper relates
to these goals, and are encouraged to describe how presentation
of these research results will foster their transition into new
IETF engineering or IRTF experimentation, or otherwise seed new
activities that will have an impact on the real-world Internet.

The goal of the Applied Networking Research Prize (ANRP) is to
foster the transitioning of research results into real-world
benefits for the Internet. Therefore, applicants must indicate
that they (or the nominee, in case of third-party nominations)
are available to attend the respective IETF meeting in person and
in its entirety.

Nominations must include:

* the name and email address of the nominee

* a reference to the published nominated paper

* a PDF copy of the nominated paper

* a statement that describes how the nominated paper
  fulfills the goals of the award

* a statement that the nominee is available to attend the
  respective IETF meeting in person and in its entirety

* a brief biography or CV of the nominee

* optionally, any other supporting information (link to
  nominee's web site, etc.)

*** Nominations are submitted via the submission site:
*** http://fit.nokia.com/anrp/82/


SELECTION PROCESS

A small selection committee comprised of individuals
knowledgeable about the IRTF, IETF and the broader networking
research community will evaluate the submissions against these
selection criteria. The goal is to select 1-2 submissions for the
Applied Networking Research Prize (ANRP) during each nomination
period. All nominees will be notified by email.


IMPORTANT DATES

Applications open:  August 1, 2011
Applications close: August 28, 2011
Notifications:      September 20, 2011
IETF-82 Meeting:    November 13-18, 2011 in Taipei, Taiwan=20


SPONSORS

The Applied Networking Research Prize (ANRP) is supported by the
Internet Society (ISOC), as part of its Internet Research Award
Programme, in coordination with the Internet Research Task Force
(IRTF).=

--Apple-Mail=_A677BD8B-9F80-4143-8FF4-99DD811EC3E2
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIMRjCCBVAw
ggQ4oAMCAQICEGxdPUZzCwUJ8KBiJwH+bYgwDQYJKoZIhvcNAQEFBQAwgd0xCzAJBgNVBAYTAlVT
MRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNpZ24gVHJ1c3QgTmV0d29y
azE7MDkGA1UECxMyVGVybXMgb2YgdXNlIGF0IGh0dHBzOi8vd3d3LnZlcmlzaWduLmNvbS9ycGEg
KGMpMDkxHjAcBgNVBAsTFVBlcnNvbmEgTm90IFZhbGlkYXRlZDE3MDUGA1UEAxMuVmVyaVNpZ24g
Q2xhc3MgMSBJbmRpdmlkdWFsIFN1YnNjcmliZXIgQ0EgLSBHMzAeFw0xMDEwMTUwMDAwMDBaFw0x
MTEwMTUyMzU5NTlaMIIBEzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlT
aWduIFRydXN0IE5ldHdvcmsxRjBEBgNVBAsTPXd3dy52ZXJpc2lnbi5jb20vcmVwb3NpdG9yeS9S
UEEgSW5jb3JwLiBieSBSZWYuLExJQUIuTFREKGMpOTgxHjAcBgNVBAsTFVBlcnNvbmEgTm90IFZh
bGlkYXRlZDEzMDEGA1UECxMqRGlnaXRhbCBJRCBDbGFzcyAxIC0gTmV0c2NhcGUgRnVsbCBTZXJ2
aWNlMRQwEgYDVQQDFAtMYXJzIEVnZ2VydDEkMCIGCSqGSIb3DQEJARYVbGFycy5lZ2dlcnRAbm9r
aWEuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwolKEyOz/NQZJJlw0x9XBS9W
wCmabdY1fXpbWSdcaJiEWhQpRzSIC/pgIwCgaUW9g3JsWioXCawyjUVeg8xR42sR690f4z+OPAUm
3jokZxsuRaGX6fuPkPQomYAGz7htUHws/8FZIU+4dciETQf4vF5ptitJ+QZCVRCTLqisj6mG/kG4
65Op3G5/YZF9F/a390LdhuRP6vdY2Y+dqm8LDa0zmENPpoE98u1pIZGqCcnskN/nNBtEPd+a4lNh
ZSGnPuL4XCUSJYR9NB7FAYBvi5N7LSWHR3fspwa5EgpXynJcsLzaLA0iGfjFOBYFxul/07edmyw4
FIXuCIkaMDUfEwIDAQABo4HSMIHPMAkGA1UdEwQCMAAwRAYDVR0gBD0wOzA5BgtghkgBhvhFAQcX
ATAqMCgGCCsGAQUFBwIBFhxodHRwczovL3d3dy52ZXJpc2lnbi5jb20vcnBhMAsGA1UdDwQEAwIF
oDAdBgNVHSUEFjAUBggrBgEFBQcDBAYIKwYBBQUHAwIwUAYDVR0fBEkwRzBFoEOgQYY/aHR0cDov
L2luZGMxZGlnaXRhbGlkLWczLWNybC52ZXJpc2lnbi5jb20vSW5kQzFEaWdpdGFsSUQtRzMuY3Js
MA0GCSqGSIb3DQEBBQUAA4IBAQAlSTzUKqa3ZouKWFQfIJ+4l/KsztPnY4Onwzt8lqAmeiFPqOmf
kLTXbXDKtC6caFadNtyHpnsmQFFKXwhe5Z9/AaVSwryu6F9992DzYLp3j8PE0DSU0wmpUXUtp+rz
TFqJRkzB8RCBoq/TPBmkMPr68qB0TkU3dbYiVIvscOt1MRkdHiwG4wKQLyCf8XRRWqmMY6lbun7g
kiEWiris5StGKRvE5+e1SrcdnoZxIKQFF7Etr+4ftClrsDQWX9nRCEjYcmz4y/deq+HU8ylBaKZE
0ZJmcnYlAaD50OYWi0ckGDnKYyeMUEtCZJSV0otm2LqyIUAu9WPv/GNHt2ntjnUaMIIG7jCCBdag
AwIBAgIQcRVmBUrkkSFN6bxE+azT3DANBgkqhkiG9w0BAQUFADCByjELMAkGA1UEBhMCVVMxFzAV
BgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTow
OAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5
MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24g
QXV0aG9yaXR5IC0gRzMwHhcNMDkwNTAxMDAwMDAwWhcNMTkwNDMwMjM1OTU5WjCB3TELMAkGA1UE
BhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBO
ZXR3b3JrMTswOQYDVQQLEzJUZXJtcyBvZiB1c2UgYXQgaHR0cHM6Ly93d3cudmVyaXNpZ24uY29t
L3JwYSAoYykwOTEeMBwGA1UECxMVUGVyc29uYSBOb3QgVmFsaWRhdGVkMTcwNQYDVQQDEy5WZXJp
U2lnbiBDbGFzcyAxIEluZGl2aWR1YWwgU3Vic2NyaWJlciBDQSAtIEczMIIBIjANBgkqhkiG9w0B
AQEFAAOCAQ8AMIIBCgKCAQEA7cRH3yooHXwGa7vXITLJbBOP6bGNQU4099oL42r6ZYggCxET6Zvg
SU6Lb9UB0F8NR5GKWkx0Pj/GkQm7TDSejW6hglFi92l2WJYHr54UGAdPWr2f0jGyVBlzRmoZQhHs
EnMhjfXcMM3l2VYKMcU2bSkUl70t2olHGYjYSwQ967Y8Zx50ABMN0Ibak2f4MwOuGjxraXj2wCyO
4YM/d/mZ//6fUlrCtIcK2GypR8FUKWVDPkrAlh/Brfd3r2yxBF6+wbaULZeQLSfSux7pg2qE9sSy
riMGZSalJ1grByK0b6ZiSBp38tVQJ5op05b7KPW6JHZi44xZ6/tu1ULEvkHH9QIDAQABo4ICuTCC
ArUwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC52ZXJpc2lnbi5jb20w
EgYDVR0TAQH/BAgwBgEB/wIBADBwBgNVHSAEaTBnMGUGC2CGSAGG+EUBBxcBMFYwKAYIKwYBBQUH
AgEWHGh0dHBzOi8vd3d3LnZlcmlzaWduLmNvbS9jcHMwKgYIKwYBBQUHAgIwHhocaHR0cHM6Ly93
d3cudmVyaXNpZ24uY29tL3JwYTA0BgNVHR8ELTArMCmgJ6AlhiNodHRwOi8vY3JsLnZlcmlzaWdu
LmNvbS9wY2ExLWczLmNybDAOBgNVHQ8BAf8EBAMCAQYwbgYIKwYBBQUHAQwEYjBgoV6gXDBaMFgw
VhYJaW1hZ2UvZ2lmMCEwHzAHBgUrDgMCGgQUS2u5KJYGDLvQUjibKaxLB4shBRgwJhYkaHR0cDov
L2xvZ28udmVyaXNpZ24uY29tL3ZzbG9nbzEuZ2lmMC4GA1UdEQQnMCWkIzAhMR8wHQYDVQQDExZQ
cml2YXRlTGFiZWw0LTIwNDgtMTE4MB0GA1UdDgQWBBR5R2EIQf04BKJL57XM9UP2SSsR+DCB8QYD
VR0jBIHpMIHmoYHQpIHNMIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4x
HzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlT
aWduLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENs
YXNzIDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHM4IRAItbdVaE
VIULAM+vOEjOsaQwDQYJKoZIhvcNAQEFBQADggEBADlNz0GZgbWpBbVSOOk5hIls5DSoWufYbAlM
JBq6WaSHO3Mh8ZOBz79oY1pn/jWFK6HDXaNKwjoZ3TDWzE3v8dKBl8pUWkO/N4t6jhmND0OojPKv
YLMVirOVnDzgnrMnmKQ1chfl/Cpdh9OKDcLRRSr4wPSsKpM61a4ScAjr+zvid+zoK2Q1ds262uDR
yxTWcVibvtU+fbbZ6CTFJGZMXZEfdrMXPn8NxiGJL7M3uKH/XLJtSd5lUkL7DojS7Uodv0vj+Mxy
+kgOZY5JyNb4mZg7t5Q+MXEGh/psWVMu198r7V9jAKwV7QO4VRaMxmgD5yKocwuxvKDaUljdCg5/
wYIxggSLMIIEhwIBATCB8jCB3TELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMu
MR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTswOQYDVQQLEzJUZXJtcyBvZiB1c2Ug
YXQgaHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL3JwYSAoYykwOTEeMBwGA1UECxMVUGVyc29uYSBO
b3QgVmFsaWRhdGVkMTcwNQYDVQQDEy5WZXJpU2lnbiBDbGFzcyAxIEluZGl2aWR1YWwgU3Vic2Ny
aWJlciBDQSAtIEczAhBsXT1GcwsFCfCgYicB/m2IMAkGBSsOAwIaBQCgggJtMBgGCSqGSIb3DQEJ
AzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTExMDgwMjEzNDY0MlowIwYJKoZIhvcNAQkE
MRYEFLG+NfUytUvQjRBiP9XmDWgPc50jMIIBAwYJKwYBBAGCNxAEMYH1MIHyMIHdMQswCQYDVQQG
EwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0IE5l
dHdvcmsxOzA5BgNVBAsTMlRlcm1zIG9mIHVzZSBhdCBodHRwczovL3d3dy52ZXJpc2lnbi5jb20v
cnBhIChjKTA5MR4wHAYDVQQLExVQZXJzb25hIE5vdCBWYWxpZGF0ZWQxNzA1BgNVBAMTLlZlcmlT
aWduIENsYXNzIDEgSW5kaXZpZHVhbCBTdWJzY3JpYmVyIENBIC0gRzMCEGxdPUZzCwUJ8KBiJwH+
bYgwggEFBgsqhkiG9w0BCRACCzGB9aCB8jCB3TELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlT
aWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTswOQYDVQQLEzJUZXJt
cyBvZiB1c2UgYXQgaHR0cHM6Ly93d3cudmVyaXNpZ24uY29tL3JwYSAoYykwOTEeMBwGA1UECxMV
UGVyc29uYSBOb3QgVmFsaWRhdGVkMTcwNQYDVQQDEy5WZXJpU2lnbiBDbGFzcyAxIEluZGl2aWR1
YWwgU3Vic2NyaWJlciBDQSAtIEczAhBsXT1GcwsFCfCgYicB/m2IMA0GCSqGSIb3DQEBAQUABIIB
AD8Kb0yL9WaeT/jpSFI9yUDVkjtj/enS1IYScESd8ivoDxglhvDL1koLbdX5763j8bzqj7MhpbEg
WqB6YpYhhoqGQc4V/o+LdfJ8H/3yuXmvxEk4GD/2xqqoCy1fSQt8RuPNeiW8di13uYphZjn9ozIR
IPIeeBbZe+zjh4iqeZYW4/L1+bs7TO/urhX3tsfJaQSCnb0d8FuMsgdG2++6LEbFBt62BmrZ8TLa
NiTjpOaayeqsATUO3Xzfir3BBS3TgA9sV1yBiDNw+jDe0QSInQcpQnKXtRySFBWvEyJQTQtrpYVU
ZW5t+LSu6fY1HmxGc9Ue7AXNW9uBsNibtBjsStkAAAAAAAA=

--Apple-Mail=_A677BD8B-9F80-4143-8FF4-99DD811EC3E2--

From prvs=202b10312=Sebastian.Meiling@haw-hamburg.de  Tue Aug 16 08:08:21 2011
Return-Path: <prvs=202b10312=Sebastian.Meiling@haw-hamburg.de>
X-Original-To: sam@ietfa.amsl.com
Delivered-To: sam@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7F75B11E8088 for <sam@ietfa.amsl.com>; Tue, 16 Aug 2011 08:08:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.249
X-Spam-Level: 
X-Spam-Status: No, score=-2.249 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vnebo9qO4V0q for <sam@ietfa.amsl.com>; Tue, 16 Aug 2011 08:08:20 -0700 (PDT)
Received: from mx3.haw-public.haw-hamburg.de (mx3.haw-public.haw-hamburg.de [141.22.6.2]) by ietfa.amsl.com (Postfix) with ESMTP id 4115711E8099 for <sam@irtf.org>; Tue, 16 Aug 2011 08:08:20 -0700 (PDT)
Received: from dehawshub02.mailcluster.haw-hamburg.de ([141.22.200.52]) by mail3.is.haw-hamburg.de with ESMTP/TLS/RC4-MD5; 16 Aug 2011 17:09:05 +0200
Received: from dehawscas04.mailcluster.haw-hamburg.de (141.22.200.54) by DEHAWSHUB02.mailcluster.haw-hamburg.de (141.22.200.52) with Microsoft SMTP Server (TLS) id 8.1.358.0; Tue, 16 Aug 2011 17:09:05 +0200
Received: from [141.22.27.146] (141.22.200.35) by haw-mailer.haw-hamburg.de (141.22.200.80) with Microsoft SMTP Server id 8.1.358.0; Tue, 16 Aug 2011 17:09:05 +0200
From: Sebastian Meiling <sebastian.meiling@haw-hamburg.de>
To: <sam@irtf.org>
In-Reply-To: <1308156203.2126.198.camel@prometheus>
References: <1308156203.2126.198.camel@prometheus>
Content-Type: text/plain; charset="UTF-8"
Organization: HAW Hamburg - Dept. Informatik - iNET
Date: Tue, 16 Aug 2011 17:09:04 +0200
Message-ID: <1313507344.1857.487.camel@prometheus>
MIME-Version: 1.0
X-Mailer: Evolution 2.30.3 
Content-Transfer-Encoding: 8bit
Subject: Re: [SAM] HAMcast Prototype Release ***NEW***
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: sebastian.meiling@haw-hamburg.de
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Aug 2011 15:08:21 -0000

Hi again,

I would like to announce to you a NEW release of our HAMcast prototype.
We presented results of our middleware performance evaluation at IETF-81
(Quebec, CA) and also presented a demo at EuroView 2011 (Würzburg, GER).

The prototype package extends/updates previous releases and now contains
several new features, i.e. overlay multicast (Scribe), a major code
revision of IP modul including service discovery and advanced software
examples demonstrating usage of the common multicast API. 

Feel free to download our prototype release at:

                        http://www.realmv6.org/hamcast_dev_downloads.html
                        
Further information can be found on our project website and developers
pages on: 
                        http://hamcast.realmv6.org
                        
Regards,
  Sebastian

Am Mittwoch, den 15.06.2011, 18:43 +0200 schrieb Sebastian Meiling: 
> Hi all,
> 
> after a period of intensive work and preparations, we are happy to
> announce the first prototype release of the HAMcast architecture. 
> 
> Our software prototype provides a universal multicast service through a
> common multicast API (as specified by draft-irtf-samrg-common-api) and a
> system-centric middleware for endsystems. 
> 
> The prototype is under constant development by the INET group, HAW
> Hamburg, Germany (see http://www.haw-hamburg.de/inet ). You can download
> the software release from our developers website:
> 
>         http://www.realmv6.org/hamcast_dev_downloads.html
> 
> More information and documentation can be found on the website(s) and
> included in the download package. For a start, have a look at the
> example programs and doxygen API documentation within the release.
> 
> Comments and feedback from tests with the HAMcast prototype release are
> very welcome.
> 
> Regards,
>   Sebastian
> 

-- 
Sebastian Meiling
+---------------------------------------+
 iNET group - Department Informatik
 Hamburg University of Applied Sciences
 Berliner Tor 7, 20099 Hamburg, Germany
+---------------------------------------+
 Mail: sebastian.meiling@haw-hamburg.de
  Fon: +49 40 42875 - 8067
  Fax: +49 40 42875 - 8409
  Web: http://www.haw-hamburg.de/inet
+---------------------------------------+


From p2p.nve.2011@gmail.com  Tue Aug 16 23:59:29 2011
Return-Path: <p2p.nve.2011@gmail.com>
X-Original-To: sam@ietfa.amsl.com
Delivered-To: sam@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 17E3211E80A7 for <sam@ietfa.amsl.com>; Tue, 16 Aug 2011 23:59:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.508
X-Spam-Level: 
X-Spam-Status: No, score=-0.508 tagged_above=-999 required=5 tests=[AWL=0.561,  BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-1, SARE_SUB_ENC_UTF8=0.152, SUBJ_ALL_CAPS=2.077]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5hF8Lwxuqaks for <sam@ietfa.amsl.com>; Tue, 16 Aug 2011 23:59:28 -0700 (PDT)
Received: from mail-pz0-f42.google.com (mail-pz0-f42.google.com [209.85.210.42]) by ietfa.amsl.com (Postfix) with ESMTP id BC40211E809C for <sam@irtf.org>; Tue, 16 Aug 2011 23:59:25 -0700 (PDT)
Received: by pzk37 with SMTP id 37so943314pzk.15 for <sam@irtf.org>; Wed, 17 Aug 2011 00:00:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; bh=NMrfhnUWX6pTgRJ5uly4+tu/wRDqqzcWy4ECtSu2qcE=; b=J3gbFhaGai/jG+DnJq2lHbr1ICVSwk8Fij/omhOaDdou5OF48/iPreUgucsbsIdWpY PiNKT2OD8Ry9JMsw7ph513rXtGxDo3IgafX0BQi5c5JnNsv4iH9OAv78YQOCXQG5QNsA MKjkm2/d7+hmrYU0DviRmbl4Or9gu3tz1g/ko=
MIME-Version: 1.0
Received: by 10.142.14.12 with SMTP id 12mr344967wfn.90.1313564415919; Wed, 17 Aug 2011 00:00:15 -0700 (PDT)
Received: by 10.143.63.5 with HTTP; Wed, 17 Aug 2011 00:00:15 -0700 (PDT)
Date: Wed, 17 Aug 2011 15:00:15 +0800
Message-ID: <CAAR-XbY-_PZDSo8RzJw_cpfjcY-+duUzpDoCPQJ9WUQ+B5nmhQ@mail.gmail.com>
From: 2011 p2pnve <p2p.nve.2011@gmail.com>
To: tccc@lists.cs.columbia.edu, p2p@ogf.org, ppsp@ietf.org, p2psip@ietf.org,  sam@irtf.org
Content-Type: multipart/alternative; boundary=000e0cd20d6666868b04aaae0c4b
Subject: [SAM] =?utf-8?b?W0NGUF1bUDJQTuKAi1ZFIDIwMTFdW0RFQUTigItMSU5FIEVY?= =?utf-8?q?TENSION=3A_AUGUST_20=2C_2011=5D_THE_5TH_INTERNATIO?= =?utf-8?q?=E2=80=8BNAL_WORKSHOP_ON_PEER-TO-PE=E2=80=8BER_NETWORKED?= =?utf-8?q?_VIRTUAL_ENVIRONMEN=E2=80=8BTS?=
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Aug 2011 06:59:29 -0000

--000e0cd20d6666868b04aaae0c4b
Content-Type: text/plain; charset=ISO-8859-1

[Apologies if you receive multiple copies of this message]



* Deadline extended to August 25, 2011 *



CALL FOR PAPERS

========================================================================
The 5th International Workshop on Peer-to-Peer Networked Virtual
Environments (P2P-NVE 2011)

in conjunction with

The 17th International Conference on Parallel and Distributed Systems
(ICPADS 2011)

December 7-9, 2011
Tainan, Taiwan

http://acnlab.csie.ncu.edu.tw/P2PNVE2011/
========================================================================
PURPOSE AND SCOPE

Peer-to-peer (P2P) is a computing paradigm based on self-organizing network
overlays, in which participating entities play symmetric roles as both
servers and clients for accomplish common goals. Compared with the
traditional client/server (C/S) paradigm, the P2P paradigm is not vulnerable
to a single point of failure and has better scalability and lower
installation and management cost. It has been successfully applied to many
applications, such as data sharing, storage sharing, bandwidth sharing,
collaborative computation, and so on. Many research studies have been
devoted to developing efficient, flexible, and secure P2P systems. They call
for a workshop to provide a forum for researchers to exchange their ideas
about state-of-the-art P2P technologies. Recently, some studies try to apply
the P2P paradigm to network virtual environments (NVEs), which is also known
as distributed virtual environment (DVEs) or collaborative virtual
environment (CVEs), to increase NVE scalability and to reduce NVE management
and deployment costs. An NVE is a computer-generated virtual world where
multiple users can assume virtual representatives (or avatars) to
concurrently interact with each other via networked links. Examples of NVEs
include early DARPA SIMNET and DIS systems as well as currently booming
Massively Multiplayer Online Games (MMOGs). Typical examples of studies on
P2P NVEs are P2P voice chatting, P2P 3D streaming, P2P game state
management, and so on. In spite of the success of the studies, we need more
studies about state consistency control, persistent data storage, multimedia
data dissemination, cheat-prevention, topology mismatching, and virtual
world interoperability to construct NVEs of better performance.

The 1st, 2nd, 3rd and 4th International Workshop on Peer-to-Peer Networked
Virtual Environments were held in conjunction with the 13th, 14th, 15th and
16th International Conference on Parallel and Distributed Systems in 2007,
2008, 2009, and 2010 respectively. To adhere to the theme of P2P-NVE
workshops, the theme of P2P-NVE 2011 is to solicit original and previously
unpublished new ideas on general P2P schemes as well as on the design and
realization of P2P NVEs. The workshop aims to facilitate discussions and
idea exchanges by both academics and practitioners. Authors are invited to
submit an electronic version of original, unpublished manuscripts, not to
exceed 8 double-columned, single-spaced pages, to the workshop. Submitted
papers should be in accordance with IEEE Computer Society guidelines, and
will be refereed by reviewers in terms of relevance, originality,
contribution, correctness, and presentation. All Accepted papers will be
published by IEEE Press (indexed by EI) and will be included in IEEE Xplore.


Topics of interest include, but are not limited to:


* P2P systems and infrastructures
* Applications of P2P systems
* Performance evaluation of P2P systems
* Trust and security issues in P2P systems
* Network support for P2P systems
* Fault tolerance in P2P systems
* Data structures for P2P systems
* Efficient P2P resource lookup and sharing
* Distributed Hash Tables (DHTs) and related issues
* Solutions to topology mismatching for P2P overlays
* P2P overlays for NVEs
* P2P NVE multicast
* P2P NVE interoperability
* P2P NVE content distribution
* P2P NVE 3D streaming
* P2P NVE voice communications
* P2P NVE architecture designs
* P2P NVE prototypes
* P2P NVE consistency control
* Persistent storage for P2P NVEs
* Security and cheat-prevention mechanisms for P2P games
* P2P control for mobile NVEs
* P2P NVE applications on mobile devices

==========================================
IMPORTANT DATES

Submission: August 25, 2011
Notification: September 25, 2011
Camera ready: October 7, 2011
===========================================

PAPER SUBMISSION

Authors are invited to submit an electronic version of original, unpublished
manuscripts, not to exceed 8 double-columned, single-spaced pages, to the
workshop. Submitted papers should be in PDF format in accordance with IEEE
Computer Society guidelines, and will be refereed by reviewers in terms of
originality, contribution, correctness, and presentation.

--000e0cd20d6666868b04aaae0c4b
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div class=3D"ecxMsoPlainText"><span lang=3D"EN-US"><p class=3D"ecxMsoPlain=
Text"><span lang=3D"EN-US">[Apologies if you receive multiple copies of thi=
s message]</span></p><p class=3D"ecxMsoPlainText"><span lang=3D"EN-US"></sp=
an>=A0</p><p class=3D"ecxMsoPlainText">
<span lang=3D"EN-US">* Deadline extended to August 25, 2011 *</span></p></s=
pan></div><div class=3D"ecxMsoPlainText"><span lang=3D"EN-US"></span>=A0</d=
iv><div class=3D"ecxMsoPlainText"><span lang=3D"EN-US"></span>=A0</div><div=
 class=3D"ecxMsoPlainText">
<span lang=3D"EN-US"></span>=A0</div><div class=3D"ecxMsoPlainText"><span l=
ang=3D"EN-US">CALL FOR PAPERS</span></div><p style=3D"margin-bottom: 12pt;"=
 class=3D"ecxMsoNormal"><span lang=3D"EN-US">=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>
The 5th International Workshop on Peer-to-Peer Networked Virtual Environmen=
ts (P2P-NVE 2011)<br><br>in conjunction with<br><br>The 17th International =
Conference on Parallel and Distributed Systems (ICPADS 2011)<br><br>Decembe=
r 7-9, 2011<br>
Tainan, Taiwan<br><br><a href=3D"http://acnlab.csie.ncu.edu.tw/P2PNVE2011/"=
 target=3D"_blank">http://acnlab.csie.ncu.edu.tw/P2PNVE2011/</a><br>=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>PURPOSE AND=
 SCOPE<br>
<br>Peer-to-peer (P2P) is a computing paradigm based on self-organizing net=
work overlays, in which participating entities play symmetric roles as both=
 servers and clients for accomplish common goals. Compared with the traditi=
onal client/server (C/S) paradigm, the P2P paradigm is not vulnerable to a =
single point of failure and has better scalability and lower installation a=
nd management cost. It has been successfully applied to many applications, =
such as data sharing, storage sharing, bandwidth sharing, collaborative com=
putation, and so on. Many research studies have been devoted to developing =
efficient, flexible, and secure P2P systems. They call for a workshop to pr=
ovide a forum for researchers to exchange their ideas about state-of-the-ar=
t P2P technologies. Recently, some studies try to apply the P2P paradigm to=
 network virtual environments (NVEs), which is also known as distributed vi=
rtual environment (DVEs) or collaborative virtual environment (CVEs), to in=
crease NVE scalability and to reduce NVE management and deployment costs. A=
n NVE is a computer-generated virtual world where multiple users can assume=
 virtual representatives (or avatars) to concurrently interact with each ot=
her via networked links. Examples of NVEs include early DARPA SIMNET and DI=
S systems as well as currently booming Massively Multiplayer Online Games (=
MMOGs). Typical examples of studies on P2P NVEs are P2P voice chatting, P2P=
 3D streaming, P2P game state management, and so on. In spite of the succes=
s of the studies, we need more studies about state consistency control, per=
sistent data storage, multimedia data dissemination, cheat-prevention, topo=
logy mismatching, and virtual world interoperability to construct NVEs of b=
etter performance.<br>
<br>The 1st, 2nd, 3rd and 4th International Workshop on Peer-to-Peer Networ=
ked Virtual Environments were held in conjunction with the 13th, 14th, 15th=
 and 16th International Conference on Parallel and Distributed Systems in 2=
007, 2008, 2009, and 2010 respectively. To adhere to the theme of P2P-NVE w=
orkshops, the theme of P2P-NVE 2011 is to solicit original and previously u=
npublished new ideas on general P2P schemes as well as on the design and re=
alization of P2P NVEs. The workshop aims to facilitate discussions and idea=
 exchanges by both academics and practitioners. Authors are invited to subm=
it an electronic version of original, unpublished manuscripts, not to excee=
d 8 double-columned, single-spaced pages, to the workshop. Submitted papers=
 should be in accordance with IEEE Computer Society guidelines, and will be=
 refereed by reviewers in terms of relevance, originality, contribution, co=
rrectness, and presentation. All Accepted papers will be published by IEEE =
Press (indexed by EI) and will be included in IEEE Xplore.<br>
<br><br>Topics of interest include, but are not limited to:<br><br><br>*   =
P2P systems and infrastructures<br>*   Applications of P2P systems<br>*   P=
erformance evaluation of P2P systems<br>*   Trust and security issues in P2=
P systems<br>
*   Network support for P2P systems<br>*   Fault tolerance in P2P systems<b=
r>*   Data structures for P2P systems<br>*   Efficient P2P resource lookup =
and sharing<br>*   Distributed Hash Tables (DHTs) and related issues<br>
*   Solutions to topology mismatching for P2P overlays<br>*   P2P overlays =
for NVEs<br>*   P2P NVE multicast<br>*   P2P NVE interoperability<br>*   P2=
P NVE content distribution<br>*   P2P NVE 3D streaming<br>*   P2P NVE voice=
 communications<br>
*   P2P NVE architecture designs<br>*   P2P NVE prototypes<br>*   P2P NVE c=
onsistency control<br>*   Persistent storage for P2P NVEs<br>*   Security a=
nd cheat-prevention mechanisms for P2P games<br>*   P2P control for mobile =
NVEs<br>
*   P2P NVE applications on mobile devices<br><br>=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>IMPORTANT DATES<br><br>Submission:          =
   <span style=3D"color: rgb(31, 73, 125);">  </span>August 2<span style=3D=
"color: rgb(31, 73, 125);">5</span>, 2011<br>
Notification:           <span style=3D"color: rgb(31, 73, 125);">   </span>=
September 25, 2011<br>Camera ready:           October 7, 2011<br>=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br><br>PAPER SUBMISSION<br><b=
r>Authors are invited to submit an electronic version of original, unpublis=
hed manuscripts, not to exceed 8 double-columned, single-spaced pages, to t=
he workshop. Submitted papers should be in PDF format in accordance with IE=
EE Computer Society guidelines, and will be refereed by reviewers in terms =
of originality, contribution, correctness, and presentation.<br>
</span></p>

--000e0cd20d6666868b04aaae0c4b--

From p2p.nve.2011@gmail.com  Mon Aug 22 07:35:50 2011
Return-Path: <p2p.nve.2011@gmail.com>
X-Original-To: sam@ietfa.amsl.com
Delivered-To: sam@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4EAD721F8B10 for <sam@ietfa.amsl.com>; Mon, 22 Aug 2011 07:35:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.109
X-Spam-Level: 
X-Spam-Status: No, score=-2.109 tagged_above=-999 required=5 tests=[BAYES_05=-1.11, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4yEspRCjVzHN for <sam@ietfa.amsl.com>; Mon, 22 Aug 2011 07:35:49 -0700 (PDT)
Received: from mail-gw0-f54.google.com (mail-gw0-f54.google.com [74.125.83.54]) by ietfa.amsl.com (Postfix) with ESMTP id 4B73021F8A62 for <sam@irtf.org>; Mon, 22 Aug 2011 07:35:46 -0700 (PDT)
Received: by gwb15 with SMTP id 15so3416628gwb.13 for <sam@irtf.org>; Mon, 22 Aug 2011 07:36:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; bh=4ety/GhcsbdX3XSi8wc625ym25NBXghXvxhq9D6eUG0=; b=ilaGpaSsOUU9Cp4LrNGWVG5lBDSOKeSC9AHGvrR4HMP5FON17pbn50rZHNzCsMPfbv nvnj10CWPGBDMTuSuDeaWn63mHwqV4wc5jM9HuVfj1EqUcnmvWPVqK8lSGMPQl4TEfNw anqfBVAtAftTEdPCWja6aVVIpMAs/m/PYzU8o=
MIME-Version: 1.0
Received: by 10.142.51.4 with SMTP id y4mr1642351wfy.107.1314023810349; Mon, 22 Aug 2011 07:36:50 -0700 (PDT)
Received: by 10.143.60.11 with HTTP; Mon, 22 Aug 2011 07:36:50 -0700 (PDT)
Date: Mon, 22 Aug 2011 22:36:50 +0800
Message-ID: <CAAR-XbY84pEeQ+z3-ZiwEaPWc5jCqFrBLt2hv5GOb0o6sdWFgA@mail.gmail.com>
From: 2011 p2pnve <p2p.nve.2011@gmail.com>
To: tccc@lists.cs.columbia.edu, p2p@ogf.org, p2psip@ietf.org, ppsp@ietf.org,  sam@irtf.org
Content-Type: multipart/alternative; boundary=000e0cd20d86713c7104ab1902f6
Subject: [SAM] [CFP] P2PNVE 2011 [Deadline extended to Aug. 30, 2011 (Firm Deadline)]
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Aug 2011 14:35:50 -0000

--000e0cd20d86713c7104ab1902f6
Content-Type: text/plain; charset=ISO-8859-1

[Apologies if you receive multiple copies of this message]



* Deadline extended to August 30, 2011 (Firm Deadline)*



CALL FOR PAPERS

========================================================================
The 5th International Workshop on Peer-to-Peer Networked Virtual
Environments (P2P-NVE 2011)

in conjunction with

The 17th International Conference on Parallel and Distributed Systems
(ICPADS 2011)

December 7-9, 2011
Tainan, Taiwan

http://acnlab.csie.ncu.edu.tw/P2PNVE2011/
========================================================================
PURPOSE AND SCOPE

Peer-to-peer (P2P) is a computing paradigm based on self-organizing network
overlays, in which participating entities play symmetric roles as both
servers and clients for accomplish common goals. Compared with the
traditional client/server (C/S) paradigm, the P2P paradigm is not vulnerable
to a single point of failure and has better scalability and lower
installation and management cost. It has been successfully applied to many
applications, such as data sharing, storage sharing, bandwidth sharing,
collaborative computation, and so on. Many research studies have been
devoted to developing efficient, flexible, and secure P2P systems. They call
for a workshop to provide a forum for researchers to exchange their ideas
about state-of-the-art P2P technologies. Recently, some studies try to apply
the P2P paradigm to network virtual environments (NVEs), which is also known
as distributed virtual environment (DVEs) or collaborative virtual
environment (CVEs), to increase NVE scalability and to reduce NVE management
and deployment costs. An NVE is a computer-generated virtual world where
multiple users can assume virtual representatives (or avatars) to
concurrently interact with each other via networked links. Examples of NVEs
include early DARPA SIMNET and DIS systems as well as currently booming
Massively Multiplayer Online Games (MMOGs). Typical examples of studies on
P2P NVEs are P2P voice chatting, P2P 3D streaming, P2P game state
management, and so on. In spite of the success of the studies, we need more
studies about state consistency control, persistent data storage, multimedia
data dissemination, cheat-prevention, topology mismatching, and virtual
world interoperability to construct NVEs of better performance.

The 1st, 2nd, 3rd and 4th International Workshop on Peer-to-Peer Networked
Virtual Environments were held in conjunction with the 13th, 14th, 15th and
16th International Conference on Parallel and Distributed Systems in 2007,
2008, 2009, and 2010 respectively. To adhere to the theme of P2P-NVE
workshops, the theme of P2P-NVE 2011 is to solicit original and previously
unpublished new ideas on general P2P schemes as well as on the design and
realization of P2P NVEs. The workshop aims to facilitate discussions and
idea exchanges by both academics and practitioners. Authors are invited to
submit an electronic version of original, unpublished manuscripts, not to
exceed 8 double-columned, single-spaced pages, to the workshop. Submitted
papers should be in accordance with IEEE Computer Society guidelines, and
will be refereed by reviewers in terms of relevance, originality,
contribution, correctness, and presentation. All Accepted papers will be
published by IEEE Press (indexed by EI) and will be included in IEEE Xplore.


Topics of interest include, but are not limited to:


*   P2P systems and infrastructures
*   Applications of P2P systems
*   Performance evaluation of P2P systems
*   Trust and security issues in P2P systems
*   Network support for P2P systems
*   Fault tolerance in P2P systems
*   Data structures for P2P systems
*   Efficient P2P resource lookup and sharing
*   Distributed Hash Tables (DHTs) and related issues
*   Solutions to topology mismatching for P2P overlays
*   P2P overlays for NVEs
*   P2P NVE multicast
*   P2P NVE interoperability
*   P2P NVE content distribution
*   P2P NVE 3D streaming
*   P2P NVE voice communications
*   P2P NVE architecture designs
*   P2P NVE prototypes
*   P2P NVE consistency control
*   Persistent storage for P2P NVEs
*   Security and cheat-prevention mechanisms for P2P games
*   P2P control for mobile NVEs
*   P2P NVE applications on mobile devices

==========================================
IMPORTANT DATES

Submission:               August 30, 2011 (Firm Deadline)
Notification:              September 25, 2011
Camera ready:           October 7, 2011
===========================================

PAPER SUBMISSION

Authors are invited to submit an electronic version of original, unpublished
manuscripts, not to exceed 8 double-columned, single-spaced pages, to the
workshop. Submitted papers should be in PDF format in accordance with IEEE
Computer Society guidelines, and will be refereed by reviewers in terms of
originality, contribution, correctness, and presentation.

--000e0cd20d86713c7104ab1902f6
Content-Type: text/html; charset=Big5
Content-Transfer-Encoding: quoted-printable

<span class=3D"Apple-style-span" style=3D"color: rgb(69, 69, 69); font-fami=
ly: Arial, =B2=D3=A9=FA=C5=E9, mingliu, sans-serif; font-size: 13px; line-h=
eight: 13px; background-color: rgb(255, 255, 255); "><p id=3D"yui_3_2_0_1_1=
3140222741962158" style=3D"margin-top: 0px; margin-right: 0cm; margin-botto=
m: 0px; margin-left: 0cm; padding-top: 0px; padding-right: 0px; padding-bot=
tom: 0px; padding-left: 0px; display: block; line-height: normal; font-size=
: 12pt; font-family: serif; ">
<span lang=3D"EN-US" id=3D"yui_3_2_0_1_13140222741962157">[Apologies if you=
 receive multiple copies of this message]</span></p><p style=3D"margin-top:=
 0px; margin-right: 0cm; margin-bottom: 0px; margin-left: 0cm; padding-top:=
 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; display: =
block; line-height: normal; font-size: 12pt; font-family: serif; ">
<span lang=3D"EN-US" style=3D"color: black; ">&nbsp;</span></p><p style=3D"=
margin-top: 0px; margin-right: 0cm; margin-bottom: 0px; margin-left: 0cm; p=
adding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px=
; display: block; line-height: normal; font-size: 12pt; font-family: serif;=
 ">
<span lang=3D"EN-US" style=3D"color: black; ">* Deadline extended to August=
 30, 2011 (Firm Deadline)*</span></p><p style=3D"margin-top: 0px; margin-ri=
ght: 0cm; margin-bottom: 0px; margin-left: 0cm; padding-top: 0px; padding-r=
ight: 0px; padding-bottom: 0px; padding-left: 0px; display: block; line-hei=
ght: normal; font-size: 12pt; font-family: serif; ">
<span lang=3D"EN-US">&nbsp;</span></p><p style=3D"margin-top: 0px; margin-r=
ight: 0cm; margin-bottom: 0px; margin-left: 0cm; padding-top: 0px; padding-=
right: 0px; padding-bottom: 0px; padding-left: 0px; display: block; line-he=
ight: normal; font-size: 12pt; font-family: serif; ">
<span lang=3D"EN-US">CALL FOR PAPERS</span></p><p class=3D"yiv1285383024Mso=
Normal" id=3D"yui_3_2_0_1_13140222741962167" style=3D"margin-top: 0px; marg=
in-right: 0cm; margin-bottom: 12pt; margin-left: 0cm; padding-top: 0px; pad=
ding-right: 0px; padding-bottom: 0px; padding-left: 0px; display: block; li=
ne-height: normal; font-size: 12pt; font-family: serif; ">
<span lang=3D"EN-US">=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D<br>The 5th International Workshop on Peer-to-Peer Networked Vi=
rtual Environments (P2P-NVE 2011)<br><br>in conjunction with<br><br>
The 17th International Conference on Parallel and Distributed Systems (ICPA=
DS 2011)<br><br>December 7-9, 2011<br>Tainan, Taiwan<br><br><a rel=3D"nofol=
low" target=3D"_blank" href=3D"http://acnlab.csie.ncu.edu.tw/P2PNVE2011/" s=
tyle=3D"text-decoration: underline; color: blue; outline-style: none; outli=
ne-width: initial; outline-color: initial; ">http://acnlab.csie.ncu.edu.tw/=
P2PNVE2011/</a><br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>PURPO=
SE AND SCOPE<br><br>Peer-to-peer (P2P) is a computing paradigm based on sel=
f-organizing network overlays, in which participating entities play symmetr=
ic roles as both servers and clients for accomplish common goals. Compared =
with the traditional client/server (C/S) paradigm, the P2P paradigm is not =
vulnerable to a single point of failure and has better scalability and lowe=
r installation and management cost. It has been successfully applied to man=
y applications, such as data sharing, storage sharing, bandwidth sharing, c=
ollaborative computation, and so on. Many research studies have been devote=
d to developing efficient, flexible, and secure P2P systems. They call for =
a workshop to provide a forum for researchers to exchange their ideas about=
 state-of-the-art P2P technologies. Recently, some studies try to apply the=
 P2P paradigm to network virtual environments (NVEs), which is also known a=
s distributed virtual environment (DVEs) or collaborative virtual environme=
nt (CVEs), to increase NVE scalability and to reduce NVE management and dep=
loyment costs. An NVE is a computer-generated virtual world where multiple =
users can assume virtual representatives (or avatars) to concurrently inter=
act with each other via networked links. Examples of NVEs include early DAR=
PA SIMNET and DIS systems as well as currently booming Massively Multiplaye=
r Online Games (MMOGs). Typical examples of studies on P2P NVEs are P2P voi=
ce chatting, P2P 3D streaming, P2P game state management, and so on. In spi=
te of the success of the studies, we need more studies about state consiste=
ncy control, persistent data storage, multimedia data dissemination, cheat-=
prevention, topology mismatching, and virtual world interoperability to con=
struct NVEs of better performance.<br>
<br>The 1st, 2nd, 3rd and 4th International Workshop on Peer-to-Peer Networ=
ked Virtual Environments were held in conjunction with the 13th, 14th, 15th=
 and 16th International Conference on Parallel and Distributed Systems in 2=
007, 2008, 2009, and 2010 respectively. To adhere to the theme of P2P-NVE w=
orkshops, the theme of P2P-NVE 2011 is to solicit original and previously u=
npublished new ideas on general P2P schemes as well as on the design and re=
alization of P2P NVEs. The workshop aims to facilitate discussions and idea=
 exchanges by both academics and practitioners. Authors are invited to subm=
it an electronic version of original, unpublished manuscripts, not to excee=
d 8 double-columned, single-spaced pages, to the workshop. Submitted papers=
 should be in accordance with IEEE Computer Society guidelines, and will be=
 refereed by reviewers in terms of relevance, originality, contribution, co=
rrectness, and presentation. All Accepted papers will be published by IEEE =
Press (indexed by EI) and will be included in IEEE Xplore.<br>
<br><br>Topics of interest include, but are not limited to:<br><br><br>* &n=
bsp; P2P systems and infrastructures<br>* &nbsp; Applications of P2P system=
s<br>* &nbsp; Performance evaluation of P2P systems<br>* &nbsp; Trust and s=
ecurity issues in P2P systems<br>
* &nbsp; Network support for P2P systems<br>* &nbsp; Fault tolerance in P2P=
 systems<br>* &nbsp; Data structures for P2P systems<br>* &nbsp; Efficient =
P2P resource lookup and sharing<br>* &nbsp; Distributed Hash Tables (DHTs) =
and related issues<br>
* &nbsp; Solutions to topology mismatching for P2P overlays<br>* &nbsp; P2P=
 overlays for NVEs<br>* &nbsp; P2P NVE multicast<br>* &nbsp; P2P NVE intero=
perability<br>* &nbsp; P2P NVE content distribution<br>* &nbsp; P2P NVE 3D =
streaming<br>* &nbsp; P2P NVE voice communications<br>
* &nbsp; P2P NVE architecture designs<br>* &nbsp; P2P NVE prototypes<br>* &=
nbsp; P2P NVE consistency control<br>* &nbsp; Persistent storage for P2P NV=
Es<br>* &nbsp; Security and cheat-prevention mechanisms for P2P games<br>* =
&nbsp; P2P control for mobile NVEs<br>
* &nbsp; P2P NVE applications on mobile devices<br><br>=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>IMPORTANT DATES<br><span style=3D"colo=
r: black; "><br>Submission: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp=
;&nbsp;August 30, 2011 (Firm Deadline)</span><br>Notification: &nbsp; &nbsp=
; &nbsp; &nbsp; &nbsp;&nbsp;<span style=3D"color: rgb(31, 73, 125); ">&nbsp=
;&nbsp;&nbsp;</span>September 25, 2011<br>
Camera ready: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; October 7, 2011<br>=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br><br>PAPER SUBMISSION<br=
><br>Authors are invited to submit an electronic version of original, unpub=
lished manuscripts, not to exceed 8 double-columned, single-spaced pages, t=
o the workshop. Submitted papers should be in PDF format in accordance with=
 IEEE Computer Society guidelines, and will be refereed by reviewers in ter=
ms of originality, contribution, correctness, and presentation.<br>
</span></p><p class=3D"yiv1285383024MsoNormal" id=3D"yui_3_2_0_1_1314022274=
1962167" style=3D"margin-top: 0px; margin-right: 0cm; margin-bottom: 12pt; =
margin-left: 0cm; padding-top: 0px; padding-right: 0px; padding-bottom: 0px=
; padding-left: 0px; display: block; line-height: normal; font-size: 12pt; =
font-family: serif; ">
<span lang=3D"EN-US"><br></span></p></span>

--000e0cd20d86713c7104ab1902f6--

From p2p.nve.2011@gmail.com  Sun Aug 28 08:05:01 2011
Return-Path: <p2p.nve.2011@gmail.com>
X-Original-To: sam@ietfa.amsl.com
Delivered-To: sam@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A681521F8B5B for <sam@ietfa.amsl.com>; Sun, 28 Aug 2011 08:05:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.369
X-Spam-Level: 
X-Spam-Status: No, score=-1.369 tagged_above=-999 required=5 tests=[AWL=0.740,  BAYES_05=-1.11, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9oeReGR9GMMB for <sam@ietfa.amsl.com>; Sun, 28 Aug 2011 08:05:00 -0700 (PDT)
Received: from mail-pz0-f42.google.com (mail-pz0-f42.google.com [209.85.210.42]) by ietfa.amsl.com (Postfix) with ESMTP id B448021F8B7C for <sam@irtf.org>; Sun, 28 Aug 2011 08:05:00 -0700 (PDT)
Received: by pzk37 with SMTP id 37so11971258pzk.15 for <sam@irtf.org>; Sun, 28 Aug 2011 08:06:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; bh=bbwjsiESM9XRoIzp/Jz1065WNvnpnudliWV8SrialBQ=; b=aErGJoYMKHB06lRxQTZ98sW2jIr3KlOZBimBNddHf5/Yf/77HnmsXWbc3iRbqmj+qY a3u56yVSUfZu7SJu6uPL7uIXRYAJGLbToV79ASfVCdfjFF76O8LqKWkDKrfS1WPaXWSO Ok9fbECmATPFcJBvCDxQ0zDkSB3vgdR/6DK0Y=
MIME-Version: 1.0
Received: by 10.142.233.15 with SMTP id f15mr764304wfh.335.1314543982247; Sun, 28 Aug 2011 08:06:22 -0700 (PDT)
Received: by 10.143.60.11 with HTTP; Sun, 28 Aug 2011 08:06:22 -0700 (PDT)
Date: Sun, 28 Aug 2011 23:06:22 +0800
Message-ID: <CAAR-XbZ8RP1OFwAeJiEHz9KZrRUXzMEzp5qdOSf+2y+xK=ZN_w@mail.gmail.com>
From: 2011 p2pnve <p2p.nve.2011@gmail.com>
To: tccc@lists.cs.columbia.edu, p2p@ogf.org, p2psip@ietf.org, ppsp@ietf.org,  sam@irtf.org
Content-Type: multipart/alternative; boundary=000e0cd23b9e1a7de704ab921f15
Subject: [SAM] [Last CFP] P2PNVE 2011 [Deadline extended to Aug. 30, 2011 (Firm Deadline)]
X-BeenThere: sam@irtf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "For use by members of the Scalable Adaptive Multicast \(SAM\) RG" <sam.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/sam>, <mailto:sam-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/sam>
List-Post: <mailto:sam@irtf.org>
List-Help: <mailto:sam-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/sam>, <mailto:sam-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Aug 2011 15:05:01 -0000

--000e0cd23b9e1a7de704ab921f15
Content-Type: text/plain; charset=ISO-8859-1

[Apologies if you receive multiple copies of this message]



* Deadline extended to August 30, 2011 (Firm Deadline)*



CALL FOR PAPERS

========================================================================
The 5th International Workshop on Peer-to-Peer Networked Virtual
Environments (P2P-NVE 2011)

in conjunction with

The 17th International Conference on Parallel and Distributed Systems
(ICPADS 2011)

December 7-9, 2011
Tainan, Taiwan

http://acnlab.csie.ncu.edu.tw/P2PNVE2011/
========================================================================
PURPOSE AND SCOPE

Peer-to-peer (P2P) is a computing paradigm based on self-organizing network
overlays, in which participating entities play symmetric roles as both
servers and clients for accomplish common goals. Compared with the
traditional client/server (C/S) paradigm, the P2P paradigm is not vulnerable
to a single point of failure and has better scalability and lower
installation and management cost. It has been successfully applied to many
applications, such as data sharing, storage sharing, bandwidth sharing,
collaborative computation, and so on. Many research studies have been
devoted to developing efficient, flexible, and secure P2P systems. They call
for a workshop to provide a forum for researchers to exchange their ideas
about state-of-the-art P2P technologies. Recently, some studies try to apply
the P2P paradigm to network virtual environments (NVEs), which is also known
as distributed virtual environment (DVEs) or collaborative virtual
environment (CVEs), to increase NVE scalability and to reduce NVE management
and deployment costs. An NVE is a computer-generated virtual world where
multiple users can assume virtual representatives (or avatars) to
concurrently interact with each other via networked links. Examples of NVEs
include early DARPA SIMNET and DIS systems as well as currently booming
Massively Multiplayer Online Games (MMOGs). Typical examples of studies on
P2P NVEs are P2P voice chatting, P2P 3D streaming, P2P game state
management, and so on. In spite of the success of the studies, we need more
studies about state consistency control, persistent data storage, multimedia
data dissemination, cheat-prevention, topology mismatching, and virtual
world interoperability to construct NVEs of better performance.

The 1st, 2nd, 3rd and 4th International Workshop on Peer-to-Peer Networked
Virtual Environments were held in conjunction with the 13th, 14th, 15th and
16th International Conference on Parallel and Distributed Systems in 2007,
2008, 2009, and 2010 respectively. To adhere to the theme of P2P-NVE
workshops, the theme of P2P-NVE 2011 is to solicit original and previously
unpublished new ideas on general P2P schemes as well as on the design and
realization of P2P NVEs. The workshop aims to facilitate discussions and
idea exchanges by both academics and practitioners. Authors are invited to
submit an electronic version of original, unpublished manuscripts, not to
exceed 8 double-columned, single-spaced pages, to the workshop. Submitted
papers should be in accordance with IEEE Computer Society guidelines, and
will be refereed by reviewers in terms of relevance, originality,
contribution, correctness, and presentation. All Accepted papers will be
published by IEEE Press (indexed by EI) and will be included in IEEE Xplore.


Topics of interest include, but are not limited to:


*   P2P systems and infrastructures
*   Applications of P2P systems
*   Performance evaluation of P2P systems
*   Trust and security issues in P2P systems
*   Network support for P2P systems
*   Fault tolerance in P2P systems
*   Data structures for P2P systems
*   Efficient P2P resource lookup and sharing
*   Distributed Hash Tables (DHTs) and related issues
*   Solutions to topology mismatching for P2P overlays
*   P2P overlays for NVEs
*   P2P NVE multicast
*   P2P NVE interoperability
*   P2P NVE content distribution
*   P2P NVE 3D streaming
*   P2P NVE voice communications
*   P2P NVE architecture designs
*   P2P NVE prototypes
*   P2P NVE consistency control
*   Persistent storage for P2P NVEs
*   Security and cheat-prevention mechanisms for P2P games
*   P2P control for mobile NVEs
*   P2P NVE applications on mobile devices

==========================================
IMPORTANT DATES

Submission:               August 30, 2011 (Firm Deadline)
Notification:              September 25, 2011
Camera ready:           October 7, 2011
===========================================

PAPER SUBMISSION

Authors are invited to submit an electronic version of original, unpublished
manuscripts, not to exceed 8 double-columned, single-spaced pages, to the
workshop. Submitted papers should be in PDF format in accordance with IEEE
Computer Society guidelines, and will be refereed by reviewers in terms of
originality, contribution, correctness, and presentation.

--000e0cd23b9e1a7de704ab921f15
Content-Type: text/html; charset=Big5
Content-Transfer-Encoding: quoted-printable

<span class=3D"Apple-style-span" style=3D"color: rgb(69, 69, 69); font-fami=
ly: Arial, =B2=D3=A9=FA=C5=E9, mingliu, sans-serif; font-size: 13px; line-h=
eight: 13px; "><div id=3D"yui_3_2_0_5_1314543587530191"><div><p class=3D"yi=
v1460190139MsoNormal" style=3D"margin-top: 0cm; margin-right: 0cm; margin-b=
ottom: 0.0001pt; margin-left: 0cm; padding-top: 0px; padding-right: 0px; pa=
dding-bottom: 0px; padding-left: 0px; display: block; line-height: normal; =
font-size: 12pt; font-family: serif; background-image: initial; background-=
attachment: initial; background-origin: initial; background-clip: initial; =
background-color: white; background-position: initial initial; background-r=
epeat: initial initial; ">
<span lang=3D"EN-US" style=3D"font-family: serif; color: black; ">[Apologie=
s if you receive multiple copies of this message]</span></p></div><div><p c=
lass=3D"yiv1460190139MsoNormal" style=3D"margin-top: 0cm; margin-right: 0cm=
; margin-bottom: 0.0001pt; margin-left: 0cm; padding-top: 0px; padding-righ=
t: 0px; padding-bottom: 0px; padding-left: 0px; display: block; line-height=
: normal; font-size: 12pt; font-family: serif; background-image: initial; b=
ackground-attachment: initial; background-origin: initial; background-clip:=
 initial; background-color: white; background-position: initial initial; ba=
ckground-repeat: initial initial; ">
<span lang=3D"EN-US" style=3D"font-family: serif; color: black; ">&nbsp;</s=
pan></p></div><div><p class=3D"yiv1460190139MsoNormal" style=3D"margin-top:=
 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; padding=
-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; disp=
lay: block; line-height: normal; font-size: 12pt; font-family: serif; backg=
round-image: initial; background-attachment: initial; background-origin: in=
itial; background-clip: initial; background-color: white; background-positi=
on: initial initial; background-repeat: initial initial; ">
<span lang=3D"EN-US" style=3D"font-family: serif; color: black; ">* Deadlin=
e extended to August 30, 2011 (Firm Deadline)*</span></p></div><div id=3D"y=
ui_3_2_0_5_1314543587530276"><p class=3D"yiv1460190139MsoNormal" id=3D"yui_=
3_2_0_5_1314543587530275" style=3D"margin-top: 0cm; margin-right: 0cm; marg=
in-bottom: 0.0001pt; margin-left: 0cm; padding-top: 0px; padding-right: 0px=
; padding-bottom: 0px; padding-left: 0px; display: block; line-height: norm=
al; font-size: 12pt; font-family: serif; background-image: initial; backgro=
und-attachment: initial; background-origin: initial; background-clip: initi=
al; background-color: white; background-position: initial initial; backgrou=
nd-repeat: initial initial; ">
<span lang=3D"EN-US" style=3D"font-family: serif; color: black; ">&nbsp;</s=
pan></p></div><div><p class=3D"yiv1460190139MsoNormal" style=3D"margin-top:=
 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; padding=
-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; disp=
lay: block; line-height: normal; font-size: 12pt; font-family: serif; backg=
round-image: initial; background-attachment: initial; background-origin: in=
itial; background-clip: initial; background-color: white; background-positi=
on: initial initial; background-repeat: initial initial; ">
<span lang=3D"EN-US" style=3D"font-family: serif; color: black; ">CALL FOR =
PAPERS</span></p></div><div id=3D"yui_3_2_0_5_1314543587530188" style=3D"ma=
rgin-bottom: 12pt; "><p class=3D"yiv1460190139MsoNormal" id=3D"yui_3_2_0_5_=
1314543587530185" style=3D"margin-top: 0cm; margin-right: 0cm; margin-botto=
m: 0.0001pt; margin-left: 0cm; padding-top: 0px; padding-right: 0px; paddin=
g-bottom: 0px; padding-left: 0px; display: block; line-height: normal; font=
-size: 12pt; font-family: serif; background-image: initial; background-atta=
chment: initial; background-origin: initial; background-clip: initial; back=
ground-color: white; background-position: initial initial; background-repea=
t: initial initial; ">
<span lang=3D"EN-US" style=3D"font-family: serif; color: black; ">=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>The 5th Intern=
ational Workshop on Peer-to-Peer Networked Virtual Environments (P2P-NVE 20=
11)<br>
<br>in conjunction with<br><br>The 17th International Conference on Paralle=
l and Distributed Systems (ICPADS 2011)<br><br>December 7-9, 2011<br>Tainan=
, Taiwan<br><br><a rel=3D"nofollow" target=3D"_blank" href=3D"http://acnlab=
.csie.ncu.edu.tw/P2PNVE2011/" style=3D"text-decoration: underline; color: b=
lue; outline-style: none; outline-width: initial; outline-color: initial; "=
>http://acnlab.csie.ncu.edu.tw/P2PNVE2011/</a><br>
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>PURPO=
SE AND SCOPE<br><br>Peer-to-peer (P2P) is a computing paradigm based on sel=
f-organizing network overlays, in which participating entities play symmetr=
ic roles as both servers and clients for accomplish common goals. Compared =
with the traditional client/server (C/S) paradigm, the P2P paradigm is not =
vulnerable to a single point of failure and has better scalability and lowe=
r installation and management cost. It has been successfully applied to man=
y applications, such as data sharing, storage sharing, bandwidth sharing, c=
ollaborative computation, and so on. Many research studies have been devote=
d to developing efficient, flexible, and secure P2P systems. They call for =
a workshop to provide a forum for researchers to exchange their ideas about=
 state-of-the-art P2P technologies. Recently, some studies try to apply the=
 P2P paradigm to network virtual environments (NVEs), which is also known a=
s distributed virtual environment (DVEs) or collaborative virtual environme=
nt (CVEs), to increase NVE scalability and to reduce NVE management and dep=
loyment costs. An NVE is a computer-generated virtual world where multiple =
users can assume virtual representatives (or avatars) to concurrently inter=
act with each other via networked links. Examples of NVEs include early DAR=
PA SIMNET and DIS systems as well as currently booming Massively Multiplaye=
r Online Games (MMOGs). Typical examples of studies on P2P NVEs are P2P voi=
ce chatting, P2P 3D streaming, P2P game state management, and so on. In spi=
te of the success of the studies, we need more studies about state consiste=
ncy control, persistent data storage, multimedia data dissemination, cheat-=
prevention, topology mismatching, and virtual world interoperability to con=
struct NVEs of better performance.<br>
<br>The 1st, 2nd, 3rd and 4th International Workshop on Peer-to-Peer Networ=
ked Virtual Environments were held in conjunction with the 13th, 14th, 15th=
 and 16th International Conference on Parallel and Distributed Systems in 2=
007, 2008, 2009, and 2010 respectively. To adhere to the theme of P2P-NVE w=
orkshops, the theme of P2P-NVE 2011 is to solicit original and previously u=
npublished new ideas on general P2P schemes as well as on the design and re=
alization of P2P NVEs. The workshop aims to facilitate discussions and idea=
 exchanges by both academics and practitioners. Authors are invited to subm=
it an electronic version of original, unpublished manuscripts, not to excee=
d 8 double-columned, single-spaced pages, to the workshop. Submitted papers=
 should be in accordance with IEEE Computer Society guidelines, and will be=
 refereed by reviewers in terms of relevance, originality, contribution, co=
rrectness, and presentation. All Accepted papers will be published by IEEE =
Press (indexed by EI) and will be included in IEEE Xplore.<br>
<br><br>Topics of interest include, but are not limited to:<br><br><br>* &n=
bsp; P2P systems and infrastructures<br>* &nbsp; Applications of P2P system=
s<br>* &nbsp; Performance evaluation of P2P systems<br>* &nbsp; Trust and s=
ecurity issues in P2P systems<br>
* &nbsp; Network support for P2P systems<br>* &nbsp; Fault tolerance in P2P=
 systems<br>* &nbsp; Data structures for P2P systems<br>* &nbsp; Efficient =
P2P resource lookup and sharing<br>* &nbsp; Distributed Hash Tables (DHTs) =
and related issues<br>
* &nbsp; Solutions to topology mismatching for P2P overlays<br>* &nbsp; P2P=
 overlays for NVEs<br>* &nbsp; P2P NVE multicast<br>* &nbsp; P2P NVE intero=
perability<br>* &nbsp; P2P NVE content distribution<br>* &nbsp; P2P NVE 3D =
streaming<br>* &nbsp; P2P NVE voice communications<br>
* &nbsp; P2P NVE architecture designs<br>* &nbsp; P2P NVE prototypes<br>* &=
nbsp; P2P NVE consistency control<br>* &nbsp; Persistent storage for P2P NV=
Es<br>* &nbsp; Security and cheat-prevention mechanisms for P2P games<br>* =
&nbsp; P2P control for mobile NVEs<br>
* &nbsp; P2P NVE applications on mobile devices<br><br>=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br>IMPORTANT DATES<br><br>Submission: &nb=
sp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;August 30, 2011 (Firm De=
adline)<br>Notification: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</span><sp=
an lang=3D"EN-US" style=3D"font-family: serif; color: rgb(31, 73, 125); ">&=
nbsp;&nbsp;&nbsp;</span><span lang=3D"EN-US" id=3D"yui_3_2_0_5_131454358753=
0182" style=3D"font-family: serif; color: black; ">September 25, 2011<br>
Camera ready: &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; October 7, 2011<br>=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D<br><br>PAPER SUBMISSION<br=
><br>Authors are invited to submit an electronic version of original, unpub=
lished manuscripts, not to exceed 8 double-columned, single-spaced pages, t=
o the workshop. Submitted papers should be in PDF format in accordance with=
 IEEE Computer Society guidelines, and will be refereed by reviewers in ter=
ms of originality, contribution, correctness, and presentation.</span></p>
</div></div><div><p class=3D"yiv1460190139MsoNormal" style=3D"margin-top: 0=
cm; margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; padding-t=
op: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; displa=
y: block; line-height: normal; font-size: 12pt; font-family: serif; backgro=
und-image: initial; background-attachment: initial; background-origin: init=
ial; background-clip: initial; background-color: white; background-position=
: initial initial; background-repeat: initial initial; ">
<span lang=3D"EN-US" style=3D"font-family: serif; color: black; ">&nbsp;</s=
pan></p></div></span>

--000e0cd23b9e1a7de704ab921f15--
