
From nobody Thu Sep  3 05:03:36 2015
Return-Path: <giovane.moura@sidn.nl>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B0231B2D2F for <nmrg@ietfa.amsl.com>; Thu,  3 Sep 2015 05:03:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.784
X-Spam-Level: **
X-Spam-Status: No, score=2.784 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HELO_EQ_NL=0.55, HOST_EQ_NL=1.545, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mql0nvpxp3js for <nmrg@ietfa.amsl.com>; Thu,  3 Sep 2015 05:03:33 -0700 (PDT)
Received: from arn2-kamx.sidn.nl (kamx.sidn.nl [IPv6:2a00:d78:0:147:94:198:152:69]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8C2C01B2AB6 for <nmrg@irtf.org>; Thu,  3 Sep 2015 05:03:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; d=sidn.nl; s=sidn-nl; c=relaxed/relaxed;  h=message-id:date:from:user-agent:mime-version:to:subject:content-type:content-transfer-encoding:x-originating-ip; bh=1KbAlRnmKijREbVIaYV3nlBk5B6SWUrVHYGmaHXxuZg=; b=jXBL/ZQjR/DjcKGPUZjrpNAzEGilds+12cWnG792ZrkUFEWR8sdKMF6c/Lj7CtZAt4qf+gNLALzED9D3k8rkvlJJ7Y9lKIbc5Bf+q9vNEdhFDreFFy0OP18lhDxucyKOLToGYUcuXQZ6S0LIHR/imk8zNfjewArDGoAyr04d7Uw60T4cj5yq3W9J8HknlbBjgsrdm2gW7CJOYCRPDCoRCLdw7Pmdr5ttc2eJHEQwPZHVIKkfDFOpZy6XAhZ5oogqBztKSXVM3zXvOeMYbaP4ycM4wLucd3vrRvfEXEeZDnSUDnHPk3HHiFzwa5CBPdoLsgdt0JaghJV1RK0gMxovFg==
Received: from ka-mbx03.SIDN.local ([192.168.2.179]) by arn2-kamx.sidn.nl  with ESMTP id t83C3TAJ014632-t83C3TAL014632 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=CAFAIL) for <nmrg@irtf.org>; Thu, 3 Sep 2015 14:03:30 +0200
Received: from KAHUBCASN02.SIDN.local (192.168.2.76) by ka-mbx03.SIDN.local (192.168.2.179) with Microsoft SMTP Server (TLS) id 15.0.1076.9; Thu, 3 Sep 2015 14:03:32 +0200
Received: from [94.198.159.133] (94.198.152.216) by kahubcasn02.SIDN.local (192.168.2.77) with Microsoft SMTP Server (TLS) id 14.3.224.2; Thu, 3 Sep 2015 14:03:31 +0200
Message-ID: <55E836E7.2080202@sidn.nl>
Date: Thu, 3 Sep 2015 14:02:47 +0200
From: "Giovane C. M. Moura" <giovane.moura@sidn.nl>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Icedove/31.8.0
MIME-Version: 1.0
To: <nmrg@irtf.org>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
X-Originating-IP: [94.198.152.216]
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/qHgqeCOa4T2GsTFIv_4rdcLb9Uk>
Subject: [nmrg] Open Aggregated Datasets and stats on DNS (.NL ccTLD)
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Sep 2015 12:03:35 -0000

[We apologize for multiple copies.]

*************************************************************
OPEN AGGREGATED DATASETS AND STATS ON DNS (.NL ccTLD)
https://stats.sidnlabs.nl/
*************************************************************

SIDN Labs[1] is happy to announce our new stats and open aggregated
datasets to the Internet/DNS community. It provides:

   *  Visualizations of the DNS traffic for .nl, which is the
country-code top-level domain (ccTLD) for the Netherlands. It also
contains stats on domain registrations, DNS queries, DNSSEC usage, plus
layer-3 and layer-4 information.
   * Longitudinal data: the data we provide are continuous and
longitudinal (starting from May 2014), and daily updated.
   * The respective datasets in JSON format.
   * URL: https://stats.sidnlabs.nl/

Currently, we only provide aggregated data and visualizations, which
means that we do not offer PCAP/Netflow datasets, similarly to the
former Internet2 Netflow Weekly report[2].

However, if you have a novel research idea that would improve the
security and stability of the Internet and would require our data, then
let us know so that we can consider sharing some of the underlying data
with you (subject to our privacy framework and EU and Dutch privacy laws
[3]). Mail us at sidnlabs@sidn.nl.


ABOUT SIDN AND SIDN LABS:

SIDN[1] manages .nl, the Internet's country-code domain for the
Netherlands. As the Dutch national domain name registry, we enable
Internet users all over the world to register.nl domain names and use
them safely.

We operate the .nl zone of the Domain Name System (DNS) and handle over
a billion DNS queries a day for the 5.5 million-plus registered .nl
domain names. More than 2.4 million of those domain names are secured
with DNSSEC, making .nl the largest secured Internet extension in the
world. We operate our own DNS anycast network to maximise the
availability of the .nl zone and we provide backend services for .aw
(Aruba, a Dutch overseas territory) and .amsterdam.

SIDN Labs[4] is SIDN's research and development team, which develops and
evaluates new technologies and systems with a view to further enhancing
the stability and security of .nl, the DNS and the wider Internet.

DATA DESCRIPTION

The data were obtained by analyzing the DNS traffic received on one of
our authoritative name servers for .nl. They represent approximately 10
per cent of the total traffic, or about 130 million queries per day.
Please note that most of the traffic comes from DNS resolvers, which are
typically located at ISPs/CDNs, and not from end users.

Data interpretation:

Please be aware that, due to DNS caching by the resolvers operated by
ISPs and CDNs, the data are actually a sample of all the .nl queries
generated by clients.

Data format:  The data are made available in JSON format.

Data processing: We use our Hadoop-based ENTRADA platform and our
Domain Registration System (DRS). ENTRADA[5] is an acronym for ENhanced
Top-level domain Resilience through Advanced Data Analysis. The goal of
the ENTRADA platform is to develop new applications and services with a
view to further increasing the security and stability of .nl, the DNS
and the wider internet. ENTRADA enables us to store all the DNS queries
received on our authoritative name servers. Automated analysis of the
stored data helps us to quickly detect threats and anomalies.

Privacy: The data and datasets provided here do not include any
personally identifiable information [3].

Usage/License: The data on this website are licensed under a Creative
Commons Attribution 4.0 International Licence.

Contact: Do you have any questions about this site or the statistics? If
so, mail us at sidnlabs@sidn.nl.

REFERENCES

[1] https://www.sidn.nl/
[2]
https://web.archive.org/web/20130724070129/http://netflow.internet2.edu/weekly/
[3]
https://www.sidnlabs.nl/uploads/tx_sidnpublications/SIDN_Labs_Privacyraamwerk_Position_Paper_V1.4_ENG.pdf
[4] https://sidnlabs.nl
[5]
https://www.sidnlabs.nl/uploads/tx_sidnpublications/NCSC-presentatie-BIG-data-pub.pdf


Giovane C. M. Moura, PhD. |Data Scientist|SIDN Labs
SIDN | Meander 501 | 6825 MD | Postbus 5022 | 6802 EA | ARNHEM
giovane.moura@sidn.nl | https://www.sidn.nl/


From nobody Fri Sep  4 01:28:52 2015
Return-Path: <ramin.sadre@uclouvain.be>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D3A111B2CF4 for <nmrg@ietfa.amsl.com>; Fri,  4 Sep 2015 01:28:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.402
X-Spam-Level: 
X-Spam-Status: No, score=-2.402 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3YxNHZv8gN4l for <nmrg@ietfa.amsl.com>; Fri,  4 Sep 2015 01:28:47 -0700 (PDT)
Received: from smtp5.sgsi.ucl.ac.be (smtp.sgsi.ucl.ac.be [130.104.5.67]) by ietfa.amsl.com (Postfix) with ESMTP id 4DE931B2CB4 for <nmrg@irtf.org>; Fri,  4 Sep 2015 01:28:47 -0700 (PDT)
Received: from [130.104.228.59] (ramin-THINK.dhcp.info.ucl.ac.be [130.104.228.59]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: sadre@smtp5.sgsi.ucl.ac.be) by smtp5.sgsi.ucl.ac.be (Postfix) with ESMTPSA id DED5A11E13F for <nmrg@irtf.org>; Fri,  4 Sep 2015 10:28:40 +0200 (CEST)
X-DKIM: Sendmail DKIM Filter v2.8.3 smtp5.sgsi.ucl.ac.be DED5A11E13F
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=uclouvain.be; s=selucl; t=1441355320; bh=Scq8U4Sye6xB+j4cYLfDffjB49i895xRXuGN4HOtcgU=; h=From:Subject:To:Message-ID:Date:MIME-Version:Content-Type: Content-Transfer-Encoding; b=mxNiyY9xRz5/sHf9M1Wms9wejwvVw9bcitA6dD7bWC4EHCKnBC452xtJ7hR8VK77z XZOSTv8zTsFNSWRiF1cE6drdi4ZF1V+2/ycSwyon+aKEmthz5uEBPoLbZeR5yJAToF yfRvIUaY4pBtgMYaucwF1YjYoDHG4r8GKLyPhkuw=
From: Ramin Sadre <ramin.sadre@uclouvain.be>
To: nmrg@irtf.org
X-Enigmail-Draft-Status: N1110
Message-ID: <55E9563A.20901@uclouvain.be>
Date: Fri, 4 Sep 2015 10:28:42 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
X-Virus-Scanned: clamav-milter 0.99-beta1 at smtp-5.sipr-dc.ucl.ac.be
X-Virus-Status: Clean
X-Sgsi-Spamcheck: SASL authenticated, 
X-SGSI-MailScanner-ID: DED5A11E13F.AD379
X-SGSI-MailScanner: Found to be clean
X-SGSI-From: ramin.sadre@uclouvain.be
X-SGSI-Spam-Status: No
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/vlff8rsZswEa8y-qGXdfAbz5c9w>
Subject: [nmrg] TMA 2016 call for papers
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Sep 2015 08:28:51 -0000

Dear all,

The 8th International Workshop on Traffic Monitoring and Analysis (TMA 2016)
will be hosted by the Université catholique de Louvain, Belgium. We will
be happy to receive your submissions. You can find the call for papers
below and on the conference website:
   http://tma.ifip.org/2016/

Regards,
Ramin Sadre

On behalf of the program committee
Alessio Botta
Fabian Bustamante
Ramin Sadre

********************************
CALL FOR PAPERS
8th International Workshop on Traffic Monitoring and Analysis (TMA 2016)
http://tma.ifip.org/2016/

Location: Louvain-la-Neuve, Belgium
Date: April 7-8
Submission deadline: December 1st, 2015 (11:59 PM EST)

Scope:
The Traffic Monitoring and Analysis workshop (TMA) is a highly selective
venue for the presentation of early-stage research and controversial works
on all the aspects of network measurements. The focus is on improving the
practice or application of measurements, across the entire network stack
up to the application layer, with an emphasis on new areas of network
communication such as Software-Defined Networks, Cloud services, Content
Distribution Networks, social networks, mobile applications and data
centers, but also including more traditional measurement topics, such as
traffic classification, anomaly detection, network performance evaluation
and traffic analysis.

Some relevant topics include:
- Measurements of data centers, virtualized systems and cloud-based services
- Measurements of distributed systems, including content distribution and P2P networks
- Application layer measurements, including web services, social networks, mobile applications
- Traffic analysis, characterization, visualization and classification
- Anomaly detection
- Measurements of home, wireless and cellular networks
- Security and privacy in network measurement and analysis
- Network measurement and monitoring methods and techniques
- Network monitoring systems and distributed monitoring architectures
- Network performance evaluation, troubleshooting and topology measurements
- Measurement based experiments: repeatability tests, shared datasets, collaborative platforms
- Measurements of the Quality of Service and Quality of Experience
- Measurement in Software-Defined Networks
- Measuring the impact of Big Data processing on networks
- Traffic measurement and analysis using Big Data frameworks

Extended versions of the two best papers on machine learning, data mining
and Big Data for network monitoring and analysis will be fast-tracked for
publication in a Special Issue of Elsevier Computer Networks, subject to
further revision:
   http://www.journals.elsevier.com/computer-networks/call-for-papers/special-issue-on-machine-learning-data-mining-and-big-data/

Papers describing experiments with users or user data (e.g., passwords,
social network information), should follow the basic principles of ethical
research, e.g., beneficence (maximizing the benefits to an individual or to
society while minimizing harm to the individual), minimal risk (appropriateness
of the risk versus benefit ratio), voluntary consent, respect for privacy,
and limited deception. When appropriate, authors are encouraged to include a
subsection describing these issues, and the review process may examine the
ethical soundness of the paper just as it would examine the technical aspects.

Authors unsure about topical fit or ethical issues are welcome to contact
the program committee co-chairs at tma2016-chairs@googlegroups.com

Submission guidelines:
Authors should only submit original work that has not been published before
and is not under submission to any other venue. Submissions must not exceed
8 pages in IEEE 2-column style. A template is available on:
   http://www.ieee.org/conferences_events/conferences/publishing/templates.html
Submissions that do not comply with these requirements will be rejected without
review.

Important dates:
Submission deadline: Tuesday, December 1st, 2015 (11:59 PM EST)
Notification to authors: Monday, January 18, 2016
Camera-ready deadline: Monday, January 29, 2016
TMA workshop: April 7-8, 2016

Please visit the workshop homepage for further information:
   http://tma.ifip.org/2016/


From nobody Fri Sep  4 02:37:43 2015
Return-Path: <phanvc@gmail.com>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E30691A6F64 for <nmrg@ietfa.amsl.com>; Fri,  4 Sep 2015 02:37:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.423
X-Spam-Level: *
X-Spam-Status: No, score=1.423 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KFDg9FNcNA55 for <nmrg@ietfa.amsl.com>; Fri,  4 Sep 2015 02:37:38 -0700 (PDT)
Received: from mail-io0-x230.google.com (mail-io0-x230.google.com [IPv6:2607:f8b0:4001:c06::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F7411B2EDB for <nmrg@irtf.org>; Fri,  4 Sep 2015 02:37:38 -0700 (PDT)
Received: by iofh134 with SMTP id h134so17555254iof.0 for <nmrg@irtf.org>; Fri, 04 Sep 2015 02:37:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:sender:date:message-id:subject:from:to:content-type;  bh=zjdfujIZey5/JHcTxuOjfw7NZkB/WHydNKdjtaHmJoY=; b=vTgNqcNcmrConAKSp1lOKWUFy/W4yPmdkRPEyOE6JE3H1oAz4BsNYZq9kXJuyNK+ya CbooJdr+MY9wkLCQLQc/HvTndY4xWCWP3jimFOuMavVMLerV08Tln8UI+swhXKyb0Ryi cuqbGXx7E+epqTZndGoTNnjD6+ayY3QNTNXol5QpNzsDU3Ye7k3tfuW7cHz+7KG60Xyg e1s4+6AGMlS6qVvfechYYwfxsnI1sMAFLpWUmPIVMpUZcx6+ii88iQ1mHXKN89wMlH3N hFfz392zO9EchdDWjwDOduypahpiuwNTHwV30zWc21CN1tT87D+Zi7hD0qW781MCH7qU gkCw==
MIME-Version: 1.0
X-Received: by 10.107.137.69 with SMTP id l66mr5220471iod.60.1441359457476; Fri, 04 Sep 2015 02:37:37 -0700 (PDT)
Sender: phanvc@gmail.com
Received: by 10.79.30.5 with HTTP; Fri, 4 Sep 2015 02:37:37 -0700 (PDT)
Date: Fri, 4 Sep 2015 16:37:37 +0700
X-Google-Sender-Auth: JgKbLFRR8W7szVzaVrXLvaZlLsg
Message-ID: <CAADY+-ti6sKufjNoUxj+yK1+MNpdLQEmduFxQ8wTUEs9EO2Z8Q@mail.gmail.com>
From: Phan Cong Vinh <pcvinh@ntt.edu.vn>
To: nmrg@irtf.org
Content-Type: multipart/alternative; boundary=001a113ecb8a74e470051ee8a681
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/IUsoeseBT5V711JvykEdIIiuYys>
Subject: [nmrg] CFC: Nature-Inspired Networking: Theory and Applications. To be published by CRC Press
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Sep 2015 09:37:42 -0000

--001a113ecb8a74e470051ee8a681
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

 CALL FOR BOOK CHAPTERS
----

Book Title:
Nature-Inspired Networking:
Theory and Applications

Proposals Submission Deadline: September 30, 2015
Full Chapters Due: April 30, 2016

A book edited by Phan Cong Vinh, Assoc.Prof., PhD in Computing
Faculty of Information Technology
Nguyen Tat Thanh University, Vietnam
Email: pcvinh@ntt.edu.vn

To be published by CRC Press - Taylor & Francis Group


INTRODUCTION TO THE SUBJECT AREA
----
The book with the title of Nature-Inspired Networking (NiN) will contain
highly original contributions about how the nature is going to shape
networking systems of the future. Hence, it will focus on rigorous
approaches and cutting-edge solutions, which encompass three classes of
major methods:
- Those that take inspiration from nature for the development of novel
problem solving techniques;
- Those that are based on the use of networks to synthesize natural
phenomena; and
- Those that employ natural materials (e.g., molecules,) to compute or
communicate.

The book=E2=80=99s purpose is to make a formal basis more accessible to
researchers, scientists, professionals and students as well as developers
and practitioners in ICT by providing them with state-of-the-art research
results, applications, opportunities and future trends.

Original contributions will be solicited for the book. In particular,
theoretical contributions should be formally stated and justified, and
practical applications should be based on their firm formal basis.:

OBJECTIVE OF THE BOOK
----
The proposed book is preferred to be an advanced reference material for
readers who already have a basic understanding of networking and are now
ready to know how to  develop NiN using rigorous approaches. Hence,
theoretical contributions are welcome provided their relevance for how to
develop NiN is clear. Reports on applications are welcome provided their
formal basis is evident. For keeping a reasonable trade-off between
theoretical and practical issues, a careful selection of the chapters will
be done, on the one hand, to cover a broad spectrum of formal and practical
aspects and, on the other hand, to achieve as much as possible a
self-contained book.

Formal and practical aspects will be preferably presented in a
straightforward fashion by discussing in detail the necessary components
and briefly touching on the more advanced components. Therefore,
development should be demonstrated how to use the formal methods for NiN
will be described by sound judgments and reasonable justifications.

TARGET AUDIENCE
----
The book is written for researchers, scientists, professionals and students
in computer science and computer engineering as well as developers and
practitioners in next-generation network design.

SCOPE OF THE BOOK
----
Topics of interest range from theory to applications of Nature-Inspired
Networking (NiN) based on rigorous interdisciplinary approaches in which
theoretical contributions should be formally stated and justified, and
practical applications should be based on their firm formal basis.

Recommended topics of the book include, but are not limited to, the
following.

* Networking based on Biological Principles:
- Autonomic networking
- Context-aware networking
- Evolutionary networking

* Networking based on Physical Principles:
- Spatial networking
- Amorphous networking
- Massive parallel computing

* Networking based on Social Principles:
- Collision-based networking
- Swam intelligence in networking
- Collective intelligence in networking
- Networking based on chaos and dynamical systems

The list is not restrictive - contributing authors are encouraged to
contact the editor before submitting a chapter proposal to determine
whether the proposed submission is within the scope of this book.

SUBMISSION PROCEDURE
----
Potential contributors are invited to submit to the book editor via email
on or before September 30, 2015 a 2-3 page chapter proposal (included as an
email attachment) clearly explaining the mission and concerns of their
proposed chapter. Contributors of accepted proposals will be notified by
October 15, 2015 regarding the status of their proposals and sent chapter
guidelines. Full chapters are expected to be submitted by April 30, 2016.
All submitted chapters will be reviewed on a double-blind review basis.
Contributors may also be requested to serve as reviewers for this book
project.

PUBLISHER
----
This book is scheduled to be published by CRC Press - Taylor & Francis
Group, premier publisher of technical and scientific work, reaching around
the globe to collect essential reference material and the latest advances
and make them available to researchers, academics, professionals, and
students in a variety of accessible formats. Its mission is to serve the
needs of scientists and the community at large by working with capable
researchers and professionals from across the world to produce the most
accurate and up to date scientific and technical resources. For additional
information regarding the publisher, please visit http://www.crcpress.com.
This publication is anticipated to be released in late 2016.

IMPORTANT DATES
----
CHAPTER PROPOSAL:

* Authors Intention to Contribute (with a txt/word/pdf chapter proposal):
September 30, 2015
* Proposals Acceptance Notification: October 15, 2015

FULL CHAPTER SUBMISSION & NOTIFICATION:

* Chapters Submission: April 30, 2016
* Notification of Acceptance: July 30, 2016
* Camera-ready Submission: August 30, 2016

PUBLICATION by CRC Press - Taylor & Francis Group

* Publication: late 2016

INQUIRIES and SUBMISSIONS can be forwarded electronically to the book
editor:

Phan Cong Vinh
Assoc. Prof., PhD in Computing
Faculty of Information Technology
Nguyen Tat Thanh University
300A Nguyen Tat Thanh street, Ward 13, District 4, Ho Chi Minh City, Vietna=
m
Email: pcvinh@ntt.edu.vn

--001a113ecb8a74e470051ee8a681
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_signature"><div dir=3D"ltr"><div dir=
=3D"ltr">=C2=A0<span style=3D"font-size:12.8000001907349px">CALL FOR BOOK C=
HAPTERS=C2=A0</span><br></div><div dir=3D"ltr" style=3D"font-size:12.800000=
1907349px">----</div><div dir=3D"ltr" style=3D"font-size:12.8000001907349px=
"><br></div><div dir=3D"ltr" style=3D"font-size:12.8000001907349px">Book Ti=
tle:=C2=A0</div><div dir=3D"ltr" style=3D"font-size:12.8000001907349px">Nat=
ure-Inspired Networking:=C2=A0</div><div dir=3D"ltr" style=3D"font-size:12.=
8000001907349px">Theory and Applications=C2=A0</div><div dir=3D"ltr" style=
=3D"font-size:12.8000001907349px"><br></div><div dir=3D"ltr" style=3D"font-=
size:12.8000001907349px">Proposals Submission Deadline: September 30, 2015=
=C2=A0</div><div dir=3D"ltr" style=3D"font-size:12.8000001907349px">Full Ch=
apters Due: April 30, 2016=C2=A0</div><div dir=3D"ltr" style=3D"font-size:1=
2.8000001907349px"><br></div><div dir=3D"ltr" style=3D"font-size:12.8000001=
907349px">A book edited by Phan Cong Vinh, Assoc.Prof., PhD in Computing=C2=
=A0</div><div dir=3D"ltr" style=3D"font-size:12.8000001907349px">Faculty of=
 Information Technology=C2=A0</div><div dir=3D"ltr" style=3D"font-size:12.8=
000001907349px">Nguyen Tat Thanh University, Vietnam=C2=A0</div><div style=
=3D"font-size:12.8000001907349px">Email: <a href=3D"mailto:pcvinh@ntt.edu.v=
n">pcvinh@ntt.edu.vn</a></div><div dir=3D"ltr" style=3D"font-size:12.800000=
1907349px"><br></div><div dir=3D"ltr" style=3D"font-size:12.8000001907349px=
">To be published by CRC Press - Taylor &amp; Francis Group</div><div dir=
=3D"ltr" style=3D"font-size:12.8000001907349px"><br></div><div dir=3D"ltr" =
style=3D"font-size:12.8000001907349px"><br></div><div dir=3D"ltr" style=3D"=
font-size:12.8000001907349px">INTRODUCTION TO THE SUBJECT AREA=C2=A0</div><=
div dir=3D"ltr" style=3D"font-size:12.8000001907349px">----</div><div dir=
=3D"ltr" style=3D"font-size:12.8000001907349px">The book with the title of =
Nature-Inspired Networking (NiN) will contain highly original contributions=
 about how the nature is going to shape networking systems of the future. H=
ence, it will focus on rigorous approaches and cutting-edge solutions, whic=
h encompass three classes of major methods:</div><div dir=3D"ltr" style=3D"=
font-size:12.8000001907349px">- Those that take inspiration from nature for=
 the development of novel problem solving techniques;</div><div dir=3D"ltr"=
 style=3D"font-size:12.8000001907349px">- Those that are based on the use o=
f networks to synthesize natural phenomena; and</div><div dir=3D"ltr" style=
=3D"font-size:12.8000001907349px">- Those that employ natural materials (e.=
g., molecules,) to compute or communicate.</div><div dir=3D"ltr" style=3D"f=
ont-size:12.8000001907349px"><br></div><div dir=3D"ltr" style=3D"font-size:=
12.8000001907349px">The book=E2=80=99s purpose is to make a formal basis mo=
re accessible to researchers, scientists, professionals and students as wel=
l as developers and practitioners in ICT by providing them with state-of-th=
e-art research results, applications, opportunities and future trends.</div=
><div dir=3D"ltr" style=3D"font-size:12.8000001907349px"><br></div><div dir=
=3D"ltr" style=3D"font-size:12.8000001907349px">Original contributions will=
 be solicited for the book. In particular, theoretical contributions should=
 be formally stated and justified, and practical applications should be bas=
ed on their firm formal basis.:</div><div dir=3D"ltr" style=3D"font-size:12=
.8000001907349px"><br></div><div dir=3D"ltr" style=3D"font-size:12.80000019=
07349px">OBJECTIVE OF THE BOOK=C2=A0</div><div dir=3D"ltr" style=3D"font-si=
ze:12.8000001907349px">----</div><div dir=3D"ltr" style=3D"font-size:12.800=
0001907349px">The proposed book is preferred to be an advanced reference ma=
terial for readers who already have a basic understanding of networking and=
 are now ready to know how to =C2=A0develop NiN using rigorous approaches. =
Hence, theoretical contributions are welcome provided their relevance for h=
ow to develop NiN is clear. Reports on applications are welcome provided th=
eir formal basis is evident. For keeping a reasonable trade-off between the=
oretical and practical issues, a careful selection of the chapters will be =
done, on the one hand, to cover a broad spectrum of formal and practical as=
pects and, on the other hand, to achieve as much as possible a self-contain=
ed book.</div><div dir=3D"ltr" style=3D"font-size:12.8000001907349px"><br><=
/div><div dir=3D"ltr" style=3D"font-size:12.8000001907349px">Formal and pra=
ctical aspects will be preferably presented in a straightforward fashion by=
 discussing in detail the necessary components and briefly touching on the =
more advanced components. Therefore, development should be demonstrated how=
 to use the formal methods for NiN will be described by sound judgments and=
 reasonable justifications.</div><div dir=3D"ltr" style=3D"font-size:12.800=
0001907349px"><br></div><div dir=3D"ltr" style=3D"font-size:12.800000190734=
9px">TARGET AUDIENCE=C2=A0</div><div dir=3D"ltr" style=3D"font-size:12.8000=
001907349px">----</div><div dir=3D"ltr" style=3D"font-size:12.8000001907349=
px">The book is written for researchers, scientists, professionals and stud=
ents in computer science and computer engineering as well as developers and=
 practitioners in next-generation network design.=C2=A0</div><div dir=3D"lt=
r" style=3D"font-size:12.8000001907349px"><br></div><div dir=3D"ltr" style=
=3D"font-size:12.8000001907349px">SCOPE OF THE BOOK=C2=A0</div><div dir=3D"=
ltr" style=3D"font-size:12.8000001907349px">----</div><div dir=3D"ltr" styl=
e=3D"font-size:12.8000001907349px">Topics of interest range from theory to =
applications of Nature-Inspired Networking (NiN) based on rigorous interdis=
ciplinary approaches in which theoretical contributions should be formally =
stated and justified, and practical applications should be based on their f=
irm formal basis.=C2=A0</div><div dir=3D"ltr" style=3D"font-size:12.8000001=
907349px"><br></div><div dir=3D"ltr" style=3D"font-size:12.8000001907349px"=
>Recommended topics of the book include, but are not limited to, the follow=
ing.=C2=A0</div><div dir=3D"ltr" style=3D"font-size:12.8000001907349px"><br=
></div><div dir=3D"ltr" style=3D"font-size:12.8000001907349px">* Networking=
 based on Biological Principles:</div><div dir=3D"ltr" style=3D"font-size:1=
2.8000001907349px">- Autonomic networking</div><div dir=3D"ltr" style=3D"fo=
nt-size:12.8000001907349px">- Context-aware networking =C2=A0</div><div dir=
=3D"ltr" style=3D"font-size:12.8000001907349px">- Evolutionary networking =
=C2=A0</div><div dir=3D"ltr" style=3D"font-size:12.8000001907349px"><br></d=
iv><div dir=3D"ltr" style=3D"font-size:12.8000001907349px">* Networking bas=
ed on Physical Principles:</div><div dir=3D"ltr" style=3D"font-size:12.8000=
001907349px">- Spatial networking</div><div dir=3D"ltr" style=3D"font-size:=
12.8000001907349px">- Amorphous networking =C2=A0</div><div dir=3D"ltr" sty=
le=3D"font-size:12.8000001907349px">- Massive parallel computing</div><div =
dir=3D"ltr" style=3D"font-size:12.8000001907349px"><br></div><div dir=3D"lt=
r" style=3D"font-size:12.8000001907349px">* Networking based on Social Prin=
ciples:</div><div dir=3D"ltr" style=3D"font-size:12.8000001907349px">- Coll=
ision-based networking</div><div dir=3D"ltr" style=3D"font-size:12.80000019=
07349px">- Swam intelligence in networking</div><div dir=3D"ltr" style=3D"f=
ont-size:12.8000001907349px">- Collective intelligence in networking</div><=
div dir=3D"ltr" style=3D"font-size:12.8000001907349px">- Networking based o=
n chaos and dynamical systems</div><div dir=3D"ltr" style=3D"font-size:12.8=
000001907349px"><br></div><div dir=3D"ltr" style=3D"font-size:12.8000001907=
349px">The list is not restrictive - contributing authors are encouraged to=
 contact the editor before submitting a chapter proposal to determine wheth=
er the proposed submission is within the scope of this book.=C2=A0</div><di=
v dir=3D"ltr" style=3D"font-size:12.8000001907349px"><br></div><div dir=3D"=
ltr" style=3D"font-size:12.8000001907349px">SUBMISSION PROCEDURE=C2=A0</div=
><div dir=3D"ltr" style=3D"font-size:12.8000001907349px">----</div><div dir=
=3D"ltr" style=3D"font-size:12.8000001907349px">Potential contributors are =
invited to submit to the book editor via email on or before September 30, 2=
015 a 2-3 page chapter proposal (included as an email attachment) clearly e=
xplaining the mission and concerns of their proposed chapter. Contributors =
of accepted proposals will be notified by October 15, 2015 regarding the st=
atus of their proposals and sent chapter guidelines. Full chapters are expe=
cted to be submitted by April 30, 2016. All submitted chapters will be revi=
ewed on a double-blind review basis. Contributors may also be requested to =
serve as reviewers for this book project.=C2=A0</div><div dir=3D"ltr" style=
=3D"font-size:12.8000001907349px"><br></div><div dir=3D"ltr" style=3D"font-=
size:12.8000001907349px">PUBLISHER=C2=A0</div><div dir=3D"ltr" style=3D"fon=
t-size:12.8000001907349px">----</div><div dir=3D"ltr" style=3D"font-size:12=
.8000001907349px">This book is scheduled to be published by CRC Press - Tay=
lor &amp; Francis Group, premier publisher of technical and scientific work=
, reaching around the globe to collect essential reference material and the=
 latest advances and make them available to researchers, academics, profess=
ionals, and students in a variety of accessible formats. Its mission is to =
serve the needs of scientists and the community at large by working with ca=
pable researchers and professionals from across the world to produce the mo=
st accurate and up to date scientific and technical resources. For addition=
al information regarding the publisher, please visit=C2=A0<a href=3D"http:/=
/www.crcpress.com/" target=3D"_blank">http://www.crcpress.com</a>. This pub=
lication is anticipated to be released in late 2016.=C2=A0</div><div dir=3D=
"ltr" style=3D"font-size:12.8000001907349px"><br></div><div dir=3D"ltr" sty=
le=3D"font-size:12.8000001907349px">IMPORTANT DATES=C2=A0</div><div dir=3D"=
ltr" style=3D"font-size:12.8000001907349px">----</div><div dir=3D"ltr" styl=
e=3D"font-size:12.8000001907349px">CHAPTER PROPOSAL:=C2=A0</div><div dir=3D=
"ltr" style=3D"font-size:12.8000001907349px"><br></div><div dir=3D"ltr" sty=
le=3D"font-size:12.8000001907349px">* Authors Intention to Contribute (with=
 a txt/word/pdf chapter proposal): September 30, 2015=C2=A0</div><div dir=
=3D"ltr" style=3D"font-size:12.8000001907349px">* Proposals Acceptance Noti=
fication: October 15, 2015=C2=A0</div><div dir=3D"ltr" style=3D"font-size:1=
2.8000001907349px"><br></div><div dir=3D"ltr" style=3D"font-size:12.8000001=
907349px">FULL CHAPTER SUBMISSION &amp; NOTIFICATION:=C2=A0</div><div dir=
=3D"ltr" style=3D"font-size:12.8000001907349px"><br></div><div dir=3D"ltr" =
style=3D"font-size:12.8000001907349px">* Chapters Submission: April 30, 201=
6</div><div dir=3D"ltr" style=3D"font-size:12.8000001907349px">* Notificati=
on of Acceptance: July 30, 2016</div><div dir=3D"ltr" style=3D"font-size:12=
.8000001907349px">* Camera-ready Submission: August 30, 2016=C2=A0</div><di=
v dir=3D"ltr" style=3D"font-size:12.8000001907349px"><br></div><div dir=3D"=
ltr" style=3D"font-size:12.8000001907349px">PUBLICATION by CRC Press - Tayl=
or &amp; Francis Group=C2=A0</div><div dir=3D"ltr" style=3D"font-size:12.80=
00001907349px"><br></div><div dir=3D"ltr" style=3D"font-size:12.80000019073=
49px">* Publication: late 2016=C2=A0</div><div dir=3D"ltr" style=3D"font-si=
ze:12.8000001907349px"><br></div><div dir=3D"ltr" style=3D"font-size:12.800=
0001907349px">INQUIRIES and SUBMISSIONS can be forwarded electronically to =
the book editor:=C2=A0</div><div class=3D"" style=3D"font-size:12.800000190=
7349px"><div id=3D":2mc" class=3D"" tabindex=3D"0"><img class=3D"" src=3D"h=
ttps://ssl.gstatic.com/ui/v1/icons/mail/images/cleardot.gif"></div></div><s=
pan class=3D"" style=3D"font-size:12.8000001907349px"><font color=3D"#88888=
8"><div dir=3D"ltr"><br></div><div dir=3D"ltr">Phan Cong Vinh=C2=A0</div><d=
iv dir=3D"ltr">Assoc. Prof., PhD in Computing=C2=A0</div><div dir=3D"ltr">F=
aculty of Information Technology=C2=A0</div><div dir=3D"ltr">Nguyen Tat Tha=
nh University =C2=A0</div><div dir=3D"ltr">300A Nguyen Tat Thanh street, Wa=
rd 13, District 4, Ho Chi Minh City, Vietnam</div><div dir=3D"ltr">Email:=
=C2=A0<a href=3D"mailto:pcvinh@ntt.edu.vn" target=3D"_blank">pcvinh@ntt.edu=
.vn</a>=C2=A0</div></font></span></div></div>
</div>

--001a113ecb8a74e470051ee8a681--


From nobody Fri Sep  4 02:44:26 2015
Return-Path: <phanvc@gmail.com>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F35641B42FA for <nmrg@ietfa.amsl.com>; Fri,  4 Sep 2015 02:44:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.622
X-Spam-Level: 
X-Spam-Status: No, score=0.622 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cqWWHe3OckH3 for <nmrg@ietfa.amsl.com>; Fri,  4 Sep 2015 02:44:21 -0700 (PDT)
Received: from mail-ig0-x233.google.com (mail-ig0-x233.google.com [IPv6:2607:f8b0:4001:c05::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4A81B1B42EE for <nmrg@irtf.org>; Fri,  4 Sep 2015 02:44:21 -0700 (PDT)
Received: by igbni9 with SMTP id ni9so9175679igb.0 for <nmrg@irtf.org>; Fri, 04 Sep 2015 02:44:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:sender:date:message-id:subject:from:to:content-type;  bh=Xv2D3CQdHX5v/tKzlmRsQu9g7ZzbYfn9WnIuHANKNlY=; b=AlSqJ1BCtnCh90bL8JzVZ3eHVp2dyXnjc/c6hutnD7h+mH6hlkVyVA/k9rvzr7Ooc1 +8dB8YzaqqTyPV3z5ptLmaxiDN2XzLIKnlIoTrupIuCb9MgHRyfgxjPW74bEdP29ywsA GMHEx9ZfzyutRahtbTxy5Cp9egjxtgjnRCNo94Xsh189+P4Fms4HJ2/GHP3QDw1JB5PR +PxdlFWNlgjwoQPOASV7KhT/AOgjHTvGQNn1lHnaFjVmHVkvjGalxg0QqaPgwjnnRf70 b+Oc/XDRROQqQJVyFGa7/s9WdVqp4PcHl5GeCTrFVTjDtbK7ZtRTlrn+l/LR5kRbnXmU oVig==
MIME-Version: 1.0
X-Received: by 10.50.43.193 with SMTP id y1mr5083238igl.64.1441359860617; Fri, 04 Sep 2015 02:44:20 -0700 (PDT)
Sender: phanvc@gmail.com
Received: by 10.79.30.5 with HTTP; Fri, 4 Sep 2015 02:44:20 -0700 (PDT)
Date: Fri, 4 Sep 2015 16:44:20 +0700
X-Google-Sender-Auth: WqdIUMyLZ3CiODlfoBZbjX5KmhE
Message-ID: <CAADY+-uwOnG_BJD-CghuohpEcMmSYZNPdhbP27QsFSeYiUvL_g@mail.gmail.com>
From: Phan Cong Vinh <pcvinh@ntt.edu.vn>
To: nmrg@irtf.org
Content-Type: multipart/alternative; boundary=089e0111d1be7c5b74051ee8befe
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/VDQCnSKpGhJUQTd0snRyN4dJVMY>
Subject: [nmrg] CFP: ICTCC 2016: 2nd International Conference on NaTure of Computation and Communication
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Sep 2015 09:44:23 -0000

--089e0111d1be7c5b74051ee8befe
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

CALL FOR PAPERS
----


ICTCC 2016: 2nd International Conference on NaTure of Computation and
Communication
Time: March 17=E2=80=9318, 2016
Location: Rach Gia, Vietnam
Website: http://ictcc.org/2016/show/home
<http://l.facebook.com/l.php?u=3Dhttp%3A%2F%2Fictcc.org%2F2016%2Fshow%2Fhom=
e&h=3DSAQGer4beAQEMGDArOFbKZYL-cCSV07mMYHmKq_Pf-VYWLg&enc=3DAZMQbr5Z3BtNGU3=
iL7sh3c9B229MFAqilBXzPKD4x02oPk8q5UBZnQb-mAiaAkn49Ze4IQZlFwfmFVUys2rboaiWi8=
14XLtJzp6P2ZE3xJgOtYx6osAtLVOxLcbjn4mU5g0jBdPsCCgSBVj5MxGclkGd158p9by-UMT6t=
06yVpGimw&s=3D1>
Event category: Computer science


THREE KEYNOTE SPEECHES:
----
1. "Application of Genetic Algorithms for MANETS and Wireless Mesh
Networks" given by Prof. Leonard Barolli at Fukuoka Institute of Technology
(FIT) in Japan

2. "Algebraically Autonomic Computing" given by Prof. Phan Cong Vinh at
Nguyen Tat Thanh University (NTTU) in Vietnam

3. "Computational Intelligence (CI) and Its Application in Engineering and
Computer Science" given by Researcher Pandian Vasant at Universiti
Teknologi PETRONAS (UTP) in Malaysia


HALF DAY TUTORIAL:
----

"Knowledge Management System (on an IT platform)" conducted by Prof. Vish
Kallimani at Universiti Teknologi PETRONAS (UTP) in Malaysia

--089e0111d1be7c5b74051ee8befe
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><p style=3D"margin:0px 0px 6px;color:rgb(20,24,35);font-fa=
mily:helvetica,arial,sans-serif;font-size:14px;line-height:12.8800001144409=
px">CALL FOR PAPERS<br>----</p><p style=3D"margin:0px 0px 6px;color:rgb(20,=
24,35);font-family:helvetica,arial,sans-serif;font-size:14px;line-height:12=
.8800001144409px"><br>ICTCC 2016: 2nd International Conference on NaTure of=
 Computation and Communication<br>Time: March 17=E2=80=9318, 2016=C2=A0<br>=
Location: Rach Gia, Vietnam<span class=3D"" style=3D"display:inline"><br>We=
bsite:=C2=A0<a href=3D"http://l.facebook.com/l.php?u=3Dhttp%3A%2F%2Fictcc.o=
rg%2F2016%2Fshow%2Fhome&amp;h=3DSAQGer4beAQEMGDArOFbKZYL-cCSV07mMYHmKq_Pf-V=
YWLg&amp;enc=3DAZMQbr5Z3BtNGU3iL7sh3c9B229MFAqilBXzPKD4x02oPk8q5UBZnQb-mAia=
Akn49Ze4IQZlFwfmFVUys2rboaiWi814XLtJzp6P2ZE3xJgOtYx6osAtLVOxLcbjn4mU5g0jBdP=
sCCgSBVj5MxGclkGd158p9by-UMT6t06yVpGimw&amp;s=3D1" target=3D"_blank" rel=3D=
"nofollow" style=3D"color:rgb(59,89,152);text-decoration:none">http://ictcc=
.org/2016/show/home</a><br>Event category: Computer science</span></p><div =
class=3D"" style=3D"display:inline;color:rgb(20,24,35);font-family:helvetic=
a,arial,sans-serif;font-size:14px;line-height:12.8800001144409px"><p style=
=3D"margin:0px 0px 6px"><br></p><p style=3D"margin:0px 0px 6px">THREE KEYNO=
TE SPEECHES:<br>----<br>1. &quot;Application of Genetic Algorithms for MANE=
TS and Wireless Mesh Networks&quot; given by Prof. Leonard Barolli at Fukuo=
ka Institute of Technology (FIT) in Japan</p><p style=3D"margin:6px 0px">2.=
 &quot;Algebraically Autonomic Computing&quot; given by Prof. Phan Cong Vin=
h at Nguyen Tat Thanh University (NTTU) in Vietnam</p><p style=3D"margin:6p=
x 0px">3. &quot;Computational Intelligence (CI) and Its Application in Engi=
neering and Computer Science&quot; given by Researcher Pandian Vasant at Un=
iversiti Teknologi PETRONAS (UTP) in Malaysia</p><p style=3D"margin:6px 0px=
"><br></p><p style=3D"margin:6px 0px">HALF DAY TUTORIAL:<br>----</p><p styl=
e=3D"margin:6px 0px">&quot;Knowledge Management System (on an IT platform)&=
quot; conducted by Prof. Vish Kallimani at Universiti Teknologi PETRONAS (U=
TP) in Malaysia</p><p style=3D"margin:6px 0px"><br></p></div></div>

--089e0111d1be7c5b74051ee8befe--


From nobody Fri Sep  4 07:39:36 2015
Return-Path: <prosper.chemouil@orange.com>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29E051B3477 for <nmrg@ietfa.amsl.com>; Fri,  4 Sep 2015 07:39:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.599
X-Spam-Level: 
X-Spam-Status: No, score=-4.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, GB_I_LETTER=-2, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WGlDO95qcYvO for <nmrg@ietfa.amsl.com>; Fri,  4 Sep 2015 07:39:33 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 396A41B347B for <nmrg@irtf.org>; Fri,  4 Sep 2015 07:39:33 -0700 (PDT)
Received: from omfedm06.si.francetelecom.fr (unknown [xx.xx.xx.2]) by omfedm14.si.francetelecom.fr (ESMTP service) with ESMTP id 705C622C1B2 for <nmrg@irtf.org>; Fri,  4 Sep 2015 16:39:31 +0200 (CEST)
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.69]) by omfedm06.si.francetelecom.fr (ESMTP service) with ESMTP id 55F6327C067 for <nmrg@irtf.org>; Fri,  4 Sep 2015 16:39:31 +0200 (CEST)
Received: from OPEXCLILM22.corporate.adroot.infra.ftgroup ([fe80::8c90:f4e9:be28:2a1]) by OPEXCLILMA2.corporate.adroot.infra.ftgroup ([fe80::bc1c:ad2f:eda3:8c3d%19]) with mapi id 14.03.0248.002; Fri, 4 Sep 2015 16:39:31 +0200
From: <prosper.chemouil@orange.com>
To: "nmrg@irtf.org" <nmrg@irtf.org>
Thread-Topic: [TNSM] Call for Papers: Special Issue on "Management of Softwarized Networks" in IEEE TNSM
Thread-Index: AdDSkhtsmDpSyJUJQ52fGzumQwaHNg==
Date: Fri, 4 Sep 2015 14:39:30 +0000
Message-ID: <15555_1441377571_55E9AD23_15555_253_1_769650E2A8C4594FB5E2CE8C6CF6682D018CD839@OPEXCLILM22.corporate.adroot.infra.ftgroup>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.7.16.85415
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/ShoeygIx_ZETWRcWhj6HAI1_cGs>
Subject: [nmrg] [TNSM] Call for Papers: Special Issue on "Management of Softwarized Networks" in IEEE TNSM
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Sep 2015 14:39:35 -0000

This might be of interest to the Group

CALL FOR PAPERS

Special Issue on "Management of Softwarized Networks"
IEEE Transactions on Network and Service Management
 -- http://www.comsoc.org/tnsm/cfp/si-msn --

   * Paper submission date: January 31, 2016
   * Notification of acceptance: April 30, 2016
   * Publication date*: September 1, 2016

Currently, there is a strong interest in both industry and academia in the =
softwarization of telecommunication networks and cloud computing infrastruc=
tures. This evolution of network softwarization is enabled by three paradig=
ms: (i) Software-Defined Networking (SDN), which allows network control to =
be separated from the forwarding plane and allows for a flexible management=
 of the network resources, (ii) Network Virtualization (NV), which enables =
virtualization of network resources, and (iii) Network Function Virtualizat=
ion (NFV), which focuses on virtualization of software-based network functi=
ons. Instead of installing and managing dedicated hardware devices for thes=
e functions, they are instead implemented as software components and deploy=
ed on commodity hardware infrastructures. There are also ongoing research e=
fforts focusing on Software-Defined Clouds, including edge clouds and Fog C=
omputing.=20
In order to efficiently manage softwarized networks and to be able to use t=
hem to their full potential, there are many interesting challenges to be ad=
dressed (see the areas listed below).=20=20
We welcome submissions addressing the important challenges and presenting n=
ovel research or experimentation results. Survey papers that offer a perspe=
ctive on related work and identify key challenges for future research will =
be considered as well. We look forward to your submissions!

Topics of interest for this special issue, include, but are not limited to =
the following:
   * APIs and management protocols for software programmable networks
   * Management of SDIs (Software-Defined Infrastructures)
   * Virtualization of resources, services and functions in SDN and NFV
   * Management of software-defined datacenters
   * Resource management for SDN or NFV-based systems
   * Efficient management of cloud computing and softwarized edge cloud inf=
rastructures=20
   * Network softwarization for 5G networks
   * Life cycle management of virtual network functions, SFC modeling and r=
epresentation
   * Composition algorithms and automated deployment of Service Function Ch=
ains (SFCs)
   * Algorithms for efficient orchestration in softwarized networks
   * Dynamic resource scaling and migration of network functions in NFV-bas=
ed systems
   * Efficient network and service monitoring for SDN or NFV
   * Security management for SDN and NFV-based systems
   * Automated configuration and repair of virtualized software-defined sys=
tems
   * Algorithms for diagnosis and correlation of events in SDN or NFV-based=
 systems
   * Availability and resilience of virtualized software-defined systems
   * Debugging and introspection of software-defined virtualized systems
   * Management of federated SDN/NFV infrastructures=20
   * Detailed experience reports from experimental testbeds
   * Transition strategies from existing networks to SDN/NFV

**Submission guidelines**
All manuscripts and any supplementary material should be submitted through =
the IEEE
ManuscriptCentral service located at: http://mc.manuscriptcentral.com/tnsm=
=20
Authors must indicate in the submission cover letter that their manuscript =
is intended for the "Management of Softwarized Networks" special issue.

We are looking forward to your submissions!

*Guest editors*
   * Raouf Boutaba, University of Waterloo, Canada
   * Prosper Chemouil, Orange Labs, France=20
   * Filip De Turck, Ghent University-iMinds, Belgium
   * Christian Esteve Rothenberg, University of Campinas, Brazil
   * Kohei Shiomoto, NTT, Japan
   * Minlan Yu, University of Southern California, USA

___________________________________________________________________________=
______________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou =
falsifie. Merci.

This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and dele=
te this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been =
modified, changed or falsified.
Thank you.


From nobody Wed Sep  9 04:49:05 2015
Return-Path: <jeremie.leguay@huawei.com>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27F691B2D0E for <nmrg@ietfa.amsl.com>; Wed,  9 Sep 2015 04:49:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qJCrzR6JU2sn for <nmrg@ietfa.amsl.com>; Wed,  9 Sep 2015 04:49:01 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD6DC1B2CFC for <nmrg@irtf.org>; Wed,  9 Sep 2015 04:49:00 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml404-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CBB37669; Wed, 09 Sep 2015 11:48:59 +0000 (GMT)
Received: from LHREML503-MBS.china.huawei.com ([10.125.30.104]) by lhreml404-hub.china.huawei.com ([::1]) with mapi id 14.03.0235.001; Wed, 9 Sep 2015 12:48:56 +0100
From: Jeremie LEGUAY <jeremie.leguay@huawei.com>
To: "nmrg@irtf.org" <nmrg@irtf.org>
Thread-Topic: Call for Papers: DRCN 2016 - International Workshop on Design of Reliable Communication Networks - Paris, France
Thread-Index: AdDq9UrDN4lKkZgJT7ergLqHIeUxOwAACSgA
Date: Wed, 9 Sep 2015 11:48:56 +0000
Message-ID: <4EC3D840F5938448832FA939BF9CBC81162F0568@lhreml503-mbs>
Accept-Language: zh-CN, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.203.78.148]
Content-Type: multipart/alternative; boundary="_000_4EC3D840F5938448832FA939BF9CBC81162F0568lhreml503mbs_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/2P2pjofSxtQIZcMrzRG2STjSp7g>
Subject: [nmrg] FW: Call for Papers: DRCN 2016 - International Workshop on Design of Reliable Communication Networks - Paris, France
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Sep 2015 11:49:04 -0000

--_000_4EC3D840F5938448832FA939BF9CBC81162F0568lhreml503mbs_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

This might be of interest to the Group.



CALL FOR PAPERS



DRCN 2016

International Workshop on Design of Reliable Communication Networks http://=
www.drcn2016.org/ March 14-17, 2016 - Paris, France.



Technically co-sponsored by IEEE and IEEEE Communications Society



IMPORTANT DATES

Submission deadline: October 2, 2015

Notification of acceptance: December 4, 2015 Camera Ready Papers: January 1=
1, 2016



SCOPE

The International Workshop on Design of Reliable Communication Networks (DR=
CN) is a forum for presenting excellent results and new challenges facing t=
he field of the reliability and availability of communication networks and =
services. It brings together experts from industry, governments and academi=
a, experienced in engineering, design and research.

We would like to invite you to contribute to and participate in DRCN 2016, =
which will be held in the very heart of Paris, France, the historical Latin=
 Quarter district.



TOPICS OF INTEREST

* Network design and operational aspects of Reliability

   * Survivability and traffic engineering for optical, IP and multi-layer =
networks

   * Robustness of multi-domain network and protocol architectures

   * Resilience in Software-Defined Networking (SDN)

   * High-availability for Network Functions Virtualization (NFV) infrastru=
ctures

   * Network dependability in cloud networking

   * Dependability of cellular/mobile networks

   * Reliability of wireless access and mesh networking

   * Survivability in grid and distributed computing

   * Resilience of networked critical infrastructures

* Theory and modeling

   * Network reliability analysis

   * Methods for survivable network and systems design, analysis and operat=
ion

   * Planning and optimization of reliable networks, systems, and services

   * Network coding techniques to improve resilience

   * Decomposition techniques for reliable network optimization

   * Service differentiation based on recovery methods

   * Simulation techniques for network resilience

* Resilience of Networked Services

   * Quality of Experience (QoE) and network service availability assessmen=
ts

   * Reliability requirements and metrics for users, businesses, and the so=
ciety

   * Dependability of networked applications

   * Survivability of multimedia networks

   * Reliability and resiliency of data center networks

   * Recovery of overlay and peer-to-peer networks

   * Restoration of services under various types of failures

   * Application and service-specific survivability techniques

   * Robustness of compound services

* Broad context

   * Telecommunication networks as an element of critical infrastructures

   * Risk and reliability in the Internet and enterprise networks

   * Public policy issues for survivability and resilience

   * Standardization of network resilience and reliability

   * Network resilience combined with economics and commercial issues

   * Network robustness to natural disasters

   * Robust network design for hostile environments

   * Security issues in networks and their relation to survivability

   * Network dependability and energy consumption trade-offs



PAPER SUBMISSION

Prospective authors are invited to submit original technical papers by the =
deadline October 2, 2015, for publication in the DRCN 2016 Conference Proce=
edings and for oral presentation during the conference. All submissions sho=
uld be written in English and should not exceed eight (8) double-column pri=
nted pages (10-point font) including figures.

All papers must be formatted according to the IEEE manuscript template for =
conference proceedings. (http://www.ieee.org/conferences_events/conferences=
/publishing/templates.html).

All submissions must be done through EDAS. Only PDF files will be accepted =
for the review process.

Paper submission site: https://edas.info/newPaper.php?c=3D20941



During the initial paper submission process via EDAS, authors are required =
to make sure that the pdf file and EDAS registration page of a paper have t=
he same list of authors and paper title, namely add all authors in EDAS dur=
ing the submission process. The author list of an accepted paper can NOT be=
 changed in the final manuscript.

At least 1 author of accepted papers must be registered to the conference a=
s presenter in order to appear in the proceedings.



Please contact submissions@drcn2016.org<mailto:submissions@drcn2016.org> if=
 you have any questions about submitting your manuscript.



VENUE

The conference will take place at Campus Les Cordeliers of the University P=
ierre and Marie Curie, in the Centre of Paris.



GENERAL CO-CHAIRS

Prosper Chemouil, Orange Labs, France

Achille Pattavina, Politecnico di Milano, Italy



TECHNICAL PROGRAM CO-CHAIRS

Stefano Secci, University Pierre et Marie Curie, France.

Eric Gourdin, Orange Labs, France



For more information, please visit: http://www.drcn2016.org/ The pdf versio=
n of the CfP is attached.


--_000_4EC3D840F5938448832FA939BF9CBC81162F0568lhreml503mbs_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.5pt;
	font-family:Consolas;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:Consolas;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle22
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoPlainText">This might be of interest to the Group.<o:p></o:p=
></p>
<p class=3D"MsoPlainText"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></=
span></p>
<p class=3D"MsoPlainText">CALL FOR PAPERS<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">DRCN 2016<o:p></o:p></p>
<p class=3D"MsoPlainText">International Workshop on Design of Reliable Comm=
unication Networks
<a href=3D"http://www.drcn2016.org/">http://www.drcn2016.org/</a> March 14-=
17, 2016 - Paris, France.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Technically co-sponsored by IEEE and IEEEE Commun=
ications Society<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">IMPORTANT DATES<o:p></o:p></p>
<p class=3D"MsoPlainText">Submission deadline: October 2, 2015<o:p></o:p></=
p>
<p class=3D"MsoPlainText">Notification of acceptance: December 4, 2015 Came=
ra Ready Papers: January 11, 2016<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">SCOPE<o:p></o:p></p>
<p class=3D"MsoPlainText">The International Workshop on Design of Reliable =
Communication Networks (DRCN) is a forum for presenting excellent results a=
nd new challenges facing the field of the reliability and availability of c=
ommunication networks and services.
 It brings together experts from industry, governments and academia, experi=
enced in engineering, design and research.<o:p></o:p></p>
<p class=3D"MsoPlainText">We would like to invite you to contribute to and =
participate in DRCN 2016, which will be held in the very heart of Paris, Fr=
ance, the historical Latin Quarter district.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">TOPICS OF INTEREST<o:p></o:p></p>
<p class=3D"MsoPlainText">* Network design and operational aspects of Relia=
bility<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Survivability and traffic engineer=
ing for optical, IP and multi-layer networks<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Robustness of multi-domain network=
 and protocol architectures<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Resilience in Software-Defined Net=
working (SDN)<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * High-availability for Network Func=
tions Virtualization (NFV) infrastructures<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Network dependability in cloud net=
working<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Dependability of cellular/mobile n=
etworks<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Reliability of wireless access and=
 mesh networking<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Survivability in grid and distribu=
ted computing<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Resilience of networked critical i=
nfrastructures<o:p></o:p></p>
<p class=3D"MsoPlainText">* Theory and modeling<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Network reliability analysis<o:p><=
/o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Methods for survivable network and=
 systems design, analysis and operation<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Planning and optimization of relia=
ble networks, systems, and services<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Network coding techniques to impro=
ve resilience<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Decomposition techniques for relia=
ble network optimization<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Service differentiation based on r=
ecovery methods<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Simulation techniques for network =
resilience<o:p></o:p></p>
<p class=3D"MsoPlainText">* Resilience of Networked Services<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Quality of Experience (QoE) and ne=
twork service availability assessments<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Reliability requirements and metri=
cs for users, businesses, and the society<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Dependability of networked applica=
tions<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Survivability of multimedia networ=
ks<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Reliability and resiliency of data=
 center networks<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Recovery of overlay and peer-to-pe=
er networks<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Restoration of services under vari=
ous types of failures<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Application and service-specific s=
urvivability techniques<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Robustness of compound services<o:=
p></o:p></p>
<p class=3D"MsoPlainText">* Broad context<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Telecommunication networks as an e=
lement of critical infrastructures<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Risk and reliability in the Intern=
et and enterprise networks<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Public policy issues for survivabi=
lity and resilience<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Standardization of network resilie=
nce and reliability<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Network resilience combined with e=
conomics and commercial issues<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Network robustness to natural disa=
sters<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Robust network design for hostile =
environments<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Security issues in networks and th=
eir relation to survivability<o:p></o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp; * Network dependability and energy c=
onsumption trade-offs<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">PAPER SUBMISSION<o:p></o:p></p>
<p class=3D"MsoPlainText">Prospective authors are invited to submit origina=
l technical papers by the deadline October 2, 2015, for publication in the =
DRCN 2016 Conference Proceedings and for oral presentation during the confe=
rence. All submissions should be written
 in English and should not exceed eight (8) double-column printed pages (10=
-point font) including figures.<o:p></o:p></p>
<p class=3D"MsoPlainText">All papers must be formatted according to the IEE=
E manuscript template for conference proceedings. (<a href=3D"http://www.ie=
ee.org/conferences_events/conferences/publishing/templates.html">http://www=
.ieee.org/conferences_events/conferences/publishing/templates.html</a>).<o:=
p></o:p></p>
<p class=3D"MsoPlainText">All submissions must be done through EDAS. Only P=
DF files will be accepted for the review process.<o:p></o:p></p>
<p class=3D"MsoPlainText">Paper submission site: <a href=3D"https://edas.in=
fo/newPaper.php?c=3D20941">
https://edas.info/newPaper.php?c=3D20941</a><o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">During the initial paper submission process via E=
DAS, authors are required to make sure that the pdf file and EDAS registrat=
ion page of a paper have the same list of authors and paper title, namely a=
dd all authors in EDAS during the
 submission process. The author list of an accepted paper can NOT be change=
d in the final manuscript.<o:p></o:p></p>
<p class=3D"MsoPlainText">At least 1 author of accepted papers must be regi=
stered to the conference as presenter in order to appear in the proceedings=
.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Please contact <a href=3D"mailto:submissions@drcn=
2016.org">
submissions@drcn2016.org</a> if you have any questions about submitting you=
r manuscript.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">VENUE<o:p></o:p></p>
<p class=3D"MsoPlainText">The conference will take place at Campus Les Cord=
eliers of the University Pierre and Marie Curie, in the Centre of Paris.<o:=
p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">GENERAL CO-CHAIRS<o:p></o:p></p>
<p class=3D"MsoPlainText">Prosper Chemouil, Orange Labs, France<o:p></o:p><=
/p>
<p class=3D"MsoPlainText">Achille Pattavina, Politecnico di Milano, Italy<o=
:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">TECHNICAL PROGRAM CO-CHAIRS<o:p></o:p></p>
<p class=3D"MsoPlainText">Stefano Secci, University Pierre et Marie Curie, =
France.<o:p></o:p></p>
<p class=3D"MsoPlainText">Eric Gourdin, Orange Labs, France<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">For more information, please visit: <a href=3D"ht=
tp://www.drcn2016.org/">
http://www.drcn2016.org/</a> The pdf version of the CfP is attached.<o:p></=
o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4EC3D840F5938448832FA939BF9CBC81162F0568lhreml503mbs_--


From nobody Wed Sep 16 04:50:01 2015
Return-Path: <nadjib.aitsaadi@u-pec.fr>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0DEFD1ACDC3 for <nmrg@ietfa.amsl.com>; Wed, 16 Sep 2015 04:50:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.44
X-Spam-Level: 
X-Spam-Status: No, score=0.44 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HELO_EQ_FR=0.35, RCVD_IN_DNSWL_LOW=-0.7, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HPNxzwq4vX7a for <nmrg@ietfa.amsl.com>; Wed, 16 Sep 2015 04:49:58 -0700 (PDT)
Received: from gulliver.u-pec.fr (gulliver.u-pec.fr [193.48.143.11]) by ietfa.amsl.com (Postfix) with ESMTP id 6B8691ACDC4 for <nmrg@irtf.org>; Wed, 16 Sep 2015 04:49:57 -0700 (PDT)
Received: from gulliver.u-pec.fr (localhost [127.0.0.1]) by gulliver.u-pec.fr (Postfix) with ESMTP id 970AAC1BAB; Wed, 16 Sep 2015 13:49:56 +0200 (CEST)
Received: from orion.u-pec.fr (orion.u-pec.fr [193.48.143.9]) by gulliver.u-pec.fr (Postfix) with ESMTP id 7D715C1BA8; Wed, 16 Sep 2015 13:49:56 +0200 (CEST)
Received: from MacBook-Pro-de-Nadjib-2.local (unknown [10.11.20.67]) (Authenticated sender: nadjib.aitsaadi@u-pec.fr) by orion.u-pec.fr (Postfix) with ESMTP id 712F558065; Wed, 16 Sep 2015 13:49:56 +0200 (CEST)
To: nmrg@irtf.org
From: Nadjib AITSAADI <nadjib.aitsaadi@u-pec.fr>
Message-ID: <55F95767.8060501@u-pec.fr>
Date: Wed, 16 Sep 2015 13:49:59 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Virus-Scanned: ClamAV using ClamSMTP
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmrg/p4nKgoNBYGLk6Dw9Y9gNBymURf8>
Subject: [nmrg] Extended deadline // Special issue on Cloudification of the IoT
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Sep 2015 11:50:01 -0000

Our apologies if you receive multiple copies
-------------------------------------------------------------------------------------------
                     CALL FOR PAPERS
             Springer Annals of telecommunications journal
         Special issue on Cloudification of the Internet of Things
http://annalsoftelecommunications.wp.mines-telecom.fr/files/2015/04/CfP_SI_Cloudification_of_IoT_final_extended.pdf
---------------------------------------------------------------------------------------------


The focus of this special issue is on the Internet of Things (IoT) with 
particular emphasis on the use of the Cloud as a central component of 
IoT architecture and a key infrastructural support for IoT applications. 
Leveraging its virtualized infrastructure and software-defined 
networking substrate, the Cloud is indeed in a good position to provide 
a flexible and scalable hosting environment for end-users with their 
profiles and privileges, the plethora of IoT applications in health, 
transportation, smart cities and many other domains, IoT generated data 
and control flows, Machine-to-Machine (M2M) communication, Big-data 
analytics, IoT management systems, security solutions, Network Function 
Virtualization (NFV), SDN-based data forwarding to name a few. The main 
objective of this special issue is to address the entire spectrum of 
research issues pertaining to the use of Cloud infrastructures in 
support of IoT systems from the sensors and machines to the end-users 
and application hosted in the Cloud. The special issue seeks novel 
research contributions and experience papers tackling the challenges in 
these areas, including but not limited to:

•    Architecture and protocols based on Cloud for IoT
•    Cloud infrastructure and middleware solutions for IoT
•    Software Defined Network (SDN) for IoT
•    Network Function Virtualization (NFV) for IoT
•    Green communication for IoT based on Cloud solutions
•    Centralized and distributed systems for IoT in Cloud environment
•    Routing solution for IoT
•    MAC layer for IoT
•    M2M communication
•    Security
•    IoT traffic model
•    End-users applications based on IoT and Cloud services
•    Management system of IoT based on Cloud solutions
•    Testbed and experimental platforms of IoT deployed in Cloud 
environment
•    Cloud Radio Access Network for IoT  (5G)

Guest Editors:
Nadjib Aitsaadi, University Paris Est Creteil, France
Raouf Boutaba, Waterloo University, Canada
Yutaka Takahashi, University of Kyoto, Japan

Papers must be written in English and describe original research not 
published or currently under review by other journals or conferences. 
The length of the article file should not exceed 35,000 characters 
including spaces (i.e., around 5,500 words). The manuscripts that are 
outside the expected length are likely to be rejected. All relevant 
papers submitted will go through an external review process. A paper if 
it has been published partially in a conference, the authors should 
specify the add value of the journal paper comparing to the conference. 
Moreover, the submitted paper must contain at least 30% of novelty 
comparing to the conference paper.
Submissions should be sent according to the instructions available at:
http://annalsoftelecommunications.wp.mines-telecom.fr/how-to-publish/
The authors can directly submit their papers at: 
https://www.editorialmanager.com/ante/default.aspx and must select in 
“Choose Article Type” item “CfP: Cloudification of the IoT”.


Proposed schedule

• Manuscript submission: September 30, 2015
• Notification: February 1st 2016
• Online with DOI: As soon as accepted
• Printed issue: September-December 2016

Best regards,

-- 

-----------------------------------------------------------------
Dr. Nadjib AIT SAADI
Associate Professor of Computer Science
University of Paris-Est Creteil Val de Marne (UPEC) - IUT Creteil/Vitry
Laboratory of Image, Signal and Intelligent Systems - LISSI
122 rue Paul Armangot, 94400 Vitry sur Seine
Tel : +33 1 41 80 73 10
http://sites.google.com/site/nadjibaitsaadi/
------------------------------------------------------------------

