Call For Special Sessions



CFP for Special session on Research and Case Study for Designing and Deploying Information-centric Networks

Information-centric network (ICN) has gained considerable attention both in academia and industry. This special session calls for recent research, practical experiences, and development lessons in deploying ICN in current and emerging networking environments. The research can be in ICN specific clean-slate architectures such as CCN/NDN, MobilityFirst, NetInf, XIA, PSIRP/PURSUIT, COMET, or can be based on enhancements to existing protocols like HTTP. ICN deployment can be realized in a clean-slate approach or as an overlay over IP, and may leverage emerging architectures such as SDN and NFV for less disruptive deployment. Practical experience on deploying ICN for novel applications are particularly welcome, such as Network Operator Services, Enterprise applications, Data Center Networking, and Big-data analytics.


The contributions requested include but are not limited to:


  • Platforms/Architecture/Solutions for ICN Application/Service Deployment
  • Application Domain specific Solutions (HomeNets, M2M/IoT, Conferencing, Data Centers etc.)
  • ICN-based Solution Performance Evaluation
  • Context-aware ICN
  • ICN Economics Challenges
  • ICN Network Management Challenges and Co-Existence with Current Services
  • ICN for consumer networks and devices, such as Smart Devices (Phones, Tablets, TV etc)/Set-top Box
  • Novel applications with ICN in consumer networks
  • Case study in ICN deployment and experiments
  • Security and privacy considerations in ICN solutions

We encourage submissions of high-quality technical papers reporting original research that has not been previously published, and is not currently submitted for consideration elsewhere. The special session papers will be treated the same as the main technical track papers in terms of formatting, reviewing, quality control, inclusion into proceedings, author registration and attendance.


Special Session Chair:
Haiyong Xie, Huawei Technologies, U.S.A


PC Co-chairs:
Ravi Ravindran, Huawei Technologies, U.S.A
Email: ravi.ravindran@huawei.com

Xinwen Zhang, Huawei Technologies, U.S.A
Email: xinwenzhang@gmail.com

BJ Lee, Samsung, South Korea
Email: bj33.lee@samsung.com

Barry Crabtree, British Telecom, United Kingdom
Email: barry.crabtree@bt.com


Technical Program Committee:
Jun Bi , Tsinghua University, China

Yanghee Choi, Seoul National University, Korea

Haiqing Jiang, Samsung, U.S.A

Myeong-wuk Jung, Samsung, Korea

Dirk Kutscher, NEC Lab, Germany

Taekyung 'Ted' Kwon , Seoul National University, Korea

JonJun Li , Inter-digital, U.SA

Luca Muscariello, Orange Labs, France Telecom, France

Priya Mahadevan, PARC, U.S.A

Ashok Narayanan , CISCO, U.S.A

Borje Ohlman, Ericsson, Sweden

Ioannis Psaras , University College London, U.K

Dirk Trossen, Cambridge University, U.K

Cedric Westphal , Huawei Technologies, U.S.A

Guo-Qiang Wang , Huawei Technologies, U.S.A

Yanyong Zhang, Rutgers University, U.S.A


Important dates:

Submission Due: September 13, 2013
Notification of Acceptance: October 11, 2013
Camera-Ready Due: November 1, 2013

Paper Format and Submission:

Format: http://ccnc2014.ieee-ccnc.org/authors
EDAS submission http://edas.info/newPaper.php?c=14867




CFP for Special session on Big Data Security and Privacy

Big Data is an emerging paradigm applied to datasets whose size is beyond the ability of commonly used software tools to capture, manage, and process the data within a tolerable elapsed time. Such datasets are larger than those conventional relational database infrastructures can cope (Volume) with increased rate at which data flows into an organization (Velocity) from diverse data source (Variety). Further, establishing trust in big data presents a huge challenge as the number of resources grows (i.e., veracity). How can we cope with uncertainty, imprecision, missing values, wrong statements or untruths? Also, Big Data has the potential for new and valuable insights. The biggest challenge is to extract value from data (Value). From security perspective, there are two distinct issues: security the organization and customer’s information in a Big Data context; and using Big Data techniques to analyze and predict security incidents.


Using Big Data approaches, one can obtain the holistic data view to gain the fullest understanding of consumer interactions, intent and value possible. Consumer being the focus of any brand, Big Data gives us an unparalleled opportunity to gain insight into consumer behavior, generate revenue and revolutionize the brand - customer relationship. As many businesses are aware, storing data using Big Data does not remove their responsibility for protecting it - from both a regulatory and a commercial perspective. Encryption and access control techniques are necessary to protect sensitive data.


Big Data can be used to build more practical and successful Security Incident and Event Management systems (SIEM), Intrusion Detection System (IDS), and Intrusion Prevention System (IPS). In summary, Big Data expands the boundaries of existing information security responsibilities and introduces significant new risks and challenges.


The Big Data Security and Privacy track has been proposed to provide a prime international forum for researchers, industry practitioners and other experts to exchange the advances in security and privacy aspects of Big Data with respect to consumers.


The objective of this track is to invite authors to submit original manuscripts that demonstrate and explore current advances in all security and privacy aspects of Big Data with respect to consumers. The contributions requested include but are not limited to:


  • Anomaly Detection in Very Large Scale Systems
  • Security Issues Around Big Data in Cloud
  • High Performance Cryptography
  • Visualizing Large Scale Security Data
  • Threat Detection using Big Data Analytics
  • Privacy Threats of Big Data
  • Privacy Preserving Big Data / Analytics
  • Trust Reputation Systems using Big Data
  • Techniques preventing nefarious use of Big Data
  • Reports on critical, real-life security and trust use cases related to Big Data
  • Compliance / Legal issues
  • Sociological Aspects of Big Data Privacy

We encourage submissions of high-quality technical papers reporting original research that has not been previously published, and is not currently submitted for consideration elsewhere. The special session papers will be treated the same as the main technical track papers in terms of formatting, reviewing, quality control, inclusion into proceedings, author registration and attendance.


Special Session Chair:
Haiyong Xie, Huawei Technologies, U.S.A


PC Co-chairs:
Dr. Neelanarayanan Venkataraman
Professor, School of Computing Science and Engineering,
VIT University – Chennai Campus,
Chennai – 600 127, Tamil Nadu, India.
neelanarayanan.v@vit.ac.in
Mobile: +91 75985 64593

Dr. Vijayakumar Varadarajan
Professor, School of Computing Science and Engineering,
VIT University – Chennai Campus,
Chennai – 600 127
Vijayakumar.v@vit.ac.in


Technical Program Committee
Balaji Rajendran, Centre for Development of Advanced Computing, India

Balakrishnan, NUS, Singapore

Biju Paniker, Infosys Technologies

Damodar Malagi, Tata Motors

Gomatinayagam, Mahindra Satyam

Muthukumar, Meenakshi University, India

Nithya, Vinayaka Missions University, India

Pramod S Pawar, London University College, UK

Rupesh, Thirdware Technologies

Rao, IT University of Copenhagen, Denmark

Sivakumar, Madras Institute of Technology, IndiaSubra

manian, Centre for Development of Advanced Computing, IndiaS

ubramanisami, Sastra University, India

Vijayakumar, Anna University, India


Important dates:

Submission Due: September 13, 2013
Notification of Acceptance: October 11, 2013
Camera-Ready Due: November 1, 2013

Paper Format and Submission:
Format: http://ccnc2014.ieee-ccnc.org/authors
EDAS submission http://edas.info/newPaper.php?c=14867a




CFP for Special session on Game Theory in Mobile Internet

The rapid development and wide application of the mobile Internet have greatly changed our lifestyle. Due to the distributed and user-contributed natures, the mobile Internet, like many distributed autonomous systems, suffers from common incentive problems caused by users’ selfishness. Such problems can significantly downgrade the performance of the mobile Internet. However, existing solutions from distributed autonomous systems cannot be directly used in the mobile Internet, because of the mobile Internet’s highly dynamic nature. The objective of this special session is to provide a platform for exchanging recent ideas on game theoretic modeling and economic incentive design in the mobile Internet.


The topics of this special session include, but are not limited to, the following:

  • Game-theoretic modeling in mobile Internet
  • Algorithmic mechanism design in mobile Internet
  • Incentive algorithms, protocols, and allocation mechanisms
  • Wireless resource allocation through game theory
  • Auction design in mobile Internet
  • Game theoretic approaches for cooperative communications
  • Collaboration analysis and design in overlay networks through game theory
  • Game theoretic security and privacy
  • Equilibrium analysis and computation in mobile Internet
  • Game theoretic learning mechanisms
  • Price of anarchy in mobile Internet
  • Empirical and experimental economic analysis

We encourage submissions of high-quality technical papers reporting original research that has not been previously published, and is not currently submitted for consideration elsewhere. The special session papers will be treated the same as the main technical track papers in terms of formatting, reviewing, quality control, inclusion into proceedings, author registration and attendance.

Special Session Chair:
Haiyong Xie, Huawei Technologies, U.S.A


PC Co-chairs:
Fan Wu, Shanghai Jiao Tong University, China

Liehuang Zhu, Beijing Institute of Technology, China


Technical Program Committee
Kaigui Bian, Peking University, China

Haibo Chen, Shanghai Jiao Tong University, China

Tingting Chen, Oklahoma State University, USA

Mark Felegyhazi, Budapest University of Technology and Economics, Hungary

Weili Han, Fudan University, China

Jingyu Hua, Nanjing University

Qiangsheng Hua,Tsinghua University, China

Jianwei Huang, The Chinese University of Hong Kong, China

Murtuza Jadliwala, Wichita State University, USA

Xiangyang Li, Illinois Institute of Technology, USA

David Naccache, Ecole normale suprieure

Chunming Qiao, SUNY Buffalo, USA

Kouichi Sakurai, Kyushu University

Bo Sheng, University of Massachusetts Boston, USA

Kai Xing, University of Science & and Technology of China, China

Xiaoyan Zhang, Nanjing Normal University

Yuan Zhang, Nanjing University

Zijian Zhang, Beijing Institute of Technology

Haojin Zhu, Shanghai Jiao Tong University, China


Important dates:

Submission Due: September 13, 2013
Notification of Acceptance: October 11, 2013
Camera-Ready Due: November 1, 2013

Paper Format and Submission:

Format: http://ccnc2014.ieee-ccnc.org/authors
EDAS submission http://edas.info/newPaper.php?c=14867




CFP for Special session on Content Caching and Distribution in Future Mobile Networks

Recently, the emerging technologies of consumer communication boost the development of mobile networks which are undergoing a tremendous data traffic predicted to increase by nearly two orders of magnitude in next 5-6 years. Integrating content caching and distribution into 4G/Beyond 4G mobile networks, e.g. deploying caching devices in base stations and mobile gateways, has been deemed as a potential way of mitigating the data traffic and improving mobile network capacity.


Compared with the traditional content caching and distribution in wired broadband network, the exclusive characteristics of mobile network have brought further challenges to researchers, for example, geographical influence on caching, tradeoff between network cost reduction and additional cost of having a large number of micro-caches. It is a great opportunity for our technical community to explore the potential gains and provide possible solutions for future mobile networks.


The goal of this special session is to provide a forum for engineers, architects, and researchers to identify challenges and share innovation in future mobile networks on caching and content distribution issues. We solicit papers covering various topics of interest that include (but are not limited to) the following:

  • Architecture and protocols of content caching and distribution in mobile networks
  • Geographical influences on caching and replication in mobile networks
  • Content placement and request routing strategy
  • Empirical studies of deployed content distribution systems in mobile networks
  • Data traffic analysis and characterization in mobile networks
  • Edge services and dynamic content caching
  • Influences of content caching and distribution on quality of experience
  • Energy efficient mobile networks with content caching and distribution
  • Security issues on content caching and distribution in mobile networks
  • Pilot projects and deployments

To ensure high quality of the contributions, all papers submitted to an approved Special Session will be reviewed using the same procedure and criteria as regular papers. All paper submissions are handled through EDAS, and follow the technical program submission and review schedule. Papers accepted for special sessions are included in the conference proceedings as part of the technical track and published in the conference proceedings including IEEE Xplore. At least one author for each accepted paper must register for the conference and present the paper during the Special Session. Formatting details can be found under Author Information on the CCNC web site (http://ccnc2014.ieee-ccnc.org/authors).

Session Organizers:
Song Ci, University of Nebraska-Lincoln, USA: sci@engr.unl.edu
Tao Lin, Chinese Academy of Sciences, China: lint@hpnl.ac.cn
Haiyong Xie, Huawei Technologies, USA: haiyong.xie@gmail.com


Technical Program Committee
Mengjun Xie, University of Arkansas at Little Rock, USA

Dalei Wu, Massachusetts Institute of Technology, USA

Yaning Liu, JCP-Consult R&D, France

Xinggong Zhang, Peking University, China

MeaWang, University of Calgary, Canada

Yongqiang Dong, Southeast University, China

Guoqiang Zhang, Nanjing Normal University, China

Haiyan Luo, Cisco Systems, USA

Lingshan Kong, China Mobile, China

Jinyao Yan, Communication University of China, China


Important dates:

Technical Papers Due: September 13th, 2013
Acceptance Notification: October 11th, 2013
Final Camera Ready: November 1st, 2013

Paper Format and Submission:

Format: http://ccnc2014.ieee-ccnc.org/authors
EDAS submission http://edas.info/newPaper.php?c=14867




CFP for Special session on Network Function Virtualization

Network Function Virtualization (NFV) has gained considerable attention both in academia and industry. This special session calls for recent research, practical experiences, and development lessons in deploying NFV in current and emerging networking environments.

The research can be in NFV range from virtualization of both residential and service provider wireless gateways/access nodes to centralized control for optical fibers channels and MPLS. There are limitless network functions that can be virtualized and there are various factors that can impact NFV such as algorithm for QoS and Security, innovation for new programmable ASIC or advanced FPGA. Practical experience on deploying NFV for novel applications are particularly welcome especially integrating virtualized network devices into the existing network.


The contributions requested include but are not limited to:

  • Cloud or Virtual Residential Gateway
  • Virtualization of Access Network Function
  • Programmable Access Technology
  • Centralized or unified control & management of FTTx
  • Wholesale of virtual access network
  • Quality of service in access network virtualization
  • Service provisioning or generation in virtual access network
  • Coexistent of virtualized and non-virtualized access network function
  • Impacts on user experiences

We encourage submissions of high-quality technical papers reporting original research that has not been previously published, and is not currently submitted for consideration elsewhere. The special session papers will be treated the same as the main technical track papers in terms of formatting, reviewing, quality control, inclusion into proceedings, author registration and attendance.


Special Session Co-Chairs:
Shucheng LIU, Huawei Technologies, China

Tina Tsou, Huawei Technologies, USA

Chern Nam YAP, Temasek Polytechnic, Singapore


Technical Program Committee:
Zvika Bronstein, Huawei Technologies, Israel

Marcus Brunner, Swisscom, Switzerland

Zhen Cao, China Mobile, China

Yong Cui, Tsinghua University, China

Linda Dunbar, Huawei Technologies, USA

Mehmet Ersue, Nokia Solutions and Networks, Germany

Igor Faynberg, Alcatel-Lucent and Stevens Institute of Technology, USA

Fred Feisullin, Sprint CTO Group, USA

Yong Huang, Huawei Technologies, China

Hongyu Li, Huawei Technologies, China

Xianfeng Li, School of ECE, Peking University, China

Diego R. Lopez, Telefonica I+D, Spain

Chunming Qiao, University at Buffalo, USA

Joseph Tardo, Broadcom, USA

Jin Wang, Soochow University, China

Chongfeng Xie, China Telecom, China

Hongfang Yu, University of Electronic Sci. & Tech. of China, China

Ruobin Zheng, Huawei Technologies, China


Important dates:

Submission Due: September 13, 2013
Notification of Acceptance: October 11, 2013
Camera-Ready Due: November 1, 2013

Paper Format and Submission:

Format: http://ccnc2014.ieee-ccnc.org/authors
EDAS submission http://edas.info/newPaper.php?c=14867