Home

Program

Keynote & Invited Speakers

Panel Discussion

Committee

Important Dates

Author Instructions

Camera Ready Submission

Registration

Statistics

Call For Papers

Call for Short Papers & Demos

Venue

Event

River Cruise

Contact Details

Call for Papers - NSysS 2015

 

The 1st International Conference on Networking Systems and Security 2015 (NSysS 2015) aims at providing a forum of researchers, practitioners, developers, and users to exchange new ideas and results related to computer networks, networking systems, and security across academia and industry. NSysS 2015 will be held during January 5-7, 2015 in Dhaka, the capital of Bangladesh. This conference is technically co-sponsored by ACM Chapter and IEEE COMSOC Bangladesh Section.

 

We solicit original technical papers articulating novel ideas, protocols, and algorithms with ground-breaking results and/or quantified experiences involving networking systems and security. The conference values papers, which will take a broad networking and/or security perspective(s) covering contemporary and future applications. Of particular interest are technical contributions that enable new and compelling networking and security paradigms.

 

Important dates:

Absract and paper submission deadline: August 17, 2014  August 31, 2014

Notification of paper acceptance: September 30, 2014 October 19, 2014

Camera-ready paper submission: October 14, 2014

Poster and demo submission deadline: October 7, 2014 November 7, 2014

Notification of poster and demo acceptance: October 14, 2014 October 25, 2014

Program: January 5-7, 2015

 

TPC Co-Chairs

Md. Mostofa Akbar, BUET

Suman Kumar Nath, Microsoft Research, USA

 

Invited Speakers 

Mohammed Atiquzzaman, University of Oklahoma, USA

Raouf Boutaba, University of Waterloo, Canada

Venkat Padmanabhan, Principle Researcher and Research Manager, Microsoft Research

 

Scope:

Scope of the conference covers, but is not limited to, the following:

  • Addressing and location management

  • Cellular and broadband wireless nets

  • Cognitive radio networking

  • Congestion control

  • Cross layer design and optimization

  • Cyber‐physical systems and networking

  • Data centers

  • Data reduction, inference, and signal processing

  • Delay/disruption tolerant networks

  • Denial of service

  • Embedded software for sensor networks

  • Energy harvesting

  • Experience with real-world applications

  • Experimental results from operational networks 
    or network applications

  • Fault-tolerance, reliability, and troubleshooting

  • Future Internet design

  • Innovative applications and deployment experiences

  • Mobile, participatory, and social sensing

  • Multicast, broadcast and anycast

  • Multimedia protocols

  • Near field communication

  • Network architectures

  • Network management and traffic engineering

  • Network security and privacy

  • Network simulation and emulation

  • Network, transport, and application-layer protocols

  • Novel components, devices and architectures for networked sensing

  • Operating systems and runtime environments

  • Optical networks

  • P2P, overlay, and content distribution networks

  • Power control and management

  • Quality of service

  • Resource allocation and management

  • RFID networks and protocols

  • Satellite networks

  • Scheduling and buffer management

  • Security, trust and privacy

  • Self-organizing networks

  • Sensor data storage, retrieval, processing and management

  • Social computing and networks

  • Switches and switching

  • Theoretical foundation and fundamental bounds

  • Topology characterization and inference

  • Underground and underwater networks

  • Vehicular networks

  • Wireless, mobile, ad-hoc, and sensor networks

 

 

Author Instructions

Authors are invited to submit papers describing original research of theoretical or practical significance to Network Systems and Security. Submitted papers must describe work not previously published. They must not be submitted simultaneously to another conference with refereed proceedings or to a journal. Papers should not exceed 10 pages in IEEE style. Please find the template of IEEE style here. Papers significantly shorter than 10 pages, however, having sufficient novelty and depth are also welcome.  Only electronic submissions will be allowed.

Paper Submission Link: Click Here

 

Proceedings

This conference is included in the IEEE Conference Publications Program (CPP). IEEE has a long-standing commitment to ensuring the high quality of its conferences and of the conference proceedings published in IEEE Xplore®. Therefore, IEEE reserves the right to withhold publishing of proceedings that do not meet the IEEE quality standards. IEEE makes every reasonable attempt to ensure that abstract and index entries of content accepted into the CPP are included in databases provided by independent abstracting and indexing (A&I) services. Each A&I partner makes its own editorial decision on what content it will index.  IEEE cannot guarantee entries are included in any particular database.

 

Journal Special Issue
Selected papers appeared in the conference will be considered, upon submission, in a special issue of a reputed journal (Special Issue on Security and Privacy in Unified Communications: Challenges and Solutions, Computer Communications Journal, Elsevier [Pending approval]). 

 

Technical Co-Sponsorship
This conference is technically co-sponsored by ACM Chapter. (IEEE Technical Co-Sponsorship [Pending approval])

 

Venue
The conference will be held in Department of Computer Science and Engineering (CSE), Bangladesh University of Engineering and Technology (BUET), Dhaka.

 

 

NSysS Organizing Committee