Tag: apt

Jan 12

AICT 2012, The Eighth Advanced International Conference on Telecommunications


AICT 2012, The Eighth Advanced International Conference on Telecommunications

May 27 – June 1, 2012 – Stuttgart, Germany

General page: http://www.iaria.org/conferences2012/AICT12.html

Call for Papers: http://www.iaria.org/conferences2012/CfPAICT12.html

– regular papers

– short papers (work in progress)

– posters

Submission page: http://www.iaria.org/conferences2012/SubmitAICT12.html

Submission deadline: January 16, 2012

Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Please note the Poster and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. 
All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

AICT 2012 Topics (topics and submission details: see CfP on the site)

Signal processing, protocols and standardization

Standardization (IEEE 802.17, Policy Models, Etc.); IEEE 802.11 engineering; Telecommunications protocol engineering; Future networks: protocol and standards; Standardization (IEEE 802.15, IEEE 802.16); Communication theory, signal processing, modulation; Modulation, coding and synchronization; Propagation, antennas and channel characterization; Signal separation and Interference rejection; Critical infrastructure protection

Ad Hoc, autonomic and sensor networks

Autonomic home networking; Sensor, mesh, and Ad hoc networks; Programmable networks; Active networks; Self-organization and network reconfiguration; Partial and intermittent resources and services; Unicast and multicast routing; Radio resource sharing in wireless networks; Energy-efficient communications; Vehicular Ad hoc networks; Underwater sensor networks; Emerging sensor technologies; Intelligent video surveilance; Multi-sensor surveillance;

Wireless technologies

3G And 4G Mobile communications services; Evolution from 2G To 2.5G, 3G and beyond; Wireless multimedia and networks and systems; Cellular and Ad hoc networks; Mobile broadband technologies; Mobile software (agents); Wireless access (WPAN, WLAN, WLL); Wireless communications antennas and propagation and transmission technologies; Vertical, horizontal and diagonalhandover; Broadband wireless technology (HSDPA, HSUPA, LTE, Wimax, Wiran); Cross-layer modeling and design; Heterogeneity and diversity; Ultra-wideband communications (UWB); Wireless hacking;

Management, operation and control networks

Monitoring telecommunicaitons systems; Network management contingency challenges; Real-time traffic and QoS; Performance and QoS, traffic engineering (MPLS, Diffserv, Intserv, Etc.); Telecommunications management and control of heterogeneous networks; Mobility control and mobility engineering; Mobile video surveillance; Mobility and QoS management; Communications networks security; Information security; IPR and network security;

Core technologies and access technologies and networks

Wireless-fiber convergence; Metro/Access networks; Broadband access networks and services; Next Generation Networks and technologies; Future Internet; Inteligent & Smart networks; Grid, Cluster and Internet computing; Designing and management of optical networks; Performance of optical networks; Future technologies in optical communications; PLC (Homeplug, OPERA, UPA, CEPCA, IEEE, HD-PLC Alliance);

Future applications and services

Service-oriented architectures; E-Learning and mobile learning on telecommunications; SOHO (Small Offices/Home Offices; Emerging telecommunications software tools; Object and component technologies in telecommunication software; Platforms for Web Services-based applications and services; Web Services communications, applications, and performance; Applications in telemedicine; Security and trust in future services applications;

Optical Technologies

Optical internetworking architectures; Novel architectures for optical routers and switches; Optical packet / burst switching; Optical multi-wavelength label switching; Optical network performance modeling; Optical network control and management;  Measurement, monitoring and supervision techniques; Security and privacy in optical networks; Optical access networks designs and protocols; High speed optical LANs and gigabit Ethernet;  Energy efficiency in optical networks; Inter-working between optical and wireless networks; Optical Grids, optical networking for cloud computing; Optical integrated circuits and novel transmission methods; Standards for optical internetworking; Optical networks for future Internet design; Multi-domain routing protocols for IP over optical networks; Control and management protocols for IP over optical networks; Next-generation IP networking and Optical Internet; Development prospect for Optical Internet; Optical transmission systems and technologie
s; Optical access systems and technologies; Optical devices

Cognitive radio

Cognitive radio technologies and opportunistic spectrum utilization; Spectrum sensing technologies; Dynamic spectrum access; Information theory and performance limits of dynamic spectrum access; Distributed algorithms for spectrum detection and cooperative spectrum sensing; Inter- and Intra- standards interoperability; Cross-layer algorithms based on spectrum sensing techniques; Advanced signal processing techniques for cognitive radio; Physical-layer design of software radio and cognitive radio transceivers; Interference and coexistence analysis; Radio resource allocation; Decision making; Game theory; Cognitive radio with reinforcement learning; SWR and CR management; Cognitive radio sensing in the large and feature detection; Spectrum and performance management in cognitive radio networks; Cognitive radio applications; Future Internet with cognitive technologies; Flexible and opportunistic wireless access; Multimedia communications through cognitive networks; Regulatory po
licies on spectrum sharing for future broadband networks; Cognitive radio standards; Cognitive radio architecture for equipments; Enabling SDR technology for cognitive radio; Hardware reconfigurability; Testbbeds

Teletraffic modeling and management

Traffic and performance measurements; Traffic characterization and modeling; Trends and patterns; Scaling phenomena; Packet and flow level models; Traffic control and QosS; Queuing theory and queuing networks; Performance evaluation; Scheduling and admission control; Reservation and priority mechanisms; Overload control; Broadcast and multicast traffic control; Analytical and numerical analysis; Network design and optimization of wired and wireless networks; Mobility and resource management; Traffic monitoring and management; Traffic engineering in multi-technology networks; Internet traffic engineering; Traffic grooming; Simulation methodology for communications networks; Simulation models and tools;

E-Learning and telecommunications

Architecture of learning technology systems; Advanced uses of multimedia and hypermedia; Integrated learning and educational environments; National and international projects on e-learning and telecommunications; Remote and wireless teaching technologies; Navigational aspects for learning; e-Learning industry and universities programs; Anytime/anywhere e-learning and wearable network devices; Tutoring e-learning applications and services; Cost models for e-learning on telecommunications; Satellite technologies for e-learning; Teaching e-learning methodologies and technologies; Adaptive e-learning and intelligent applications/tools; Agent technology; Training e-learning teachers; Practical uses of authoring tools; Application of metadata and virtual reality; Collaborative learning/groupware; Intelligent tutoring systems; Internet based systems; Application of instructional design theories; Evaluation of learning technology systems; Standards related activities;

Committee: http://www.iaria.org/conferences2012/ComAICT12.html

Jan 08

Laptop seizures at customs cause thorny legal dispute – Business – The Boston Globe

David House took his laptop to Mexico a little over a year ago, hoping to squeeze in some work between sightseeing, fishing, and laying on the beach. All went well, vacation- and work-wise, until the former MIT researcher landed in Chicago, where federal agents seized his laptop, kept it for nearly two months, and may have shared information on his hard drive with several government agencies.

via Laptop seizures at customs cause thorny legal dispute – Business – The Boston Globe.

Dec 22

Apple obtient l’interdiction des smartphones HTC aux USA

“l’International Trade Commission ITC a reconnu qu’un brevet déposé par Apple a été violé par le constructeur taïwanais. En conséquence, l’instance en charge d’arbitrer les conflits de propriété intellectuelle aux États-Unis a ordonné une interdiction de vente des smartphones HTC à partir du 19 avril 2012.Le brevet en question, numéroté 5 946 647, a été déposé en 1996. Il concerne un système d’adaptation des actions proposées à l’utilisateur en fonction des données identifiées dans un document. Formulé ainsi, le brevet concerne manifestement le cas d’une adresse mail présente dans un document et avec laquelle l’utilisateur peut interagir en cliquant dessus pour lancer un client de courrier électronique par exemple.”

via Apple obtient l’interdiction des smartphones HTC aux USA.

Dec 09

13 Out Of 15 Popular CAPTCHA Schemes Vulnerable To Automated Attacks | Darknet – The Darkside

13 Out Of 15 Popular CAPTCHA Schemes Vulnerable To Automated Attacks | Darknet – The Darkside.

Nov 30

Semer = Pirater ? | Korben

“Dans le domaine d’Internet et de l’informatique, on commence tous à très bien maitriser ces notions de piratage, de brevets, de copies et on a bien capté que grâce au travail des lobbyistes en France, comme en Europe, on se retrouve très souvent avec des lois “à la carte” pour les industries et puissants de ce monde.

Mais saviez-vous que nos amis agriculteurs souffraient exactement du même problème ? Ce n’est pas nouveau effectivement, mais ça s’aggrave… La preuve avec cette transposition d’un règlement européen de 1994 transformée cette année en proposition de loi par l’UMP et adoptée ce lundi par les députés qui a pour objectif d’empêcher les agriculteurs français de replanter leurs propres récoltes d’une année sur l’autre.”

Semer = Pirater ? | Korben.

Nov 07

Stanford Researchers Crack “Captcha” Test

Stanford Researchers Crack “Captcha” Test.

Oct 23

ICCIT 2012 – Second International Conference on Communications and Information Technology ICCIT 2012

Deadline: January 16, 2012 When: June 26, 2012 – June 28, 2012

Where: Hammamet / Tunisia Tunisia

Updated: 15:03:00 Oct. 19, 2011 GMT+9

Call For Papers – CFP

Prospective authors are invited to submit an original full-length paper (10-point font) in IEEE format via the EDAS submissions system. Note that the maximum number of pages is 6; 5 pages plus 1 additional page allowed with a charge for the one additional page of USD100 if accepted. Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published.

IEEE specification based Latex and MS-Word templates for paper submission are available here.

The program committee may designate one accepted paper per track to the conference as ICCIT-2012 Best Papers. Every submission is automatically eligible for this award. Each author on each of the selected papers will receive a certificate to be awarded at the award dinner banquet.

The conference has four tracks. Topics of interest include, but are not limited to:

Wireless Communications and Signal Processing

Wireless Cross Layer Design

Multi-Antenna and MIMO Systems

Cognitive Radio and Dynamic Spectrum Access

Broadband Wireless/ OFDM System

Broadband Wireless Techno. (LTE, WiMAX ..)

Convergence of Wireless Systems

Cognitive Radio and Dynamic Spectrum Access

Modulation, Coding, and Diversity Techniques

PHY-Layer Security

Wireless Communications Testbed Development

Signal Processing Interfaces in Cognitive Radio

Speech, Image and Video Signal Processing

Multimedia Communication Technologies

Spectrum Shaping and Filters

Transmitter and Receiver Techniques

Adaptive Antennas and Beamforming

Blind Signal Processing for Communications

Channel Estimation, Modeling and Equalization

Information Technology and Cloud Computing

Hybrid Information Technology

High Performance Computing

Cloud and Cluster Computing

Ubiquitous Networks and Wireless Communications

Digital Convergence

Multimedia Convergence

Intelligent and Pervasive Applications

Security and Trust Computing

IT Management and Service

Bioinformatics and Bio-Inspired Computing

Knowledge System and Intelligent Agent

Game and Graphics

Human-centric Computing and Social Networks

Computer Vision and Image Processing

Remote Sensing and GIS

IT Applications in different Areas

Engineering Applications of IT

Communication Networks and Systems

Cellular Systems, 3G/4G and beyond

Wireless Ad hoc, Mesh and Sensor Networks

Reconfigurable Wireless Networks

Resource Management, Mobility Management, and Admission Control

Cross-Layer Design and Optimization

Performance Analysis and QoS Provisioning

Network Planning, Capacity Analysis, and Topology Control

Monitoring and Network Management Algorithms

Fault-Tolerance and Traffic Reliability Issues

Pricing and Billing Modeling and Solutions

Optical Networking

Network Reliability, Privacy & Security

Next Generation Internet

Internet Architecture and Design

Internet Signalling and Service Enabling Protocols

Digital Information Management

Data Mining, Web Mining

E-Learning, e-Commerce, e-Business and e-Gov.

Web Metrics and its applications

XML and other extensible languages

Semantic Web, Ontologies and Rules

Artificial Intelligence and Decision Support Systems

Knowledge Management

Peer to Peer Data Management

Interoperability, Mobile Data Management

Data Exchange issues and Supply Chain

Data Life Cycle in Products and Processes

Security and Access Control

Information Content Security

Distributed Information Systems

Information Visualization, Web Services

Multimedia and Interactive Multimedia

Video Search and Video Mining

Oct 17

Schneier on Security: New Attacks on CAPTCHAs

Schneier on Security: New Attacks on CAPTCHAs.

Oct 10

Jupiter sous Ubuntu 11.10 | Korben

… sous Ubuntu, il n’y a pas de soft qui ajuste la consommation de la batterie en temps réel…C’est à vous que revient la tâche d’installer Jupiter, un petit applet qui vous permettra de switcher le niveau de performance de votre laptop et donc de gagner quelques précieux gigowatts.

via Jupiter sous Ubuntu 11.10 | Korben.

Oct 06

Séminaire de Crypto de l’ENS : A Decision Procedure for Trace Equivalence

Programme du séminaire Cryptographie
Ecole Normale Supérieure — 45, rue d'Ulm — Paris 5me


Conférencier : Vincent Cheval – ENS Cachan

Date : Jeudi 13 octobre 2011, 11 heures
École Normale Supérieure, Amphi Évariste Galois – NIR

Title: A Decision Procedure for Trace Equivalence

Abstract: We consider security properties of cryptographic protocols
that can be modeled using the notion of trace equivalence.
The notion of equivalence is crucial when specifying privacy-type
properties, like anonymity, vote-privacy, and unlinkability.
In this paper, we give a calculus that is close to the applied
pi calculus and that allows one to capture most existing protocols
that rely on classical cryptographic primitives.
First, we propose a symbolic semantics for our calculus relying
on constraint systems to represent infinite sets of possible traces,
and we reduce the decidability of trace equivalence to deciding a
notion of symbolic equivalence between sets of constraint systems.
Second, we develop an algorithm allow- ing us to decide whether
two sets of constraint systems are in symbolic equivalence or not.
Altogether, this yields the first decidability result of trace
equivalence for a general class of processes that may involve
else branches and/or private channels (for a bounded number
of sessions).