IPTComm 2007 Call for Participation
Please find enclosed the Call for Participation for a new conference devoted to IP telecommunications to be held in New York, July 2007. You are encouraged to circulate this message to interested colleagues, mailing lists, forums and blogs.
Greg Bond
IPTComm 2007 Co-Chair
==============================================================
Call For Participation
IPTComm 2007
PRINCIPLES, SYSTEMS AND APPLICATIONS OF IP TELECOMMUNICATIONS
19, 20 July 2007
Columbia University
NY, USA
(in cooperation with ACM SIGCOMM)
http://iptcomm.org
Registration for IPTComm 2007 is now open! Be sure to register soon in order to qualify for the early registration discount. The conference program has been finalized. Some highlights are: a stimulating technical program, Jeff Pulver as the keynote speaker, Jonathan Rosenberg opening Day Two, a panel discussion with broad representation from industry and academia, two tutorials, and a demos program. We are now in the process of organizing some entertaining social events. Details will be available soon. Hope to see you in New York in July!
Hi John,
Is I said in the mail I sent you, I'd be interested in having a go at this. We use TRAC in house and it would be nice to have a connector up and running for TPC.
I'm hoping others would be willing to join in as well.
Thanks
Femi
Similar Messages
-
Please find enclosed the Call for Demos for a new conference devoted to IP telecommunications to be held in New York, July 2007. You are encouraged to circulate this CFD to interested colleagues, mailing lists, forums and blogs.
Greg Bond
IPTComm 2007 Co-Chair
==============================================================
Call For Demos
IPTComm 2007
PRINCIPLES, SYSTEMS AND APPLICATIONS OF IP TELECOMMUNICATIONS
19, 20 July 2007
Columbia University
NY, USA
(in cooperation with ACM SIGCOMM)
http://iptcomm.org
IPTComm features a special session for demonstrations. Topics of interest cover all aspects of VoIP and IMS security as well as convergent services, as outlined in the main conference call for papers. Demos will be held on July 20 at the main conference venue.
All demonstration submissions should include a title, a short description of the system, a summary of its novel characteristics, the list of functions and features to be demonstrated, and state the significance of the contribution relevant to the Conference themes. Submissions must be in English and must not exceed four pages. We encourage authors to include in their submissions a link to a set of screenshots and/or mockups and/or animations of the proposed demonstration where possible.
Submissions will be evaluated on the basis of their innovation, practical value, relevance and presentation. Accepted submissions will be published on the Conference website.
Submissions are to be sent as email attachments (PDF format) to [email protected]
DEADLINES
Submission Deadline: June 01, 2007
Notification: June 15, 2007
Demo: July 20, 2007
DEMO COMMITTEE
Gregory W. Bond - AT&T
Henning Schulzrinne - Columbia University
Dorgham Sisalem - TekelecWe haven't seen 'the call' go out. Remember OpenWorld is about a month later this year.
We will post something here as soon as we get the word.
thanks
Steve -
Please find enclosed the Call for Papers for a new conference devoted to IP telecommunications to be held in New York, July 2007. You are encouraged to circulate this CFP to interested colleagues, mailing lists, forums and blogs.
Greg Bond
IPTComm 2007 Co-Chair
==============================================================
CALL FOR PAPERS
IPTComm 2007
PRINCIPLES, SYSTEMS AND APPLICATIONS OF IP TELECOMMUNICATIONS
19, 20 July 2007
Columbia University
NY, USA
http://iptcomm.org
While standards and products now support PSTN-equivalent services for voice, video and text over IP, there are significant difficulties in deploying large-scale, reliable and secure IP telecommunication systems. Services that go beyond basic call features remain hard to develop and deploy.
The aim of the IPTComm conference is to serve as a platform for researchers from academia and research labs, industry and government to share their ideas, views, results and experiences in the field of IP-based telecommunication. IPTComm will include presentations of theoretical and experimental achievements, innovative security systems, prototyping efforts, case studies, and advancements in technology directly affecting IP-based telecommunication in general and VoIP and IMS services in particular.
We invite authors to submit papers in the following and related areas:
VoIP and IMS Security:
* Denial of Service detection and prevention
* Security models of voice, video and text over IP services
* Detection and prevention of SPIT, Phreaking, Vishing
* Fraud detection and prevention
* Prevention and mitigation of security attacks
* End-to-end security
* Inter-provider trust and verification schemes
Qos and billing:
* QoS for voice and video
* Traffic and QoS measurement of VoIP and IMS traffic
* Billing, AAA
* Management of VoIP infrastructure and services
* VoIP and IMS system performance, reliability and scalability
Convergent Services:
* VoIP emergency services
* Service architectures (e.g. Parlay, SIP Servlets, IMS)
* Service creation environments and languages
* Presence and event notification
* Interactive collaboration beyond voice, video and text
* Feature interaction
The IPTComm conference is a two-day conference.
PAPER SUBMISSION
IPTComm solicits full papers up to 12 pages in length, in two-column ACM conference format (see http://www.acm.org/sigs/pubs/proceed/template.html). All submissions must describe original research, not published nor currently under review for another conference or journal. The program committee will referee all papers, and accepted papers will be published in the conference proceedings. Pending cooperation agreements, papers will also be published in the ACM Digital Library.
DEADLINES
Submission deadline: February 28, 2007
Notification: May 01, 2007
Final Submission: June 10, 2007
CONFERENCE CHAIRS
Gregory W. Bond - AT&T
Henning Schulzrinne - Columbia University
TECHNICAL COMMITTEE
Gregory W. Bond - AT&T
Sapan Bhatia - Princeton University
Gonzalo Camarillo - Ericsson
George Carle - Tubingen University
Eric Chen - NTT
Charles Consel - Inria
Ram Dantu - University of North Texas
Luigi Logrippo - Universite du Quebec en Outaouais
Evan H. Magill - University of Stirling
Saverio Niccolini - NEC
Aki Niemi - Nokia
Calton Pu - Georgia Tech
Gunter Schafer - University of Ilmenau
Henning Schulzrinne - Columbia University
Dorgham Sisalem - Tekelec
Radu State - Inria
Simon Tsang - Telcordia
Xiaotao Wu - Avaya
Pamela Zave - AT&TWe haven't seen 'the call' go out. Remember OpenWorld is about a month later this year.
We will post something here as soon as we get the word.
thanks
Steve -
Call for participation: OASIS Enterprise Key Management Infrastructure TC
We would welcome your participation in this process. Thank you.
Arshad Noor
StrongAuth, Inc.
To: OASIS members & interested parties
A new OASIS technical committee is being formed. The OASIS Enterprise Key
Management Infrastructure (EKMI) Technical Committee has been proposed by the
members of OASIS listed below. The proposal, below, meets the requirements of
the OASIS TC Process [a]. The TC name, statement of purpose, scope, list of
deliverables, audience, and language specified in the proposal will constitute
the TC's official charter. Submissions of technology for consideration by the
TC, and the beginning of technical discussions, may occur no sooner than the
TC's first meeting.
This TC will operate under our 2005 IPR Policy. The eligibility
requirements for becoming a participant in the TC at the first meeting (see
details below) are that:
(a) you must be an employee of an OASIS member organization or an individual
member of OASIS;
(b) the OASIS member must sign the OASIS membership agreement [c];
(c) you must notify the TC chair of your intent to participate at least 15
days prior to the first meeting, which members may do by using the "Join this
TC" button on the TC's public page at [d]; and
(d) you must attend the first meeting of the TC, at the time and date fixed
below.
Of course, participants also may join the TC at a later time. OASIS and the TC
welcomes all interested parties.
Non-OASIS members who wish to participate may contact us about joining OASIS
[c]. In addition, the public may access the information resources maintained for
each TC: a mail list archive, document repository and public comments facility,
which will be linked from the TC's public home page at [d].
Please feel free to forward this announcement to any other appropriate lists.
OASIS is an open standards organization; we encourage your feedback.
Regards,
Mary
Mary P McRae
Manager of TC Administration, OASIS
email: mary.mcrae(AT)oasis-open.org
web: www.oasis-open.org
a) http://www.oasis-open.org/committees/process.php
b) http://www.oasis-open.org/who/intellectualproperty.php
c) See http://www.oasis-open.org/join/
d) http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=ekmi
CALL FOR PARTICIPATION
OASIS Enterprise Key Management Infrastructure (EKMI) TC
Name
OASIS Enterprise Key Management Infrastructure (EKMI) TC
Statement of Purpose
Public Key Infrastructure (PKI) technology has been around for more than a
decade, and many companies have adopted it to solve specific problems in the
area of public-key cryptography. Public-key cryptography has been embedded in
some of the most popular tools -- web clients and servers, VPN clients and
servers, mail user agents, office productivity tools and many industry-specific
applications -- and underlies many mission-critical environments today.
Additionally, there are many commercial and open-source implementations of PKI
software products available in the market today. However, many companies across
the world have recognized that PKI by itself, is not a solution.
There is also the perception that most standards in PKI have already been
established by ISO and the PKIX (IETF), and most companies are in
operations-mode with their PKIs -- just using it, and adopting it to other
business uses within their organizations. Consequently, there is not much left
to architect and design in the PKI community.
Simultaneously, there is a new interest on the part of many companies in the
management of symmetric keys used for encrypting sensitive data in their
computing infrastructure. While symmetric keys have been traditionally managed
by applications doing their own encryption and decryption, there is no
architecture or protocol that provides for symmetric key management services
across applications, operating systems, databases, etc. While there are many
industry standards around protocols for the life-cycle management of asymmetric
(or public/private) keys -- PKCS10, PKCS7, CRMF, CMS, etc. -- however, there is
no standard that describes how applications may request similar life-cycle
services for symmetric keys, from a server and how public-key cryptography may
be used to provide such services.
Key management needs to be addressed by enterprises in its entirety -- for both
symmetric and asymmetric keys. While each type of technology will require
specific protocols, controls and management disciplines, there is sufficient
common ground in the discipline justifying the approach to look at
key-management as a whole, rather than in parts. Therefore, this TC will
address the following:
Scope
A) The TC will create use-case(s) that describe how and where
the protocols it intends to create, will be used;
B) The TC will define symmetric key management protocols,
including those for:
1. Requesting a new or existing symmetric key from a server;
2. Requesting policy information from a server related to caching of keys on the
client;
3. Sending a symmetric key to a requestor, based on a request;
4. Sending policy information to a requestor, based on a request;
5. Other protocol pairs as deemed necessary.
C) To ensure cross-implementation interoperability, the TC will create a test
suite (as described under 'Deliverables' below) that will allow different
implementations of this protocol to be certified against the OASIS standard
(when ratified);
D) The TC will provide guidance on how a symmetric key-management infrastructure
may be secured using asymmetric keys, using secure and generally accepted
practices;
E) Where appropriate, and in conjunction with other standards organizations that
focus on disciplines outside the purview of OASIS, the TC will provide input on
how such enterprise key-management infrastructures may be managed, operated and
audited;
F) The TC may conduct other activities that educate users about, and promote,
securing sensitive data with appropriate cryptography, and the use of proper
key-management techniques and disciplines to ensure appropriate protection of
the infrastructure.
List of Deliverables
1. XSchema Definitions (XSD) of the request and response protocols (by August
2007) 2. A Test Suite of conformance clauses and sample transmitted keys and
content that allows for clients and servers to be tested for conformance to the
defined protocol (by December 2007)
3. Documentation that explains the communication protocol (by August 2007)
4. Documentation that provides guidelines for how an EKMI may be built,
operated, secured and audited (by December 2007)
5. Resources that promote enterprise-level key-management: white papers,
seminars, samples, and information for developer and public use. (beginning
August 2007, continuing at least through 2008)
Anticipated Audiences:
Any company or organization that has a need for managing cryptographic keys
across applications, databases, operating systems and devices, yet desires
centralized policy-driven management of all cryptographic keys in the
enterprise. Retail, health-care, government, education, finance - every industry
has a need to protect the confidentiality of sensitive data. The TC's
deliverables will provide an industry standard for protecting sensitive
information across these, and other, industries.
Security services vendors and integrators should be able to fulfill their use
cases with the TC's key management methodologies.
Members of the OASIS PKI TC should be very interested in this new TC, since the
goals of this TC potentially may fulfill some of the goals in the charter of the
PKI TC.
Language:
English
IPR Policy:
Royalty Free on Limited Terms under the OASIS IPR Policy
Additional Non-normative information regarding the start-up of the TC:
a. Identification of similar or applicable work:
The proposers are unaware of any similar work being carried on in this exact
area. However, this TC intends to leverage the products of, and seek liaison
with, a number of other existing projects that may interoperate with or provide
functionality to the EKMI TC's planned outputs, including:
OASIS Web Services Security TC
OASIS Web Services Trust TC
W3C XMLSignature and XMLEncryption protocols and working group
OASIS Digital Signature Services TC
OASIS Public Key Infrastructure TC
OASIS XACML TC (and other methods for providing granular access-control
permissions that may be consumed or enforced by symmetic key management)
b. Anticipated contributions:
StrongAuth, Inc. anticipates providing a draft proposal for the EKMI protocol,
at the inception of the TC. The current draft can be viewed at:
http://www.strongkey.org/resources/documentation/misc/skcl-sks-protocol.html
and a working implementation of this protocol is available at:
http://sourceforge.net/projects/strongkey for interested parties.
c. Proposed working title and acronym for specification:
Symmetric Key Services Markup Language (SKSML), subject to TC's approval or
change.
d. Date, time, and location of the first meeting:
First meeting will be by teleconference at:
Date: January 16, 2007
Time: 10 AM PST, 1PM EST
Call in details: to be posted to TC list
StrongAuth has agreed to host this meeting.
e. Projected meeting schedule:
Subject to TC's approval, we anticipate monthly telephone meetings for the first
year. First version of the protocol to be voted on by Summer 2007. StrongAuth is
willing to assist by arranging for the teleconferences; we anticipate using
readily available free teleconference services.
f. Names, electronic mail addresses, of supporters:
Ken Adler, ken(AT)adler.net
June Leung,June.Leung(AT)FundServ.com
John Messing, jmessing(AT)law-on-line.com
Arshad Noor, arshad.noor(AT)strongauth.com
Davi Ottenheimer, davi(AT)poetry.org
Ann Terwilliger, aterwil(AT)isa.com
g. TC Convener:
Arshad Noor, arshad.noor(AT)strongauth.comHi Bilge,
did you put your text in a blender before sending it?
I understood everything works fine except the miscellaneous menu item in the configuration tab of ERM?
Have you already tried to clear all browser cache, close all browsers and try it again?
Best,
Frank -
VL 2000 Call for Participation
VL'2000: IEEE Symposium on Visual Languages
September 10-14, 2000
Seattle, Washington
http://www.cs.orst.edu/~burnett/vl2000/
Call for Participation
VL'2000 is the premier international conference on visual and
multimedia languages for creating/understanding software.
We hope you will plan to join us at this year's conference, which
includes keynote talks by Brad Myers and Tony DeRose, a special
session by S.-K. Chang, tutorials, satellite workshops, a social
program to provide a sampling of some of Seattle's unique attractions,
and more. Here are some of the details:
Opening keynote: Brad Myers (Carnegie-Mellon University).
Brad Myers is an extremely well known researcher in programming by
demonstration. His topic will be "Creating More Natural Programming
Languages," a description of his new line of research into
deriving the design of a programming language from the results of
human-factors experiments and principles.
Closing keynote: Tony DeRose (Pixar Animation Studios).
Tony DeRose is a senior scientist at Pixar, and was a major
contributor
to the Oscar winning short film "Geri's Game." In 1999 he received
the ACM SIGGRAPH Computer Graphics Achievement Award. His topic
will be "How Computer Graphics is Changing Hollywood," a behind-the-
scenes look at how fully digital films --- such as Pixar's "A Bug's
Life" and "Toy Story 2"--- are made, with particular emphasis on the
role that geometry plays in the revolution.
Tutorial -- Diagrammatic Reasoning and Visual Languages: How to draw
upon research findings from psychology, art, mathematics, and
human-computer interaction to design a diagrammatic visual
language or environment.
Tutorial -- Object-Oriented Software Development of Multimedia
Applications with UML: UML is becoming extremely popular. This
tutorial will introduce participants to UML diagrams, and will
preview
the currently proposed UML extensions to model multimedia
applications.
Tutorial -- Advanced Visual Modelling: Beyond UML:
An overview of UML and some of its strengths and weaknesses, and
alternative visual reasoning mechanisms that can be used instead of
or in conjunction with UML.
Tutorial -- Programming by Example Techniques: Introduction and survey
of a broad range of techniques used in programming systems that
allow the user to give examples of the desired behaviors and
contents, from which the system generalizes.
Satellite Workshop -- The Visual End User:
http://borg.cs.dal.ca/~smedley/veu/index.html
Satellite Workshop -- Visual Methods for Parallel/Distributed
Programming:
http://wwwmath.uni-muenster.de/math/u/guidow/wsvl2000/index.html
Satellite Workshop -- Multimedia Computing on the World Wide Web:
http://grail.cba.csuohio.edu/~mcwww2k/Vl2000.html
Also, S.-K. Chang will be doing a special presentation on the emerging
subarea of Multimedia Software Engineering.
Finally, our social program this year includes two receptions, an
excursion to Paradise on Mount Rainier, and a banquet. See the web
page for details.
Please join us! More information, including the advance program
and registration details, is available at:
http://www.cs.orst.edu/~burnett/vl2000/
Hotel reservation deadline for the special VL rates: August 9.
Conference registration deadline for the early rates: August 15.Hi John,
Is I said in the mail I sent you, I'd be interested in having a go at this. We use TRAC in house and it would be nice to have a connector up and running for TPC.
I'm hoping others would be willing to join in as well.
Thanks
Femi -
IPTComm 2010 Call for Papers: Deadline Extended
CALL FOR PAPERS: DEADLINE EXTENDED
4th ACM Conference on Principles, Systems and Applications of IP Telecommunications
IPTComm 2010
http://www.iptcomm.org
August 2-3, 2010
Leibniz Supercomputing Center
Munich, Germany
IMPORTANT DATES
================
Paper registration: Midnight, March 5, 2010.
Paper submission: Midnight March 19th, 2010 (Firm deadline).
Notification of acceptance: May 21st, 2010.
Final camera-ready submission: June 30th, 2010.
Conference dates: August 2-3, 2010.
The paper submission deadline has been extended to March 19, 2010.
However, authors are required to register with EDAS and submit
their paper abstract by the original deadline of Midnight March 5,
2010.
The IP communications domain has matured beyond providing VoIP only
services. Universities, enterprises, businesses and individual
consumers routinely use VoIP. The focus of IP communications is now on
the operations, management, administration and provisioning aspects of
large-scale, reliable and secure communication systems. To this extent,
the research and standardization work now includes log file analysis,
session tracing across proxy meshes and overload control. As IP
communications grapples with these issues, newer technologies in the
form of cloud-based IP communication systems; peer-to-peer VoIP
networks; use of IP communications in virtual worlds; social
networks and IP communications are starting to assert a strong
presence in the IP communications domain.
The aim of the IPTComm conference is to serve as a platform for
researchers from academia, research labs, industry and government to
share their ideas, views, results and experiences in the field of
IP-based telecommunication. IPTComm will include presentations of
theoretical and experimental achievements, innovative systems,
prototyping efforts, case studies, and advancements in technology.
We invite authors to submit papers in the following and related areas:
New services and service models
* Over-the-top services.
* Social networking and IP communications.
* IP telecommunications in virtual worlds.
* Compositional services and model checking.
* Cloud-based IP communications infrastructure.
* Rapid application development frameworks.
* APIs and enablers for IP communication services.
* Browser-based IP communication services.
* Context-aware communication services.
* IMS and NGN services.
Management and Resilience
* Advantages and disadvantages of IP communications as a P2P
application.
* Advances in P2P overlays for IP communications systems.
* Management of IP communications systems and networks.
* Overload management schemes for IP communications.
* Log files and log file analysis for IP communication systems.
* Scalability of large-scale IP communication systems.
* Traffic and QoS measurement of VoIP traffic.
* Self-tuning and self-monitoring IP communications systems.
* Service discovery.
* Energy consumption and energy management in IP communication
systems.
* Incentives in P2P IP communication systems.
* Resilience in P2P IP communication system.
Security
* Identity management for IP communications systems.
* Anonymity and privacy in IP communications.
* Forensics and diagnostics in IP communication systems.
* Techniques to detect, mitigate and prevent SPIT, phreaking
and vishing.
* Denial of service detection and prevention.
Mobile IP Communications
* Mobile IP communication services.
* Mobility in cloud-based IP communications infrastructure.
* Mobile P2P IP communication systems.
Miscellaneous
* The role of IP communications in the power grid.
* Open source development in IP communications.
* Research issues in vertical IP communication markets (e.g.,
privacy in the medical field, location in logistical
field, etc.)
* Regulatory issues in IP communications.
AUTHOR INFORMATION
==================
Papers submission is handled by EDAS (http://edas.info/N8459).
IPTComm solicits full papers up to 12 pages in length, in two-column
ACM conference format
(see http://www.acm.org/sigs/publications/proceedings-templates). All
submissions must describe original research, not published nor
currently under review for another conference or journal. The program
committee will referee all papers, and accepted papers will be
published in the conference proceedings. Papers will also be published in
the ACM Digital Library.
In 2010, IPTComm will be accepting short papers of at least 5 pages and
no more than 6 pages. The aim of the short paper category is to help
maintain a published record of work carried out as well as facilitate
future affiliations and foster collaborative work. Short papers are
subject to the same rigorous review process as full papers and follow
the same submission process, schedule and expectation of presentation as
the full papers.
IMPORTANT DATES
================
Paper registration: Midnight, March 5, 2010.
Paper submission: Midnight March 19th, 2010 (Firm deadline).
Notification of acceptance: May 21st, 2010.
Final camera-ready submission: June 30th, 2010.
Conference dates: August 2-3, 2010.
Conference Location: Leibniz Supercomputing Center, Munich, Germany.
CONFERENCE CO-CHAIRS
====================
Georg Carle (Technical University of Munich)
Helmut Reiser (Leibniz Supercomputing Center)
TPC CO-CHAIRS
=============
Gonzalo Camarillo (Ericsson Research)
Vijay K. Gurbani (Bell Laboratories/Alcatel-Lucent)
DEMONSTRATION AND INDUSTRY TALKS CO-CHAIRS
==========================================
Carol Davids (Illinois Institute of Technology)
Saverio Niccolini (NEC Laboratories Europe)
PUBLICITY CHAIR
===============
Gregory Bond (AT&T Research)
Steering Committee
==================
Gregory Bond (AT&T Research)
Saverio Niccolini (NEC Laboratories Europe)
Henning Schulzrinne (Columbia University)
Dorgham Sisalem (Tekelec)
Radu State (University of Luxembourg)
TPC MEMBERS
===========
John Buford Avaya Labs Research
Eric Chen NTT Corporation
Eric Cheung AT&T Labs - Research
Tasos Dagiuklas Technological Educational Institute of Mesolonghi
Carol Davids Illinois Institute of Technology
Ali Fessi Technical University of Munich
Rosario Garroppo University of Pisa
Aniruddha Gokhale Vanderbilt University
Swapna Gokhale University of Connecticut
Carmen Guerrero University Carlos III of Madrid
Christian Hoene University of Tubingen
Alan Jeffrey Bell Laboratories, Alcatel-Lucent
Cullen Jennings Cisco
Salvatore Loreto Ericsson
Jouni Maenpaa Ericsson
Enrico Marocco Telecom Italia
Joerg Ott Helsinki University of Technology
Victor Pascual Avila Acme Packets
Joachim Posegga University of Passau
Anand Prasad NEC Corporation
Yacine Rebahi Fraunhofer Institut Fokus, Berlin
Ivica Rimac Bell Laboratories, Alcatel-Lucent
Ronaldo Salles Military Institute of Engineering (Brazil)
Stefano Salsano University of Rome "Tor Vergata"
Jan Seedorf NEC Europe Ltd.
Jose Solar Technical University of Denmark
Ivan Vidal University Carlos III of Madrid
Xiaotao Wu Avaya Labs Research
Pamela Zave AT&T LaboratoriesReminder: Our call for papers is closing on Monday 27th July. Be sure to send your abstracts to [[email protected]]
We also have a Twitter account and will be posting updates via that. Se sure to follow: aus_ora_spatial
Ross. -
IPTComm 2010: Call for Papers
****** NOTE: Submissions due on Mar 5, 2010 *******
IPTCOMM 2010
============
The Fourth Conference on Principles, Systems and Applications of
IP Telecommunications
August 2 and 3, 2010
Leibniz Supercomputing Center
Munich, Germany
http://iptcomm.org
The IP communications domain has matured beyond providing VoIP only
services. Universities, enterprises, businesses and individual
consumers routinely use VoIP. The focus of IP communications is now on
the operations, management, administration and provisioning aspects of
large-scale, reliable and secure communication systems. To this extent,
the research and standardization work now includes log file analysis,
session tracing across proxy meshes and overload control. As IP
communications grapples with these issues, newer technologies in the
form of cloud-based IP communication systems; peer-to-peer VoIP
networks; use of IP communications in virtual worlds; social
networks and IP communications are starting to assert a strong
presence in the IP communications domain.
The aim of the IPTComm conference is to serve as a platform for
researchers from academia, research labs, industry and government to
share their ideas, views, results and experiences in the field of
IP-based telecommunication. IPTComm will include presentations of
theoretical and experimental achievements, innovative systems,
prototyping efforts, case studies, and advancements in technology.
We invite authors to submit papers in the following and related areas:
New services and service models
* Over-the-top services.
* Social networking and IP communications.
* IP telecommunications in virtual worlds.
* Compositional services and model checking.
* Cloud-based IP communications infrastructure.
* Rapid application development frameworks.
* APIs and enablers for IP communication services.
* Browser-based IP communication services.
* Context-aware communication services.
* IMS and NGN services.
Management and Resilience
* Advantages and disadvantages of IP communications as a P2P
application.
* Advances in P2P overlays for IP communications systems.
* Management of IP communications systems and networks.
* Overload management schemes for IP communications.
* Log files and log file analysis for IP communication systems.
* Scalability of large-scale IP communication systems.
* Traffic and QoS measurement of VoIP traffic.
* Self-tuning and self-monitoring IP communications systems.
* Service discovery.
* Energy consumption and energy management in IP communication
systems.
* Incentives in P2P IP communication systems.
* Resilience in P2P IP communication system.
Security
* Identity management for IP communications systems.
* Anonymity and privacy in IP communications.
* Forensics and diagnostics in IP communication systems.
* Techniques to detect, mitigate and prevent SPIT, phreaking
and vishing.
* Denial of service detection and prevention.
Mobile IP Communications
* Mobile IP communication services.
* Mobility in cloud-based IP communications infrastructure.
* Mobile P2P IP communication systems.
Miscellaneous
* The role of IP communications in the power grid.
* Open source development in IP communications.
* Research issues in vertical IP communication markets (e.g.,
privacy in the medical field, location in logistical
field, etc.)
* Regulatory issues in IP communications.
AUTHOR INFORMATION
==================
Papers submission is handled by EDAS (http://edas.info/N8459).
IPTComm solicits full papers up to 12 pages in length, in two-column
ACM conference format
(see http://www.acm.org/sigs/publications/proceedings-templates). All
submissions must describe original research, not published nor
currently under review for another conference or journal. The program
committee will referee all papers, and accepted papers will be
published in the conference proceedings. Pending cooperation agreements,
papers will also be published in the ACM Digital Library.
In 2010, IPTComm will be accepting short papers of at least 5 pages and
no more than 6 pages. The aim of the short paper category is to help
maintain a published record of work carried out as well as facilitate
future affiliations and foster collaborative work. Short papers are
subject to the same rigorous review process as full papers and follow
the same submission process, schedule and expectation of presentation as
the full papers.
IMPORTANT DATES
================
Paper submission: Midnight March 5th, 2010.
Notification of acceptance: May 21st, 2010.
Final camera-ready submission: June 30th, 2010.
Conference dates: August 2-3, 2010.
Conference Location: Leibniz Supercomputing Center, Munich, Germany.
CONFERENCE CO-CHAIRS
====================
Georg Carle (Technical University of Munich)
Helmut Reiser (Leibniz Supercomputing Center)
TPC CO-CHAIRS
=============
Gonzalo Camarillo (Ericsson Research)
Vijay K. Gurbani (Bell Laboratories/Alcatel-Lucent)
DEMONSTRATION AND INDUSTRY TALKS CO-CHAIRS
==========================================
Carol Davids (Illinois Institute of Technology)
Saverio Niccolini (NEC Laboratories Europe)
PUBLICITY CHAIR
===============
Gregory Bond (AT&T Research)
Steering Committee
==================
Gregory Bond (AT&T Research)
Saverio Niccolini (NEC Laboratories Europe)
Henning Schulzrinne (Columbia University)
Dorgham Sisalem (Tekelec)
Radu State (University of Luxembourg)
TPC MEMBERS
===========
John Buford Avaya Labs Research
Eric Chen NTT Corporation
Eric Cheung AT&T Labs - Research
Tasos Dagiuklas Technological Educational Institute of Mesolonghi
Carol Davids Illinois Institute of Technology
Ali Fessi Technical University of Munich
Rosario Garroppo University of Pisa
Aniruddha Gokhale Vanderbilt University
Swapna Gokhale University of Connecticut
Carmen Guerrero University Carlos III of Madrid
Christian Hoene University of Tubingen
Alan Jeffrey Bell Laboratories, Alcatel-Lucent
Cullen Jennings Cisco
Salvatore Loreto Ericsson
Jouni Maenpaa Ericsson
Enrico Marocco Telecom Italia
Joerg Ott Helsinki University of Technology
Victor Pascual Avila Acme Packets
Joachim Posegga University of Passau
Anand Prasad NEC Corporation
Yacine Rebahi Fraunhofer Institut Fokus, Berlin
Ivica Rimac Bell Laboratories, Alcatel-Lucent
Ronaldo Salles Military Institute of Engineering (Brazil)
Stefano Salsano University of Rome "Tor Vergata"
Jan Seedorf NEC Europe Ltd.
Jose Solar Technical University of Denmark
Ivan Vidal University Carlos III of Madrid
Xiaotao Wu Avaya Labs Research
Pamela Zave AT&T LaboratoriesReminder: Our call for papers is closing on Monday 27th July. Be sure to send your abstracts to [[email protected]]
We also have a Twitter account and will be posting updates via that. Se sure to follow: aus_ora_spatial
Ross. -
Please find below the "Call for Demos" for the
IPTComm 2008
http://iptcomm.org
Heidelberg, Germany,
July 1-2 2008.
Please feel free to circulate this call for demos to interested colleagues, mailing lists, forums and blogs.
==============================================================
Call for Demos:
IPTComm2008 (as already IPTComm2007) features a special session for demonstrations. Topics of interest cover all aspects of Services and Security for Next Generation Networks, as outlined in the main conference call for papers. Demos will be held as closing session on July 2 at the main conference venue. All demonstration submissions should include a title, a short description of the system, a summary of its novel characteristics, the list of functions and features to be demonstrated, and state the significance of the contribution relevant to the conference themes. Submissions must be in English and must not exceed four pages. We encourage authors to include in their submissions a link to a set of screenshots and/or mockups and/or animations of the proposed demonstration where possible. Submissions will be evaluated on the basis of their innovation, practical value, relevance and presentation. Accepted submissions will be published on the Conference website. Priority will be given to submissions that have industrial relevance and have a demonstrable impact on products in the short-medium term. The demo session is seen as an opportunity for researchers to come together with developers and industry to discuss practically oriented topics. Submissions are to be sent as email attachments (PDF format) to [email protected]
Deadlines:
Submission deadline: May 15, 2008
Notification: June 1, 2008
Demo: July 2, 2008
Demo Committee
Dorgham Sisalem - Tekelec
Ali Fessi - University of TubingenI am afraid I don't know how to make this Sticky... Maybe someone can email me the answer ?? [email protected]
As far as sharing material, ASUG has a non-disclosure agreements, which prohibits me from sharing the materials to the world at large. I agree that it would be nice to share ASUG presentations with everyone here at SDN/BPX, but I am not allowed to do so.
Thanks for the pointer about stickiness. -
OOW 2007 Call for papers?
It's July - OOW 2007 is approaching in November. I've been watching but have not found a call for papers this year. Is there going to be one?
BryanWe haven't seen 'the call' go out. Remember OpenWorld is about a month later this year.
We will post something here as soon as we get the word.
thanks
Steve -
Catalogue of SQL and PL/SQL bad practices: Call for participation
I started compiling a list of Oracle SQL and PL/SQL bad practices, with the intention of producing a comprehensive catalogue of common and recurring programming mistakes, that can be used as a check-list for code reviews or given to junior developers. I have identified about 30 bad practices so far. For each bad practice, I provided a list of symptoms in the code, an explanation why it causes problems and a list of preferred solutions.
My goal with this list is primarily to start a discussion about similar recurring issues that other people have noticed. That discussion should lead to a more complete list which the community will then be able to use, hopefully, to learn something from the mistakes of others and to produce better code.
I would really appreciate your feedback - if you are interested in discussing these practices we can either do it in this forum, or start a separate mailing list.
You can download the first version of the catalogue in PDF form from http://gojko.net/effective-oracle
gojko adzic
http://gojko.netexception handler (already covered), the philosophy
behind not using stored procedures, and having beenHi riedelme,
I'm not advocating not using stored procedures, but I am advocating not using exclusively stored procedures. I've seen that approach often, typically with people coming from SQL server or Oracle forms backgrounds, I never could understand the reasons behind it. Even for a simple select or update, they would write a stored proc that wraps the call and then require the client to execute a stored proc.
I think that views are much better for getting the data out of the database in general, and forcing people to use stored procedures with ref output cursors makes little sense. If the only possible interface is a stored proc, then one proc must be created for every required combination of data and every required filtering or grouping method, so there is much much more code in the database, and more code means harder maintenance.
If client apps can get data out using views, then they can join them with other views, filter or group the data as they require, which means that there is a lot less code in the database to maintain.
My other problem with stored-proc only approach is when people wrap simple insert/update/delete commands into a stored proc. Again, I'm not advocating using complex instead-of triggers to implement workflows and forcing people to use views, but I simply don't see any benefit of implementing a stored proc to do a simple update. I see a bad side of it because a stored proc needs to be implemented for every combination of columns that a client may need to update and every criteria that can be used for that. If a client is allowed to update a view, there is much less code in the database.
Views are, in my experience, also a lot easier to maintain and optimise without downtime because they can be revalidated without causing any problems to currently connected clients, where revalidated stored procedure or package will throw an exception the first time a connected client that had called it before calls it again.
If I'm missing something, please tell me. I'd really love to understand why someone would build a client API exclusively from stored procedures.
So far, I've been given explanations that it is for security purposes, or for performance. I don't know of any security restriction that can be implemented on a stored procedure or package that cannot be implemented with a view, and if bound variables and statement caching is used, sql statements don't suffer from sql injection and support pre-compilation.
Again, i'm not advocating throwing stored procs completely out, i'm against using them exclusively and throwing out any chance of SQL access.
gojko adzic
http://gojko.net -
Hello all,
I have a T2000 (sol10 8/07), OBP 4.27.7, SUNWldm 1.0.1, zfs version 4 that post os patching (using the Sept 08 Recommended patch cluster) now cannot use zfs volumes as virtual disks. Files on zfs filesystems used for boot devices however work fine (ie the ZFS for boot disk setup as described in the admin guide). Whenever I try and "bind-domain" on a guest domain using a zfs volume I see the following in /var/adm/messages on the primary domain...
Sep 3 15:16:56 isdsyddev13 specfs: [ID 853503 kern.notice] NOTICE: spec_getpage called for character device. Check any non-ON consolidation drivers
Sep 3 15:16:59 isdsyddev13 last message repeated 25903 times
syslog tail spins and chews up close to 100% of the cpu. The only way to recover the primary domain is to reboot it (and in some cases power cycle). On the system console I also see the following..
message overflow on /dev/log minor #6 -- is syslogd(1M) running?
NOTICE: spc_getpage called for character device. Check any non-ON onsolidation drivers
A guest ldom config that contains use a zfs volume which kills things when you run bind-domain below..
root@isdsyddev13# ldm ls -l itgsyddev11
NAME STATE FLAGS CONS VCPU MEMORY UTIL UPTIME
itgsyddev11 inactive ----- 4 4G
VARIABLES
auto-boot?=false
boot-device=vdisk
NETWORK
NAME SERVICE DEVICE MAC
vnet0 primary-vsw0 network@0 00:14:4f:f8:85:1c
DISK
NAME VOLUME TOUT DEVICE SERVER
vdisk0 vol9@primary-vds0 disk@0
vdisk1 vol2@primary-vds0 disk@1
There is only one service domain (primary) and it runs the only virtual disk service. Entries for the above vdisks on the primary-vds0 are...
vol2 /dev/zvol/rdsk/isdsyddev13zp_loc/itgsyddev11-optbmc2
vol9 /isdsyddev13zp_loc/itgsyddev11/bootdisk-fullos
subset of zfs output below. The os boot files are clones of a snapshot.
root@isdsyddev13# zfs list
NAME USED AVAIL REFER MOUNTPOINT
isdsyddev13zp_loc 142G 53.5G 79.5K /isdsyddev13zp_loc
isdsyddev13zp_loc/boot-images 20.0G 53.5G 20.0G /isdsyddev13zp_loc/boot-images
isdsyddev13zp_loc/boot-images@initial 22.5K - 20.0G -
isdsyddev13zp_loc/itgsyddev11 645M 53.5G 20.0G /isdsyddev13zp_loc/itgsyddev11
isdsyddev13zp_loc/itgsyddev11-optbmc2 25.4G 58.0G 21.2G -
isdsyddev13zp_loc/itgsyddev11-optbmc2@20080424 4.21G - 18.6G -
Note that if I remove vdisk1 from the guest domain, bind-domain works fine, no issues. So this is an issue just with the zfs volumes used as virtual disks. I also created a new zfs volume, added it to the primary-vds0 and the guest domain. However on bind-domain, same error/issue.
Patches applied from the patch run below...
119812-06
120272-21
127959-02
137017-03
125166-11
119783-06
125184-07
119254-57
120222-28
120222-29
128306-05
122911-13
120292-02
123590-09
119313-21
119059-44
124630-17
120410-29
120094-21
118712-22
127737-02
136892-01
125539-04
137019-02
119042-11
127922-04
138159-01
121004-04
119090-26
127853-02
120830-06
137032-01
137093-01
123611-04
137871-01
136998-04
127755-01
125891-01
127127-11
138068-01
137289-02
137111-03
138291-01
126133-04
138075-02
125551-02
128342-01
128000-01
128294-02
127884-01
128328-01
126206-04
124393-06
119757-12
137321-01
121095-02
119810-05
120543-11
125378-05
128300-03
120201-05
125719-12
137080-01
136882-01
125731-02
121308-12
Any help appreciated.I am not using ldom version 1.0.3, I'm using version 1.0.1 as per the original post
root@isdsyddev13# pkginfo -l SUNWldm
PKGINST: SUNWldm
NAME: Logical Domains Manager
CATEGORY: application
ARCH: sparc.sun4v
VERSION: 1.0.1,REV=2007.08.23.10.20
BASEDIR: /
VENDOR: Sun Microsystems, Inc.
PSTAMP: dt90-19120070823102022
INSTDATE: Dec 10 2007 14:07
STATUS: completely installed
FILES: 38 installed pathnames
6 shared pathnames
12 directories
23 executables
20860 blocks used (approx) -
Requesting API calls for Windows 10's virtual desktops
Please add API calls for working with Windows 10's virtual desktops, for example, a way to determine which virtual desktop a particular window is on and which virtual desktop is active.
The problem can be seen using the Snipping Tool. Open the tool and select a
New / Window Snip. As you move the mouse around, the snipping tool
highlights areas where there is no window, but there is a window in another virtual desktop.
First desktop, Snipping Tool highlights and empty area ...
Second desktop...
It's because Snipping Tool has no way to know which virtual desktop a particular window is on.
Thanks!Thanks, been there, did that, but there's no way to know if Microsoft listened or provided a solution :-(
Hi GoVideo,
Currently, Windows 10 is still in the Technical Preview stage, Microsoft will collect all feedbacks and evaluate them guardedly.
We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
Click
HERE to participate the survey. -
Call for Beta testers - Skype Click to Call for Ma...
Updated 20.12.2011:
We have got a good number of people signing up to be a beta testers for Skype Click to Call for Mac. We have now closed the collection of candidates and will be contacting the chosen people soon.
Thank you for showing out suchs a interest on our product.
We're in the process of developing Skype Click to Call functionality for Mac. This will enable Mac users to make calls with Skype directly from their browser. It's free to call numbers with blue buttons - you'll be given Skype Credit to call all other numbers.
We have reached a point where we would like to share Skype Click to Call with select participants to get early feedback.
As this is a closed beta, we will be asking all selected participants to sign a non-disclosure agreement with Skype.
We will also be offering active participants free Skype credit, and a memorable gift for taking part. In addition, a larger gift will be awarded to the top contributor.
To be part of the Skype Click to Call closed beta testing please fill out the following survey:
https://www.surveymonkey.com/s/KVQ9M22
We will be contacting selected participants via email over the next few days.
Follow the latest Skype Community News
↓ Did my reply answer your question? Accept it as a solution to help others, Thanks. ↓How abut you perfect it for PC / Firefox first? I just updated to Firefox 9.0.1 and click to call is broken. I cannot find any reference for it in Tools.
-
hello i have started using iphone 5 for which i downloaded my contacts from i clouds i am not able to get name of the person when he is calling for which i have already saved the no. on my contact list i have reseted my phone twice its only showing the names of the person whose no. i have saved it with the country code i am staying in india new delhi pls help me i am fed up not able to get the name of person who is calling
Sir, your Apple ID can be used as an iCloud account as well. They are both the same thing.
You can learn more from --> Set up your Apple ID for iCloud and iTunes - Apple Support -
I have a production mobile Flex app that uses RemoteObject calls for all data access, and it's working well, except for a new remote call I just added that only fails when running with a release build. The same call works fine when running on the device (iPhone) using debug build. When running with a release build, the result handler is never called (nor is the fault handler called). Viewing the BlazeDS logs in debug mode, the call is received and send back with data. I've narrowed it down to what seems to be a data size issue.
I have targeted one specific data call that returns in the String value a string length of 44kb, which fails in the release build (result or fault handler never called), but the result handler is called as expected in debug build. When I do not populate the String value (in server side Java code) on the object (just set it empty string), the result handler is then called, and the object is returned (release build).
The custom object being returned in the call is a very a simple object, with getters/setters for simple types boolean, int, String, and one org.23c.dom.Document type. This same object type is used on other other RemoteObject calls (different data) and works fine (release and debug builds). I originally was returning as a Document, but, just to make sure this wasn't the problem, changed the value to be returned to a String, just to rule out XML/Dom issues in serialization.
I don't understand 1) why the release build vs. debug build behavior is different for a RemoteObject call, 2) why the calls work in debug build when sending over a somewhat large (but, not unreasonable) amount of data in a String object, but not in release build.
I have't tried to find out exactly where the failure point in size is, but, not sure that's even relevant, since 44kb isn't an unreasonable size to expect.
By turning on the Debug mode in BlazeDS, I can see the object and it's attributes being serialized and everything looks good there. The calls are received and processed appropriately in BlazeDS for both debug and release build testing.
Anyone have an idea on other things to try to debug/resolve this?
Platform testing is BlazeDS 4, Flashbuilder 4.7, Websphere 8 server, iPhone (iOS 7.1.2). Tried using multiple Flex SDK's 4.12 to the latest 4.13, with no change in behavior.
Thanks!After a week's worth of debugging, I found the issue.
The Java type returned from the call was defined as ArrayList. Changing it to List resolved the problem.
I'm not sure why ArrayList isn't a valid return type, I've been looking at the Adobe docs, and still can't see why this isn't valid. And, why it works in Debug mode and not in Release build is even stranger. Maybe someone can shed some light on the logic here to me.
Maybe you are looking for
-
Hi all, I want to use my selections along with logical database selection screen in my program.when i am trying to use it its giving some errors.if there is a get event its not allowing to select my own selection.can any advise my how to do it. Regar
-
I periodically check Console to see how my macbook pro retina with OS X Yosemite 10.10.3 is performing. This morning I checked the logs and for a period of about 1 minute there was some activity while I was not at my computer, Here is a copy of th
-
I can't get into iTunes music store at all. It's just a blank page that says the music store may be busy, check my internet connection. Also I no longer receive information from iTunes on new releases Tuesdays. It's like they're mad and don't want to
-
Hi Experts, This might be a possibly silly question however I have done some studies and research but I'm getting quite confused on the architecture of Duet Enterprise, so my main question would be do we need a server for Duet? Or is it Duet is insta
-
Signature greyed out in desktop manager.
hi We use a BES server and are finding that when users use the desktop software the ability to change the signature is greyed out.Would it be due to either of these policy settings - Desktop addins is set to false. Application loader and weblink is