From no-reply at ripe.net Tue Nov 1 19:22:52 2011 From: no-reply at ripe.net (RIPE Meeting) Date: Tue, 01 Nov 2011 19:22:52 +0100 Subject: RIPE 63 Daily Meeting Report - Tuesday Message-ID: <4EB038FC.4020301@ripe.net> [Apologies for duplicate emails] Dear Colleagues, A short summary of Tuesday's events at RIPE 63 can be found below. The full Daily Meeting Report, including photos, links to presentations, webcasts and further information, can be found at: http://ripe63.ripe.net/programme/report/tuesday/ Plenary Day two of RIPE 63 began with a busy Plenary session, with talks on "DDoS Attack Trends Through 2009-2011", the "Reputation of Networks ? RIPE Region" and "Operational Experiences in Deploying 100 GbE". The RIPE NCC talked about "IPv4 and IPv6 assignments for RIPE NCC Routing Information Service" and "Resource Request for Business Operations". There were several comments from the audience about this and it was left to the community to decide the outcome during the Closing Plenary on Friday. The second Plenary session continued the focus on technical issues, starting with a presentation on transit costs, followed by BGP policy violations in the data-plane, and an analysis of IPv6 latencies. A study of measured trends in IPv6 adoption looked primarily at trends seen around and following World IPv6 Day. The third Plenary session saw RIPE NCC's Managing Director, Axel Pawlik, share the RIPE NCC's plan for contacting legacy space holders in the RIPE NCC service region. The presentation prompted a lot of participation from the audience, many of whom were legacy space holders themselves. Axel encouraged legacy space holders, even those with particularly specific situations, to contact the RIPE NCC. RIPE Chair, Rob Blokzijl, supported the efforts to "blow off the dust" of legacy address space. IPv6 remains a hot topic at RIPE Meetings, with a talk on "IPv6 Deployment Beauty Pageant" and a four-person panel discussing "CPE and End-User IPv6". Audience comments indicated that having hardware providers speaking about IPv6 deployment was an encouraging indication that things were moving in the right direction. Next, several interesting Lightning Talks were held and David Kessens, reported from a draft document currently reviewed by the IETF: IANA Reserved IPv4 prefixes for shared CGN space and urged everyone to look at the draft and participate in the discussion. At the end of the session, Marco Hogewoning, WG co-Chair, introduced 'speed dating' between those who have deployed IPv6 and those busy deploying it. IPv6 Working Group Shane Kerr, ISC, gave a presentation on renumbering for enterprise networks and the IETF Working Group that has been established to look at this issue, seeking operator feedback on their work. The update to RIPE Document, ripe-501, "Requirements for IPv6 in ICT Equipment", which will conclude its Last Call phase next week, was discussed. Constanze B?rger delivered an update on the German government's roll-out of a federal IPv6 network, which led to some discussion and Timo Hilbrink provided an update on the IPv6 deployment of Dutch ISP XS4ALL. Anti-Abuse Working Group There was a good mix of the technical, the practical and the policy at the Anti-Abuse Working Group session. Joao Damas, ISC, gave an interesting presentation on passive DNS. Laura Cobley, Customer Services Manager at the RIPE NCC, spoke about how to report abuse to the RIPE NCC. She received many helpful suggestions on how the process should work. Michele Neylon, Blacknight, talked about how hosting companies deal with abuse. The session ended with lengthy discussion on interactions with governments and legal enforcement agencies. From no-reply at ripe.net Wed Nov 2 13:35:59 2011 From: no-reply at ripe.net (Axel Pawlik) Date: Wed, 02 Nov 2011 13:35:59 +0100 Subject: Share Your Views - Review of ICANN ASO Message-ID: <4EB1392F.9030800@ripe.net> Dear colleagues, ITEMS International (Paris) is conducting an independent review of the ICANN Address Supporting Organisation (ASO). It is very important for reviewers to gather the views and opinions of the Regional Internet Registry (RIR) communities, particularly concerning Global Policies. The RIPE community is strongly urged to share their views on this short questionnaire: www.items.fr/aso.php Kind regards, Axel Pawlik RIPE NCC Managing Director From no-reply at ripe.net Wed Nov 2 19:49:27 2011 From: no-reply at ripe.net (RIPE Meeting) Date: Wed, 02 Nov 2011 19:49:27 +0100 Subject: RIPE 63 Daily Meeting Report - Wednesday Message-ID: <4EB190B7.2080401@ripe.net> [Apologies for duplicate emails] Dear colleagues, A short summary of Wednesday's events at RIPE 63 can be found below. The full Daily Meeting Report, including photos, links to presentations, webcasts and further information, can be found at: http://ripe63.ripe.net/programme/report/wednesday/ Address Policy Working Group Emilio Madaio, RIPE NCC Policy Development Officer, gave on overview of "Current Policy Topics" and the "Policy Development Office Activities". Alex le Heux, RIPE NCC, continued with "Feedback from RIPE NCC Registration Services", showing how the implementation can take from days to years. The APWG co-Chairs announced their intention to declare consensus on proposal 2011-02, "Removal of multihomed requirement for IPv6 PI". 2011-04, "Extension of the Minimum Size for IPv6 Initial Allocation" and 2011-05, "Safeguarding future IXPs with IPv4 space" were presented and discussed. Dave Wilson, HEAnet, gave an overview "On Inter-RIR Transfers" and asked for discussion on whether we need an inter-RIR transfer policy. The RIPE NCC was requested to evaluate the current transfer policy. Rob Blokzijl then introduced his initiative for the "IPv4 Maintenance Policy" document. Shane Kerr, ISC, explained the conclusions from yesterday's IPv6 WG session about IPv6 renumbering. The last item on the agenda was a review of the withdrawn policy 2008-08, "Initial Certification Policy in the RIPE NCC Service Region". ENUM Working Group The ENUM WG started with Wolfgang Nagele, RIPE NCC, giving an update of the RIPE NCC's ENUM service. Patrik Faltstrom, Cisco, gave a short presentation about User ENUM in Sweden. The third presenter, Lino Santos, reported about the progress made with ENUM in Portugal. Most of the WG session was covered by an interesting panel discussion with ENUM experts from various countries and a speaker from from TERENA. The discussion focused around why ENUM is not so successful and if ENUM itself is a service or if it is an underlying technology on which services can be based. An action was assigned to contact all ENUM operators between now and RIPE 64. Routing Working Group Geoff Huston, APNIC, presented the mystery of "The Flat World of BGP" and Thomas Mangin, EXA Networks Ltd., presented on exaBGP and asked for feedback. Randy Bush, IIJ, presented the "Impact of the Tohoku Earthquake on Japanese ISPs" and concluded this was a boring event; the Internet worked around failures. He also presented on the CPU load of BGPSEC. Daniel Karrenberg, RIPE NCC, asked for input on the usefulness of RIS routing beacons. The responses were that they were useful. There was an action on the RIPE NCC to publish the IPv6 Routing Recommendations document. RIPE NCC Services Working Group The RIPE NCC Services Working Group was the final session of the day. Following an introduction to the newly composed Senior Management team by Axel Pawlik, RIPE NCC Managing Director, there was an update from the RIPE NCC Senior Managers on the organisation's various activities, priorities and developments and the results of the RIPE NCC Membership and Stakeholder Survey 2011. There were presentations on the RIPE NCC's preparation for the distribution of the last remaining IPv4 address space, and on the progress of the RIPE NCC's project on Contractual Relationship Requirements for End Users. Finally, Daniel Karrenberg, RIPE NCC Chief Scientist, reported on the development and future plans for RIPE Atlas. PGP Key-Signing Party The PGP Key-Signing Party has been a regular feature at the last few RIPE Meetings, and RIPE 63 was no exception. While cryptography ensures the secrecy of communication, it is important to establish a ?web of trust? so that the authenticity of the involved parties is also known with a high degree of confidence. The RIPE Meeting presents an ideal opportunity for attendees to meet, exchange, verify and sign each others' public keys. Yesterday?s Key-Signing Party was attended by 10-15 people and will be continued at future RIPE meetings. From no-reply at ripe.net Thu Nov 3 19:31:28 2011 From: no-reply at ripe.net (RIPE Meeting) Date: Thu, 03 Nov 2011 19:31:28 +0100 Subject: RIPE 63: Daily Meeting Report - Thursday Message-ID: <4EB2DDFF.9000802@ripe.net> [Apologies for duplicate emails] Dear colleagues, A short summary of Thursday's events at RIPE 63 can be found below. The full Daily Meeting Report, including photos, links to presentations, webcasts and further information, can be found at: http://ripe63.ripe.net/programme/report/thursday/ Address Policy Working Group The third AP WG session started on Thursday with discussion on the IPv6 PI/PA unification proposal made by Gert Doering, AP Working Group co-Chair. There was an analysis of special cases, the costs and the "multiple blocks per LIR" scenario that would result from the unification. The RIPE NCC was tasked to look into possible reasons why LIRs would like to be able to request multiple prefixes. More feedback was encouraged on the mailing list. During the Open Policy Hour, the recent RFC 6382, published by the IETF, was presented. Some possible interpretation issues with the ripe-525 policy, "Autonomous System (AS) Number Assignment Policy" were highlighted. The attendees present reached the conclusion that a policy proposal should not be submitted. DNS Working Group The first session of the DNS Session WG had a very diverse set of presentations, ranging from an update by the RIPE NCC, an update on the DANE work in IETF, to DNS configuration management and two different implementations of an authoritative DNS server. The second DNS session started with an interesting presentation about the excessive increased query load on the root name servers that occurred for a brief time this summer, followed by a presentation on "DNSSEC Trigger". There was also an update on the "IDN Variant Issues Project" and an update on the status of the DNSEASY and SSR Meetings. The session ended with a very engaging panel discussion, ranging from the technical to the political implications of blocking or rewriting DNS query results at the registry or ISP level and how that affects operators throughout the world. EIX Working Group The first presentation of the session was an introduction to the local peering scene in Austria, given by Christian Panigl, VIX. There was then an update on EIX activities, which included the new IPv4 policy and switch wishlist. Remco van Mook, Equinix, and Martin Pels, AMS-IX, offered to help with the document. The session continued with a presentation on "Monitoring Platforms for Internet Exchange Points" and "Jumbo Frames in AMS-IX", which prompted many in the audience to voice their opinions. The second EIX WG session began with a presentation on "Extended Communities for Route-Servers and ASN32", followed by "How to Resolve Edge Redundancy for Peering". Next up was Joao Damas, ISC, who talked about the Open Source Routing project he was working on. There were two presentations on problems experienced with Proxy-ARP and discussion focused on why this happened. A Cisco representative said he would bring this feedback back to Cisco. The session ended with on open mic session of lightning updates. RIPE Database Working Group The RIPE NCC shared the latest RIPE Database developments. RIPE NCC staff members, Kaveh Ranjbar and Denis Walker, presented on the action points from the RIPE 62 Meeting, all of which have been completed. The main discussion of the session was about the geolocation service. The RIPE NCC showed a prototype of the service and the WG Chair will present the proposed way forward on the RIPE Database mailing list. The RIPE NCC was also requested to investigate how internationalisation could be made possible and what would need to be done if it is decided to fully serve the data in utf-8. As reported in the Anti-Abuse WG earlier this week, a requirement of an abuse contact i in the RIPE Database will start the PDP in the coming weeks.. This is the result of the Abuse Contact Task Force. An other issue raised was that objects sponsored by an LIR are not shown in the RIPE Database. The mailing list will be used to analyse how to move forward. Cooperation Working Group The RIPE Cooperation Working Group met in the final session of the day, and included a remote presentation from European Commission representative Andrea Glorioso, who emphasised the need for more synchronisation between the RIPE community and the Commission. Chris Buckridge, RIPE NCC, gave an update on the Internet Governance Forum 2011, while Nurani Nimpuno, Netnod, spoke about the work of the United Nations CSTD Working Group on "Improvements to the IGF". MAT Working Group The session started with NIC Brazil reporting on how RIPE TTM data is being used in real time in Brazil. Next there was a presentation on Google's "Measurement Lab (M-Lab)" . After the talk, a number of people asked if Google was considering integrating or sponsoring RIPE Atlas. Wolfgang Nagele, RIPE NCC, then presented on "PCAP Analysis with HADOOP". The session concluded with two presentations by the RIPE NCC, one of which updated the audience on the recent developments in the RIPE NCC's measurements activities. The other announced the introduction of user defined measurements for RIPE Atlas. David Freedman, Claranet, then asked the audience how the reachability of a prefix could be measured so that people can build filters properly and proposed an experiment. Interest was expressed and he said he would formulate a more solid proposal. IPv6 Privacy BoF An IPv6 Privacy BoF was held in the Park Congress I room following the last working group sessions of the day. The German NGO Arbeitskreis Vorratsdatenspeicherung?s (Working Group on Data Retention) position on how user privacy should be supported by ISPs and software/hardware vendors was discussed as well as how privacy concerns will influence ISPs? IPv6 assignment practices. From cris.pascual.gonzalez at gmail.com Thu Nov 3 20:08:14 2011 From: cris.pascual.gonzalez at gmail.com (Cristina Pascual) Date: Thu, 3 Nov 2011 20:08:14 +0100 Subject: 2nd CfP: ICCGI 2012 || June 24-29, 2012 - Venice, Italy Message-ID: <201111031908.pA3J8EVT017792@smtp.upv.es> INVITATION: ================= Please, consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results to ICCGI 2012. The submission deadline is set to February 5, 2012. In addition, authors of selected papers will be invited to submit extended article versions to one of the IARIA Journals: http://www.iariajournals.org ================= ============== ICCGI 2012 | Call for Papers =============== CALL FOR PAPERS, TUTORIALS, PANELS ICCGI 2012, The Seventh International Multi-Conference on Computing in the Global Information Technology June 24-29, 2012 - Venice, Italy General page: http://www.iaria.org/conferences2012/ICCGI12.html Call for Papers: http://www.iaria.org/conferences2012/CfPICCGI12.html - regular papers - short papers (work in progress) - posters - ideas Submission page: http://www.iaria.org/conferences2012/SubmitICCGI12.html Submission deadline: February 5, 2012 Sponsored by IARIA, www.iaria.org Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org Please note the Poster and Work in Progress options. The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels. Before submission, please check and comply with the Editorial rules: http://www.iaria.org/editorialrules.html ICCGI 2012 Topics (topics and submission details: see CfP on the site) Industrial systems Control theory and systems; Fault-tolerance and reliability; Data engineering; Enterprise computing and evaluation; Electrical and electronics engineering; Economic decisions and information systems; Advanced robotics; Virtual reality systems; Industrial systems and applications; Industrial and financial systems; Industrial control electronics; Industrial IT solutions Evolutionary computation Algorithms, procedures, mechanisms and applications; Computer architecture and systems; Computational sciences; Computation in complex systems; Computer and communication systems; Computer networks; Computer science theory; Computation and computer security; Computer simulation; Digital telecommunications; Distributed and parallel computing; Computation in embedded and real-time systems; Soft computing; User-centric computation Autonomic and autonomous systems Automation and autonomous systems; Theory of Computing; Autonomic computing; Autonomic networking; Network computing; Protecting computing; Theories of agency and autonomy; Multi-agent evolution, adaptation and learning; Adjustable and self-adjustable autonomy; Pervasive systems and computation; Computing with locality principles; GRID networking and services; Pervasive computing; Cluster computing and performance; Artificial intelligence Computational linguistics; Cognitive technologies; Decision making; Evolutionary computation; Expert systems; Computational biology Bio-technologies Models and techniques for biometric technologies; Bioinformatics; Biometric security; Computer graphics and visualization; Computer vision and image processing; Computational biochemistry; Finger, facial, iris, voice, and skin biometrics; Signature recognition; Multimodal biometrics; Verification and identification techniques; Accuracy of biometric technologies; Authentication smart cards and biometric metrics; Performance and assurance testing; Limitations of biometric technologies; Biometric card technologies; Biometric wireless technologies; Biometric software and hardware; Biometric standards Knowledge data systems Data mining and Web mining; Knowledge databases and systems; Data warehouse and applications; Data warehousing and information systems; Database performance evaluation; Semantic and temporal databases; Database systems Databases and information retrieval; Digital library design; Meta-data modeling Mobile and distance education Human computer interaction; Educational technologies; Computer in education; Distance learning; E-learning; Mobile learning Cognitive support for learning; Internet-based education; Impact of ICT on education and society; Group decision making and software; Habitual domain and information technology; Computer-mediated communications; Immersing authoring; Contextual and cultural challenges in user mobility Intelligent techniques, logics, and systems Intelligent agent technologies; Intelligent and fuzzy information processing; Intelligent computing and knowledge management; Intelligent systems and robotics; Fault-tolerance and reliability; Fuzzy logic & systems; Genetic algorithms; Haptic phenomena; Graphic recognition; Neural networks; Symbolic and algebraic computation; Modeling, simulation and analysis of business processes and systems Knowledge processing Knowledge representation models; Knowledge languages; Cognitive science; Knowledge acquisition; Knowledge engineering; Knowledge processing under uncertainty; Machine intelligence; Machine learning; Making decision through Internet; Networking knowledge plan Information technologies Information technology and organizational behavior; Agents, data mining and ontologies; Information retrieval systems; Information and network security; Information ethics and legal evaluations; Optimization and information technology; Organizational information systems; Information fusion; Information management systems; Information overload; Information policy making; Information security; Information systems; Information discovery Internet and web technologies Internet and WWW-based computing; Web and Grid computing; Internet service and training; IT and society; IT in education and health; Management information systems; Visualization and group decision making; Web based language development; Web search and decision making; Web service ontologies; Scientific web intelligence; Online business and decision making; Business rule language; E-Business; E-Commerce; Online and collaborative work; Social eco-systems and social networking; Social decisions on Internet; Computer ethics Digital information processing Mechatronics; Natural language processing; Medical imaging; Image processing; Signal processing; Speech processing; Video processing; Pattern recognition; Pattern recognition models; Graphics & computer vision; Medical systems and computing Cognitive science and knowledge agent-based systems Cognitive support for e-learning and mobile learning; Agents and cognitive models; Agents & complex systems; computational ecosystems; Agent architectures, perception, action & planning in agents; Agent communication: languages, semantics, pragmatics & protocols; Agent-based electronic commerce and trading systems Multi-agent constraint satisfaction; Agent programming languages, development environments and testbeds; Computational complexity in autonomous agents; Multi-agent planning and cooperation; Logics and formal models of for agency verification; Nomadic agents; Negotiation, auctions, persuasion; Privacy and security issues in multi-agent systems Mobility and multimedia systems Mobile communications; Multimedia and visual programming; Multimedia and decision making; Multimedia systems; Mobile multimedia systems; User-centered mobile applications; Designing for the mobile devices; Contextual user mobility; Mobile strategies for global market; Interactive television and mobile commerce Systems performance Performance evaluation; Performance modeling; Performance of parallel computing; Reasoning under uncertainty; Reliability and fault-tolerance; Performance instrumentation; Performance monitoring and corrections; Performance in entity-dependable systems; Real-time performance and near-real time performance evaluation; Performance in software systems; Performance and hybrid systems; Measuring performance in embedded systems Networking and telecommunications Telecommunication and Networking; Telecommunication Systems and Evaluation; Multiple Criteria Decision Making in Information Technology; Network and Decision Making; Networks and Security; Communications protocols (SIP/H323/MPLS/IP); Specialized networks (GRID/P2P/Overlay/Ad hoc/Sensor); Advanced services (VoIP/IPTV/Video-on-Demand; Network and system monitoring and management; Feature interaction detection and resolution; Policy-based monitoring and managements systems; Traffic modeling and monitoring; Traffic engineering and management; Self-monitoring, self-healing and self-management systems; Man-in-the-loop management paradigm Software development and deployment Software requirements engineering; Software design, frameworks, and architectures; Software interactive design; Formal methods for software development, verification and validation; Neural networks and performance; Patterns/Anti-patterns/Artifacts/Frameworks; Agile/Generic/Agent-oriented programming; Empirical software evaluation metrics; Software vulnerabilities; Reverse engineering; Software reuse; Software security, reliability and safety; Software economics; Software testing and debugging; Tracking defects in the OO design; Distributed and parallel software; Programming languages; Declarative programming; Real-time and embedded software; Open source software development methodologies; Software tools and deployment environments; Software Intelligence; Software Performance and Evaluation Knowledge virtualization Modeling techniques, tools, methodologies, languages; Model-driven architectures (MDA); Service-oriented architectures (SOA); Utility computing frameworks and fundamentals; Enabled applications through virtualization; Small-scale virtualization methodologies and techniques; Resource containers, physical resource multiplexing, and segmentation; Large-scale virtualization methodologies and techniques; Management of virtualized systems; Platforms, tools, environments, and case studies; Making virtualization real; On-demand utilities Adaptive enterprise; Managing utility-based systems; Development environments, tools, prototypes Systems and networks on the chip Microtechnology and nanotechnology; Real-time embedded systems; Programming embedded systems; Controlling embedded systems; High speed embedded systems; Designing methodologies for embedded systems; Performance on embedded systems; Updating embedded systems; Wireless/wired design of systems-on-the-chip; Testing embedded systems; Technologies for systems processors; Migration to single-chip systems Context-aware systems Context-aware autonomous entities; Context-aware fundamental concepts, mechanisms, and applications; Modeling context-aware systems; Specification and implementation of awareness behavioral contexts; Development and deployment of large-scale context-aware systems and subsystems; User awareness requirements Design techniques for interfaces and systems; Methodologies, metrics, tools, and experiments for specifying context-aware systems; Tools evaluations, Experiment evaluations Networking technologies Next generation networking; Network, control and service architectures; Network signalling, pricing and billing; Network middleware; Telecommunication networks architectures; On-demand networks, utility computing architectures; Next generation networks [NGN] principles; Storage area networks [SAN]; Access and home networks; High-speed networks; Optical networks; Peer-to-peer and overlay networking; Mobile networking and systems; MPLS-VPN, IPSec-VPN networks; GRID networks; Broadband networks Security in network, systems, and applications IT in national and global security; Formal aspects of security; Systems and network security; Security and cryptography; Applied cryptography; Cryptographic protocols; Key management; Access control; Anonymity and pseudonymity management; Security management; Trust management; Protection management; Certification and accreditation; Virii, worms, attacks, spam; Intrusion prevention and detection; Information hiding; Legal and regulatory issues Knowledge for global defense Business continuity and availability; Risk assessment; Aerospace computing technologies; Systems and networks vulnerabilities; Developing trust in Internet commerce; Performance in networks, systems, and applications; Disaster prevention and recovery; IT for anti-terrorist technology innovations (ATTI); Networks and applications emergency services; Privacy and trust in pervasive communications; Digital rights management; User safety and protection Information Systems [IS] Management Information Systems; Decision Support Systems; Innovation and IS; Enterprise Application Integration; Enterprise Resource Planning; Business Process Change; Design and Development Methodologies and Frameworks; Iterative and Incremental Methodologies; Agile Methodologies; IS Standards and Compliance Issues; Risk Management in IS Design and Development; Research Core Theories; Conceptualizations and Paradigms in IS; Research Ontological Assumptions in IS Research; IS Research Constraints, Limitations and Opportunities; IS vs Computer Science Research; IS vs Business Studies IPv6 Today - Technology and deployment IP Upgrade - An Engineering Exercise or a Necessity?; Worldwide IPv6 Adoption - Trends and Policies; IPv6 Programs, from Research to Knowledge Dissemination; IPv6 Technology - Practical Information; Advanced Topics and Latest Developments in IPv6; IPv6 Deployment Experiences and Case Studies; IPv6 Enabled Applications and Devices Modeling Continuous and Discrete Models; Optimal Models; Complex System Modeling; Individual-Based Models; Modeling Uncertainty; Compact Fuzzy Models; Modeling Languages; Real-time modeling; Performance modeling Optimization Multicriteria Optimization; Multilervel Optimization; Goal Programming; Optimization and Efficiency; Optimization-based decisions; Evolutionary Optimization; Self-Optimization; Extreme Optimization; Combinatorial Optimization; Discrete Optimization; Fuzzy Optimization; Lipschitzian Optimization; Non-Convex Optimization; Convexity; Continuous Optimization; Interior point methods; Semi-definite and Conic Programming Complexity Complexity Analysis; Computational Complexity; Complexity Reduction; Optimizing Model Complexity; Communication Complexity; Managing Complexity; Modeling Complexity in Social Systems; Low-complexity Global Optimization; Software Development for Modeling and Optimization; Industrial applications ------------------------------ Committee:http://www.iaria.org/conferences2012/ComICCGI12.html ==================== From jlloret at dcom.upv.es Fri Nov 4 01:06:44 2011 From: jlloret at dcom.upv.es (Jaime Lloret Mauri) Date: Fri, 4 Nov 2011 01:06:44 +0100 Subject: IJAHUC Special Issue on "Localization, Positioning and Coverage in Wireless Sensor Networks" Message-ID: <201111040006.pA406ia1008841@smtp.upv.es> Call for Papers Special Issue on "Localization, Positioning and Coverage in Wireless Sensor Networks" International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) Journal Impact Factor: 0.435 (2010) http://www.inderscience.com/browse/callpaper.php?callID=1741 In Wireless Sensor Network (WSN) deployments, wireless sensor nodes should be strategically placed in order to maximize the sensed area while minimizing the number of nodes to be placed in the field. Moreover, wireless radio coverage distances should be taken into account in order to cover large areas. Wireless sensors may be located quite far from each other, allowing lower deployment costs, but it may increase the wireless sensor node power consumption due to the energy needed to reach large distances. Although many factors may affect the position of each wireless sensor node inside the WSN, there are two main ones: the radio coverage area, which allows the sensors to communicate, and, the sensing coverage area, which gives the sensing region. Both types of coverage areas could be affected by the field where the WSN is deployed, but different factors affect each type of coverage. The goal is to maximize the coverage percentage, while coverage holes should be minimized. This special issue is focused on sensor node location and positioning techniques taking into account the aforementioned constraints. Suitable topics include but are not limited to: - WSN radio coverage. - WSN sensing field. - WSN deployment zones. - Isotropic and sectorial sensing nodes. - Positioning systems. - Node location techniques. - Analytical node placement systems. - 2D and 3D Regions of Interest in WSNs. - Theoretical systems and analytical methods to maximize the radio and sensing coverage. - Sensing gain and power gain systems. - Sleep scheduling techniques for enhancing WSN coverage. - Self-organization Strategies. Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper was not originally copyrighted and if it has been completely re-written). All papers are refereed through a peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the Author Guidelines page (http://www.inderscience.com/mapper.php?id=31). Important Dates Submission deadline: 30 November, 2012 Notification of acceptance: 29 February, 2013 Camera Ready Papers: 30 April, 2013 Guest Editors: Prof. Jaime Lloret Mauri, Polytechnic University of Valencia, Spain Dr. Lei Shu, Osaka University, Japan Prof. Sabu M. Thampi, Indian Institute of Information Technology and Management, Kerala State, India Dr. Javier M. Aguiar, University of Valladolid, Spain Editors and Notes All papers must be submitted online. To submit a paper, please go to Online Submissions of Papers (http://www.inderscience.com/mapper.php?id=35&jid=145). If you experience any problems submitting your paper online, please contact submissions at inderscience.com, describing the exact problem you experience. Please include in your submission the title of the Special Issue, the title of the Journal and the name of the Guest Editors. Please contact Assoc. Prof. Jaime Lloret Mauri (jlloret at dcom.upv.es) with any queries concerning this special issue. From no-reply at ripe.net Fri Nov 4 13:57:43 2011 From: no-reply at ripe.net (RIPE Meeting) Date: Fri, 04 Nov 2011 13:57:43 +0100 Subject: RIPE 63: Daily Meeting Report - Friday Message-ID: <4EB3E147.6060001@ripe.net> [Apologies for duplicate emails] Dear colleagues, A short summary of Friday's events at RIPE 63 can be found below. The full Daily Meeting Report, including photos, links to presentations, webcasts and further information, can be found at: http://ripe63.ripe.net/programme/report/thursday/ Friday Plenary Friday morning's Plenary began with updates from the other four Regional Internet Registries (RIRs). Axel Pawlik, Managing Director, RIPE NCC, also gave an update on the Number Resource Organization (NRO) Executive Council (EC) activities and Andrea Cima, Registration Services Manager, RIPE NCC, presented a global overview of allocation and assignment statistics. Filiz Yilmaz, Senior Director of Participation and Engagement, gave the IANA Update. Closing Plenary The Closing Plenary began with Geoff Huston, Chief Scientist, APNIC, giving an entertaining and informative presentation on IPv4 exhaustion. Next on the agenda were three IPv6-related lightning talks and one on "RPKI Validation Performance". The RIPE Programme Committee (PC) held elections for the revolving vacant seat. The audience thanked Rob Evans, who is standing down from the PC. Filiz Yilmaz was elected by the attendees in the room by show of hands. It was also announced that Joao Damas, IRC, was standing down from the PC. He received a standing ovation for his efforts in coordinating the RIPE Meeting plenary content over the last several years. Brian Nisbet was welcomed as his replacement. Rob Blokzijl, RIPE Chair, asked the Plenary if it agreed that the RIPE NCC could continue to use an address block for RIS activities. The attendees present agreed by show of hands. Marco Hogewoning, RIPE NCC, announced that the resource request for business operations he had presented on earlier in the week has been revoked. Nigel Titley, Chairman of the RIPE NCC Executive Board, announced that Wilfried Woeber had been selected as the RIPE NCC Executive Board appointee to the NRO Number Council (NC). Erik Romijn, RIPE NCC, gave the RIPE 63 Technical Report. A report from the Secret Working Group followed and Rob Blokzijl closed the RIPE 63 Meeting with a short overview of meeting statistics, thanked the meeting hosts, the organisation team and the attendees and encouraged everyone to take part in the RIPE 64 Meeting, Ljubljana, Slovenia. From noreply at ripe.net Wed Nov 9 10:57:11 2011 From: noreply at ripe.net (Axel Pawlik) Date: Wed, 09 Nov 2011 10:57:11 +0100 Subject: Wilfried Woeber Appointed to NRO NC for Three-Year Term Message-ID: <4EBA4E77.9070706@ripe.net> [Apologies for duplicate emails] Dear colleagues, We are pleased to announce that Wilfried Woeber was appointed by the RIPE NCC Executive Board to take the vacant seat on the Number Resource Organization (NRO) Number Council (NC). He will serve a three-year term that runs from 1 January 2012 to 31 December 2014. The RIPE NCC Executive Board Chairman, Nigel Titley, made the announcement during the Closing Plenary on Friday, 4 November 2011, at the RIPE 63 Meeting in Vienna. More information about the NRO NC and the selection process can be found at: http://www.ripe.net/nronc2011 Kind regards, Axel Pawlik Managing Director RIPE NCC From meeting at ripe.net Thu Nov 10 12:33:02 2011 From: meeting at ripe.net (RIPE NCC Meeting Coordinator) Date: Thu, 10 Nov 2011 12:33:02 +0100 Subject: RIPE 63: Report and Thanks Message-ID: <4EBBB66E.7080900@ripe.net> Dear Colleagues, RIPE 63 took place last week from 31 October - 4 November 2011 in Vienna, Austria. 465 people attended, making it the the most well-attended RIPE Meeting to date. RIPE 63 Meeting Report ---------------------- The full RIPE 63 Meeting Report is now available at: http://ripe63.ripe.net/programme/report/ Sessions Archive ----------------- Presentations from the week can be found at: http://ripe63.ripe.net/presentations/ Webcasts and stenography transcripts can be found at: http://ripe63.ripe.net/archives/ Thanks ------ We would like to thank everyone who participated at RIPE 63 - onsite and remotely - who helped to make this such a successful meeting. We would also like to thank the RIPE 63 sponsors: A1, Arbor Networks, Google, Netnod, next layer, Nokia Siemens Networks and 6connect. And special thanks goes to the local hosts of this meeting: ACOnet, nic.at, University of Vienna and the Vienna Internet Exchange. Next Meeting ------------ RIPE 64 will take place in Ljubljana, Slovenia from 16 ? 20 April 2012. We hope to see you there! Your Opinion ------------ As always we appreciate your feedback. You can either send an email to or fill in the anonymous feedback form at: http://ripe63.ripe.net/feedback/ Best regards, The RIPE Meeting Team From noreply at ripe.net Thu Nov 10 16:47:01 2011 From: noreply at ripe.net (Axel Pawlik) Date: Thu, 10 Nov 2011 16:47:01 +0100 Subject: RIPE NCC Membership and Stakeholder Survey 2011 - Results Message-ID: <4EBBF1F5.8000509@ripe.net> [Apologies for duplicate emails] Dear colleagues, The results of the Membership and Stakeholder Survey 2011 were presented at the RIPE 63 Meeting, which took place in Vienna, Austria from 31 October-4 November 2011. The full report is available at: https://www.ripe.net/survey2011 These large-scale surveys are used by the RIPE NCC to assess its current service offering and to shape its strategy for the years ahead. The RIPE NCC carries out these every three years. They are extremely important in finding out the views of RIPE NCC members and other stakeholders on the direction the RIPE NCC should be taking as an organisation. An independent third party, the Oxford Internet Institute (OII), conducted the analysis of the survey data. Any information that might identify the respondent was removed by the OII and was not made available to the RIPE NCC or published in the report. If you have any questions or comments relating to the survey, please email . Best regards, Axel Pawlik Managing Director RIPE NCC From alix at ripe.net Thu Nov 10 17:38:51 2011 From: alix at ripe.net (Alix Guillard) Date: Thu, 10 Nov 2011 17:38:51 +0100 Subject: New RIPE Document "RIPE Routing Working Group Recommendations,on IPv6 Route Aggregation" Message-ID: <4EBBFE1B.2080902@ripe.net> [Apologies for duplicate emails] Dear Colleagues, The RIPE Document, ripe-532, "RIPE Routing Working Group Recommendations on IPv6 Route Aggregation", has been published. You can find the new document at: http://ripe.net/ripe/docs/routing-recommendations-ipv6 During RIPE 63, the Routing Working Group decided to add specific IPv6 recommendations to its existing document about route aggregation, ripe-399 "RIPE Routing Working Group Recommendations on Route Aggregation". This new guideline document is intended to supplement ripe-399. Best regards, -- Alix Guillard RIPE NCC Webmaster - http://ripe.net/ From rdobbins at arbor.net Thu Nov 17 05:46:27 2011 From: rdobbins at arbor.net (Dobbins, Roland) Date: Thu, 17 Nov 2011 04:46:27 +0000 Subject: Last call for participation in the Arbor 2011 WISR opsec survey. Message-ID: <0315C417-937A-44BF-BE57-10EDAAF03050@arbor.net> [Apologies if you've already seen this message in other forums.] We'd be grateful if folks who've yet to do so would take a few minutes to participate in the 2011 WISR opsec survey - responses will be tabulated on Sunday, 20Nov11, and input from the operational community is greatly appreciated! This link redirects to the http/s-enabled survey tool: ----------------------------------------------------------------------- Roland Dobbins // The basis of optimism is sheer terror. -- Oscar Wilde From no-reply at ripe.net Tue Nov 22 11:57:38 2011 From: no-reply at ripe.net (Sandra Bras) Date: Tue, 22 Nov 2011 11:57:38 +0100 Subject: New E-Learning Tutorial: RIPE PDP Explained Message-ID: <4ECB8022.1080201@ripe.net> [Apologies for duplicate emails] Dear colleagues, You can now get a concise overview of the RIPE Policy Development Process (PDP) by watching the latest video tutorial online at: http://www.ripe.net/lir-services/training/e-learning/policy-development-process-pdp In the coming months, we will release new E-Learning solutions and tutorials on: - The RIPE Database - RIPE Atlas - DNSSEC (Module 3) RIPE NCC E-Learning tutorials are provided as a free service available to everyone. If you have any questions, please feel free to contact us at: . Happy learning, Sandra Br?s Trainer/E-Learning Coordinator RIPE NCC From mtinka at globaltransit.net Thu Nov 24 18:46:16 2011 From: mtinka at globaltransit.net (Mark Tinka) Date: Fri, 25 Nov 2011 01:46:16 +0800 Subject: APRICOT-2012: Call for Papers Message-ID: <201111250146.16976.mtinka@globaltransit.net> Asia Pacific Regional Internet Conference on Operational Technologies (APRICOT) 21 February - 2 March 2012, New Delhi, India http://www.apricot2012.net CALL FOR PAPERS =============== The APRICOT 2012 Programme Committee is now seeking contributions for Presentations and Tutorials for APRICOT 2012. We are looking for people and proposals that would: - Offer a technical tutorial on an appropriate topic; and/or - Participate in the technical conference sessions as a speaker; and/or - Convene and chair a Birds of a Feather (BOF) session. Please submit proposals on-line at: http://submission.apnic.net/ CONFERENCE MILESTONES --------------------- Call for Papers Opens: 22 November 2011 First Draft Program Published: 19 December 2011 Final Deadline for Submissions: 10 February 2012 Final Program Published: 17 February 2012 Final Slides Received: 25 February 2012 PROGRAM MATERIAL ---------------- The APRICOT Programme is organised in three parts, including workshops, tutorials and the conference. The APNIC Policy SIG and Annual Members Meeting will be held during the APRICOT conference. Topics for tutorials and conference would include amongst others relevant to Internet Operations and Technologies: - IPv4 / IPv6 Routing and operations - IPv4 address runout / IPv6 deployment and transition technologies - Backbone operations - ISP and Carrier services - Network security issues (NSP-SEC, DDoS Anti-Spam, Anti-Malware) - Peering / IXPs - DNS / DNSSEC - Internet policy (Security, Regulation, Content Management, Addressing, etc) - Access and Transport Technologies, including broadband deployment, Cable/DSL, wireless, WiMax, metro ethernet, fiber network, MPLS - Content & Service Delivery (Multicast, Voice, Video, "telepresence", Gaming) CfP SUBMISSION -------------- All draft and complete slides must be submitted in PDF format only. Draft slides for both tutorials and conference sessions MUST be provided with CfP submissions otherwise the Programme Committee will be unable to review the submission. For work in progress, the most current information available at time of submission is acceptable. Final slides are to be provided by the specified deadline for publication on the APRICOT website. While the majority of speaking slots will be filled by the first submission deadline, a limited number of slots may be available up to the final submission deadline for presentations that are exceptionally timely, important, or of critical operational importance. Please submit on-line at: http://submission.apnic.net/ Any questions or concerns should be addressed to the Programme Committee by e-mail at: pc-chairs at apricot.net We look forward to receiving your presentation proposals. Mark Tinka & Jonny Martin Co-Chairs, APRICOT Programme Committee program at apricot.net -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: This is a digitally signed message part. URL: From cris.pascual.gonzalez at gmail.com Tue Nov 29 20:27:32 2011 From: cris.pascual.gonzalez at gmail.com (Cristina Pascual) Date: Tue, 29 Nov 2011 20:27:32 +0100 Subject: Deadline extension, December 16: PESARO 2012 || April 29 - May 4, 2012 - Chamonix / Mont Blanc, France Message-ID: <201111291927.pATJRWYG016882@smtp.upv.es> INVITATION: ================= Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results to PESARO 2012. The submission deadline is extended to December 16, 2011. In addition, authors of selected papers will be invited to submit extended article versions to one of the IARIA Journals: http://www.iariajournals.org ================= ============== PESARO 2012 | Call for Papers =============== CALL FOR PAPERS, TUTORIALS, PANELS PESARO 2012: The Second International Conference on Performance, Safety and Robustness in Complex Systems and Applications April 29 - May 4, 2012 - Chamonix / Mont Blanc, France General page: http://www.iaria.org/conferences2012/PESARO12.html Call for Papers: http://www.iaria.org/conferences2012/CfPPESARO12.html - regular papers - short papers (work in progress) - posters - ideas Submission page: http://www.iaria.org/conferences2012/SubmitPESARO12.html Submission deadline: December 16, 2011 Sponsored by IARIA, www.iaria.org Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org Please note the Poster and Work in Progress options. The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels. Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html PESARO 2012 Topics (topics and submission details: see CfP on the site) Fundamentals Fundamentals on system safety; Robustness technology and evaluation; Metrics for risk assessment; Performance-oriented design; Safety-oriented system design; Performance metrics and dependable metrics ; Active and passive safety; Performance warning delay Methodologies, techniques and algorithms Systems modeling; Hazard analysis; System measurement and monitoring; Evaluation of safety data, and mitigation and prevention strategies; Model verification and validation; Fault-tolerant systems; Simulation, statistical analysis, and experimental design analysis; Language and runtime systems Performance Performance basics; Performance-oriented design; Performance methodology techniques and algorithms for analytic modeling; System measurement and monitoring; Model verification and validation, simulation, statistical analysis; Experimental design, and reliability analysis; Performance evaluation of various technologies and systems (mobile devices and wireless networks, distributed and parallel systems, file and storage systems, power management, database systems, computer networks and architectures, operating systems, fault-tolerant systems, and language and runtime systems). Performance in dedicated service systems (Web services, Financial services, Healthcare and pharmaceuticals, Telecommunications services, Industrial Manufacturing, Education services, Transportation services, Energy and utilities) Safety in industrial systems Fundamentals on system safety; Safety of software systems and software engineering; Safety requirements; Safety for critical systems; Engineering for system robustness and reliability; Control of mission critical systems; Safety-oriented system design; Human tasks and error models; Hazard analysis; Cost and effectiveness of system safety; Verification and validation of safety; Safety tools; Evaluation of safety data, and mitigation and prevention strategies; Safety control and management; System Safety Implementation Guidelines and Standards; Transferring safety knowledge; Metrics for Risk Assessment; Contingency Planning and Occurrence Reporting; Preparedness Activities; Industry specific safety systems (Medical devices, Aerospace, Chemical industry, Nuclear power plants, Public health, Biological Safety) Robustness Basic concepts and applications; Theory and mechanisms for robustness; Uncertainty and robustness; Statistic robustness; Computation and optimization of robustness; Robustness estimation and approximation; Robustness correction; Robust systems; Robustness tests and benchmarking Applications and services Mobile Web performance; Multiple data center management; Network latency and impact on performance/robustness; Performance and robustness of cloud-based solutions; Scalable safe and robust solutions; Mobile devices and wireless networks; Mission critical systems and applications; Industry specific safety systems (medical devices, aerospace, chemical industry, nuclear power plants, public health, biological systems) Committee: http://www.iaria.org/conferences2012/ComPESARO12.html ====================