The IFIP Networking 2016 Conference (NETWORKING 2016), to be held at the University of Vienna, Austria, is the 15th event of the series, sponsored by the IFIP Technical Committee on Communication Systems (TC6) and technically co-sponsored by the IEEE Computer Society. Accepted papers will be published both in the IFIP Digital Library and the IEEE Xplore Digital Library.
The main objective of Networking 2016 is to bring together members of the networking community, from both academia and industry, to discuss recent advances in the broad and quickly-evolving fields of computer and communication networks, to highlight key issues, identify trends, and develop visions for the networking domain.
The technical sessions will be structured around (but not limited to) the following areas:
SDN, information/content-centric networking, content distribution, P2P, network virtualization, self-organizing networks, web architectures and protocols, overlays, in-cloud networking, evolution of IP network architectures and protocols, middleware support for networking, green networking, resilient networks, network management, traffic engineering, network neutrality, addressing, routing and switching, resource management and scheduling, cross-layer design, network-on-chip, networking support for smart grids, emerging value-added services and applications.
Topology characterization and inference, performance measurements, traffic monitoring and analysis, user behavior modeling and inference, quality of experience, tools and techniques to design and analyze networks, dependability and resilience of networks, network complexity, emergent properties of real networks, dynamic peer-to-peer network topologies, analysis of social networks, crowdsourcing in network measurements, socio-economic aspects of networked ecosystems, pricing and billing, incentives for crowdsourcing network applications.
Network security protocols, trust and privacy, anomaly and malware detection, DoS detection and mitigation, network forensics, authentication, applications of privacy-preserving computation in networks, anonymization, user profiling and tracking methods and possible countermeasures.
Ad-hoc and mesh networks, mobile networks, sensor networks, IoT, delay/disruption tolerant networks, opportunistic networks, disaster-recovery networks, physical layer security, device-to-device networking.