UNet is an international scientific event that highlights new trends and findings in hot topics related to ubiquitous computing/networking. This fourth edition will be held on May 03-05, 2018, in the fascinating city of Hammamet, Tunisia.
Ubiquitous networks sustain development of numerous paradigms/technologies such as distributed ambient intelligence, context-awareness, cloud computing, wearable devices, and future mobile networking (e.g., B4G and 5G). Various domains are then impacted by such a system, one cite security and monitoring, energy efficiency and environment protection, e-health, precision agriculture, intelligent transportation, home-care (e.g., for elderly and disabled people), etc. Communication in such a system has to cope with many constraints (e.g., limited capacity resources, energy depletion, strong fluctuations of traffic, Real-time constraint, dynamic network topology, radio link breakage, interferences, etc.) and has to meet the new application requirements. Ubiquitous systems bring many promising paradigms aiming to deliver significantly higher capacity to meet the huge growth of mobile data traffic and to accommodate efficiently dense and ultra-dense systems. A crucial challenge is that ubiquitous networks should be engineered to better support existing and emerging applications including broadband multimedia, machine-to-machine applications, Internet of things, sensor networks and RFID technologies. Many of these systems require stringent quality-of-service including better latency, reliability, higher spectral and energy efficiency, but also some quality-of-experience and quality-of-context constraints.
The main purpose of UNET 2018 conference is to serve as a forum that brings together researchers and practitioners from academia and industry to discuss recent developments in pervasive and ubiquitous networks. This conference will provide a forum to exchange ideas, discuss solutions, debate on identified challenges and share experiences among researchers and professionals. UNET aims also to promote adoption of new methodologies and to provide the participants with advanced and innovative tools able to catch the fundamental dynamics of the underlying complex interactions (e.g., game theory, Mechanism Design theory, Learning theory, SDR platforms, etc.). Papers describing original research on both theoretical and practical aspects of pervasive computing and future mobile computing (e.g., LTE-A, LTE-B, 5G) are invited for submission to UNET 2018.
UNet 2018 will features thematic content across the following five tracks:
Track 1: Ubiquitous Communication Technologies and Networking
Millimeter-Wave and Terahertz communications
Modulation, coding, and diversity techniques
OFDM, MIMO, multi-user MIMO, and massive MIMO
Multiple access techniques in wireless networks
Optical wireless access networks
Visible light communications and networks
Free space optical communications and networking
Power line communication technologies
Maritime, space and underwater communications
Beyond 4G and 5G communications
Heterogeneous and small-cell networks
Satellite communication and networks
Physical-layer secrecy and privacy
Quality of service provisioning schemes
Cognitive and flexible radio
Channel estimation, characterization, and synchronization techniques
Optical data center networking
Radio-over-fiber
Visible light positioning and navigation
Ultraviolet communications and networks
Optical wireless sensing and monitoring
Optical switching technologies, devices, and architectures
Energy harvesting and green wireless communications
Software-defined mobile/wireless networks
Mesh, relay, sensor and ad hoc networks
Delay-tolerant and fault-tolerant networking
Seamless inter-networking, self-organization and self-healing
Routing in ubiquitous networks
Resource management and optimization
Integrated wireless/optical networks
Mobility, localization, navigation, and handoff management
Wireless broadcast, multicast and streaming
Congestion and admission control
Wireless BAN, PAN, LAN, MAN and WAN
Dynamic bandwidth allocation in 4G, B4G, 5G and Pervasive Systems
Provisioning, measuring and controlling QoS, QoE, QoC and QoI in Pervasive Environments
Cross-layer design and emerging protocols for Pervasive Networks
Track 2: Ubiquitous Internet of Things: Emerging Technologies and Breakthroughs
Internet connectivity for IoT
Data architectures, brokering and management
Security, privacy, trust, and access control for IoT
Edge and cloud computing for IoT
Mobility, localization and management aspects of IoT
Internet of Things scalable infrastructures, architectures and platforms
Beyond 4G and 5G involvement in IoT environment
Innovative context aware IoT services and applications
Crowdsensing and sourcing, and social IoT
Incentive mechanisms for participatory crowdsensing/crowdsourcing applications
Energy harvesting and green technologies for IoT
Object naming in the IoT/IoE environments
Fundamentals and characterization of IoE communications
Multiple access protocols for IoT environment
Resource management techniques for IoT environment
Routing and control protocols for ultra-dense IoT environment
Game theory and learning for IoT ubiquitous communications
Identity management and object recognition
Embedded Systems, wearables devices, and Body Sensor Networks
Multi-sensor fusion in IoT
Distributed computing and storage in IoT
Data Fusion and management, and big data analytics for IoT
Autonomous vehicles and self-driving
Cooperative driving for autonomous vehicles
Unmanned-Aerial-Vehicles (UAV) platforms and networking
Standardization, regulation and industrial efforts for IoT
Business models, monetization and ecosystems of IoT
Lightweight communication protocols and data structures for IoT
Radio Frequency Identification
Low power chip/system design for IoT
Integration of software defined networks with IoT
Machine-to-Machine (M2M), Device-to-Device (D2D) communications
Application-oriented solutions (Healthcare, Military, Supply Chains, Environment, Agriculture, Smart cities, Education, ...)
Cyber Physical Systems design and networking
Advanced technologies for dense and ultra-dense network deployment
Clustering, topology control, coverage, and connectivity
Track 3: Mobile Edge Networking and Fog-Cloud Computing
Mobile cloud networking, architectures, and platforms
Cloud radio access networks
Security, privacy and reliability for ubiquitous cloud computing
Crowdsensing models and architectures
Energy efficient resource allocation for cloud-based systems
Resources management, provisioning, and migration in cloud systems
Cloud data storage and management models
Network and service functions virtualization, and programmable infrastructures
SDN, objects abstraction and virtualization
Fog and Edge computing
Hybrid cloud integration
X As A Service in ubiquitous clouds
Resource management, optimization, and provisioning in the cloud
Quality of Service for cloud applications
Big Data analytics in clouds
Virtualization aware networking
Service modeling, specification, discovery, monitoring, control, composition, and brokering
Techniques and methods for cloud design and analysis
Cluster and smart Grid
Vehicular and sensor cloud networks
Consumer-centric applications and services using mobile edge platforms
Cloud on Demand: agility and scalability
Fog-based and Cloud Radio Access Networks
Fog-Cloud interactions and enabling protocols
Data centers and infrastructures
Interaction between the edge and the cloud
Cloud economics
Risk compliance and governance for cloud networking
Software development platforms and innovative applications
Cloud service-level agreements and cloud context-level agreements
Virtual network management and orchestration
Track 4: Data Engineering for Ubiquitous Environments
Data engineering models
Machine learning and data mining
Deep learning
Data science and big data
Cloud, high performance, and scalable computing
Multimedia streaming over mobile networks
Collaborative streaming for Ubiquitous Networks
On Demand video streaming
ICN enabled mobile video delivery
Provisioning user QoE in ICN
Analytics for information centric networking decision in 5G
Cyber security and defense in Big Data
Big Data analytics and applications in pervasive systems
Big Data platforms for 5G
Data classification, retrieval, clustering, and visualization
Knowledge discovery and transformation
Artificial intelligence and decision support systems
Formal methods, fuzzy logic, neural networks, genetic algorithms, and ant colony optimization
Data query processing and optimization in databases
Temporal, spatial, sensor, and multimedia databases
Distributed, Parallel, and Peer-to-Peer Databases
Ubiquitous data management
Cooperation, competition, learning and autonomy in pervasive systems
Context-aware and profile-aware pervasive systems
Content caching/storage and dissemination in pervasive systems
Adaptive, autonomic and context-aware computing
Data Grids, Data Warehousing, and OLAP
Economics in pervasive systems
Signal, image, and video processing for pervasive systems
Game-theoretic models and application in pervasive systems
Track 5: Cyber Security for Ubiquitous Communication
Legal and policy issues in cyber security and defense
Availability, privacy, authentication, trust, access control, and key management
Formal and theoretical techniques of cyber security
Incident response techniques in networked and distributed systems
Security and privacy in wireless and mobile systems
Cyber security engineering
Intrusion Detection
Risk analysis and management in cyber security
Storage systems protection and forensics
Economic and management aspects of cyber security and privacy
Evidentiary aspects and forensics of digital crimes
Cybercrime scenarios modeling, analysis, and investigation
Hypothetical reasoning in cyber incident response
Collaborative and distributed techniques for cyber defense and cyber investigation
Active, adaptive, and intelligent defense systems
Embedded security
Evidence preservation, management, storage and reassembly
Anti-forensics and anti-anti forensics prevention, detection, and analysis
Multimedia security
Traffic jamming and defenses
Lightweight security techniques
Large-scale investigations in large networks and Big Data
Privacy and Security in Big Data
Security and privacy in clouds
Techniques for tracking and trace-back of attacks in ubiquitous systems
Data hiding, extraction, and recovery technique
Security in distributed, virtual, and cloud environments
Cyber security architectures
Defense in depth
Cybersecurity o
05月03日
2018
05月05日
2018
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
留言