Conference Information
ICN 2018: ACM Conference on Information-Centric Networking
Submission Date:
Notification Date:
Conference Date:
Boston, Massachusetts, USA
Viewed: 6433   Tracked: 1   Attend: 0

Conference Location
Call For Papers
The 5th ACM conference on Information Centric Networking (ICN 2018) will be held in Boston, MA, USA, Friday through Sunday, September 21-23, 2018. We are inviting submissions that describe significant research contributions to ICN as broadly defined. The fundamental concept in Information Centric Networking (ICN) is to provide the ability to access named information as a principal service offered by the network, evolving the Internet from today’s host based packet delivery towards directly retrieving information objects and invoking services by name in a secure, resilient, scalable, and efficient way. These architectural design efforts aim to address the challenges that arise from the increasing demands from accessing cloud resources, from accelerated growth of mobile devices and edge computing, from wide deployment of Internet-of-things (IoT), and from the need to secure the global Internet. Papers pertaining to these and/or related fields are specifically encouraged.

ACM ICN 2018 will be a single track conference focusing on current ICN research topics, featuring paper presentations, posters, and demonstrations.

Topics of Interest

    Use of ICN for both legacy problems and novel use cases, including but not limited to:
        name-based access to fog/edge computing resources as well as to cloud services;
        device and content mobility;
        IoT and CPS (e.g., industrial IoT, smart city, smart homes, vehicular communications).

    Network layer, mobility and architecture:
        comparison of architectures, ICN styles and semantics;
        interdependency of namespace design, routing, and resource control;
        ICN support for ad hoc and direct peer-to-peer communication;
        ICN for high-speed networking.

        privacy, both generally and especially its interaction with caching;
        trust management and access control;
        IoT and CPS-specific security considerations.

    Application layer, Evaluations and Testbeds:
        ICN and application-layer messaging and stream processing frameworks (e.g., Kafka, Flink, QUIC);
        APIs for transport, other higher-level abstractions, and their assessment;
        experience from implementation, testbeds, and tools;
        critical analysis of previous research in ICN, including reproducibility studies;
        methodology and metrics.

    Translational Research:
        deployments of ICN;
        ICN for distributed computation, cloud-based services, edge computing, database queries, big data manipulation as well as ICN-mediated sensor/actuator control loops;
        ICN and in-network computation (e.g., NFN and related approaches);
        ICN and SDN interactions;
        ICN-inspired applications and systems.

        business and Economic models and their effects on deployability;
        management of ICN networks and systems;
        caching and its interaction with I/O performance;
        scalability analysis;
        traffic engineering.

    Implementation challenges and experiences:
        line speed caching;
        routing scalability;
        congestion control;
        zero configuration ICN.

Submission Details

Full-papers can be up to 10 pages in length (excluding references), following the ACM SIGCOMM format, and should convey results of mature research. Short-papers can be up to 6 pages in length (excluding references): This format is suitable for less mature workshop-oriented work not ready for a full submission and for thought-provoking position papers. Submissions exceeding the 6 pages length will be considered as full-papers. Papers with doctoral students as first authors are particularly encouraged. Note that in order to ensure adequate citation of related work, extra pages of references are allowed (and encouraged).

Submissions will be reviewed (single-blind review process) and evaluated on the basis of originality, importance of contribution, soundness, evaluation, quality of presentation and appropriate comparison to related work. The program committee as a whole will make final decisions about which submissions to accept for presentation at the conference. A “best paper award” will be attributed from the program committee to one among the accepted papers in each of the Full paper and Short paper categories. The program committee may invite authors of non-accepted papers to present their work with a poster accompanied by a 2-page extended abstract. Please note that ACM ICN 2018 also has a specific call for posters, demos, tutorials, and panel sessions.
Last updated by Dou Sun in 2018-03-11
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ISMSTInternational Symposium on Material Science and Technology2018-04-282018-05-022018-03-29
cb2HISInternational Conference on Hybrid Intelligent Systems2015-09-202015-09-302015-11-16
cb2ICMLAInternational Conference on Machine Learning and Applications2019-07-192019-08-312019-12-16
edCelectronic displays Conference2018-10-05 2019-02-27
b1CCNCIEEE Consumer Communications and Networking Conference2019-07-092019-09-202020-01-10
ICNTInternational Conference on Network Technologies2019-02-152019-03-052019-04-09
CyberSafetyInternational Workshop on Computational Methods for CyberSafety2019-02-102019-02-252019-05-13
AMEMEInternational Conference on Applied Mechanics, Electronics and Mechatronics Engineering2017-10-12 2017-10-22
SEBDItalian Symposium on Advanced Database Systems2019-03-182019-04-202019-06-16
aa*a1SIGCOMMAnnual Conference of the ACM Special Interest Group on Data Communication2018-01-242018-05-112018-08-20
Related Journals
CCFFull NameImpact FactorPublisherISSN
IET Control Theory & Applications2.048IET1751-8644
cIET Information Security0.862IET1751-8709
bInformation Sciences4.305ELSEVIER0020-0255
aIEEE Transactions on Information Theory2.728IEEE0018-9448
Journal of King Saud University - Computer and Information Sciences ELSEVIER1319-1578
Information Security Technical Report ELSEVIER1363-4127
Network Security ELSEVIER1353-4858
cExpert Systems0.947John Wiley & Sons1468-0394
International Journal of Next-Generation Networks AIRCC0975-7252
Computational Science and Engineering SoftwareRational Publication0000-0000