[dtn-interest] (no subject)

Nadir Shah <nadirshah82@gmail.com> Fri, 26 August 2016 06:36 UTC

Return-Path: <nadirshah82@gmail.com>
X-Original-To: dtn-interest@ietfa.amsl.com
Delivered-To: dtn-interest@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id E40D812B017 for <dtn-interest@ietfa.amsl.com>; Thu, 25 Aug 2016 23:36:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.449
X-Spam-Status: No, score=-1.449 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id BtGNuUJdoGc5 for <dtn-interest@ietfa.amsl.com>; Thu, 25 Aug 2016 23:36:35 -0700 (PDT)
Received: from mail-oi0-x235.google.com (mail-oi0-x235.google.com [IPv6:2607:f8b0:4003:c06::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8BEA4128E19 for <dtn-interest@irtf.org>; Thu, 25 Aug 2016 23:36:35 -0700 (PDT)
Received: by mail-oi0-x235.google.com with SMTP id 188so8092899oif.2 for <dtn-interest@irtf.org>; Thu, 25 Aug 2016 23:36:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:from:date:message-id:subject:to:cc; bh=qcKXX089zKR21MoQ9bWgZUEmQBSRNyYyKGNL7vE1jUk=; b=lI91zgJECQXR4iZSMyqIFPuK01sZ/099WrYeyMDykZGoaBAwE7MB8yWcfmgAxBCuBB PoGzfuic6mSmdR+EDkGRmhC6srqt2TLDVRS3zmCO8tCkwQa7ywsZhqDI2I6OZHCRqdVE 4ebrDdhN41QBZbrRiXJPQ8h9INJ1EtDqGZRaw+VJPILXxi9+9dsEoU94fq3IgC5w8zr+ KxjQFo5HxAVj8RyI4KTuYRQxQ3vzlLlS3rrWFD2hc0gPVkAjrcM31N7zPE1JP+w2EAKn buZXU1w8Gm0xr1ptXFdAT00raWq8sCqSc1j/1N1174meA0hHa+VRatO0cCEbaWGGGPzY WP8w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=qcKXX089zKR21MoQ9bWgZUEmQBSRNyYyKGNL7vE1jUk=; b=FUj9TRa2nM5ix440v4KQaQ9cvHCjK0mzSWxY98HlPHCVeg9lB3wFI0hhCBsownzcUZ cigAdymlyvssOMYrcvueaAq9HPAsAYrMz4cqMYxQpRIt0LNeG6PbT7LLFvH6ezBzZQLK 5vM6XWJbuPQaytQppBqUByjUt5zQVia8QpsWhMv5txIAQ1zYrkwI6S6fAde3ponaHr3r YiCK4ottk81evJ0DhhLYEupurtIO6PqmQaVhCgzOfdMkxW3NdrIyh+2Z2s728EAmAkMl 8cPNyFOqEcnBK0X7yvoaro3wTzayAaLQUi5GYlBS8yHNgOo3chN1b1BabXphy5Jwip54 aQqQ==
X-Gm-Message-State: AE9vXwO0vHwM7ZUnb1vn8YutoGovskoLKxV1qdNQnzzI/ZSVhgwLNlgjf3Wzolgzi1eCjBTainZVn2WNDSOxag==
X-Received: by with SMTP id v7mr966609otb.125.1472193394614; Thu, 25 Aug 2016 23:36:34 -0700 (PDT)
MIME-Version: 1.0
Received: by with HTTP; Thu, 25 Aug 2016 23:36:34 -0700 (PDT)
From: Nadir Shah <nadirshah82@gmail.com>
Date: Fri, 26 Aug 2016 11:36:34 +0500
Message-ID: <CAHXNfrSQU=64skHds2BZY+v=HdYhF23h8ch0Qmwz9dx2C2JjXw@mail.gmail.com>
To: dtn-interest@irtf.org
Content-Type: multipart/alternative; boundary=001a1141549e53a686053af3bc3c
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn-interest/2y2UyBnqHR8_qNAmIl-1UplCQwE>
Cc: nadir@ciitwah.edu.pk
Subject: [dtn-interest] (no subject)
X-BeenThere: dtn-interest@irtf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "The Delay-Tolerant Networking Research Group \(DTNRG\) - Announce." <dtn-interest.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/dtn-interest>, <mailto:dtn-interest-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn-interest/>
List-Post: <mailto:dtn-interest@irtf.org>
List-Help: <mailto:dtn-interest-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/dtn-interest>, <mailto:dtn-interest-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Aug 2016 06:36:38 -0000

[Please accept our apologies if you receive multiple copies of this

           Call For Papers
Special Issue on
Emerging Peer to Peer (P2P) Network Technologies for Pervasive and Mobile
Pervasive and Mobile Computing Journal (Elsevier)

Link   http://www.journals.elsevier.com/pervasive-and-mobile-

The next era will be the era of pervasive and mobile computing (PMC).
Ubiquitous computing, mobile computing, and last mile connectivity based
applications will be the future of mobile applications. Peer-to-Peer (P2P)
will play an important role in such applications. P2P networking refers to
the technology that enables two or more peers to collaborate spontaneously
in an overlay network by using appropriate information and communication
systems without the necessity for a central coordination. A P2P overlay
network is a robust, distributed and fault-tolerant network architecture
for sharing resources like CPU, memory and files. Mobile and wireless
technology have experienced great progress in recent years. There are
several research challenges in the design of an efficient P2P-based
network, e.g., the design of a flexible structure (like ring, chord, 3D or
other multi dimensional structure),  avoiding mismatch between physical and
logical networks, having a flexible structure that can accommodate dynamic
joining and departure of nodes, routing, and forwarding of query. Also, P2P
networks have been used in the emerging networks, such as smart grid,
cognitive radio networks, online social networks and data center networks,
for the support of various applications like routing information
maintenance, data storage and retrieval, and location  service. Each of
these emerging networks has their own unique characteristics which requires
a different approach for the design of an efficient P2P structure for these
emerging networks.

In this special issue, we are seeking new and unpublished work in the
domain of emerging P2P network technologies for pervasive and mobile
computing. More specifically, this special issue will focus on recent
developments in the design of an efficient P2P-based protocol in the
emerging networks and its new applications with special focus on pervasive
and mobile computing. Traditional networking papers or papers that do not
emphasize the proper focus of this special issue will be rejected without

The list of topics includes, but is not limited to:

- P2P networks for pervasive and mobile computing (PMC) applications
- P2P-based protocol for data/file sharing in Internet, smart grid, ad hoc
networks, wireless sensor networks, data center, vehicular networks,
Internet of Things, smart systems
- P2P-based routing protocols for Internet, smart grid, ad hoc networks,
data center networks
- P2P support of efficient data management in cloud computing
- P2P-based location services for storing/managing geographic location
- Application of P2P in vehicular networks.
- P2P based protocols for Named Networks for PMC applications
- P2P based protocols for social networking for PMC applications
- P2P based protocols for Software Defined Radio for PMC applications
- P2P-based protocol for multimedia networks for PMC applications
- P2P-based overlays for group communication for PMC applications
- IP/Name resolution through P2P-based protocol
- Cross-layer approach for P2P-based protocols for PMC
- Developments, issues, and open areas of P2P protocols for PMC
- P2P-based protocol for resource management in emerging networks (like
Cognitive Radio Cellular/Sensor Networks/D2D)
- New applications of P2P-based networks for PMC applications
- Future perspective for P2P-based protocols in emerging networks

Manuscript Due: August 30, 2016
Acceptance notification: November 30, 2016
Expected Publication of the Special Issue: Mid 2017

All submissions have to be prepared according to the Guide for Authors as
published in the Journal website at http://www.journals.elsevier.
com/pervasive-and-mobile-computing/. Authors should select “SI:P2PPMC”,
from the “Choose Article Type” pull-down menu during the submission
process. All contributions must not have been previously published or be
under consideration for publication elsewhere. A submission based on one or
more papers that appeared elsewhere has to comprise major value-added
extensions over what appeared previously (at least 30% new material).
Authors are requested to attach to the submitted paper their relevant,
previously published articles and a summary document explaining the
enhancements made in the journal version.

* Nadir Shah, Lead Guest Editor
  COMSATS Institute of Information Technology, Pakistan
  Email: nadirshah82@gmail.com

* Mubashir Husain Rehmani
  COMSATS Institute of Information Technology, Pakistan
  Email: mshrehmani@gmail.com

* Paolo Bellavista
  Universita de Bolanga, Italy
  Email: paolo.bellavista@unibo.it

Dr. Nadir Shah, (PhD)

Associate Professor

Department of Computer Science

COMSATS Institute of Information Technology, Pakistan.

Email: nadirshah82@gmail.com, nadir@ciitwah.edu.pk

Phone.   051-9274056, 051-9314371, 051-9272614-5 , Ext : 265

Website : https://sites.google.com/site/nadirshah82/


*Dr. Nadir Shah, (PhD)*

*Associate Professor*

*Department of Computer Science*

*COMSATS Institute of Information Technology, Pakistan.*

*Email: nadirshah82@gmail.com <nadirshah82@gmail.com>om>, nadir@ciitwah.edu.pk
<nadir@ciitwah.edu.pk> *

*Phone.   051-9274056, 051-9314371, 051-9272614-5 , Ext : 265*

*Website : https://sites.google.com/site/nadirshah82/
<https://sites.google.com/site/nadirshah82/> *