Contributions under eight main tracks are requested. Successful papers will be included in the IEEE Explore index. Selected papers in their extended version will be published in a special issue for the Forum (probably a book publish by a global publisher).
Topics of interest for each of the main research tracks of the 2016 forum include, but are not limited to:
1. Mobile on Cloud/Utility/Web Computing/Big Data:
- Cloud computing
- Resource acquisition models in cloud/utility computing
- Security management, analysis for cloud/utility services
- System performance evaluation, analysis and management
- Utility business services
- Utility computing
- Web computing
- Web service discovery and negotiation
- Web service management and collaboration
- Web service security and privacy
- Big Data collection and pre-processing
- Big Data storage and parallel computing
- Big Data intelligent computing, mining methods and algorithms
2. Mobile Technology:
- 5th Generation Mobile Network
- Wireless Technology
- Cloud Technology
- Wearable Electronics
- Deep Learning
- Internet of Things
3. Mobile Social/Peer-to-Peer/Ubiquitous/Pervasive:
- Online Social Networks
- Peer-to-Peer Mobile Computing
- Human interface for mobile/ubiquitous/pervasive environments
- Mobile ad hoc networks
- Mobile wireless Internet
- Mobile Crowd Sourcing
- Mobile/ubiquitous security
- Mobile/ubiquitous/pervasive quality of service (QoS) adaptation
- Personal area networks, body wireless networks, Bluetooth
- Software-defined radio, reconfigurable radio network
- Wireless sensor networks
4. Mobile Applications:
- Mobile Shopping
- Mobile Commerce
- Mobile Payment
- Mobile Health
- Mobile Education
- Mobile Gaming
5. Mobile Integration of telecommunication SOA and Web services:
- Service orchestration
- Mobile/Internet Protocol Television (IPTV)
- Service-oriented Telco architectures and business processes
- IP Multimedia Subsystem (IMS)
- Next generation networks
- Quality of service (QoS) and billing
6. Mobile Business Process Integration and Management:
- Application integration services (e.g., Enterprise Service Bus)
- Business performance management
- E-business solutions
- Enterprise modeling
- Industry solution patterns
- Linkage between IT services and business services
- Mathematical foundation of business process modeling, integration and management
- Security, privacy and trust in business process management
- Service computing process modeling, transformation and integration
- Service level automation and orchestration
- Software architecture design, development and deployment (e.g., Software as a Service)
7. Mobile Security and Privacy:
- Cryptography for privacy-preserving in mobile cloud computing
- Privacy preserving cryptographic protocols
- Privacy preserving cryptographic access control
- Privacy preserving keyword search scheme
- Privacy preserving data sharing methodology
- Privacy preserving public auditing
- Privacy preserving resource usage
- Trusted execution environment
- Trustworthy infrastructures and services for cloud computing
8. Mobile Crime:
- Policing, Investigation and prosecution
- Mobile Crime Detection and prevention
- Malware/Adware
- Any kind of Mobile fraud /deviance
- Any novel crime on mobile
- Mobile awareness and public education
Submission Instructions:
Listed below are two paper submission streams, please choose which stream best fits your intention. Authors seeking to have their papers considered for IEEE indexing/publication in IEEE Xplore will be required to submit a fully completed, camera-ready paper, limit to 8 pages (but no less than 6 pages) in length (*please note that over limit page(s) extra charge would be incurred), within two weeks of receiving notification that their papers have been accepted for publication. Presenting authors whose papers have been accepted must also complete the registration process and pay their registration fee no later than September 30, 2016. Please note that papers submitted for publication in IEEE Xplore must be formatted using an IEEE-approved template. Template available from IEEE website.
For criminologists and other social scientists who wish to present a paper at the conference, but do not wish to have their paper considered for IEEE indexing/publication in IEEE Xplore, please submit an abstract for your paper. The acceptance of your paper for presentation at the conference will be based upon a peer review of the strength of your abstract.
IEEE Conference Record Number: to be announced.
All abstracts maximum length no more than 300 words.
The IEEE copyright form can be downloaded here for authors who are submitting via the IEEE stream. Registered authors of accepted papers should complete and return the copyright form to conference secretariat.