[sigcomm] CFP IEEE JSAC NON-COOPERATIVE BEHAVIOR IN NETWORKING

Li (Erran) Li erranlli at research.bell-labs.com
Mon May 1 06:05:18 PDT 2006


CALL FOR PAPERS
IEEE Journal on Selected Areas in Communications

NON-COOPERATIVE BEHAVIOR IN NETWORKING

http://www.argreenhouse.com/society/J-SAC/Calls/non_cooperative.html

Network protocols and architectures have traditionally been designed under the 
assumption that end users and network entities are cooperative. However, this 
fundamental assumption is clearly not valid in today's commercial wired and 
wireless networks. For example, ISPs are independent entities and they do not 
necessarily cooperate among one another; similarly, end users in a wireless 
network are interested in the share of the radio spectrum they enjoy, not in 
the global optimum of the system (the temptation to depart from the nominal 
protocols is further fueled by the increasing programmability of the end 
systems).

These entities naturally want to optimize their own objectives. There are 
growing interests in using game theory and mechanism design to solve these 
problems. For these methods to be practical they must incorporate realistic 
constraints of the underlying network systems; the solutions must be scalable, 
easily implementable, predictable and reach stable state fast. The aim of this 
issue is to bring together the work done by researchers and practitioners in 
understanding the theoretical, architectural, system, and implementation issues 
related to all aspects of non-cooperative issues in networking. We seek 
original, previously unpublished and completed contributions not currently 
under review by another journal. Areas of interest include but are not limited 
to the following topics:

Characterization and quantification of selfish behavior, e.g. among end users 
or among network providers
Fast convergence to equilibrium
Game-theoretic models and limitations
Modeling of the behavior of individual players, notably by machine learning
Incentive techniques, reputation systems, micro-payments
Security techniques to thwart selfish behavior and to support incentive 
techniques
Non-cooperative aspects at the MAC, routing, and transport layers
Inter-layer aspects of non-cooperation

Each paper should be no more than 35 pages in double-space format using font 
size of at least 12, including figures, graphs, and illustrations.

Prospective authors should follow the IEEE J-SAC manuscript format described in 
the Information for Authors. Manuscripts submitted for this issue should not be 
under consideration by any other journal. All papers should be submitted in pdf 
format. To submit your paper 1) go to http://edas.info, 2) establish an 
account, 3) receive an email from edas with your password, 4) login to the edas 
system, 5) select the J-SAC issue, 6) click on view, and 7) click on submit 
paper and follow the instructions. The following timetable shall apply:

Manuscript submission: JUNE 1, 2006
Acceptance notification: November 1, 2006
Final manuscript due: January 1, 2007
Publication: 2nd Quarter 2007

Guest Editors

Levente Buttyan
CrySys Laboratory
BME
buttyan at hit.bme.hu

Jean-Pierre Hubaux
School of Computer and Communications Sciences
EPFL
jean-pierre.hubaux at epfl.ch

Li (Erran) Li
Networking Research Lab
Bell Labs, Lucent
erranlli at research.bell-labs.com

Xiang-Yang Li
Dept Computer Science
Illinois Inst of Technology
xli at cs.iit.edu

Tim Roughgarden
Computer Science Dept
Stanford University
tim at cs.stanford.edu


More information about the sigcomm mailing list