posted by organizer: tsheltami || 931 views || tracked by 5 users: [display]

AASNET 2015 : Applications of Ad hoc and Sensor Networks (AASNET'15)


When Sep 27, 2015 - Sep 30, 2015
Where Berlin, Germany
Submission Deadline Jun 30, 2015
Notification Due Jul 7, 2015
Final Version Due Jul 26, 2015
Categories    energy-aware routing protocols   mobility tracking schemes in a   intrusion detection systems in   telehealth monitoring system u

Call For Papers

Dear Colleague,

I would like to invite you to submit papers to the Seventh International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'15),, which be held in conjunction with the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2015) in Berlin, Germany on September 27-30, 2015.

Wireless mobile ad hoc and sensor network nodes have limited battery capacity. Hence, they tend to be energy conservative. Many MAC, routing protocols, scheduling scheme were proposed to promote energy conservation without degrading the performance of the network. Nonetheless, nowadays, many real-time applications have been proposed and developed using ad hoc and sensor networks.

The aim of this symposium is to provide a forum for academic and industry professionals to discuss recent progress and challenges in the area of real time applications in ad hoc and sensor networks. We encourage contributions that describe innovative work and results on AASNET. The topics of interest include but are not limited to:

Energy-aware routing protocols
Energy-aware scheduling techniques
Energy-aware MAC protocols
Artificial intelligence applications in ad hoc and sensor networks
Sensor networks for oil and gas industry
Mobility tracking schemes in ad hoc networks
Voice over ad hoc networks
Multimedia over sensor networks
Machine leaning schemes for ad hoc and sensor networks
Intrusion detection systems in ad hoc and sensor networks
Telehealth monitoring system using ad hoc and sensor networks

Important date:

June 30, 2015 Submission Deadline
July 7, 2015 Author Notification
July 26, 2015 Final Manuscript Due


Only original papers will be considered that have neither been published nor submitted for publication elsewhere, including web publication. All submissions will be handled electronically. The length of the paper is limited to 6 pages. All papers will be reviewed by at least two independent reviewers.

All accepted papers will be printed in the conference proceedings published by Elsevier Science in the open-access Procedia Computer Science series on-line. Procedia Computer Sciences is hosted on and on Elsevier content platform ScienceDirect (, and will be freely available worldwide. All papers in Procedia will be indexed by Scopus ( and by Thomson Reuters' Conference Proceeding Citation Index The papers will contain linked references, XML versions and citable DOI numbers. You will be able to provide a hyperlink to all delegates and direct your conference website visitors to your proceedings. All accepted papers will also be indexed in DBLP (

Related Resources

IJASUC 2016   International Journal of Ad hoc, Sensor & Ubiquitous Computing
WiOpt 2017   Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks
WCN @ ACM SAC 2017   Track on Selected Areas of Wireless Communications and Networking (WCN) The 32nd ACM/SIGAPP Symposium on Applied Computing, SAC, 2017 April 3 - 7, 2017,
GRAPH-HOC 2016   Eighth International Conference on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
GRAPH-HOC 2016   International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks
MobiHoc 2016   17th International Symposium on Mobile Ad Hoc Networking and Computing
RNMDA 2017   Special Issue on “Resilient Networks : Modeling, Design, and Applications”, Digital Communications and Networks, Elsevier
AdHocNets 2016   8th International Conference on Ad Hoc Networks
IoT 2017   The 3rd International Workshop on Internet of Things
NTMS 2016   8th IFIP International Conference on New Technologies, Mobility and Security