ICNP 2020 : The 28th IEEE International Conference on Network Protocols
Conference Series : International Conference on Network Protocols
Call For Papers
ICNP, the IEEE International Conference on Network Protocols, is a premier conference covering all aspects of network protocol research, including design, analysis, specification, verification, implementation, and performance. ICNP 2020 (https://icnp20.cs.ucr.edu) will be held in Madrid, Spain, from October 13 to October 16, 2020.
Abstract registration: May 19, 2020 (11:59 p.m. EDT)
Full paper submission: May 26, 2020 (11:59 a.m. EDT, i.e., Noon)
Notification of acceptance: July 25, 2020
Camera ready version: August 24, 2020
The conference is soliciting the submission of papers with significant research contributions to the field of network protocol research. Both experimental results as well as formal investigations are equally welcome. Topics traditionally of interest include, but are not limited to:
All aspects of network protocol research including design, specification, verification, implementation, measurement, testing, and analysis.
Protocols for wireless networks, cellular networks, software-defined networks, data center networks, social networks, peer-to-peer networks, sensor networks, vehicular networks, and Internet of Things.
Domain-specific solutions, including protocols for network security, routing, user privacy, and network management.
Contributions to network architecture, e.g., specific algorithms and protocols for network virtualization or future Internet architectures.
Contributions to other areas of data communications to the extent that they articulate a strong connection to protocols, for example by discussing potential implications on the design or performance of certain types of protocols.
The "other areas of data communications" in the last bullet above should not be interpreted as a "catch-all" category. ICNP’s focus is on networks and their protocols, and while this encompasses a broad range of topics including aspects of design, analysis, measurement, architecture, etc., papers need to articulate some relevance to networking and protocols. Those that do not will be returned as out-of-scope. If you are in doubt as to whether your paper is a fit for ICNP, please reach out to the Program co-Chairs.
Papers should adhere to the IEEE Conference formatting requirements using the templates available here, and should not exceed 10 pages excluding references. Your goal as an author is to produce a readable submission that complies with the formatting constraints. Violating the formatting requirements to squeeze in additional material will result in your submission being returned without being reviewed.
Plagiarism and Submission Policy
Papers must present original contributions and can neither be previously published nor under review by another conference or journal. Papers containing plagiarized material will be subject to the IEEE plagiarism policy and possible penalties, and will be rejected without review.
Submissions and Anonymity
Papers submitted to the conference will be reviewed through a double-blind review process, where the identities of the authors are withheld from the reviewers (and that of the reviewers from the authors). Achieving this goal requires some care to, on the one hand, preserve the anonymity of your submission, while on the other hand ensuring proper coverage of related past work, including your own. While this may seem challenging, the few basic steps listed below will go a long way towards achieving the desired outcome:
Remove all authors' identifiers, e.g., names, emails, and affiliations, from the title page.
Remove acknowledgments to and identifiers of funding sources.
Use anonymous names for your files, as source file names are often embedded in the final output you generate, and therefore accessible as comments.
When referring to your own related work, refer to it in the third person as you would with any other related work by another author.
Besides anonymizing your submission, double-blind reviewing also imposes additional requirements on both authors and reviewers. Specifically, while it is permissible for authors to give local talks on their work and release their paper on a non-peer-reviewed location, e.g., and institutional repository or even arXiv, care should be exercised to limit public exposure as much as possible. This includes refraining from advertising the work on mailing lists and public forums, and in general limiting as much as possible the odds that program committee members be exposed to the work and the authors’ identity. Conversely, program committee members will be advised to neither actively seek to “reverse engineer” the authors’ identity, nor to directly share with other program committee members any such information they may have acquired. All questions regarding possible breaches of the anonymity covenant that underlies the double-blind review process will be adjudicated by the Program co-Chairs.
Best Paper Award and Fast-Track Journal Publication
One of the accepted papers will be selected for a best paper award. Up to two of the best papers from ICNP may be fast tracked in the IEEE/ACM Transactions on Networking, with a streamlined journal review process.
Presentation and Registration Requirements
It is IMPERATIVE that at least one of the authors of any accepted paper register for the conference at the full rate and be available to present the paper at the conference. Failure to comply with this policy will result in the paper’s withdrawal from the conference proceedings and IEEE Xplore. Exceptions to this policy will only be granted for truly mitigating circumstances and must be approved by the Program co-Chairs before the beginning of the conference.
Technical Program Chairs
Roch Guérin (Washington University in Saint Louis)
Peter Steenkiste (Carnegie Mellon University)
Lachlan Andrew (University of Melbourne, Australia)
Ken Calvert (University of Kentucky, USA)
Jyh-Cheng Chen (National Chiao Tung University, Taiwan)
Sonia Fahmy (Purdue University, USA)
Lixin Gao (University of Massachusetts, Amherst, USA)
J. J. Garcia-Luna-Aceves (University of California, Santa Cruz, USA)
Sergey Gorinsky (IMDEA Networks Institute, Spain)
Baochun Li (University of Toronto, Canada)
Jörg Liebeherr (University of Toronto, Canada)
Mingyan Liu (University of Michigan, Ann Arbor, USA)
Yong Liu (New York University, USA)
John C. S. Lui (Chinese University of Hong Kong, China)
Vishal Misra (Columbia University, USA)
Lili Qiu (University of Texas, Austin, USA)
K. K. Ramakrishnan (University of California, Riverside, USA)
Karthikeyan Sundaresan (NEC Labs America, USA)
Steve Uhlig (Queen Mary University of London, UK)
Ana Aguiar (University of Porto, Portugal)
Gianni Antichi (Queen Mary University of London, UK)
Behnaz Arzani (Microsoft Research, USA)
Ashwin Ashok (Georgia State University, USA)
Konstantin Avrachenkov (INRIA Sophia Antipolis, France)
Marinho Barcellos (Waikato University, New Zealand)
Olivier Bonaventure (Université Catholique de Louvain, Belgium)
Ignacio Castro (Queen Mary University of London, UK)
Mun Choon Chan (National University of Singapore, Singapore)
Yanjiao Chen (Wuhan University, China)
Jiasi Chen (University of California, Riverside, USA)
Marco Chiesa (KTH, Sweden)
Felix Cuadrado (Technical University of Madrid, Spain)
Abhishek Dwaraki (Washington University in St. Louis, USA)
Soudeh Ghorbani (Johns Hopkins University, USA)
Maria Gorlatova (Duke University, USA)
Timothy Griffin (University of Cambridge, UK)
Katherine Guo (Bell Labs, USA)
Tao Han (University of North Carolina, Charlotte, USA)
Israat Haque (Dalhousie University, Canada)
Khaled Harras (Carnegie Mellon University, USA)
Teruo Higashino (Osaka University, Japan)
Ralph Holz (University of Twente, Netherlands)
Mariam Kiran (ESnet, Lawrence Berkeley Natl. Lab., USA)
Kirill Kogan (Ariel University, Israel)
Koojana Kuladinithi (Hamburg University of Technology, Germany)
Patrick P. C. Lee (Chinese University of Hong Kong, China)
Dan Li (Tsinghua University, China)
Zhenyu Li (Chinese Academy of Sciences, China)
Kate Lin (National Chiao Tung University, Taiwan)
Eirini Liotou (National & Kapodistrian University of Athens, Greece)
Dmitri Loguinov (Texas A&M University, USA)
Richard T. B. Ma (National University of Singapore, Singapore)
Olaf Maennel (Tallinn University of Technology, Estonia)
Deep Medhi (University of Missouri-Kansas City & NSF, USA)
Eugene Ng (Rice University, USA)
Neal Patwari (Washington University in St. Louis, USA)
Dan Pei (Tsinghua University, China)
Chen Qian (University of California Santa Cruz, USA)
Feng Qian (University of Minnesota, USA)
Chathu Ranaweera (Deakin University, Australia)
Gabor Retvari (Budapest University of Technology & Economics, Hungary)
Hulya Seferoglu (University of Illinois at Chicago, USA)
Rute Sofia (fortiss GmbH, Germany)
Rade Stanojevic (Qatar Computing Research Institute, Qatar)
Chen Tian (Nanjing University, China)
Eirini Eleni Tsiropoulou (University of New Mexico, USA)
Christina Vlachou (Hewlett Packard Labs, USA)
Jia Wang (AT&T Labs Research, USA)
Wei Wang (Hong Kong University of Science & Technology, China)
Geoffrey Xie (Naval Postgraduate School, USA)
Tong Yang (Peking University, China)
Diman Zad Tootaghaj (Hewlett Packard Labs, USA)
Beichuan Zhang (University of Arizona, USA)
Jiaqi Zheng (Nanjing University, China)
Martina Zitterbart (Karlsruhe Institute of Technology, Germany)