<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:x="urn:schemas-microsoft-com:office:excel" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=iso-8859-1"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
span.StileMessaggioDiPostaElettronica17
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:70.85pt 2.0cm 2.0cm 2.0cm;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=IT link="#0563C1" vlink="#954F72"><div class=WordSection1><p class=MsoNormal><span lang=EN-US>*** Springer Computing Special Issue ***<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>[Apologies if you receive multiple copies of this CfP]<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>*************************************************************************************************<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Springer - Computing (impact factor: 2.063)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Call for Special issue on "QoS and security in software for wireless and mobile micro-services"<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>https://www.springer.com/journal/607/updates/17198624<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>(Submissions due: 30 May 2020)<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>*************************************************************************************************<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Recent years have witnessed very remarkable technological advances in both hardware miniaturization (availability of enough powerful micro-devices at reasonable prices with communication capabilities) and associated software and service developments. Their target applications cover a broad spectrum of services, ranging from general public applications (health services, smart cities services, automotive services, etc.) to specialized applications (military, industrial, etc.). The development of such services and their deployment raise several open research challenges, among them Quality of service (QoS) and Security.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Quality of Service is intrinsically related to the requirements of the end users/applications. It can be declined under various metrics: technological metrics (throughput maximization, delay, and energy minimization, etc.) as well as user experience metrics (quality of data, completeness of the information, etc.). The recent developments have widened the perimeter of QoS to include new aspects and the corresponding metrics/constraints such as quality of the captured data, quality of the transmission, quality of the local processing due to intrinsic limitations (memory and computing), etc. This is a consequence of the used hardware, known to be more prone to failures, and of the development of the associated software, usually characterized by low-level abstraction (i.e., close to the hardware primitives for performance reasons). Another issue related to QoS is the increased importance of scalability for the proposed services, raised by the need of large scale deployment, as the expected number of devices used in an application may be of the order of thousands. Those new conditions call for a paradigm shift in terms of concepts and techniques handling QoS within micro-services.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Closely connected to QoS, the objectives related to privacy, security, and trust have become a significant challenge, mainly due to the extensive dissemination of these micro-services in our private lives, for instance in health monitoring, home control, e-payments, etc. Techniques addressing these issues aim at ensuring that the provided micro-services will protect the users' data and provide guarantees that no malicious device will affect the system decisions, under the additional constraints of granting a given QoS level.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>The objective of this special issue is to explore recent advances in QoS and Security in software for wireless and mobile micro-services.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>** TOPICS<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Topics of interest include (but are not limited to):<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Wireless and mobile network security (WLAN, PCS, Ad hoc and Sensor Networks, Wireless Mesh, etc. )<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- QoS for wireless networks,<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Intrusion detection in wireless ad hoc and sensor networks<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Privacy and authentication<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- QoS for wireless multimedia systems, VoIP QoS<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Quality of control of wireless networks<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Power and energy management<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Wireless video surveillance networks<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- QoS in the Wireless Internet<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- QoS and Routing<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- QoS Metrics<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- QoS of Wireless Network Services<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Wireless Network Survivability<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- QoS and Reliability<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Image Quality in Wireless Video-Surveillance Networks<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- QoS provisioning in wireless multimedia systems<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Wireless and mobile systems and applications<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Performance Modeling and Simulation Techniques<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Mobile security: device, application, and data security<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>- Game Theoretical modeling of QoS and Security<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>** GUEST EDITORS<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Ahmed Mostefaoui, University of Franche-Comte, France. </span>Email: ahmed.mostefaoui@univ-fcomte.fr<o:p></o:p></p><p class=MsoNormal>Gabriele Gianini, Universitą degli Studi di Milano, Italy. Email: gabriele.gianini@unimi.it<o:p></o:p></p><p class=MsoNormal>Ernesto Damiani, Universitą degli Studi di Milano, Italy. <span lang=EN-US>Email: ernesto.damiani@unimi.it<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Geon Min, University of Exeter, UK. Email: g.min@exeter.ac.uk<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>** GUIDELINES<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>This Special Issue invites novel contributions that advance the state-of-the-art in the above areas. Manuscripts that extend research published previously (e.g., in conference or workshop proceedings) will only be considered if they include at least 50% of significantly new material; the submission of such manuscripts must be accompanied by a "Summary of Differences" letter explaining how the authors extended their previously published work.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Submission Guidelines<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>All submitted manuscripts must be formatted according to Computing's instructions for authors which are available at https://www.springer.com/607. We will accept both LaTeX manuscripts (which must use Springer templates at https://www/springer.com/607) and word manuscripts (for which no templates are available).<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Manuscript length<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Please note that the page limit for Special Issue submissions differs from that of regular Computing submissions. Manuscripts submitted to the Special Issue should not exceed 18 pages. Submission that do not comply with this requirement are likely to be desk rejected without being reviewed.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Submission instruction<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Manuscripts should be submitted using the online submission system at (http://www.springer.com/607). When submitting a manuscript for this special issue, authors should take care to select 'QoS and security in software for wireless and mobile micro-services'.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>** IMPORTANT DATES<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US>Submission Due: 30th May 2020<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>First Review Notification: 30th September 2020<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Revision Due: 30th November 2020<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US>Second Review Notification: 31st January 2021<o:p></o:p></span></p><p class=MsoNormal>Publication date: approx. third quarter 2021<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p></div></body></html>