Call for Papers
Virtual Machines in Pervasive Computing
SUBMISSION DEADLINE: 8 May 2009
Notification of final acceptance: 21 July 2009
Author guidelines: www.computer.org/pervasive/author.htm
Submission address: https://mc.manuscriptcentral.com/pc-cs
Issue to press: September 2009
WIP Deadline: See below
IEEE Pervasive Computing invites submissions on the use of virtual machines in pervasive computing.
Virtual machines provide a computing container that appears to be a physical computer and that can run a conventional OS and applications. Such virtual machines are now in wide use in datacenter and desktop computing, and multiple benefits are being realized from their use. These include the ability to easily encapsulate, deploy, clone, and manage applications, run multiple computing environments on the same system without sacrificing performance or security isolation, move running environments between systems, and recover quickly from hardware failures.
With the growing number of increasingly capable pervasive devices, virtual machines are becoming popular in pervasive computing. While the benefits mentioned above also apply to pervasive computing, their realization is complicated by the intrinsic differences of pervasive and desktop/datacenter computing – mobility, distrusted systems, limited energy sources and other resource constraints, personal use of multiple devices, etc. This special issue is focused on better understanding these complications, exploring solutions to them, and evaluating pervasive-computing specific benefits of virtualization. Example topics for this special issue include but are not limited to the following
- applications or services built on top of virtual machines, including Virtual Appliances, Virtual Appliance ensembles, and Virtual Desktop solutions
- creation and distribution of virtual machines including image management, end-user experience, payment models/mechanisms, patch and update mechanisms, and trust
- mechanisms for deploying such applications/services to mobile/ubiquitous devices
- management of such deployed virtual machines including mechanisms for discontinuous management and digital rights management
- migration of virtual machines between mobile/ubiquitous devices including mechanisms for addressing virtual-machine data loss, network-speed discontinuities, and dissimilar platform capabilities
- security and privacy concerns from the perspective of users of virtual machines or computing platform providers including mechanisms for enforcing or increasing trust between these two groups
- all aspects of performance including the performance impact of running mobile/pervasive applications within virtual machines, downloading virtual machines, and distributing updates/patches for them
- hardware support for making virtualization more viable on resource constrained mobile/pervasive devices such as cell phones
- case studies reporting the experience and lessoned-learned from the development, deployment, use, or maintenance of virtual-machine-based pervasive applications or solutions
- services that operate below the virtual machine that enable pervasive computing, such as update or patching services or encryption services
Submissions should be 4,000 to 6,000 words long and should follow the magazine's guidelines on style and presentation. All submissions will be anonymously reviewed in accordance with normal practice for scientific publications. Submissions should be received by 8 May 2009 to receive full consideration.
In addition to full-length submissions, we also invite work-in-progress submissions of 250 words or less (submit to email@example.com). These will not be peer-reviewed but will be reviewed by the Department Editor Anthony Joseph and, if accepted, edited by the staff into a feature for the issue. The deadline for work-in-progress submissions is 1 September 2009.
Keith Farkas, VMware Inc. (firstname.lastname@example.org)
Chandra Narayanaswami, IBM (email@example.com)
Jason Nieh, Columbia (firstname.lastname@example.org)