<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<tt>MobiSys 2018 -- Call for Papers
</tt><tt><br>
</tt><tt>===============================
</tt><tt><br>
</tt><tt>
</tt><tt><br>
</tt><tt><a class="moz-txt-link-freetext"
href="https://www.sigmobile.org/mobisys/2018/cfp/">https://www.sigmobile.org/mobisys/2018/cfp/</a></tt><tt>
</tt><tt><br>
</tt><tt>
</tt><tt><br>
</tt><tt>MobiSys 2018 seeks to present innovative and significant
research on all
</tt><tt><br>
</tt><tt>aspects of mobile systems, applications, and services. The
conference
</tt><tt><br>
</tt><tt>values technical contributions with working implementations
and
</tt><tt><br>
</tt><tt>practical evaluations. We also welcome work that explores
new and
</tt><tt><br>
</tt><tt>compelling mobile scenarios and applications as long as the
work goes
</tt><tt><br>
</tt><tt>well beyond providing an initial vision.
</tt><tt><br>
</tt><tt>
</tt><tt><br>
</tt><tt>Topics of interest include, but are not limited to:
</tt><tt><br>
</tt><tt>- Experience with mobile applications, networks and systems
</tt><tt><br>
</tt><tt>- Innovative mobile, mobile sensing, and mobile
crowdsourcing apps
</tt><tt><br>
</tt><tt>- Tools for building and measuring mobile systems
</tt><tt><br>
</tt><tt>- Innovative wearable or mobile devices
</tt><tt><br>
</tt><tt>- Novel software architectures for mobile devices
</tt><tt><br>
</tt><tt>- Data management for mobile applications
</tt><tt><br>
</tt><tt>- Infrastructure support for mobile computing
</tt><tt><br>
</tt><tt>- System-level energy management for mobile devices
</tt><tt><br>
</tt><tt>- Operating systems for mobile devices
</tt><tt><br>
</tt><tt>- Support for mobile social networking and mobile Web
</tt><tt><br>
</tt><tt>- Security and privacy in mobile systems
</tt><tt><br>
</tt><tt>- Systems for location and context sensing and awareness
</tt><tt><br>
</tt><tt>- Mobile computing support for pervasive computing
</tt><tt><br>
</tt><tt>- Vehicular and robotic systems
</tt><tt><br>
</tt><tt>- Systems and networking support for virtual or augmented
reality
</tt><tt><br>
</tt><tt>- Applications of mobile systems in health, sustainability,
and other
</tt><tt><br>
</tt><tt> domains
</tt><tt><br>
</tt><tt>
</tt><tt><br>
</tt><tt>Non-traditional topics that bring new perspectives to
mobile computing
</tt><tt><br>
</tt><tt>papers whose contributions overlap with work currently
under review
</tt><tt><br>
</tt><tt>elsewhere must not be submitted to MobiSys. Papers whose
contributions
</tt><tt><br>
</tt><tt>overlap with an earlier published paper will be considered
only if (1)
</tt><tt><br>
</tt><tt>the previous paper was published (not just accepted) at a
workshop at
</tt><tt><br>
</tt><tt>least 6 months before our submission date and (2) it adds
significant
</tt><tt><br>
</tt><tt>new contributions over the previous paper. Authors
uncertain whether
</tt><tt><br>
</tt><tt>their submission meets these guidelines should contact the
program
</tt><tt><br>
</tt><tt>chairs. Papers accompanied by nondisclosure agreement forms
will not be
</tt><tt><br>
</tt><tt>considered. Accepted submissions will be treated as
confidential prior
</tt><tt><br>
</tt><tt>to publication; rejected submissions will be permanently
treated as
</tt><tt><br>
</tt><tt>confidential.
</tt><tt><br>
</tt><tt>
</tt><tt><br>
</tt><tt>MobiSys uses a double-blind review policy during the
initial paper
</tt><tt><br>
</tt><tt>review. Authors are instructed to not include their names,
affiliations
</tt><tt><br>
</tt><tt>and contact information on the manuscript they submit for
review.
</tt><tt><br>
</tt><tt>Authors should also anonymize the content of their paper to
hide their
</tt><tt><br>
</tt><tt>identity. Reviewers will not know the identity of the
authors during the
</tt><tt><br>
</tt><tt>initial phase of the review process, however, anonymity
will expire
</tt><tt><br>
</tt><tt>after the majority of the reviews have been submitted and
preliminary
</tt><tt><br>
</tt><tt>outcomes decided. The identities of the authors will be
revealed to the
</tt><tt><br>
</tt><tt>reviewers toward the end of the review process. Submissions
who are not
</tt><tt><br>
</tt><tt>properly anonymized will be rejected without being
reviewed.
</tt><tt><br>
</tt><tt>
</tt><tt><br>
</tt><tt>We strongly encourage prospective authors to use past
MobiSys
</tt><tt><br>
</tt><tt>proceedings as a guideline to assess the readiness of their
work for
</tt><tt><br>
</tt><tt>submission. Due to high review load on PC members, low
quality or
</tt><tt><br>
</tt><tt>premature work submitted to the conference is likely to
receive a
</tt><tt><br>
</tt><tt>smaller number of reviews and the reviews may be brief.
</tt><tt><br>
</tt><tt>
</tt><tt><br>
</tt><tt>As part of the submission process, authors of papers that
describe
</tt><tt><br>
</tt><tt>experiments on human subjects, or that analyze nonpublic
data derived
</tt><tt><br>
</tt><tt>from human subjects (even anonymized data), will be asked
to certify
</tt><tt><br>
</tt><tt>that their work was vetted by an ethics review (e.g., IRB
approval). We
</tt><tt><br>
</tt><tt>expect authors to follow the rules of their host
institutions around
</tt><tt><br>
</tt><tt>data collection and experiments with human subjects.
</tt><tt><br>
</tt><tt>
</tt><tt><br>
</tt><tt>Selected outstanding papers may be fast-tracked as a
special section of
</tt><tt><br>
</tt><tt>IEEE Transactions on Mobile Computing.
</tt><tt><br>
</tt><tt>
</tt><tt><br>
</tt><tt>Best Paper Award
</tt><tt><br>
</tt><tt>----------------
</tt><tt><br>
</tt><tt>All papers will be considered for the Best Paper Award. The
program
</tt><tt><br>
</tt><tt>committee will select a number of candidates for the award
among
</tt><tt><br>
</tt><tt>accepted papers, and select one or more award papers prior
to the
</tt><tt><br>
</tt><tt>conference.
</tt><tt><br>
</tt><tt>
</tt><tt><br>
</tt><tt>Video Presentation
</tt><tt><br>
</tt><tt>------------------
</tt><tt><br>
</tt><tt>The authors of each accepted paper will submit a 1-minute
video that
</tt><tt><br>
</tt><tt>presents their papers' contributions to a general audience.
These videos
</tt><tt><br>
</tt><tt>will be placed on the conference website before the
conference, and may
</tt><tt><br>
</tt><tt>be played during the conference. Some of the videos will be
featured on
</tt><tt><br>
</tt><tt>the social media channels related to the conference.
</tt><tt><br>
</tt><tt>
</tt><tt><br>
</tt><tt>Important Dates
</tt><tt><br>
</tt><tt>---------------
</tt><tt><br>
</tt><tt>Abstract Registration: December 1st, 2017, 11:00 PM
PST (this
</tt><tt><br>
</tt><tt> corresponds to Dec 2nd, 2017,
07:00 UTC)
</tt><tt><br>
</tt><tt>Paper Submission: December 8th, 2017, 11:00 PM
PST (this
</tt><tt><br>
</tt><tt> corresponds to Dec 9th, 2017,
07:00 UTC)
</tt><tt><br>
</tt><tt>Notification of acceptance: March 2nd, 2018
</tt><tt><br>
</tt><tt>Camera Ready Deadline: May 4th, 2018
</tt><tt><br>
</tt><tt>Conference: June 10-15, 2018
</tt><tt><br>
</tt><tt>
</tt><tt><br>
</tt><tt>Contact
</tt><tt><br>
</tt><tt>-------
</tt><tt><br>
</tt><tt>If you have any questions, please contact Stefan Saroiu
</tt><tt><br>
</tt><tt>(</tt><tt><a class="moz-txt-link-abbreviated"
href="mailto:ssaroiu@microsoft.com">ssaroiu@microsoft.com</a></tt><tt>)
and Prabal Dutta (</tt><tt><a class="moz-txt-link-abbreviated"
href="mailto:prabal@berkeley.edu">prabal@berkeley.edu</a></tt><tt>)<br>
<br>
</tt><br>
</body>
</html>