N2Women workshop aims to foster connections among the underrepresented women in communications, computer networking, and related research fields. The workshop also welcomes men who share the same research interests, often face similar career hurdles as women, acknowledge underrepresentation of women in the field and believe proactive action is required for improving retention rate.
Posters are solicited for research related to any aspect of networking and communications. All researchers in the networking and communications fields are welcome to submit their work for presentation at this workshop.
Posters will NOT be published in the ACM SenSys proceedings and can therefore be work in progress, under submission in other conferences or workshops, or a combination of recently published work.
Authors of accepted posters will be invited to present their work as part of a lightning presentations session, followed by an hour of interactive poster presentation. One poster will be selected for Best Poster Award.
The posters will be judged based on a) technical merit of the poster, b) presentation quality during the lightning talk as well as the poster presentation session. Presenting a poster is a great opportunity to receive interesting and valuable feedback on ongoing research from mentors and a knowledgeable crowd at the workshop.
Limited number of travel grants are available for students (undergraduate or graduate), postdocs or young professionals who present a poster at this workshop. Please check the Travel Grant web site for the grant policy and use the form for N2Women grant application. While filling in your application, please mention if you have a paper submitted to N2Women.
Please also see Travel Grant Application Deadline here.
Poster Submission GuidelinesEach submission should be formatted as an extended abstract, describing the research to be presented in the poster. All submissions should be written in English with a maximum paper length of TWO printed pages including all figures and references. Authors must follow the standard ACM two-column conference format (single-spaced 8.5” x 11” pages with 9-pt font size). The extended abstract must include the names, affiliations and email addresses of all authors and should be submitted as a single PDF file. All submissions must use the following LaTeX (preferred) styles.
You can use the following template: template download link
Please note that only PDF files will be accepted, and all submissions must be done through HotCRP.
Submission link: https://n2women19.hotcrp.com
- Paper Submission:
August 7, 2019 (4PM AoE)
- Acceptance Notification:
August 22nd, 2019
- Workshop Date:
November 10, 2019
For more information, please contact the Workshop Chairs:
- Ziqian (Cecilia) Dong (New York Institute of Technology, USA)
- Jorge Ortiz (Rutgers University, USA)
- Suzan Bayhan (TU Berlin, Germany and University of Twente, Netherlands)
- Catherine H Crawford (IBM Research)
- Eirini Eleni Tsiropoulou (University of New Mexico)
- Ella Peltonen (University of Oulu)
- Irene Manotas (IBM Research)
- Jay Taneja (University of Massachusetts Amherst)
- Ozlem Durmaz Incel (Galatasaray University)
- Setareh Maghsudi (TU Berlin)
- Hack me-do. Deploying an IoT Malware Laboratory to Analyze Malicious Behavior
- Accelerating Data-Driven Agriculture Using Wireless Soil Moisture Sensors
- Computer Vision for Graphology
- 3D Motion Characterization Using Stereo Camera for Vehicular Communications
- Predicting Job Completion Time in Vehicular Clouds
- DeepMAC: A Machine Learning-Based Automated Design Framework for MAC protocols
- Performance of IEEE 802.11ah Networks under Rician Fading Channels
- QoS in Software Defined IoT network using Block-chain based Smart Contract
- Predicting the aircraft engine’s health condition using classification algorithms and demonstrating the model performance measures
- Contribution to the Analysis of the Lifetimes of Well Functioning of Wireless Sensor Networks Application on 5G Infrastructure
- Resilient close neighbors collaborative service performance monitoring
- A Method for Studying Communications Resiliency in Emergency Plans
- Poster: A Secure and Smart Framework for Preventing Ransomware Attack
- Classification of MIMO Wireless Signals
- Poster Abstract: Deep Room Recognition Using Inaudible Echos
- Comparison of Throughput Analytical Models for IEEE 802.11ah Wireless Networks
- Performance Analysis for Cache-Enabled User-Centric Network