ICNP, the IEEE International Conference on Network Protocols, is a premier conference covering all aspects of network protocol research, including design, analysis, specification, verification, implementation, and performance. ICNP’20 will be held in Madrid, Spain, from October 13 to October 16, 2020.
|Abstract registration||May 19, 2020 (11:59 p.m. EDT)|
|Full paper submission||May 26, 2020 (11:59 a.m. EDT, i.e., Noon)|
|Notification of acceptance||July 25, 2020|
|Camera ready version||August 24, 2020|
The conference is soliciting the submission of papers with significant research contributions to the field of network protocol research. Both experimental results as well as formal investigations are equally welcome. Topics traditionally of interest include, but are not limited to:
The "other areas of data communications" in the last bullet above should not be interpreted as a "catch-all" category. ICNP’s focus is on networks and their protocols, and while this encompasses a broad range of topics including aspects of design, analysis, measurement, architecture, etc., papers need to articulate some relevance to networking and protocols. Those that do not will be returned as out-of-scope. If you are in doubt as to whether your paper is a fit for ICNP, please reach out to the Program co-Chairs.
Papers should adhere to the IEEE Conference formatting requirements using the templates available here, and should not exceed 10 pages excluding references. Your goal as an author is to produce a readable submission that complies with the formatting constraints. Violating the formatting requirements to squeeze in additional material will result in your submission being returned without being reviewed.
Papers must present original contributions and can neither be previously published nor under review by another conference or journal. Papers containing plagiarized material will be subject to the IEEE plagiarism policy and possible penalties, and will be rejected without review.
Papers submitted to the conference will be reviewed through a double-blind review process, where the identities of the authors are withheld from the reviewers (and that of the reviewers from the authors). Achieving this goal requires some care to, on the one hand, preserve the anonymity of your submission, while on the other hand ensuring proper coverage of related past work, including your own. While this may seem challenging, the few basic steps listed below will go a long way towards achieving the desired outcome:
Besides anonymizing your submission, double-blind reviewing also imposes additional requirements on both authors and reviewers. Specifically, while it is permissible for authors to give local talks on their work and release their paper on a non-peer-reviewed location, e.g., and institutional repository or even arXiv, care should be exercised to limit public exposure as much as possible. This includes refraining from advertising the work on mailing lists and public forums, and in general limiting as much as possible the odds that program committee members be exposed to the work and the authors’ identity. Conversely, program committee members will be advised to neither actively seek to “reverse engineer” the authors’ identity, nor to directly share with other program committee members any such information they may have acquired. All questions regarding possible breaches of the anonymity covenant that underlies the double-blind review process will be adjudicated by the Program co-Chairs.
One of the accepted papers will be selected for a best paper award. Up to two of the best papers from ICNP may be fast tracked in the IEEE/ACM Transactions on Networking, with a streamlined journal review process.
It is IMPERATIVE that at least one of the authors of any accepted paper register for the conference at the full rate and be available to present the paper at the conference. Failure to comply with this policy will result in the paper’s withdrawal from the conference proceedings and IEEE Xplore. Exceptions to this policy will only be granted for truly mitigating circumstances and must be approved by the Program co-Chairs before the beginning of the conference.