Skip to main content

Virtual Machines in Pervasive Computing Call For Papers

By January 20, 2009March 4th, 2019Uncategorized

Virtual Machines In Pervasive Computing
IEEE Pervasive Computing invites submissions on the use of virtual machines in pervasive computing.
First decisions: 16 June 2009
Revisions due: 7 July 2009
Final Acceptances: 21 July 2009
Issue to press: September 2009
Author guidelines:
Submission address:
Virtual machines provide a computing container that appears to be a physical computer and that can run a conventional OS and applications. Such virtual machines are now in wide use in datacenter and desktop computing, and multiple benefits are being realized from their use. These include the ability to easily encapsulate, deploy, clone, and manage applications, run multiple computing environments on the same system without sacrificing performance or security isolation, move running environments between systems, and recover quickly from hardware failures.
With the growing number of increasingly capable pervasive devices, virtual machines are becoming popular in pervasive computing. While the benefits mentioned above also apply to pervasive computing, their realization is complicated by the intrinsic differences of pervasive and desktop/datacenter computing – mobility, distrusted systems, limited energy sources and other resource constraints, personal use of multiple devices, etc. This special issue is focused on better understanding these complications, exploring solutions to them, and evaluating pervasive-computing specific benefits of virtualization. Example topics for this special issue include but are not limited to the following
* applications or services built on top of virtual machines, including
Virtual Appliances, Virtual Appliance ensembles, and Virtual Desktop
* creation and distribution of virtual machines including image
management, end-user experience, payment models/mechanisms, patch and
update mechanisms, and trust
* mechanisms for deploying such applications/services to
mobile/ubiquitous devices
* management of such deployed virtual machines including mechanisms
for discontinuous management and digital rights management
* migration of virtual machines between mobile/ubiquitous devices
including mechanisms for addressing virtual-machine data loss,
network-speed discontinuities, and dissimilar platform capabilities
* security and privacy concerns from the perspective of users of
virtual machines or computing platform providers including mechanisms
for enforcing or increasing trust between these two groups
* all aspects of performance including the performance impact of
running mobile/pervasive applications within virtual machines,
downloading virtual machines, and distributing updates/patches for
* hardware support for making virtualization more viable on resource
constrained mobile/pervasive devices such as cell phones
* case studies reporting the experience and lessoned-learned from the
development, deployment, use, or maintenance of virtual-machine-based
pervasive applications or solutions
* services that operate below the virtual machine that enable
pervasive computing, such as update or patching services or encryption
* surveys
Submissions should be 4,000 to 6,000 words long and should follow the magazine’s guidelines on style and presentation. All submissions will be peer-reviewed in accordance with normal practice for scientific publications. Submissions should be received by 1 May 2009 to receive full consideration.
In addition to full-length submissions, we also invite work-in-progress submissions of 250 words or less (submit to These will not be peer-reviewed but will be reviewed by the Department Editor, Anthony Joseph, and, if accepted, edited by the staff into a feature for the issue. The deadline for work-in-progress submissions is 1 September 2009.
Guest Editors:
Keith Farkas, VMware Inc. (
Chandra Narayanaswami, IBM (
Jason Nieh, Columbia (