---------- Forwarded Message ----------
Subject: IASTED International Newsletter on Telecommunication
Date: Thursday 28 October 2004 03:38
From: <info(a)iasted.com>
To: <gustaf.neumann(a)wu-wien.ac.at>
<http://www.iasted.org\newsletter\images\ACIT_CS.jpg>
The IASTED International Conference on
COMMUNICATION SYSTEMS
~ACIT-CS 2005~
IN COOPERATION WITH
THE RUSSIAN ACADEMY OF SCIENCES
AS PART OF THE SECOND IASTED INTERNATIONAL MULTI-CONFERENCE ON
AUTOMATION, CONTROL, AND INFORMATION TECHNOLOGY
(ACIT 2005)
June 20-24, 2005
Novosibirsk, Russia
SPONSORS
The International Association of Science and Technology for Development
(IASTED) in cooperation with:
- The Russian Foundation for Basic Research
- The Foundation for Assistance to Small Innovative Enterprises (FASIE)
- The Institute of Automation and Electrometry, Siberian Branch of the
RAS
- The Institute of Computational Technologies, Siberian Branch of the
RAS
- The Institute of Radio-Engineering and Electronics, RAS
IMPORTANT DEADLINES
Submissions due January 15, 2005
Notification of Acceptance March 1, 2005
Registration and camera-ready manuscripts due April 15, 2005
To view the call for papers, scope of this conference and the
International Program Committee visit our website at:
http://www.iasted.org/conferences/2005/russia/c488.htm?tel
_____
The fifth IASTED International Multi-Conference on
WIRELESS AND OPTICAL COMMUNICATIONS
~ WOC 2005 ~
July 19 - 21, 2005
Banff, Alberta, Canada
CONFERENCE CHAIR
Dr. A.O. Fapojuwo - University of Calgary, Canada
SPONSORS
The International Association of Science and Technology for Development
Technical Committee on Telecommunications
TECHNICAL ENDORSEMENT
IEEE Technical Committee on Personal Communications
CONFERENCES
Communication Systems and Applications
To view the call for papers, scope of this conference and the
International Program Committee visit our website at:
http://www.iasted.org/conferences/2005/banff/csa.htm?tel
Optical Communications Systems and Networks
To view the call for papers, scope of this conference and the
International Program Committee visit our website at:
http://www.iasted.org/conferences/2005/banff/ocsn.htm?tel
Wireless Networks and Emerging Technologies
To view the call for papers, scope of this conference and the
International Program Committee visit our website at:
http://www.iasted.org/conferences/2005/banff/wnet.htm?tel
IMPORTANT DEADLINES
Submissions due March 1, 2005
Notification of Acceptance April 15, 2005
Final manuscripts due May 1, 2005
Registration Deadline May 15, 2005
_____
The IASTED International Conference on
Networks and Communication Systems
~NCS 2005~
April 18-20, 2005
Krabi, Thailand
CONFERENCE CHAIRS
Dr. M.H. Hamza - IASTED, Canada
Dr. P. Prapinmonkolkarn - Chulalongkorn University, Thailand
Dr. T. Angkaew - Chulalongkorn University, Thailand
IMPORTANT DEADLINES***UPDATED***
Submissions due December 1, 2004
Notification of Acceptance January 15, 2005
Final manuscripts due February 15, 2005
Registration Deadline March 1, 2005
To view the call for papers, scope of this conference and the
International Program Committee visit our website at:
http://www.iasted.org/conferences/2005/thailand/c464.htm?tel
<http://www.iasted.org/conferences/2005/thailand/c464.htm?tel>
_____
For more information or to join one of the following mail groups: Power,
Control, Modelling and Simulation, Bio-Medicine, Signal and Image
Processing, Artificial Intelligence, Business, Software Engineering,
Education, Databases and Knowledge Engineering, Internet and
Applications, Parallel and Distributed Computing, please contact:
IASTED
#80 4500 - 16th Avenue N.W.
Calgary Alberta
Canada T3B 0M6
Tel: 403-288-1195
Fax: 403-247-6851
E-mail: calgary(a)iasted.org
Web site: http://www.iasted.org
To unsubscribe from the email list please visit the following link and
click on the Unsubscribe button:
http://www.iasted.org/unsubscribe/unsubscribe.asp?email=gustaf.neumann@w
u-wien.ac.at
Or email to unsubscribe(a)iasted.org from your email account
(gustaf.neumann(a)wu-wien.ac.at) and copy and paste the following lines
into the body of the email:
*****************************************************
Telecommunication Newsletter
Unsubscribe gustaf.neumann(a)wu-wien.ac.at
*****************************************************
Please click here <http://www.iasted.com/newsletter/2004/ACIT_cs.htm>
if this e-mail does not display properly.
-------------------------------------------------------
--
Univ.Prof. Dr.Gustaf Neumann
Abteilung für Wirtschaftsinformatik und Neue Medien
Wirtschaftsuniversität Wien, Augasse 2-6, 1090 Wien
### to whom it may concern. //fw.
--------------------------------------------
FINAL CALL FOR PAPERS
Extended Deadline: 15. November 2004
--------------------------------------------
SICHERHEIT 2005 - SCHUTZ UND ZUVERLÄSSIGKEIT
5.-8. April 2005
Universität Regensburg
2. Jahrestagung des
Fachbereichs "Sicherheit - Schutz und Zuverlässigkeit"
der Gesellschaft für Informatik e.V. (GI)
Die beiden Aspekte von Sicherheit, Safety als Schutz vor gefährlichem
Fehlverhalten technischer Systeme und Security als Schutz
informationstechnischer Systeme vor Datenspionage und -korruption,
haben an gesellschaftlicher Wahrnehmung weiter gewonnen. Die
vielfältigen Auswirkungen von Mikroprozessorsystemen im Alltag
(beispielsweise Brems- und Fahrassistenzsysteme im Auto) werfen ebenso
Sicherheitsfragen auf wie auch die zunehmende Abwicklung
elektronischer Geschäftsprozesse über das Internet. Schutz vor den
Systemen und Schutz der Systeme sind eng verwobene Aspekte, sowohl in
Bezug auf die Ziele und Definitionen als auch in Bezug auf angewandte
Modelle und Techniken. Experten aus Wissenschaft und Praxis in einen
fruchtbaren Gedankenaustausch darüber zu bringen, ist das Ziel der
Sicherheit 2005.
Beiträge aus sicherheitsrelevanten Anwendungsbereichen (beispielsweise
E-Commerce und E-Government, Finanzindustrie und Zahlungsverkehr,
Automobil, Bahn, Luft- und Raumfahrt, Mobile Systeme, Medizin) aus
Praxis und Wissenschaft sind insbesondere zu folgenden Themen
erwünscht:
- Vertrauenswürdige Softwarekomponenten
- Zuverlässigkeit und Fehlertoleranz in Hardware- und Softwaresystemen
- Formale Techniken, Modellierung, Spezifikation und Verifikation
- Betriebssicherheit unter extremen Bedingungen
- Sicherheitsmanagement
- Netzwerksicherheit
- Unternehmensübergreifende Sicherheit
- Standards und Normung
- Sicherheitsevaluation und -zertifizierung
- Kosten von Sicherheit
- Aus- und Weiterbildung im Bereich Sicherheit
- Sicherheit - eine Aufgabe für Staat und Gesellschaft
- Sicherheit vs. Informationsfreiheit
- Verbraucherschutz
- Datenschutz und Anonymität
- Schutzmechanismen für digitale Waren
- Intrusion Detection und IT-Forensik
- Biometrie und Elektronische Signaturen
- Angewandte Kryptographie
- Steganographie, Stegoanalyse und Digitale Wasserzeichen
Es ist geplant, eine Special Session "Informationssicherheit im
Automobil" sowie Workshops zu den Themen "Privacy Respecting Incident
Management" <http://www.gi-fg-sidar.de/prima2005> und "Sicherheit in
Monokulturen" durchzuführen, für die ebenfalls einschlägige Beiträge
erwünscht sind.
Folgende Formen von Beiträgen (in dt. oder engl. Sprache) sind
willkommen:
- Wissenschaftliche Beiträge ("Full Papers", ca. 12 Druckseiten)
- Kurzbeiträge unter dem Motto "Praxis, Projekte, Produkte,
Innovationen, Statements" (ca. 2-4 Druckseiten)
- Angebote zu Tutorien und Miniworkshops (Umfang 3-8 Stunden)
- Weitere Angebote zu Special Sessions und Diskussionsforen
(Umfang etwa 1-3 Stunden)
TERMINE
-------
15.11.2004 (Extended Deadline)
Elektronische Abgabe der Einreichungen
Hinweise zur Einreichung unter
http://www.sicherheit2005.de/submission
Formatvorlage erhältlich
unter http://www.gi-ev.de/LNI/proceedings
15.12.2004 Zu-/Absage an Autoren per E-Mail
15.01.2005 Elektronische Abgabe druckfertiger Beiträge
TAGUNGSLEITUNG
--------------
Volkert Barr, Schweizerische Post / PostFinance
Jana Dittmann, Otto-von-Guericke Universität Magdeburg
Hannes Federrath (Vorsitz), Universität Regensburg
Bernhard Kaiser, Universität Potsdam, Hasso-Plattner-Institut
Hans v. Sommerfeld, Rohde & Schwarz SIT GmbH
Udo Voges, Forschungszentrum Karlsruhe
PROGRAMMKOMITEE
---------------
Ammar Alkassar, Sirrix AG
Volkert Barr, Schweizerische Post / PostFinance
Wolfgang Behnsen, T-Systems
Fevzi Belli, Uni Paderborn
Arslan Brömme, Uni Magdeburg
Christoph Busch, Fraunhofer IGD
Frank Damm, DB Systems
Peter Dencker, Aonix Karlsruhe
Rüdiger Dierstein, Oberpfaffenhofen
Jana Dittmann, Uni Magdeburg
Wolfgang Ehrenberger, FH Fulda
Hannes Federrath, Uni Regensburg
Herbert Fiedler, Uni Bonn
Ulrich Flegel, Uni Dortmund
Rüdiger Grimm, TU Ilmenau
Karl E. Grosspietsch, Fraunhofer AIS
Marit Hansen, ULD Kiel
Hanns-Wilhelm Heibey, Berliner Beauftragter für
Datenschutz und Informationsfreiheit
Patrick Horster, Uni Klagenfurt
Dieter Hutter, DFKI
Matthias Jänichen, perComp Verlag
Jan Jürjens, TU München
Bernhard Kaiser, Uni Potsdam
Hubert Keller, Forschungszentrum Karlsruhe
Dogan Kesdogan, RWTH Aachen
Eckhard Koch, MediaSec
Klaus-Peter Kossakowski, Presecure
Andreas Lang, Uni Magdeburg
Peter Lory, Uni Regensburg
Astrid Lubinski, Uni Rostock
Erik Maehle, Uni Lübeck
Heiko Mantel, ETH Zürich
Michael Meier, BTU Cottbus
Marie-Luise Moschgath, Fraunhofer SIT
Isabel Münch, BSI Bonn
Jens Nedon, Consecur
Edgar Nett, Uni Magdeburg
Günter Pernul, Uni Regensburg
Andreas Pfitzmann, TU Dresden
Hartmut Pohl, FH Bonn-Rhein-Sieg
Kai Rannenberg, Uni Franfurt/Main
Frank Reiländer, Infodas GmbH
Manfred Reitenspiess, Fujitsu Siemens Computers München
Peer Reymann, ITQS GmbH/Uni Hamburg
Martina Rohde, BSI Bonn
Martin Rothfelder, Siemens AG
Francesca Saglietti, Uni Erlangen-Nürnberg
Thomas Santen, TU Dresden
Peter Schartner, Uni Klagenfurt
Hans v. Sommerfeld, Rohde & Schwarz SIT GmbH
Helmut Stiegler, STI-Consulting
Theodor Tempelmeier, FH Rosenheim
Udo Voges, Forschungszentrum Karlsruhe
Christoph Walther, TU Darmstadt
Gerhard Weck, Infodas GmbH
Andreas Westfeld, TU Dresden
Petra Wohlmacher, RegTP
Erik Zenner, Uni Mannheim
VERANSTALTER UND WEITERE INFORMATIONEN
--------------------------------------
Bereits zum zweiten Mal veranstaltet der noch junge Fachbereich
"Sicherheit - Schutz und Zuverlässigkeit" der Gesellschaft für
Informatik (GI) seine Fachtagung zu allen Aspekten der Sicherheit in
den Bedeutungen von Safety und Security. Was mit der Teiltagung
Sicherheit innerhalb der GI-Jahrestagung 2003 begann, soll mit der
Sicherheit 2005 in Regensburg zu einer eigenständigen und im
deutschsprachigen Raum führenden Konferenz ausgebaut werden.
Veranstalter: Fachbereich "Sicherheit - Schutz und Zuverlässigkeit"
der Gesellschaft für Informatik e.V. (GI), Wissenschaftszentrum,
Ahrstraße 45, 53175 Bonn, http://www.gi-ev.de/
Lokale Organisation: Hannes Federrath, Thomas Nowey, Klaus Plößl,
Universität Regensburg, Institut für Wirtschaftsinformatik, 93040
Regensburg, Tel.: +49 (0) 941 943-2870, Fax: -2888,
http://www-sec.uni-regensburg.de/
Weitere Informationen: http://www.sicherheit2005.de/
* * *
---------- Forwarded Message ----------
Subject: FEA, AMA Conference Program
Date: Wednesday 27 October 2004 04:17
From: <info(a)iasted.com>
To: <gustaf.neumann(a)wu-wien.ac.at>
<http://www.iasted.org\newsletter\images\FEA.jpg>
The 2nd IASTED International Conference on
FINANCIAL ENGINEERING AND APPLICATIONS
~FEA 2004~
November 8-10, 2004
MIT
Cambridge, MA, USA
We are delighted to invite you to attend the IASTED International
Conference on Financial Engineering and Applications. We have an
excellent plenary address, a special session and two tutorials in
addition to paper presentations.
PLENARY ADDRESS
"Financial Engineering of Risk Managed Funds"
organized by Prof. Michael Dempster, Director of Research and Professor
of Management Studies, Judge Institute of Management Studies, Cambridge
University, UK
SPECIAL SESSION
"Models of Financial Market Microstructure"
Organized by Dr. Ted Theodosopoulos of Drexel University, USA
TUTORIALS
"Methods for Superreplication"
presented by Dr. Johan Tysk of Uppsala University, Sweden
"Discovering Hidden Financial Patterns with Genetic Programming"
presented by Prof. Dr. Shu-Heng Chen of the National Chengchi
University, Taiwan, Dr. Tina Xu of the ChevronTexaco Information
Technology Company, USA, and Ms. Tzu-Wen Kuo of the National Chengchi
University, Taiwan
For more information on the program, please look at the following link:
http://www.iasted.org/conferences/2004/cambridge/fea.htm?fea
For registration information, please look at the following link:
http://www.iasted.org/conferences/2004/cambridge/fea-registrationmain1.h
tm?fea
_____
The 2nd IASTED International Conference on
ALLIANCES, MERGERS, AND ACQUISITIONS
~AMA 2004~
November 8-10, 2004
MIT
Cambridge, MA, USA
We are delighted to invite you to attend the IASTED International
Conference on Alliances, Mergers and Acquisitions. We are pleased to
inform you that we have an excellent plenary address, tutorial and paper
presentations.
PLENARY ADDRESS
"75 Common and Uncommon Errors in Company Valuation"
presented by Prof. Pablo Fernndez of the IESE Business School at the
University of Navarre, Spain
TUTORIAL
"Using Optimization Models to Consolidate Supply Chains Following a
Merger or Acquisition"
presented by Dr. Jeremy F. Shapiro of the Massachusetts Institute of
Technology, USA and Slim Technologies, LLC, USA
For more information on the program, please look at the following link:
http://www.iasted.org/conferences/2004/cambridge/ama-programmain.htm?fea
For registration information, please look at the following link:
http://www.iasted.org/conferences/2004/cambridge/ama-registrationmain1.h
tm?fea
Please click here <http://www.iasted.com/newsletter/2004/fea.htm> if
this e-mail does not display properly.
-------------------------------------------------------
--
Univ.Prof. Dr.Gustaf Neumann
Abteilung für Wirtschaftsinformatik und Neue Medien
Wirtschaftsuniversität Wien, Augasse 2-6, 1090 Wien
---------- Forwarded Message ----------
Subject: Deadline Extension ICEIS-2005 (Int'l Conference on Enterprise Information Systems)
Date: Tuesday 26 October 2004 20:03
From: "ICEIS Secretariat" <secretariat(a)iceis.org>
To: "Gustaf Neumann" <gustaf.neumann(a)wu-wien.ac.at>
Dear Gustaf Neumann,
Due to numerous requests, it was decided to extend the paper submission
deadline about 2 weeks, until November 12.
Furthermore, a deadline for the submission of position papers, reporting work
in progress, was set to November 26. Position papers will also be subject to
double-blind review and may be accepted as short papers (up to 6 pages) or
posters (up to 4 pages) but not as full papers.
Vitor Pedrosa
(Conference Secretariat)
*************************************************************************
ICEIS web site: http://www.iceis.org
Important dates:
Full Paper Submission: 12th November 2004
Position Paper Submission: 26th November 2004
Author Notification: 10th January 2005
Workshops Paper Submission: 25th January 2005
Final Camera-Ready Submission and Registration: 31st January
2005
Main topic areas:
Databases and Information Systems Integration
Artificial Intelligence and Decision Support Systems
Information Systems Analysis and Specification
Software Agents and Internet Computing
Human-Computer Interaction
(more details at http://www.iceis.org/cfp2005.htm)
Workshops:
Pattern Recognition in Information Systems
(http://www.iceis.org/workshops/pris/pris2005-cfp.html)
Wireless Information Systems
(http://www.iceis.org/workshops/wis/wis2005-cfp.html)
Verification and Validation of Enterprise Information Systems
(http://www.iceis.org/workshops/vveis/vveis2005-cfp.html)
Natural Language Understanding and Cognitive Science
(http://www.iceis.org/workshops/nlucs/nlucs2005-cfp.html)
Ubiquitous Computing
(http://www.iceis.org/workshops/iwuc/iwuc2005-cfp.html)
Security In Information Systems
(http://www.iceis.org/workshops/wosis/wosis2005-cfp.html)
Computer Supported Activity Coordination
(http://www.iceis.org/workshops/csac/csac2005-cfp.html)
Web Services: Modeling, Architecture and Infrastructure
(http://www.iceis.org/workshops/wsmai/wsmai2005-cfp.html)
Organizational Modeling & Simulation Using Petri Nets
(http://www.iceis.org/workshops/omspn/omspn2005-cfp.html)
Model-Driven Enterprise Information Systems
(http://www.iceis.org/workshops/mdeis/mdeis2005-cfp.html)
Protection by Adaptation
(http://www.iceis.org/workshops/pba/pba2005-cfp.html)
Efficacy of E-Learning Systems
(http://www.iceis.org/workshops/ees/ees2005-cfp.html)
Keynote Speakers:
Richard Soley, Object Management Group, Inc, USA
Jan Dietz, Delft University of Technology, The Netherlands
Thomas Greene, MIT, USA
Rosalind W. Picard, MIT, USA
Henri Barki, HEC Montréal, Canada
Daniel Schwabe, PUC-Rio, Brazil
Lynne Markus, Bentley College, USA
Raghavan Srinivas, Sun Microsystems, USA
Tutorial Speaker:
Eduardo B. Fernandez, Florida Atlantic University, USA
The list of keynote speakers and tutorials is not yet closed. You may wish to
take a look at the list of previous keynote speakers at
http://www.iceis.org/hall_of_fame.htm.
-------------------------------------------------------
--
Univ.Prof. Dr.Gustaf Neumann
Abteilung für Wirtschaftsinformatik und Neue Medien
Wirtschaftsuniversität Wien, Augasse 2-6, 1090 Wien
---------- Forwarded Message ----------
Subject: CfP: Sicherheit2005 - Schutz und Zuverlässigkeit
Date: Tuesday 26 October 2004 15:12
From: GI Mitglieder Info <mitglieder-info(a)gi-ev.de>
To: mitglieder(a)gi-ev.de
--------------------------------------------
FINAL CALL FOR PAPERS
Extended Deadline: 15. November 2004
--------------------------------------------
SICHERHEIT 2005 - SCHUTZ UND ZUVERLÄSSIGKEIT
5.-8. April 2005
Universität Regensburg
2. Jahrestagung des
Fachbereichs "Sicherheit - Schutz und Zuverlässigkeit"
der Gesellschaft für Informatik e.V. (GI)
Die beiden Aspekte von Sicherheit, Safety als Schutz vor gefährlichem
Fehlverhalten technischer Systeme und Security als Schutz
informationstechnischer Systeme vor Datenspionage und -korruption,
haben an gesellschaftlicher Wahrnehmung weiter gewonnen. Die
vielfältigen Auswirkungen von Mikroprozessorsystemen im Alltag
(beispielsweise Brems- und Fahrassistenzsysteme im Auto) werfen ebenso
Sicherheitsfragen auf wie auch die zunehmende Abwicklung
elektronischer Geschäftsprozesse über das Internet. Schutz vor den
Systemen und Schutz der Systeme sind eng verwobene Aspekte, sowohl in
Bezug auf die Ziele und Definitionen als auch in Bezug auf angewandte
Modelle und Techniken. Experten aus Wissenschaft und Praxis in einen
fruchtbaren Gedankenaustausch darüber zu bringen, ist das Ziel der
Sicherheit 2005.
Beiträge aus sicherheitsrelevanten Anwendungsbereichen (beispielsweise
E-Commerce und E-Government, Finanzindustrie und Zahlungsverkehr,
Automobil, Bahn, Luft- und Raumfahrt, Mobile Systeme, Medizin) aus
Praxis und Wissenschaft sind insbesondere zu folgenden Themen
erwünscht:
- Vertrauenswürdige Softwarekomponenten
- Zuverlässigkeit und Fehlertoleranz in Hardware- und Softwaresystemen
- Formale Techniken, Modellierung, Spezifikation und Verifikation
- Betriebssicherheit unter extremen Bedingungen
- Sicherheitsmanagement
- Netzwerksicherheit
- Unternehmensübergreifende Sicherheit
- Standards und Normung
- Sicherheitsevaluation und -zertifizierung
- Kosten von Sicherheit
- Aus- und Weiterbildung im Bereich Sicherheit
- Sicherheit - eine Aufgabe für Staat und Gesellschaft
- Sicherheit vs. Informationsfreiheit
- Verbraucherschutz
- Datenschutz und Anonymität
- Schutzmechanismen für digitale Waren
- Intrusion Detection und IT-Forensik
- Biometrie und Elektronische Signaturen
- Angewandte Kryptographie
- Steganographie, Stegoanalyse und Digitale Wasserzeichen
Es ist geplant, eine Special Session "Informationssicherheit im
Automobil" sowie Workshops zu den Themen "Privacy Respecting Incident
Management" <http://www.gi-fg-sidar.de/prima2005> und "Sicherheit in
Monokulturen" durchzuführen, für die ebenfalls einschlägige Beiträge
erwünscht sind.
Folgende Formen von Beiträgen (in dt. oder engl. Sprache) sind
willkommen:
- Wissenschaftliche Beiträge ("Full Papers", ca. 12 Druckseiten)
- Kurzbeiträge unter dem Motto "Praxis, Projekte, Produkte,
Innovationen, Statements" (ca. 2-4 Druckseiten)
- Angebote zu Tutorien und Miniworkshops (Umfang 3-8 Stunden)
- Weitere Angebote zu Special Sessions und Diskussionsforen
(Umfang etwa 1-3 Stunden)
TERMINE
-------
15.11.2004 (Extended Deadline)
Elektronische Abgabe der Einreichungen
Hinweise zur Einreichung unter
http://www.sicherheit2005.de/submission
Formatvorlage erhältlich
unter http://www.gi-ev.de/LNI/proceedings
15.12.2004 Zu-/Absage an Autoren per E-Mail
15.01.2005 Elektronische Abgabe druckfertiger Beiträge
TAGUNGSLEITUNG
--------------
Volkert Barr, Schweizerische Post / PostFinance
Jana Dittmann, Otto-von-Guericke Universität Magdeburg
Hannes Federrath (Vorsitz), Universität Regensburg
Bernhard Kaiser, Universität Potsdam, Hasso-Plattner-Institut
Hans v. Sommerfeld, Rohde & Schwarz SIT GmbH
Udo Voges, Forschungszentrum Karlsruhe
PROGRAMMKOMITEE
---------------
Ammar Alkassar, Sirrix AG
Volkert Barr, Schweizerische Post / PostFinance
Wolfgang Behnsen, T-Systems
Fevzi Belli, Uni Paderborn
Arslan Brömme, Uni Magdeburg
Christoph Busch, Fraunhofer IGD
Frank Damm, DB Systems
Peter Dencker, Aonix Karlsruhe
Rüdiger Dierstein, Oberpfaffenhofen
Jana Dittmann, Uni Magdeburg
Wolfgang Ehrenberger, FH Fulda
Hannes Federrath, Uni Regensburg
Herbert Fiedler, Uni Bonn
Ulrich Flegel, Uni Dortmund
Rüdiger Grimm, TU Ilmenau
Karl E. Grosspietsch, Fraunhofer AIS
Marit Hansen, ULD Kiel
Hanns-Wilhelm Heibey, Berliner Beauftragter für
Datenschutz und Informationsfreiheit
Patrick Horster, Uni Klagenfurt
Dieter Hutter, DFKI
Matthias Jänichen, perComp Verlag
Jan Jürjens, TU München
Bernhard Kaiser, Uni Potsdam
Hubert Keller, Forschungszentrum Karlsruhe
Dogan Kesdogan, RWTH Aachen
Eckhard Koch, MediaSec
Klaus-Peter Kossakowski, Presecure
Andreas Lang, Uni Magdeburg
Peter Lory, Uni Regensburg
Astrid Lubinski, Uni Rostock
Erik Maehle, Uni Lübeck
Heiko Mantel, ETH Zürich
Michael Meier, BTU Cottbus
Marie-Luise Moschgath, Fraunhofer SIT
Isabel Münch, BSI Bonn
Jens Nedon, Consecur
Edgar Nett, Uni Magdeburg
Günter Pernul, Uni Regensburg
Andreas Pfitzmann, TU Dresden
Hartmut Pohl, FH Bonn-Rhein-Sieg
Kai Rannenberg, Uni Franfurt/Main
Frank Reiländer, Infodas GmbH
Manfred Reitenspiess, Fujitsu Siemens Computers München
Peer Reymann, ITQS GmbH/Uni Hamburg
Martina Rohde, BSI Bonn
Martin Rothfelder, Siemens AG
Francesca Saglietti, Uni Erlangen-Nürnberg
Thomas Santen, TU Dresden
Peter Schartner, Uni Klagenfurt
Hans v. Sommerfeld, Rohde & Schwarz SIT GmbH
Helmut Stiegler, STI-Consulting
Theodor Tempelmeier, FH Rosenheim
Udo Voges, Forschungszentrum Karlsruhe
Christoph Walther, TU Darmstadt
Gerhard Weck, Infodas GmbH
Andreas Westfeld, TU Dresden
Petra Wohlmacher, RegTP
Erik Zenner, Uni Mannheim
VERANSTALTER UND WEITERE INFORMATIONEN
--------------------------------------
Bereits zum zweiten Mal veranstaltet der noch junge Fachbereich
"Sicherheit - Schutz und Zuverlässigkeit" der Gesellschaft für
Informatik (GI) seine Fachtagung zu allen Aspekten der Sicherheit in
den Bedeutungen von Safety und Security. Was mit der Teiltagung
Sicherheit innerhalb der GI-Jahrestagung 2003 begann, soll mit der
Sicherheit 2005 in Regensburg zu einer eigenständigen und im
deutschsprachigen Raum führenden Konferenz ausgebaut werden.
Veranstalter: Fachbereich "Sicherheit - Schutz und Zuverlässigkeit"
der Gesellschaft für Informatik e.V. (GI), Wissenschaftszentrum,
Ahrstraße 45, 53175 Bonn, http://www.gi-ev.de/
Lokale Organisation: Hannes Federrath, Thomas Nowey, Klaus Plößl,
Universität Regensburg, Institut für Wirtschaftsinformatik, 93040
Regensburg, Tel.: +49 (0) 941 943-2870, Fax: -2888,
http://www-sec.uni-regensburg.de/
Weitere Informationen: http://www.sicherheit2005.de/
* * *
-------------------------------------------------------
--
Univ.Prof. Dr.Gustaf Neumann
Abteilung für Wirtschaftsinformatik und Neue Medien
Wirtschaftsuniversität Wien, Augasse 2-6, 1090 Wien
---------- Forwarded Message ----------
Subject: [all-prolearn] UM2005 final CFP
Date: Friday 22 October 2004 09:38
From: "Peter Dolog" <dolog(a)l3s.de>
To: <all-prolearn(a)agws.dit.upm.es>
10th International Conference on User Modeling, UM'05
Edinburgh, Scotland, UK, 24-29 July, 2005
http://gate.ac.uk/conferences/um2005/
FINAL CALL FOR PAPERS AND WORKSHOP PROPOSALS
The International User Modeling Conferences
represent the central forum
for the discussion and presentation of research
and industry results in
the development of personalized systems, as
well as basic research about personalization.
In the last 25 years, the field of User Modeling has
produced significant new theories and methods
to analyze and model computer users in short and
long-term interactions. Moreover, methods for
personalizing human-computer interaction based
on user models have been successfully developed,
applied and evaluated in a number of domains, such
as information filtering, e-commerce,
adaptive natural language and adaptive educational
systems. New User Modeling topics are emerging,
including adaptation to user attitudes and
affective states, personalized interaction in
mobile, ubiquitous and context-aware computing
and in user interactions with embodied
autonomous agents. User Modeling
research is being influenced by different
fields, such as Artificial Intelligence,
Human-Computer Interaction, Cognitive
Psychology, Linguistics, Education,
as well as, by newly emerging
links with Customer Relationship Management
and technologies for the communication on the
Web, such as Web Services and the Semantic Web.
UM'05 invites submissions in following categories:
* Papers and posters
* Workshops
* Tutorials
* Doctoral Consortium
Relevant topics for the conference include,
but are not limited, to:
* acquisition, updating and management of
* user models and student models
* security and privacy aspects in the
* management of user data
* evaluation of user modeling techniques
* user model representation standards
* user model information sharing in ubiquitous
* services and smart environments
* user modeling servers
* user modeling in the Semantic Web
* user modeling and adaptive systems
* applications of user modeling systems and techniques
* data mining for personalization and cross-recommendation
* affective computing
* adaptation to the handicapped and elderly
* adaptive hypermedia and Web systems
* intelligent information retrieval, information
* filtering and content personalization
* collaborative filtering and recommender systems
* adaptive user interfaces
* dialog planning and response tailoring
* plan recognition and generation
* presentation planning
* recognition and correction of misconceptions
* intelligent tutoring systems
* human-computer cooperation, user support
* adaptive learning environments
* personalized Web sites and services
* personalized interaction in Virtual
* reality and 3D Interfaces
* personalized interaction in mobile,
* ubiquitous and context-aware computing
* embodied animated agents
* support of collaboration and group modeling
* engineering adaptive systems
All submissions will be reviewed on the
basis of relevance, originality, significance,
soundness and clarity. Three referees will
review each submission.
DEADLINES:
Preliminary workshop proposals: November 15, 2004 (see below)
Papers and posters: November 22, 2004
Tutorial proposals: December 6, 2004
Final workshop proposals: December 6, 2004 (see below)
Doctoral Consortium Papers: January 28, 2005
Papers/Posters Notification: January 28, 2005
Camera-Ready Versions Submission: February 28, 2005
Workshop Papers Submission: March 7, 2005
Conference: 24-29 July, 2005
SUBMISSION OF PAPERS AND POSTERS:
Papers and postscripts have to be submitted in electronic
form (PDF format is preferred, but PostScript and
RTF are acceptable as well).
The link to the submission Web site will be available
on the main conference Web site
(http://gate.ac.uk/conferences/um2005/)
starging from the first days of November.
FORMATS:
The proceedings of the conference will be published
by Springer-Verlag in Lecture Notes in Computer Science
(http://www.springer.de/comp/lncs/index.html) under
the title "UM2005 User Modeling: Proceedings of
the Tenth International Conference".
For camera-ready format instructions, please see
"For Authors" instructions at
http://www.springer.de/comp/lncs/authors.html.
The page limit is 10 pages for papers, 5 pages for
posters, and 3 pages for the Doctoral Consortium
submissions.
ORGANIZATION:
Conference Chair:
Paul Brna, Northumbria University, UK
Program Co-Chairs:
Liliana Ardissono, Universita` di Torino, Italy
Tanja Mitrovic, University of Canterbury, New Zealand
Organizing Chair:
Alison Cawsey, Heriot-Watt University, Scotland
Workshop and Tutorial Co-Chairs:
Kathleen McCoy, University of Delaware, US
Vania Dimitrova, University of Leeds, UK
Doctoral Consortium Co-Chairs:
Jon Oberlander, University of Edimburgh, UK
Kalina Bontcheva, University of Sheffield, UK
Industrial Liaison CHair:
Daniel Kudenko, University of York, UK
Publicity Co-Chairs:
Nicolas van Labeke, Northumbria University, UK
Ayse Goker, Robert Gordon University, UK
Program Committee:
Lora Aroyo, The Netherlands
Mathias Bauer, Germany
Joseph Beck, USA
Peter Brusilovsky, USA
Susan Bull, UK
Sandra Carberry, USA
Noelle Carbonell, France
Keith Cheverst, UK
David Chin, USA
Luca Chittaro, Italy
Cristina Conati, Canada
Albert Corbett, USA
Paul De Bra, The Netherlands
Nadja De Carolis, Italy
Fiorella de Rosis, Italy
Vania Dimitrova, UK
Peter Dolog, Germany
Gerhard Fischer, USA
Elena Gaudioso, Spain
Piotr Gmytrasiewicz, USA
Brad Goodman, USA
Jim Greer, Canada
Haym Hirsh, USA
Eric Horvitz, USA
Anthony Jameson, Germany
Gal Kaminka, Israel
Judy Kay, Australia
Alfred Kobsa, USA
Joseph Konstan, USA
Antonio Krueger, Germany
Frank Linton, USA
Diane Litman, USA
Brent Martin, New Zealand
Mark Maybury, USA
Gordon McCalla, Canada
Kathleen McCoy, USA
Eva Millan, Spain
Riichiro Mizoguchi, Japan
Wolfgang Nejdl, Germany
Helen Pain, UK
George Paliouras, Greece
Cecile Paris, Australia
Daniela Petrelli, UK
Candy Sidner, USA
Barry Smyth, Ireland
Markus Specht, Germany
Carlo Tasso, Italy
Julita Vassileva, Canada
Gerhard Weber, Germany
Stephan Weibelzahl, Germany
Ross Wilkinson, Australia
Frank Wittig, Germany
Ingrid Zukerman, Australia
------------------------------------------
SECOND CALL FOR WORKSHOP PROPOSALS
Workshop proposals should provide sufficient information to judge the
importance, quality, and benefits for the research community. Each
workshop should have one or more chairs and a program committee. Proposals
should be 2-4 pages long and should provide the following information:
* Title of the proposed workshop.
* Names and full addresses, including contact details, of the
workshop chair(s).
* A brief description of the workshop topic and goals, its
relevance to UM05 and significance for the research field.
* A description of the target audience, areas from which the
participants are expected to come, strategy for publicizing the
workshop, number of expected participants, names of potential
attendees (if known).
* Arrangements for the organization of the workshop, including
length (half day or one day) and a brief outline of the workshop
describing anticipated format and possible session names.
* Names, addresses, and home page links of people who have agreed
to be part of the workshop program committee if the workshop
proposal is accepted. This list should preferably include people
from at least three different sites.
* A brief description of the organizers experience and background
in the topic, and links to web pages of the workshop chairs.
SUBMISSION DETAILS
Workshops should be submitted via e-mail (either plain text or pdf format)
to both UM05 workshop chairs:
Vania Dimitrova (vania(a)comp.leeds.ac.uk) and
Kathleen McCoy (mccoy(a)cis.udel.edu
with a subject line of: UM05 Workshop Proposal
Workshop organizers are encouraged to submit a preliminary workshop
proposal containing a brief outline of the workshop which will be used to
identify possible overlap of workshop topics and, in this case,
cooperation and joint workshop organization may be suggested.
FURTHER INFORMATION
For further information about workshop organization check the conference
web site: http://gate.ac.uk/conferences/um2005/
------------------------------------------
Peter Dolog,
Research Associate
L3S Research Center
Expo Plaza 1
30539 Hannover
Germany
Tel. +49. (0)511. 762-9735 (L3S)
Tel. +49. (0)511. 762-19713 (ISI-KBS)
fax. +49. (0)511. 762-9779
E-Mail: dolog(a)l3s.de
WWW: http://www.l3s.de/~dolog
------------------------------------------
-------------------------------------------------------
--
Univ.Prof. Dr.Gustaf Neumann
Abteilung für Wirtschaftsinformatik und Neue Medien
Wirtschaftsuniversität Wien, Augasse 2-6, 1090 Wien
---------- Forwarded Message ----------
Subject: Internet and Multimedia Systems and Applications Conference One Week Reminder
Date: Friday 15 October 2004 04:18
From: <info(a)iasted.com>
To: <gustaf.neumann(a)wu-wien.ac.at>
<http://www.iasted.org\newsletter\images\EuroIMsaNews5.jpg>
ONE WEEK REMINDER!
The IASTED International Conference on
Internet and Multimedia Systems and Applications
~ EuroIMSA 2005 ~
February 21-23, 2005
Grindelwald, Switzerland
IMPORTANT DEADLINES
Submissions due October 22, 2004
Notification of Acceptance November 10, 2004
Camera-ready manuscripts due December 5, 2004
Registration Deadline December 15, 2004
For more information please visit:
http://www.iasted.org/conferences/2005/switzerland/imsa.htm
_____
OTHER IASTED UPCOMING CONFERENCES
The IASTED International Conference on
Internet and Multimedia Systems and Applications
~ IMSA 2005 ~
August 15-17, 2005
Honolulu, Hawaii
IMPORTANT DEADLINES
Submissions due March 15, 2005
Notification of Acceptance May 1, 2005
Camera-ready manuscripts due June 1, 2005
Registration Deadline June 1, 2005
For more information please visit:
http://www.iasted.org/conferences/2005/hawaii/imsa.htm
_____
JOURNALS OF INTEREST FROM ACTA PRESS
The International Journal of Computers and Applications - First
published in 1979 this journal covers all aspects of contemporary
computers and their applications including technology hardware and
software systems networking and communications multimedia systems and
the Internet as well as microcomputer applications such as engineering
science business management robotics medicine manufacturing and the
humanities. It also includes book reviews conference notices call for
papers and new publications.
Co-Editor-in-Chiefs: Dr. L. Monticone and Dr. J. Wu
Frequency: 4 issues per year
2003 Rate: US$270.00
Postage & Handling: US$25.00
ISSN: 1206-212X (202)
http://www.actapress.com/journals/journals.htm#Computers
IASTED MEMBERSHIP
Membership pays! One of the benefits of IASTED membership is a
complimentary one-year subscription to an ACTA Press journal of your
choice. Renew or become a member today!
http://www.iasted.org/member/membership.htm
CONFERENCE PROCEEDINGS AVAILABLE
Past conference proceedings in the area of Internet and Applications are
available for purchase from ACTA Press
http://www.actapress.com/proceedings/proceedings.htm
For more information or to join one of the following mail groups: Power
Telecommunication Control Modelling and Simulation Bio-Medicine Signal
and Image Processing Artificial Intelligence Business Software
Engineering Education Databases and Knowledge Engineering Parallel and
Distributed Computing please contact:
IASTED
#80 4500 - 16th Avenue N.W.
Calgary Alberta
Canada T3B 0M6
Tel: 403-288-1195
Fax: 403-247-6851
E-mail: calgary(a)iasted.org
Web site: http://www.iasted.org
To unsubscribe from the email list please visit the following link and
click on the Unsubscribe button:
http://www.iasted.org/unsubscribe/unsubscribe.asp?email=gustaf.neumann@w
u-wien.ac.at
Or email to unsubscribe(a)iasted.org from your email account
(gustaf.neumann(a)wu-wien.ac.at) and copy and paste the following lines
into the body of the email:
*****************************************************
Internet and Applications Newsletter
Unsubscribe gustaf.neumann(a)wu-wien.ac.at
*****************************************************
-------------------------------------------------------
--
Univ.Prof. Dr.Gustaf Neumann
Abteilung für Wirtschaftsinformatik und Neue Medien
Wirtschaftsuniversität Wien, Augasse 2-6, 1090 Wien
---------- Forwarded Message ----------
Subject: Extension:Virtual Presentation Submissions Deadline until November 5th: 3rd IBIMA Conf.
Date: Thursday 14 October 2004 05:15
From: "Dr. Khalid S. Soliman" <soliman(a)ibima.org>
To: <soliman(a)ibima.org>
We have received numerous requests to extend the submission deadline. The
conference organizing committee is extending:
The Virtual Presentation paper submission deadline: November 5th
Regular Paper submission deadline: October 27th, 2004.
Please pass this extension note to interested colleagues
Conference information at a glance:
The 3rd IBIMA - International Business Information Management Conference
General Theme: E-Business & Organizations in the 21st Century
Location: The Island of Cozumel, Mexico
Date: 14 - 16 December 2004
Conference activities will take place at the elegant 5-stars and AAA
4-diamonds the Presidente Intercontinental Hotel Cozumel Resort.
Website: http://www.ibima.org
Across the waters from Cancun stands the Island of Cozumel in the Caribbean
Sea. A million visitors a year flock to beautiful Cozumel Island, the home
of the second largest coral reef in the world.
Conference themes include topics such as e-commerce, m-commerce, e-business,
e-government, e-services, and e-transformation among others.
Please visit conference for complete list of themes and tracks
http://www.ibima.org
IMPORTANT DATES:
- Paper Submission: Now Open
- Notification of Acceptance: Within 3 week from submission date (in most
cases) -Virtual Presentation paper submission deadline: November 5th
- Paper submission deadline Extension: Oct. 27, 2004
Conference proceedings will be published as an e-book on a CD (ISBN:
0-9753393-2-X)
High quality papers in M-Commerce will be further considered for publication
in the Journal of International Journal of Mobile Computing and Commerce
IMPORTANT: Four types of submissions:
1) full research paper: (5000 words) with complete references section
2) Extended abstract or research-in-progress
3) Invited sessions: You can also submit a proposal to organize an invited
session/workshop. A 100-word description of the topic of the session along
with your information
4) Virtual presentation: Those who are unable to attend the conference in
person but wish to participate in this major international event, virtual
presentation is available. Virtual Presentation allows participants to
submit papers for refereeing and publication in the conference proceedings,
just like a regular paper. Virtual participants will receive a full copy
of the conference proceedings.
ARRANGED TOURS for conference participants before, during, and after the
conference. Visit the conference website for complete details:
http://www.ibima.org/tours.html
Excellent opportunity to combine a world-class research & intellectual event
with the mystical environment of Mayan ruins & the natural beauty of Cozumel
We'll be delighted to meet you in Cozumel.
Sincerely,
Khalid S. Soliman
IBIMA Conference Chair
http://www.ibima.org
-------------------------------------------------------
--
Univ.Prof. Dr.Gustaf Neumann
Abteilung für Wirtschaftsinformatik und Neue Medien
Wirtschaftsuniversität Wien, Augasse 2-6, 1090 Wien
---------- Forwarded Message ----------
Subject: CFP for IEEE Transactions on KDE
Date: Monday 11 October 2004 15:18
From: Computational Science Announcements <computational.science(a)optimanumerics.com>
To: computational.science(a)optimanumerics.com
Call for Papers
IEEE Transactions on Knowledge and Data Engineering----A Special Issue on
Intelligent Data Preparation
Data Preparation is the collection of algorithms and techniques that
embodies data pre-processing in data analysis. It includes data
integration, data transformation, noise detection, data cleaning/cleansing,
data preprocessing, feature/attribute selection, information filtering, and
data reduction. Data preparation enhances the useful information in the
data by such as, resolving the inconsistency and conflicts, selecting
relevant information, removing anomalies, correcting errors, filtering
information, and clustering information and pattern reduction.
Many data analysis applications, such as data mining, Web mining,
information retrieval, machine learning, and pattern recognition, require
various forms of data preparation. In data preparation, one takes the data
in their raw form, removes as much noise and redundancy as possible, and
brings out the core that is ready for further processing. Indeed, data
preparation often presents itself as a less glamorous but in fact more
critical step than other steps in data analysis applications. It can be
characterized as a data processing technique such that a minor data quality
adjustment may potentially bring about much higher data mining
effectiveness. However, in the past, much work in these relevant fields,
such as data mining and machine learning, has been founded on quality data.
The input to the data mining algorithms is assumed to conform to nice data
distributions, containing no missing, inconsistent or incorrect values.
This leaves a large gap between the available data and the available
machinery to process the data.
This special issue will provide a forum for timely and in-depth
presentation of progress in the theory and principles underlying data
preparation.
Topics of Interest
- Data Preparation Architectures
- Data Preparation Foundations
- Data Integration and Transformation
- Noise Detection, Data Cleaning/Cleansing
- Feature/Attribute Selection, Information Filtering, Data Reduction
- Resolving Incompleteness, Inconsistency, and Conflicts of data
- Removing Anomalies, Correcting Errors
- Filling Missed Values, Reducing Ambiguity
- Web Page Cleaning, Text Cleaning
- Information/Data Clustering for data cleaning
- Ontology Architectures for Data Mining
Submission Guidelines
Please follow the guideline of the submissions on:
http://www.computer.org/tkde/author_new.htm
Important Dates
Submission Deadline November 20, 2004
Author Notification April 8, 2005
Camera-ready Due April 28, 2005
Issue ships September 2005
Special Issue Guest Editors
Prof. Chengqi Zhang (University of Technology, Sydney, Australia)
Prof. Qiang Yang (Hong Kong University of Science and Technology, Hong
Kong)
Prof. Bing Liu (University of Illinois at Chicago, USA)
---------------------------------------------------------------------
To unsubscribe, e-mail: computational.science-unsubscribe(a)OptimaNumerics.com
For additional commands, e-mail:
computational.science-help(a)OptimaNumerics.com
Computational Science mailing list hosting is provided by
OptimaNumerics (http://www.OptimaNumerics.com)
---------------------------------------------------------------------
-------------------------------------------------------
--
Univ.Prof. Dr.Gustaf Neumann
Abteilung für Wirtschaftsinformatik und Neue Medien
Wirtschaftsuniversität Wien, Augasse 2-6, 1090 Wien
---------- Forwarded Message ----------
Subject: [Announcement] CFP: A special issue of Data Mining and Knowledge Discovery journal
Date: Thursday 07 October 2004 23:33
From: Computational Science Announcements <computational.science(a)optimanumerics.com>
To: computational.science(a)optimanumerics.com
*Call for Papers*
* *
*/Data Mining and Knowledge Discovery/**: A Special Issue on***
*Mining Multiple Data Sources: Local Pattern Analysis*
* *
Many large organizations have multiple data sources, such as different
branches of a multi-national company. Also, as the Web has emerged as a
large, distributed data repository, it is easy nowadays to access a
multitude of data sources. Therefore, companies must confront the
multiple data source mining problem. Mining local patterns at different
data sources and forwarding the local patterns (rather than the original
raw data) to a centralized place for global pattern analysis provides a
feasible way to deal with multiple data source problems. As such the
local patterns at each data source may be required for that data source
in the first instance, so knowledge discovery at each data source is
also important and useful.
/Local pattern analysis/ is an in-place strategy specifically designed
for mining multiple data sources, providing a feasible way to generate
globally interesting models from data in multidimensional spaces. With
local pattern analysis, one can better understand the distribution and
inconsistency of local/global data patterns, and develop
high-performance data mining systems to deal with multiple data sources
in which local patterns are fused to make global patterns.
Although the data collected from the Web brings us opportunities in
improving the quality of decisions, it generates a significant
challenge: how to efficiently identify quality knowledge from different
data sources and how to integrate them. This problem is difficult to
solve due to the facts that multiple data source mining is a procedure
of searching for useful patterns in multidimensional spaces; and putting
all data together from different sources might amass a huge database for
centralized processing and cause problems such as data privacy breaches,
data inconsistency, data conflict, and irrelevant data.
This special issue will provide a leading forum for timely, in-depth
presentation of progress in the theory and principles underlying local
pattern analysis for multiple data source mining.
*Topics of Interest *
We solicit papers on the following non-exhaustive list of topics
pertaining to multiple data source mining:
·Foundational issues
·Application case studies
·Data privacy issues
·Data cleansing, data preparation, data/pattern selection, conflict and
inconsistency resolution
·Data/pattern clustering, data source
classification
·Ontology
·Local pattern analysis and fusion
·Post-processing of local patterns
·Resource-bounded local pattern analysis
·New solutions for multiple data source mining
·Distributed and parallel data mining
*Submission Guidelines*
Please follow the guideline of the submissions on:
http://www.kluweronline.com/issn/1384-5810/contents **
*Important Dates*
Submission Deadline March 25, 2005
Author Notification July 20, 2005
Camera-readies Due September 5, 2005
Special issue to be published in First half of 2006
*Special Issue Guest Editors*
*Dr. Shichao Zhang <http://www-staff.it.uts.edu.au/%7Ezhangsc/>**
(*University of Technology, Sydney, Australia)
*Prof. Xindong Wu <http://www.cs.uvm.edu/%7Exwu/home.html>* (University
of Vermont, USA)
*Prof. Mohammed J. Zaki <http://www.cs.rpi.edu/%7Ezaki/>* (Rensselaer
Polytechnic Institute, USA)
---------------------------------------------------------------------
To unsubscribe, e-mail: computational.science-unsubscribe(a)OptimaNumerics.com
For additional commands, e-mail:
computational.science-help(a)OptimaNumerics.com
Computational Science mailing list hosting is provided by
OptimaNumerics (http://www.OptimaNumerics.com)
---------------------------------------------------------------------
-------------------------------------------------------
--
Univ.Prof. Dr.Gustaf Neumann
Abteilung für Wirtschaftsinformatik und Neue Medien
Wirtschaftsuniversität Wien, Augasse 2-6, 1090 Wien