-------- Original-Nachricht --------
Betreff: [computational.science] [Call for Papers] The First
International Workshop on Smart Home (IWSH06)
Datum: Wed, 24 May 2006 00:04:14 +0900
Von: IWSH'06 CyberChair <smarthome06(a)gmail.com>
Organisation: "OptimaNumerics"
An: Computational Science Mailing List
<computational.science(a)lists.optimanumerics.com>
[Appologies if you receive multiple copies of this CFP.]
=========================================================
The First International Workshop on Smart Home (IWSH06)
November 10 ~ 11, 2006
http://www.secureworld.or.kr/IWSH.htm
Hotel Shilla Cheju, Cheju Island, Korea
=========================================================
Introduction
Smart Home Environments (SHE) are emerging rapidly as an exciting new
paradigm including ubiquitous, grid, and peer-to-peer computing to provide
computing and communication services any time and anywhere. But in order to
realize their advantages, it requires the security services and applications
to be suitable for SHE.
If they are realized, a user will be able to remotely access and control all
information appliances in the workplace as well as at home, and easily and
conveniently use various services to enable working from home, remote
education, remote diagnosis, virtual shopping, network gaming, and portal &
high quality VOD with no limitations on space and time.
Our workshop is intended to foster the dissemination of state-of-the-art
research in the area of SHE including business models, security services,
and novel applications associated with its utilization. In this wrkshop, we
plan to publish high quality papers, which cover the various theories and
practical applications related smart home. The published papers are expected
to present the high level results to solve the application services and
various problems in the various SH fields. In addition, we expect they will
trigger further related research and technology improvements for SH.
Topics (included, but are not limited to)
SH Applications
- Smart home (Building) applications and services
- Smart home network middleware and protocols
- Commercial and industrial application for SH
- Context awareness model for smart home services
- Wireless sensor networks (WSN) / RFID application for SH
SH Security
- Multimedia Security and Services in SH
- Smart home security issues and model
- Access control and privacy protection in SH
- Forensics and Security Policy in SH
- WSN/ RFID Security in SH
- Security Protocol for smart home service
International Committee
General Chairs:
Ching-Hsien Hsu (Chung Hua University, Taiwan)
Jong Hyuk Park (Hanwha S&C Co., Ltd., Korea)
Sajal K. Das (University Texas at Arlington, USA)
Program Chair:
Tai-hoon Kim (SERSC, Korea)
Publicity Chairs:
Eun-Sun Jung (Samsung Advanced Institute of Technology, Korea)
Xinwen Fu (Dakota State University, USA)
Publication Chairs:
Woo-Seok Hyun (Korean Bible University, Korea)
George Roussos (University of London, UK)
Financial Chairs:
Yeoun-Sik Park (KIMICS, Korea)
Heau Jo Kang (Mokwon University, Korea)
Sung-eon Jo (Sunchun University, Korea)
System Management Chair:
Il Seok Ko (Chungbuk Provincial University, Korea)
Program Committee:
Anatole Gershman (Accenture Technology Labs, USA)
Andry Rakotonirainy (Queensland University of Technology, Australia)
Anind K. Dey (Carnegie Mellon University, USA)
Antonio Coronato (ICAR-CNR, Italy)
Antonio Pescape' (University of Napoli "Federico II", Italy)
Arek Dadej (University of South Australia, Australia)
Bessam Abdulrazak (University of Florida, USA)
Bharadwaj Veeravalli (National University of Singapore, Singapore)
Bin Lu (West Chester University of Pennsylvania, USA)
Bo-Chao Cheng (National Chung-Cheng University, Taiwan)
Borhanuddin Mohd Ali (University of Putra Malaysia, Malaysia)
Byoung-Soo Koh (DigiCAPS Co., Ltd, Korea)
Debasish Ghose (Indian Institute of Science, India)
Do-Hyeon Kim (Cheju National University, Korea)
Dong Myung Shin (Korea Information Security Agency, Korea)
Eung-Nam Ko (Baekseok University, Korea)
Geoff West (Curtin University of Technology, Australia)
Gerd Kortuem (Lancaster University, UK)
Giuseppe De Pietro (ICAR-CNR, Italy)
Hans-Peter Dommel (Santa Clara University, USA)
Hakan Duman (University of Essex, UK)
Hesham H. Ali (University of Nebraska at Omaha, USA)
HoJae Hyun (Korea Information Security Agency, Korea)
HwaJin Park (Sookmyung Women's University , Korea)
Hung-Chang Hsiao (National Cheng Kung University, Taiwan)
Hyoung Joong Kim (Kangwon National University, Korea)
Ibrahim Kamel (University of Sharjah, UAE)
Im Yeong Lee (SoonChunHyang University, Korea)
In-Hwa Hong (KETI, Korea)
Insung Jung (Digicaps.Co. Ltd., Korea)
Jalal Al-Muhtadi (King Saud University, Saudi Arabia)
Jari Veijalainen (University of Jyvaskyla, Germany)
JeongHyun Yi (Samsung Advanced Institute of Technology, Korea)
Jin Wook Lee (Samsung Advanced Institute of Technology, Korea)
Joohun Lee (Dong-Ah Broadcasting College, Korea)
Karen Henricksen (NICTA, Australia)
Kia Makki (Florida International University, USA)
Kwang-Man Lee (Cheju National University, Korea)
LF Kwok (City University of Hong Kong, HK)
Li-Der Chou (National Central University, Taiwan)
Maria Teresa Arredondo (LifeSTech, Spain)
Michael Beigl (University of Karlsruhe, Germany)
Miyoun Yoon (Korea Information Security Agency, Korea)
Mounir Mokhtari (INT/GET, France)
Myung-Chan Park (International Graduate University for Peace, Korea)
Nicolas Sklavos (University of Patras, Greece)
Niki Pissinou (Florida International University, USA)
Ning Zhang (University of Manchester, UK)
Panos Kourouthanassis (Athens University of Economics and Business, Greece)
Petteri Kaskenpalo (AUT University, New Zealand)
Qi Shi (Liverpool John Moores University, UK)
Rene Mayrhofer (Lancaster University, UK)
Ricky Robinson (NICTA, Australia)
Ron Watro (BBN Technologies, USA)
Saracco Roberto (Telecom Italia Lab, Italy)
Shamila Makki (Florida International University, USA)
Shaohua TANG (South China University of Technology, China)
SuJin Park (University of Daejeon , Korea)
Sung Soo Kim (Kangwon National University, Korea)
Tatsuo Nakajima (Waseda University, Japan)
Tatsuya Yamazaki (NICT, Japan)
Toshihiro TABATA (Okayama University, Japan)
Tsung-Chuan Huang (National Sun Yat-sen University, Taiwan)
Tsutomu Terada (Osaka University, Japan)
Urs Hengartner (University of Waterloo, Canada)
Vipin Chaudhary (Wayne State University, USA)
Wen-Shenq Juang (Shih Hsin University, Taiwan)
Yang Guangwen (Tsinghua University, P.R.China)
Young Yong Kim (Yonsei University, Korea)
Deadlines and Dates
Paper Submission Due: Jun 20, 2006
Acceptance Notification for IEEE CS: July 20, 2006
Camera-ready Paper Submission for IEEE CS: August 20, 2006
First Acceptance Notification for LNCS/Journals: August 31, 2006
Final Decision and Acceptance Notification for LNCS/Journals : November 17,
2006
Paper Submission
Authors are invited to submit original papers: they must not substantially
duplicate work that any of the authors have published elsewhere or have
submitted in parallel to any other conferences that have proceedings. The
submission of contributions to IWSH'06 occurs through the ICHIT2006
Electronic Submission system (
http://www.secureworld.or.kr/IWSH.files/Submission Information.htm).
Publication
1.Proceedings: All accepted papers will be included in the conference
proceedings published by IEEE CS.
2.Revised Monographs: We are contacting a number of top scientific journals
interested in publishing the special issues consisting of the extended and
additionally revised IWSH 2006 papers. Selected papers will be included
revised monographs in LNCS/LNAI Series or the following journals with
special issue (this has been agreed with the respective editors in chief).
-Asian Journal of Information Technology
-International Journal of Smart Home
-Journal of Security Engineering
Contact
For general enquiries about IWSH 2006 Workshop or in case of any difficulty,
please contact:
-IWSH'06 CyberChair (smarthome06(a)gmail.com)
-Tai Hoon Kim(taihoonn(a)empal.com)
-The IWSH Secretariat, Ms Hyun-ah Kim (secureworld(a)paran.com)
-------- Original-Nachricht --------
Betreff: [computational.science] CFP SIS-2006
Datum: Sat, 20 May 2006 00:39:19 +0200
Von: Marcin Paprzycki <marcin(a)a.cs.okstate.edu>
Organisation: "OptimaNumerics"
An: Computational Science Mailing List
<computational.science(a)lists.optimanumerics.com>
Second Call for Papers
-----------------------------------------------------------------
1st International Workshop on Secure Information Systems (SIS'06)
Wisla, Poland, November 6-10, 2006
http://www.sis2006.pti.katowice.pl/
-----------------------------------------------------------------
*****************************************************************
NEW:
Extended versions of selected papers will be published as in a special
issue of the Journal of Information Assurance and Security (JIAS)
http://www.softcomputing.net/jias/
*******************************************************************
The 1st International Workshop on Secure Information Systems (SIS'06)
will be held in Wis³a, Poland on November 6-10, 2006, in conjunction
with the First International Multiconference on Computer Science and
Information Systems, http://www.FIMCSIT.pti.katowice.pl
The SIS workshop is envisioned as a forum to promote the exchange of
ideas and results addressing complex security issues that arise in
modern information systems. We aim at bringing together a community of
security researchers and practitioners working in such divers areas as
networking security, antivirus protection, intrusion detection,
cryptography, security protocols, and others. We would like to promote
an integrated view at the security of information systems.
As information systems evolve, becoming more complex and ubiquitous,
issues relating to security, privacy and dependability become more
critical. At the same time, the global and distributed character of
modern computing - typically involving interconnected heterogeneous
execution environments - introduces many new and challenging engineering
and scientific problems. Providing protection against increasingly
sophisticated attacks requires strengthening the interaction between
different security communities, e.g. antivirus and networking. New
technologies lead to the emergence of new threats and attack strategies,
involving smart mobile devices, peer-to-peer networks, instant
messaging, VoIP, mesh networks or even networked consumer devices, such
as house appliances or cars. Furthermore, the increasing openness of the
communications infrastructure results in novel threats and can
jeopardize critical enterprise and public infrastructure, such as
industrial automation and process control systems. Not only it is
estimated that half of all Web applications and Internet storefronts
still contain some security vulnerabilities, but secure commerce
applications are also exposed to increasingly elaborate attacks,
including spyware, phishing and other social engineering methods.
In order to develop a secure system, security has to be considered in
all phases of the lifecycle and adequately addressed in all layers of
the system. At the same time, good engineering has to take into account
both scientific and economic aspects of every solution: the cost of
security has to be carefully measured against its benefits - in
particular the expected cost of mitigated risks. Most companies and
individuals treat security measures in information system as a
necessary, but often uncomfortable, overhead. The increasing penetration
of computing in all domains of everyday life means that security of
critical business systems is often managed and maintained by personnel
who are not knowledgeable in the field. This highlights the importance
of usability and ease of configuration of security mechanism and protocols.
Covered topics include (but are not limited to):
* Access control
* Adaptive security
* Cryptography
* Copyright protection
* Cyberforensics
* Honeypots
* Intrusion detection
* Network security
* Privacy
* Secure commerce
* Security exploits
* Security policies
* Security protocols
* Security services
* Security evaluation and prediction
* Software protection
* Trusted computing
* Threat modeling
* Usability and security
* Viruses and worms
* Zero-configuration security mechanisms
PAPER SUBMISSION AND PUBLICATION
- Authors should submit papers in PDF format before July 3, 2006
(details of electronic submission will be provided in the near future)
- Papers should be formatted according to the LNCS style and not exceed
10 pages.
- Papers will be subject to peer review and accepted on the basis of
their scientific merit and relevance to the workshop topics
- Papers presented at the workshop will be included in the conference
proceedings and published on a CD (with an ISSN/ISBN number)
- Extended versions of selected papers will be published as in a special
issue of the Journal of Information Assurance and Security (JIAS)
http://www.softcomputing.net/jias/
DATES
Submission of Papers: July 3, 2006
Notification of Acceptance: September 1, 2006
Camera-Ready Papers: October 1, 2006
Conference: November 6-10, 2006
WORKSHOP CHAIR:
Konrad Wrona, SAP Research, France
LOCAL ORGANIZING COMMMITTEE:
Lukasz Nitschke, Adam Mickiewicz University, Poland
Michal Ren, Adam Mickiewicz University, Poland
PROGRAM COMMITTEE:
Hirokazu Aoshima Hitachi Research, Japan
Nicolas Courtois Axalto, France
Kris Gaj Gorge Mason University, USA
Silke Holtmans Nokia Research, Finland
Lech Janczewski University of Auckland, New Zealand
Stanislaw Jarecki University of California Irvine, USA
Eugene Kaspersky Kaspersky Lab, Russia
Marka Klonowskiego Wroclaw University of Technology, Poland
Ryszard Kossowski Warsaw University of Technology , Poland
Refik Molva Eurecom Institute, France
Josef Pieprzyk Macquarie University, Australia
Andreas Schaad SAP Research, Germany
Mike Scott Dublin City University, Ireland
Janusz Stoklosa Poznan University of Technology, Poland
Johnson Thomas Oklahoma State University Tulsa, USA
Thomas Walter DoCoMo Labs Europe, Germany
---------------------------------------------------------------------
To unsubscribe, e-mail: computational.science-unsubscribe(a)lists.optimanumerics.com
For additional commands, e-mail: computational.science-help(a)lists.optimanumerics.com
Computational Science mailing list hosting is provided by
OptimaNumerics (http://www.OptimaNumerics.com)
---------------------------------------------------------------------
-------- Original-Nachricht --------
Betreff: [computational.science] CFP: VORTE 2006 - 2nd International
EDOC Workshop on VOCABULARIES, ONTOLOGIES AND RULES FOR THE ENTERPRISE
(Submission, June 16)
Datum: Fri, 19 May 2006 15:12:13 +0200 (CEST)
Von: Guizzardi, G. (Giancarlo) <guizzardi(a)loa-cnr.it>
Antwort an: guizzardi(a)loa-cnr.it
Organisation: "OptimaNumerics"
An: Computational Science Mailing List
<computational.science(a)lists.optimanumerics.com>
CALL FOR PAPERS
[Apologies if you receive multiple copies of this announcement]
2nd International EDOC Workshop on
VOCABULARIES, ONTOLOGIES AND RULES FOR THE ENTERPRISE (VORTE 2006)
http://www.pms.ifi.lmu.de/mitarbeiter/spies/EDOCVORTE2006.html
as part of the
The 10th International IEEE Enterprise
Distributed Object Computing Conference (EDOC)
16-20 October 2006, Hong Kong
http://www4.comp.polyu.edu.hk/~edoc06/
ABOUT THE WORKSHOP
Vocabularies, ontologies and business rules are key components of a
model-driven approach to enterprise computing in a networked economy.
VORTE 2006 is the second workshop on an EDOC conference that intends to
bring together researchers and practitioners in areas such as
philosophical ontology, enterprise modeling, information systems, semantic
web, MDA (Model-Driven Architecture) and business rules to discuss the
role of foundational and domain ontologies in the conceptual development
and implementation of next generation tools for enterprise computing.
The Workshop Encourages Submissions on topics including
(but not limited to) the following:
* Business Vocabularies
* Business Rules and Constraint Modeling
* Enterprise Integration and Interoperability
* Ontological Foundations for Conceptual Modeling and Metamodeling
* Vocabularies and Foundational Ontologies for Enterprise Information Systems
* Enterprise Modeling and Simulation
* Foundations for the Model-Driven Architecture (MDA)
* Model-Driven Architecture (MDA) approaches to Enterprise Computing Systems
* Enterprise Computing and the Semantic Web
* Enterprise Reference Architectures
* Enterprise Domain Engineering
* Domain specific Business Information and Application Engineering
* Ontologies and organizational Semiotics
* Ontological Approaches to Content and Knowledge Management
SUBMISSION GUIDELINES
All submissions will be formally peer reviewed. Submissions should be 6 to
8 pages long and MUST be submitted in IEEE Computer Society format and
include the author's name, affiliation and contact details. They should be
submitted by e-mail as LaTeX or PDF files before June 16th, 2006, to
marcus.spies(a)lmu.de.
Authors will be notified of acceptance by July 28, 2006. At least one
author of accepted papers must participate in the Workshop. IEEE has
agreed to publish all papers accepted at the EDOC Workshops at the IEEE
Digital Library (i.e., the IEEE Xplore). The workshop papers will be
posted separately with its own ISBN.
WORKSHOP CHAIRS
Marcus Spies
University of Munich (LMU), Institute for Informatics,
Programming and Modeling Languages Unit (Germany)
Giancarlo Guizzardi
Laboratory for Applied Ontology (LOA), ISTC-CNR (Italy)
Gerd Wagner
Brandenburg University of Technology at Cottbus (Germany)
IMPORTANT DATES
Paper submission deadline: 16 June 2006
Author notification: 28 July 2006
Camera ready papers: 18 August 2006
Workshop date: 16 October 2006
PROGRAM COMMITTEE
Aldo Gangemi, Laboratory for Applied Ontology (ISTC-CNR), Italy
Brian Henderson Sellers, University of Technology Sydney, Australia
Christophe Roche, Université de Savoie, France
Colin Atkinson, University of Mannheim, Germany
Csaba Veres, Norwegian Univ. of Science and Technology, Norway
Elisa Kendall, Sandpiper Software, USA
François Bry, University of Munich, Germany
Fred Freitas, Federal University of Pernambuco, Brazil
Gerd Wagner, Brandeburg Univ. of Technology at Cottbus, Germany
Giancarlo Guizzardi, Laboratory for Applied Ontology (ISTC-CNR), Italy
Heinrich Herre, University of Leipzig, Germany
Jens Dietrich, Massey University, New Zealand
Joerg Evermann, Victoria University Wellington, New Zealand
Kuldar Taveter, University of Melbourne, Australia
Luís Ferreira Pires, University of Twente, The Netherlands
Marcus Spies, University of Munich, Germany
Michael Rosemann, Queensland University of Technology, Australia
Michele Missikoff, IASI-CNR, Italy
Mustafa Jarrar, STARLAb, Vrije Universiteit Brussel, Belgium
Nicola Guarino, Laboratory for Applied Ontology (ISTC-CNR), Italy
Oscar Pastor, Polytechnic University of Valencia, Spain
Pericles Loucopoulos, University of Manchester, UK
Peter Rittgen, University of Boras, Sweden
Ricardo Falbo, Federal University of Espirito Santo, Brazil
Robert Colomb, University of Queensland, Australia
Terry Halpin, Neumont University, USA
Thomas Roth-Berghofer, DFKI, Germany
Uwe Assmann, TU Dresden, Germany
York Sure, University of Karlsruhe, Germany
Wolfgang Hesse, University of Marburg, Germany
---------------------------------------------------------------------
To unsubscribe, e-mail: computational.science-unsubscribe(a)lists.optimanumerics.com
For additional commands, e-mail: computational.science-help(a)lists.optimanumerics.com
Computational Science mailing list hosting is provided by
OptimaNumerics (http://www.OptimaNumerics.com)
---------------------------------------------------------------------
-------- Original-Nachricht --------
Betreff: [computational.science] PDM'06 CFP
Datum: Thu, 18 May 2006 08:35:57 +0200
Von: Maurizio Urso <urso(a)pa.icar.cnr.it>
Organisation: "OptimaNumerics"
An: Computational Science Mailing List
<computational.science(a)lists.optimanumerics.com>
[Apologies if you receive multiple copies]
CALL FOR PAPERS
ECML PKDD 2006 Workshop on Parallel Data Mining
(at ECML/PKDD '06)
Berlin, Germany
September 18, 2006
http://www.inf.uni-konstanz.de/pdm06/
Recently major processor manufacturers have announced a dramatic shift in
their paradigm to increase computing power over the coming years. Instead
of focusing on faster clock speeds and more powerful single core CPUs,
the trend clearly goes towards multi core systems. This will also result
in a paradigm shift for the development of algorithms for computationally
expensive tasks, such as data mining applications. Obviously, work on
parallel algorithms is not new per se but concentrated efforts in the
many application domains are still missing. Multi-core systems, but also
clusters of workstations and even large-scale distributed computing
infrastructures provide new opportunities and pose new challenges for the
design of parallel and distributed algorithms.
Since data mining and machine learning systems rely on high performance
computing systems, research on the corresponding algorithms must be on
the forefront of parallel algorithm research in order to keep pushing
data mining and machine learning applications to be more powerful and,
especially for the former, interactive. The workshop focus will encompass
data mining and machine learning approaches from low to high degree of
parallelism, embracing algorithms for tightly coupled sharedmemory
systems (as will become widely available using multi core systems) and
also distributed approaches making use of the increasingly mature grid
infrastructure.
TOPICS OF INTEREST
Contributions are sought in all areas of high performance computing in
Data Mining and Machine Learning, in particular:
* Systems
o Distributed, grid and peer-to-peer computing
o parallel computing, multi-core systems
o distributed and shared-memory systems
* Methods
o Mining distributed datasets
o Meta learning
o Distributed, partial model learning
* Platforms and Tools
o Parallel data mining workflow management environments
o Distributed systems and tools for data mining and data
exploration
We also welcome submissions on data mining for the analysis of
distributed systems as well as reports on applications of particular
interest.
For more information, please email PDM06(a)inf.uni-konstanz.de
IMPORTANT DATES
* Paper submission deadline: June 28, 2006 (12pm GMT)
* Notification: July 31th, 2006
* Camera ready deadline: August 16, 2006
* Workshop: September 18, 2006
See website for detailed instructions on submitting a paper.
WORKSHOP CHAIRS
* Giuseppe Di Fatta, University of Konstanz (Germany)
and ICAR-CNR (Italy)
* Michael R. Berthold, University of Konstanz
* Srinivasan Parthasarathy, The Ohio State University
PUBLICITY CHAIR
* Matthew Eric Otey, The Ohio State University
PROGRAM COMMITTEE
* Gagan Agrawal, The Ohio State University, USA
* Pradeep Dubey, Intel Corp., USA
* Mario Cannataro, University "Magna Græcia" of Catanzaro, Italy
* Alok Choudhary, Northwestern University, USA
* Salvatore Gaglio, University of Palermo, Italy
* Robert Grossman, University of Illinois-Chicago, USA
* Yike Guo, Imperial College, UK
* Ruoming Jin, Kent State University, USA
* Hillol Kargupta, University of Maryland, USA
* George Karypis, University of Minnesota, USA
* Shonali Krishnaswamy, Monash University, Australia
* Shinichi Morishita, University of Tokyo, Japan
* Salvatore Orlando, University of Venice, Italy * Matthew Otey,
The Ohio State University
* Raffaele Perego, ISTI-CNR, Italy
* Omer F. Rana, Cardiff University, UK
* Sanjay Ranka, University of Florida, USA
* Assaf Schuster, TECHNION, Israel Institute of Technology, Israel
* Domenico Sacca', ICAR-CNR and University of Calabria, Italy
* Krishnamoorthy Sivakumar, Washington State University, USA
* Domenico Talia, University of Calabria, Italy
* Alfonso Urso, ICAR-CNR, Italy
* Jason T. L. Wang, New Jersey Institute of Technology, USA
* Ran Wolff, University of Maryland at Baltimore County, USA
* Mohammed J. Zaki, Rensselaer Polytechnic Institute, USA
* Albert Y Zomaya, University of Sydney, Australia
---------------------------------------------------------------------
To unsubscribe, e-mail: computational.science-unsubscribe(a)lists.optimanumerics.com
For additional commands, e-mail: computational.science-help(a)lists.optimanumerics.com
Computational Science mailing list hosting is provided by
OptimaNumerics (http://www.OptimaNumerics.com)
---------------------------------------------------------------------
-------- Original-Nachricht --------
Betreff: ETRICS 2006 - Call For Participation
Datum: Tue, 16 May 2006 16:31:43 +0200 (CEST)
Von: gi-mitglieder-info(a)gi-ev.de
An: undisclosed-recipients:;
========================== CALL FOR PARTICIPATION ==========================
International Conference on
Emerging Trends in Information and Communication Security
/\
||__^_ /\ ETRICS 2006
_/\_| \_||______________________________________________________________
June 6-9, 2006, FREIBURG, GERMANY
http://www.etrics.org
----------------------------------------------------------------------------
ETRICS is a part of the Scientific Year 2006 “Informatikjahr”
============================================================================
CONFERENCE SCOPE:
Considering the progress of IT technologies, security is still one of the
most vibrant and developing areas in computer science. Protecting
information and services from malicious use is essential for their
deployment and acceptance. While the main protection goals denoting
confidentiality, integrity and availability are of a general nature, their
relevance, realization and enforcement vary depending upon the underlying
architectures, technologies and applications.
Tomorrows information systems will accommodate highly dynamic applications
and build infrastructures with lots of mobile, autonomic nodes and ad hoc,
structureless relationships between them. Human interaction assumes new
forms and has to be pre-planned and expressed by means of rules that are
part of security policies. To enforce security rules, not only context data,
but also personal data is needed. In highly dynamic systems, security and
privacy become mutually exclusive.
ETRICS solicits research contributions focusing on emerging trends in
security and privacy.
----------------------------------------------------------------------------
SCIENTIFIC PROGRAM | http://www.etrics.org/program.php
TOPICS
- SOA and Security - Intrusion Detection
- Vulnerability Analysis - Security Policies
- Security Engineering - Cryptography
- Secure Mobility - Trusted Computing
- Security Protocols - Privacy
KEYNOTE SPEAKERS | http://www.etrics.org/keynotes.php
- By renowned industry and research leaders
Best Practice Security Solutions | http://www.etrics.org/applications.php
- What can you learn from industry?
Exhibition | http://www.etrics.org/exhibition.php
- Open everyday for ETRICS attendees and public
Scientific Year 2006 “Informatikjahr”
- Thursday, June 8 - for ETRICS attendees and public
WORKSHOPS | http://www.etrics.org/workshops
- Long-lasting Security / Are there mechanisms?
(A. Schmidt/ M. Kreutzer)
- Security in Autonomous Systems / Is privacy mutually exclusive to
security?
(J. Peters/ R. Accorsi)
- Privacy and Personalized Services / Is this a paradox?
(S. Sackmann/ S. Spiekermann)
- UC and RFID today - Breakthrough or still on hold?
(J. Strüker/ C. Flörkemeier)
TUTORIALS | will take place on Monday, 5th June 2006
- Economics of Security and Privacy (S.Sackmann)
- Protection of Communication Infrastructures (G. Schäfer)
- Cryptography and Security (W. Geiselmann)
- Modelling and Analysis of Information Security (H. Mantel)
INFORMATIKJAHR | will take place on Thursday, June 8th, 2006
- "Security In a Interconnected World" / Take your chance in informatics!
The Institute of Informatics of the University of Freiburg and the German
Society of Computer Science Region Southern Baden, introduce informatics to
public, especially pupils, by Freiburg’s football playing robots, finalists
at the world championship 2006, and Albert your robot as a museum guide as
well as a real-time surgery simulator. A talk about hackers explains
security threats raised by viruses, worms and trojan horses. Students
present the study of informatics by their personal experiences and by the
role of mathematics for this study. Pupils and students from other topics
have the possibility to get to know their way in informatics by the study
advice centre of the University of Freiburg and the career centres of
Deutsche Telekom and Booz Allen Hamilton. Please find the program on
www.gi-suedbaden.de/informatikjahr.
This regional event is part of the series “Develop the Future” of GI and
FhG, sponsored by the BMBF.
----------------------------------------------------------------------------
PROGRAM CHAIR:
- Günter Müller, U of Freiburg, Germany (Chair)
- Gerhard Schneider, U of Freiburg, Germany (Co-Chair)
----------------------------------------------------------------------------
IN COOPERATION WITH:
- ACM Special Interest Group on Security, Audit and Control (SIGSAC)
- IEEE Computer Society
- DFG (German Research Foundation)
- GI (German Society for Computer Science)
- DaimlerChrysler - Deutsche Bank
- Deutsche Telekom - DoCoMo Euro-Labs
- Endress+Hauser - Novartis
- Siemens - SAP
----------------------------------------------------------------------------
CONTACT:
Albert-Ludwigs-Universitaet Freiburg, Telematics
http://www.telematik.uni-freiburg.de
Friedrichstr. 50 - D-79098 Freiburg, Germany
E-mail: info(a)etrics.org
Web: http://www.etrics.org
-------- Original-Nachricht --------
Betreff: [computational.science] SKG2006
Datum: Tue, 16 May 2006 19:22:24 +1000
Von: Jinjun Chen <jchen(a)ict.swin.edu.au>
Organisation: "OptimaNumerics"
An: Computational Science Mailing List
<computational.science(a)lists.optimanumerics.com>
SKG 2006
Oct.30-Nov.2 2006, Guilin, China
2nd International Conference on Semantics, Knowledge and Grid
The Internet and World Wide Web are milestone of information sharing. IT
professionals are in the critical historical stage of creating the new
brilliance ¾ a new interconnection environment. Semantics and knowledge are
the basis of this environment. The International Conference on Semantics,
Knowledge and Grid (SKG) is the unique cross-area international forum on
semantic computing, knowledge networking, and grid computing.
The 2nd International Conference on Semantics, Knowledge and Grid (SKG2006)
is to bring together researchers and practitioners in areas of knowledge and
intelligence, semantics, and grid computing to share their visions, research
achievements and solutions to real applications, to resolve the challenge
issues and to establish worldwide cooperative research and development.
SKG2006 will be held in Guilin, a city with natural beauty and historical
treasures, located in the northeast of Guangxi Zhuang Autonomous Region of
China.
Conference Co-Chairs:
Ian Foster, Argonne National Laboratory, USA
James Hendler. University of Maryland, USA
Geoffrey C. Fox, Indiana University, USA
Program Co-Chair:
Hai Zhuge Chinese Academy of Sciences, China
Toru Ishida Kyoto University, Japan
Advisory Board:
David De Roure University of Southampton, UK
Carole Goble University of Manchester, UK
P.M.A. Sloot University of Amsterdam, Netherlands
Keynote Speaker: C. Lee Giles, Pennsylvania State University, USA
Themes (include but not limited to)
n Semantics and Semantic Grid. Semantic Normalization; Semantic
Interoperability; Semantic Visualization and modeling; Semantic Web Mining;
Semantic Brokering; Semantic Searching and Querying; Semantic-based
Interface; Automatic Semantic Annotation; Semantic Web Services; Theory and
Model of Semantic Grid.
n Knowledge and Knowledge Grid. Semantic Knowledge Portals; Web
Knowledge Discovery; Representation and Reasoning; Theory and Model of
Knowledge Grid; Large-Scale Distributed Knowledge Management; Ontology;
Information/ Knowledge/ Service Integration; Knowledge Flow; Internet-based
Knowledge Engineering and Software Engineering.
n Advanced Networking Model. Complex Network and Resource Management;
Resource Management Model in Grid, Internet-based Multi-agent Systems;
Nature-Inspired Computing; Autonomous Computing; Internet-based Intelligent
Applications; P2P Computing; Grid Computing; Self-Organized Intelligence;
Service-oriented Computing; Mobile Grid.
n Systems, Tools and Applications. Semantic-based Virtual
Organizations; e-Science; e-Business; e-Learning; e-Government; Grid
Security; Sensor networks and the Grid.
n e-Culture or e-HASS(Humanities, Arts and Social Sciences).
Applications in Humanities; Applications in Arts; Applications in Social
Sciences
Submission: See submission page at http://www.culturegrid.net/SKG2006
Important Dates:
June 1, 2006 (Deadline for submission)
July 1, 2006 (Notification of acceptance)
August 1, 2006 (Final copy due)
Publication Information:
Accepted papers will be published in proceedings. Selected high-quality
papers will be published as special issues/sections in the following
international journals after extension: Concurrency and Computation:
Practice and Experience (Wiley); Journal of Systems and Software (Elsevier);
Future Generation Computer Systems (Elsevier).
---------------------------------------------------------------------
To unsubscribe, e-mail: computational.science-unsubscribe(a)lists.optimanumerics.com
For additional commands, e-mail: computational.science-help(a)lists.optimanumerics.com
Computational Science mailing list hosting is provided by
OptimaNumerics (http://www.OptimaNumerics.com)
---------------------------------------------------------------------
-------- Original-Nachricht --------
Betreff: [computational.science] IA&B-ISDA 2006, Jinan, China
Datum: Fri, 12 May 2006 11:02:32 +0200
Von: Praca <aidabt(a)ii.pb.bialystok.pl>
Antwort an: Praca <aidabt(a)ii.pb.bialystok.pl>
Organisation: "OptimaNumerics"
An: Computational Science Mailing List
<computational.science(a)lists.optimanumerics.com>
****** IA&B - ISDA'06 - Deadline Extension ******
Image Analysis and Biometrics
http://isda2006.ujn.edu.cn/special_session.html
(In conjunction with ISDA'2006)
As of May 12, 2006, ISDA has received nearly 350 papers and due to several
requests from prospective authors, and the Conference Chairs are pleased to
announce an extension of 1 week for submitting the full papers.
Conference URL: http://isda2006.ujn.edu.cn
All papers should be submitted electronically via the Online Paper
Submission System.
http://isda2006.ujn.edu.cn/isda/author/submit.php
The format of the initial submissions can be PDF, MS Word, or Postscript.
The file of the final accepted papers should be in either Word or Latex.
All submitted papers will be refereed by at least THREE experts in the
respective fields according to the criteria of originality, significance,
quality, and clarity. The authors of accepted papers will have an
opportunity to revise their papers and take consideration of the referees'
comments and suggestions, before submitting the final papers.
All accepted papers with paid registration will be included in the
Proceedings of ISDA2006, to be published by IEEE Computer Society Press (EI
Indexed).
All IA&B Workshop papers will also have the opportunity to be published in
their extended versions
in an International Journal on Image Processing (IP&C edited by Professor
R.S. Choraś).
Khalid Saeed
IA&B Workshop, chair
---------------------------------------------------------------------
To unsubscribe, e-mail:
computational.science-unsubscribe(a)lists.optimanumerics.com
For additional commands, e-mail:
computational.science-help(a)lists.optimanumerics.com
Computational Science mailing list hosting is provided by
OptimaNumerics (http://www.OptimaNumerics.com)
---------------------------------------------------------------------
---------------------------------------------------------------------
To unsubscribe, e-mail: computational.science-unsubscribe(a)lists.optimanumerics.com
For additional commands, e-mail: computational.science-help(a)lists.optimanumerics.com
Computational Science mailing list hosting is provided by
OptimaNumerics (http://www.OptimaNumerics.com)
---------------------------------------------------------------------
-------- Original-Nachricht --------
Betreff: [computational.science] 2nd IFIP SWWS 2006 - CFP
Datum: Fri, 12 May 2006 15:09:28 +1000
Von: IFIP SWWS 2006 <rajugan(a)it.uts.edu.au>
Organisation: "OptimaNumerics"
An: Computational Science Mailing List
<computational.science(a)lists.optimanumerics.com>
*********************************************************************************
We apologize if you received multiple copies of this Call for Papers
Please feel free to distribute it to those who might be interested
*********************************************************************************
CALL FOR PAPERS
Second International IFIP WG 2.12 / 12.4 Workshop on Web Semantics (SWWS '06)
with special tracks on Security & Trust, Fuzzy models and Regulatory Ontologies
Oct 29 - Nov 3, 2006, Montpellier, France
http://www.cs.rmit.edu.au/fedconf/index.html?page=swws2006cfp
In conjunction with OnTheMove Federated Conferences (OTM'06)
http://www.cs.rmit.edu.au/fedconf
Proceedings will be published by Springer LNCS
Motivation
The IFIP Working Group 2.12 & 12.4 on Semantic Web (http://www.ceebi.curtin.edu.au/IFIP/) is a timely active international community of scientists, engineers, and practitioners dedicated to advancing the state of the art of research and practice in the emerging field of Semantic Web, and meanwhile providing input and guidance on the direction, scope, and importance of different aspects of artificial intelligence, data modelling, and software theory and practice to Web semantics. It is unique in that it targets to synthesize the concepts from these diverse fields in a comprehensive fashion in the context of the semantics Web.
The Web has now been in existence for quite some time and its pervasive in its influence on all aspects of society and commerce. It has also produced a major shift in our thinking on the nature and scope of information processing. However in its technological nature and its supporting theoretical foundations, it has remained relatively rudimentary, being currently largely suitable for information dissemination. It is rapidly moving away from this, to application deployment and knowledge deployment that require complex interactions and properly structured underlying semantics. This has been a sudden upsurge of research activity in the problems associated with adding semantics to the Web. This work on semantics will involve data, knowledge, and process semantics. The Second International IFIP WG 2.12 & WG 12.4 Workshop on Web Semantics (SWWS '06) will provide a forum for presenting original, unpublished research results, and innovative ideas related to this voluminous quantity of research.
In SWWS06, as a complementary to the main OTM '06 conference themes, special focus is aimed at looking three rapidly evolving areas of interest for the Semantic Web, namely Security & Trust, Regulatory Ontologies and Fuzzy models.
Trust and Reputation are assuming an increasing importance in interaction and commerce over the web. There are several trust and Reputation Systems (albeit simple) increasingly finding development by major development by major internet companies such as Amazon, eBay and Epinion.
Also, there is a growing intend in using an attention formulation for web semantics based on Fuzzy set, models and protoforms.
The intention of the workshop is to bring together a community of researchers and practitioners who will provide a collection of work that is of utmost importance to the advancement of the web semantics and its future, reviewed by the top experts and minds in the field, in an area of the utmost importance to business, IT and industry.
Whom Should Attend
The workshop is intended for researchers, academic, practitioners, IFIP workgroup WG 2.12/12.4 members and organizations who are actively involved in present and upcoming semantic web technologies. Moreover, the workshop concepts covered is a good reference point for academic and industrial researchers who want to familiarize themselves with emerging trends in semantic web research, technologies and applications.
TOPICS OF INTEREST
Topics of interest may include one or more of the following (but are not limited to) themes;
* Semantic Web and Web Semantics
* Security, Trust and Reputation Systems
* Providing Semantics for the Web using Fuzzy Methods
The following topics related to these themes including, but are not limited to:
* Formal and practical knowledge representation and inference for the semantic Web
* Design, evaluation, and use of ontology
* Metadata and knowledge markup
* Special track on Fuzzy sets
- Providing semantics for the web using Fuzzy set methods
- Fuzzy models for the Semantic Web
- Protoforms
* Special track on Security and Trust
- Security and trust for the Semantic Web
- Reputation Systems for the Semantic Web
* Special track on Regulatory Ontologies
- Engineering of regulatory ontologies:
conceptual analysis, representation, modularization and layering, reusability, evolution and dynamics, etc;
- Multilingual and terminological aspects of regulatory ontologies;
- Models of legal reasoning (from ontological viewpoint):
regulatory compliance, case-based reasoning, reasoning with uncertainty, etc.
- Sensitivity on and harmonization of regulations;
- Regulatory metadata and content standardization (e.g. legal-XML/LeXML, ADR/ODR-XML,...);
- Regulatory ontologies of: property rights, persons and organizations, legal procedures, contracts, legal causality, etc;
- Task models for socially regulated activities;
- Experiences with projects and applications involving regulatory ontologies in legal knowledge based systems, legal information retrieval, e-governments, e-commerce;
* Interoperability of data and Web services
* Semantics of agent and Web interaction
* Automated extraction of Information from regulatory documents.
* Content-based information and knowledge retrieval
* Information extraction, automatic, and semi-automatic generation of metadata
* Database technologies for the Semantic Web
* Multimodality and visualization technologies for the Semantic Web
* Applications on mobile devices
* Human centred aspects specifically for the Semantic Web
* Impact of Semantic Web computing on organizations and society
* Evaluation of the quality of Web semantics
* Context-awareness for the Semantic Web
* Semantics for ubiquitous computing
SUBMISSION REQUIREMENTS
All submitted papers will be carefully evaluated based on originality, significance, technical soundness, clarity of expression, and relevance to IFIP WG 2.12 & WG 12.4. All submissions must be in English, and will be refereed by a program committee comprising members of the Working Group. Research submissions must not exceed 10 pages following the Springer format. Submissions should be made in PDF format.
Detailed formatting instructions can be found at:
http://www.springer.de/comp/lncs/authors.html
The paper submission site is located at:
http://www.cs.rmit.edu.au/fedconf/swws/2006/papers
The final proceedings will be published by Springer Verlag as LNCS (Lecture Notes in Computer Science). Failure to commit to presentation at the conference automatically excludes a paper from the proceedings.
IMPORTANT DATES
Abstract Submission Deadline - June 23, 2006
Paper Submission Deadline - June 30, 2006
Acceptance Notification - July 31, 2006
Final Version Due - August 20, 2006 (hard deadline)
OTM Conferences and workshops - Oct 29 - Nov 03, 2006
ORGANISATION COMMITTEE
Program Chairs
Katia Sycara (katia(a)cs.cmu.edu)
Carnegie Mellon University, USA.
Elizabeth Chang (Elizabeth.Chang(a)cbs.curtin.edu.au)
Curtin University of Technology, Australia.
Workshop Vice-Chairs
Ernesto Damiani (edamiani(a)crema.unimi.it)
Computer Science Department, Milan University, Italy.
Mustafa Jarrar (mjarrar(a)vub.ac.be)
STARLab, Vrije Universiteit Brussel, Belgium.
Special Track Chairs
Elizabeth Chang - Security, Trust & Reputation Systems
Ernesto Damiani - Fuzzy Models and Systems
Mustafa Jarrar - Regulatory Ontologies
IFIP WG 2.12/12.4 Chair
Tharam S. Dillon (tharam(a)it.uts.edu.au)
University of Technology Sydney, Australia.
Publicity Chair
Rajugan, R. (rajugan(a)it.uts.edu.au)
University of Technology Sydney, Australia.
Program Committee Members
IFIP Working Group 2.12/12.4 Members
* Aldo Gangemi (Laboratory for Applied Ontology, ISTC-CNR, Rome, Italy)
* Amit Sheth (University of Georgia, Athens)
* André Valente (Knowledge Systems Ventures, USA)
* Andrew Stranieri (JUSTSYS, Ballarat, Australia)
* Avigdor Gal (Technion - Israel Institute of Technology)
* Carlos Sierra (Spanish National Research Council, Spain)
* Carole Goble (Department of Computer Science, University of Manchester, UK)
* Carole Hafner (Northeastern University, USA)
* Cecilia Magnusson Sjoberg (Stockholm University, Sweden)
* Chris Bussler (Oracle Corp., US)
* David Bell (Queen's University, Belfast)
* Elisa Bertino (CERCS Department of Purdue University, USA)
* Elizabeth Chang (Curtin University of Technology, Australia)
* Enrico Franconi (Free University of Bozen-Bolzano, Italy)
* Ernesto Damiani (Computer Science Department, Milan University, Italy.)
* Feng Ling (University of Twente, The Netherlands)
* Frank van Harmelen (Vrije Universiteit, The Netherlands)
* Giancarlo Guizzardi (University of Twente, The Netherlands)
* Grigoris Antoniou (University of Crete, Greece)
* Guiraude Lame (CERSA Université Paris 2, France)
* Hai Zhuge (Institute of Computing, Chinese Academy of Science)
* Jaime Delgado (Universitat Pompeu Fabra, Barcelona, Spain)
* Jaiwei Han (Dept of Computer Science, Univ. of Illinois at Urbana-Champaign, Urbana, Illinois)
* John Debenham (University of Technology, Sydney (UTS) Australia)
* John Mylopoulos (University of Toronto, Canada)
* Joost Breuker (Leibniz Center for Law, Netherlands)
* Jos Lehmann (Laboratory for Applied Ontology, ISTC-CNR, Rome Italy)
* Katia Sycara (Laboratory for Agents Technology, Carnegie Mellon University)
* Kokou Yetongnon (Universite de Bourgogne, France)
* Layman Allen (University of Michigan, USA)
* Leonardo Lesmo (Universita' di Torino, Italy)
* Ling Liu (CERCS, College of Computing, Atlanta, Georgia)
* Lizhu Zhou (Department of Computer Science and Technology at Tsinghua University, Beijing, China)
* Lotfi Zadeh (Berkeley Initiative in Soft Computing)
* Manfred Hauswirth (EPFL, Switzerland)
* Mariano Lopez (Universidad San Pablo CEU, Spain)
* Masood Nikvesh (The Berkeley Initiative in Soft Computing)
* Mihaela Ulieru (University of Calgary, Canada)
* Mohand-Said Hacid (University Claude Bernard Lyon 1 LIRIS - Villeurbanne, France)
* Mukesh Mohania (Database Technologies, IBM India Research Lab, India)
* Mustafa Jarrar (STARLab, Vrije Universiteit Brussel, Belgium)
* Nicola Guarino (Institute of Cognitive Sciences and Technologies of the Italian National Research Council (ISTC-CNR))
* Peter Spyns (Semantics Technology and Applications Research Lab, Vrije Universiteit Brussel, Belgium)
* Pieree Yves Schobbens (Institut d'Informatique, University of Namur, Belgium)
* Qing Li (Dept of Computer Eng. and Information Technology, City University of Hong Kong)
* Radboud Winkels (Leibniz Center for Law, Netherlands)
* Ramasamy Uthurusamy (General Motors Corporation.)
* Richard Benjamins (ISOCO, Spain)
* Rita Temmerman (Erasmushogeschool Brussels, Belgium)
* Robert Meersman (Vrije Universiteit Brussel, Belgium)
* Robert Tolksdorf (Free university of Berlin, Germany)
* Said Tabet (The RuleML Initiative, Boston, USA)
* Stefan Decker (University of Southern California)
* Susan Urban (Arizona State University , Tempe)
* Tharam Dillon (University of Technology, Sydney (UTS) Australia)
* Trevor Bench-Capon (University of Liverpool, UK)
* Usuama Fayed (Strategic Data Solutions Group, Yahoo)
* Valentina Tamma (University of Liverpool, UK)
* Wil van der Aalst (Technische Universiteit Eindhoven, The Netherlands)
* York Sure (Institute AIFB (University of Karlsruhe))
* Zahir Tari (School of Computer Science & IT, RMIT University, Melbourne, Australia)