-------- Original-Nachricht --------
Betreff: [isworld] CfPart: NFPinDSML2008
Datum: Tue, 9 Sep 2008 18:27:06 +0200
Von: Marko Boskovic <Marko.Boskovic(a)Informatik.Uni-Oldenburg.DE>
Antwort an: Marko Boskovic <Marko.Boskovic(a)Informatik.Uni-Oldenburg.DE>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Please accept our apologies in the case of cross posting
****************************************************************************
***************
****************************************************************************
***************
Call for Participation
1st International Workshop on Non-functional System Properties in
Domain Specific Modeling Languages (NFPinDSML2008)
(http://planet-mde.org/nfpindsml)
Affiliated with MoDELS 2008, Toulouse France, September 28, 2008,
(http://www.irit.fr/models/index.html)
****************************************************************************
***************
****************************************************************************
***************
Early registration deadline: September 10th, 2008
https://wwwsecu.irit.fr/models08-adm/
Objective
The NFPinDSML 2008 workshop brings together researchers and practitioners
from communities
dedicated to non-functional properties of software systems and researches
from language
engineering to study the principles of integration of various non-functional
system
properties and language engineering in order to further expand principles of
reasoning about
non-functional properties of software systems in Domain Specific Modeling
Languages, and
model-driven engineering in general
Invited Speakers:
Prof. Dorina C. Petriu, Carleton University, Canada,
"Performance Analysis of Aspect-Oriented UML Models"
Huascar Espinoza, PhD, CEA,
"Evaluating MARTE in an Industry-Driven Environment: TIMMO's Challenges
for
AUTOSAR Timing Model"
Technical Contributions:
Richard Paige, Louis Rose, Dimitrios Kolovos, Phil Brooke and Xiaocheng Ge,
"Automated Safety Analysis for Domain-Specific Languages"
Gabriel Pedraza-Ferreira and Jacky Estublier,
"An Extensible Services Orchestration Framework through Concern
Composition"
Gunter Mussbacher, Jon Whittle and Daniel Amyot,
"Towards Semantic-Based Aspect Interaction Detection"
Christiano Braga,
"From Access Control Policies to an Aspect-based Infrastructure:
A Metamodel-based Approach"
Position Papers:
Michael Giddings, Jan Jürjens and Pat Allen,
"Challenges for the model based development of distributed real time
systems"
Moran Kupfer and Irit Hadar,
"Understanding and Representing Deployment Requirements for Achieving
Non-Functional System Properties"
Andreas Petter, Alexander Behring, Miroslav Zlatkov, Joachim Steinmetz and
Max Mühlhäuser,
"Modeling Usability in Model-Transformations"
Workshop Supporters
TrustSoft Research Training Group (TrustSoft Graduiertkolleg), Unversity of
Oldenburg
German Research Foundation (Deutsche Forschunggemeinschaft-DFG)
Workshop Organizers:
Marko Bošković, University of Oldenburg, Germany
Dragan Gašević, Athabasca University, Canada
Claus Pahl, Dublin City University, Ireland
Bernhard Schätz, Technische Universität München, Germany
No virus found in this outgoing message.
Checked by AVG.
Version: 7.5.526 / Virus Database: 270.6.19/1660 - Release Date: 9/8/2008
18:39
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] 2nd CFP: RCIS 2009 Research Challenges in
Information Science
Datum: Tue, 09 Sep 2008 14:53:03 +0200
Von: Martine Collard <Martine.Collard(a)unice.fr>
Antwort an: Martine Collard <Martine.Collard(a)unice.fr>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
********* 2nd CALL FOR PAPERS *********
3rd International Conference on RESEARCH CHALLENGES IN INFORMATION SCIENCE
(RCIS 2009)
APRIL 22-24, 2009, FEZ, MOROCCO
http://www.farcampus.com/rcis
Papers submission deadline: November 28, 2008
Proceedings will be published by IEEE (Print Version ISBN #978-1-4244-2864-9)
CO-SPONSORED BY IEEE MOROCCO SECTION and EMSI
(Ecole Marocaine des Sciences de l’Ingénieur)
RCIS 2009 is a conference of RCIS CONFERENCE SERIES
Ouarzazate (2007), Marrakech (2008), Fez (2009)
SCOPE AND TOPICS
================
The third International Conference on RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS) aims at providing an international forum for scientists, researchers, engineers and developers from a wide range of information science areas. While presenting research findings and state-of-art solutions, you are especially invited to share experiences on new research challenges in these main topics:
• Databases
• Information Systems
• WEB Systems
• Business Process Modelling, Analysis and Design
• Intelligent Agents
• Knowledge Management
• Ontologies
• Knowledge Discovery from Data
Each of these topics is expanded on the web site at http://www.farcampus.com/rcis/topics.php. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the conference main topics.
CONFERENCE PUBLICATIONS AND BEST PAPERS
=======================================
Papers that have already been accepted or are currently under review for other conferences or journals will not be considered for publications at RCIS’09. Authors are invited to submit papers in English using the paper format indicated below. Each submitted paper will have to be associated to one of the four following categories.
Technical solution papers present solutions which are novel or significantly improve on existing solutions. A technical solution paper must include a preliminary validation of the proposed solution. Results must be stated clearly enough so that it is possible to validate them in later research.
Evaluation papers evaluate existing problem situations or validate proposed solutions with scientific means, i.e. by empirical studies, experiments, case studies, simulations, mathematical proofs, etc. The research method must be sound and appropriate.
Industrial practice and experience papers: present problems or challenges encountered in practice, relate success and failure stories, or report on industrial practice. The practice must be clearly described and its context must be given.
Doctoral Papers are papers submitted by doctoral students (only) and are related to research work in progress.
IMPORTANT DATES
===============
Papers submission deadline: NOVEMBER 28, 2008
Notification of acceptance and Registration opening: FEBRUARY 10, 2009
PAPER SUBMISSION
================
The manuscript must contain, in its first page, the paper title, the paper category (Technical solution, Evaluation, Industrial or Doctoral), an abstract and a list of keywords but no names or contact details are to be included in any part of the file. Notification of paper acceptance/rejection will be sent by email. All the accepted papers will be published in the RCIS’09 proceedings.
Since it is planned to publish the proceedings in the IEEE Conference Publications Program, paper submissions must be formatted using the IEEE 2-column format (see http://www.ieee.org). They should be limited to a maximum of 12 pages.
All paper submissions will be handled electronically
(see //www.farcampus.com/rcis/author.php).
By submitting a paper, authors implicitly agree that at least one of them will register to the conference and present the paper. Submitted papers will be reviewed by the RCIS’09 Program Committee based on originality, significance, technical soundness, and clarity of exposition. A "blind" paper evaluation method will be used. Therefore authors are kindly requested to produce and provide the full paper, without any reference to the authors.
The authors of papers that obtain the highest marks in the reviewing process will be invited to submit an extended version to a journal.
CONFERENCE COMMITTEE
====================
General Chair:
André Flory (INSA Lyon, France)
RCIS Steering Committee Chair:
Colette Rolland (University of Paris 1 Panthéon Sorbonne, France)
Program Committee Chair:
Martine Collard (INRIA Sophia Antipolis, France)
Program Committee Co-Chair:
Mohammed El Mohajir (University of Fez, Morocco)
IEEE Organizational Unit:
Mohammed Essaïdi (University of Tétouan, Morocco)
Publicity Chair:
Selmin Nurcan (University of Paris 1 Panthéon Sorbonne, France)
Operating Committee Chair:
Jean Louis Cavarero (University of Nice, France)
KEYNOTE SPEAKERS
================
Jacky Akoka (CNAM Paris, France)
John Mylopoulos (University of Toronto, Canada)
Aris Ouksel (University of Illinois, USA)
Oscar Pastor (Technical University of Valencia, Spain)
CONFERENCE CONTACT: rcis(a)farcampus.com
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: Sonet 2008 Call for participation 2
Datum: Tue, 9 Sep 2008 12:51:05 +0200
Von: Arnošt Svoboda <asvobod(a)gmail.com>
An: e.pokorna(a)amtech.cz, e.schlessinger(a)ucl.ac.uk, e.tlelo(a)ieee.org,
e.vossough(a)uws.edu.au, ebert(a)userpages.uni-koblenz.de,
ecker(a)informatik.tu-clausthal.de, eckmiller(a)nero.uni-bonn.de,
eddie.johnston(a)ucd.ie, edgar.glowacki(a)pjwstk.edu.pl, edmassad(a)usp.br,
eduardo.nakamura(a)fucapi.br, edunko(a)yahoo.com,
eero.hyvonen(a)cs.helsinki.fi, effelsberg(a)pi4.informatik.uni-mannheim.de,
eggenberger(a)informatik.uni-stuttgart.de, egodard(a)cmi.univ-mrs.fr,
ehara(a)4dd.co.jp, ehorn(a)soft.cs.uni-potsdam.de,
ehrig(a)aifb.uni-karlsruhe.de, ehrig(a)cs.tu-berlin.de,
ehrich(a)idb.cs.tu-bs.de, ehud(a)cs.bgu.ac.il,
echtle(a)informatik.uni-essen.de, eickel(a)informatik.tu-muenchen.de,
eike(a)iti.cs.uni-magdeburg.de, einsfran(a)dsic.upv.es,
eiss_office(a)ira.uka.de, eji21(a)sussex.ac.uk, ejyoon(a)purple.knu.ac.kr,
ekhong(a)venus.uos.ac.kr, ekpardede(a)cs.latrobe.edu.au, eldan(a)case.edu,
elena.ferrari(a)uninsubria.it, elhadi.shakshuki(a)acadiau.ca,
elchavez(a)fismat.umich.mx, elchavez(a)gmail.com, elijahblessing(a)yahoo.com,
elina.kalnina(a)di.lv, eliska.treterova(a)osu.cz, ellenmk(a)ifi.uio.no,
elst(a)dfki.uni-kl.de, em(a)info.ucl.ac.be, emdeboas(a)cs.com, emil(a)cs.cas.cz,
emmanuel.cecchet(a)inria.fr, enavas(a)fundacionginer.org,
engels(a)uni-paderborn.de, engin(a)seznam.cz, eosanghun(a)dblab.inha.ac.kr,
epifanio(a)math.unipa.it, erdmann(a)ontoprise.de, erdogan(a)cs.itu.edu.tr,
erhard(a)cs.tu-berlin.de, eri(a)affrc.go.jp, eric.dubois(a)tudor.lu,
erlebach(a)tik.ee.ethz.ch, esafa(a)yahoo.com, esposito(a)di.uniba.it,
esteva(a)iiia.csic.es, estrella.pulido(a)uam.es, etuci(a)ulb.ac.be,
eugene(a)kgs.twi.tudelft.nl, eva.burianova(a)osu.cz,
Eva.Jaksikova(a)profinit.eu, eva.marinicova(a)softec.sk, eva.volna(a)osu.cz,
evren(a)cs.umd.edu, ewra(a)wsm.gdynia.pl, exonsedl(a)savba.sk,
expsdvdl(a)savba.sk, expsgola(a)savba.sk, expsgur(a)savba.sk,
expsjkor(a)savba.sk, expspro(a)savba.sk, expssarm(a)savba.sk,
ezequiel(a)cogs.susx.ac.uk, f.ciravegna(a)dcs.shef.ac.uk, fdivina(a)upo.es,
f.j.stewart(a)sms.ed.ac.uk, f.wahl(a)tu-bs.de, fabrice(a)lefessant.net,
falex(a)loria.fr, fanizzi(a)di.uniba.it, faucher(a)leei.enseeiht.fr,
fausto(a)dit.unitn.it, favre(a)cscs.ch, fazekas(a)fiit.stuba.sk,
fbotana(a)uvigo.es, fehr(a)inf.fu-berlin.de, feigenbaum(a)cs.stanford.edu,
felea(a)infoiasi.ro, felfernig(a)ifit.uni-klu.ac.at, felixkl(a)inf.ethz.ch,
fend(a)ifi.unizh.ch, fengjun-cn(a)vip.sina.com, feriel.beji(a)ensi.rnu.tn,
fernau(a)ira.uka.de, few(a)informatik.uni-hannover.de, fh10(a)txstate.edu,
fhc(a)residencia.csic.es, fhesse(a)informatik.uni-leipzig.de,
fhofmann(a)informatik.uni-erlangen.de, fchedid(a)ndu.edu.lb,
figaidug2000(a)yahoo.com, fich(a)cs.toronto.edu,
filip.zagorski(a)im.pwr.wroc.pl, Filip.Zagorski(a)pwr.wroc.pl,
Filip.Zavoral(a)mff.cuni.cz, finin(a)cs.umbc.edu, fiona(a)cs.york.ac.uk,
fischer(a)itm.uni-luebeck.de, floyd(a)informatik.uni-hamburg.de,
fmadh(a)uni-paderborn.de, fmplusx(a)yahoo.com, fmunyoz(a)iti.upv.es,
forcrand(a)itp.phys.ethz.ch, forlizzi(a)di.univaq.it, forst(a)cuni.cz,
forster(a)fmi.uni-passau.de, fotouhi(a)cs.wayne.edu,
fperdrix(a)diarisegre.com, fran(a)us.es, francesco.mondada(a)epfl.ch,
francez(a)cs.technion.ac.il, franck.ravat(a)univ-tlse1.fr,
francois.bry(a)ifi.lmu.de, francois.bry(a)informatik.uni-muenchen.de,
frank.neven(a)luc.ac.be, frank.schoen(a)dresdner-bank.com,
frank.van.harmelen(a)cs.vu.nl, frantisek.galcik(a)upjs.sk,
franz(a)uni-paderborn.de, franz-josef.radermacher(a)uni-ulm.de,
fred.annexstein(a)uc.edu, freitag(a)fmi.uni-passau.de,
freksa(a)informatik.uni-bremen.de, frepa(a)nada.kth.se,
freytag(a)poll.informatik.hu-berlin.de, fric.pavol(a)ditec.sk,
friedrich(a)ifit.uni-klu.ac.at, friedrich(a)informatik.uni-bremen.de,
frivolt(a)fiit.stuba.sk, fsf(a)is.pku.edu.cn, fstephan(a)comp.nus.edu.sg,
fstomp(a)cs.wayne.edu, ft(a)ecs.soton.ac.uk, ftoumani(a)isima.fr,
fukatani(a)tt.cs.titech.ac.jp, fukushige.yoshio(a)jp.panasonic.com,
fukuta(a)cs.inf.shizuoka.ac.jp, fumihiro(a)sfc.keio.ac.jp,
g.simmons(a)ballarat.edu.au, g.soldar(a)brighton.ac.uk, gabo(a)ifi.savba.sk,
gabriel.semanisin(a)upjs.sk, gabriel(a)iit.tuiasi.ro,
Gabriela.Andrejkova(a)upjs.sk, gaibisso(a)iasi.rm.cnr.it,
galambos(a)ksi.ms.mff.cuni.cz, galba(a)valm.sk, galbavy(a)fiit.stuba.sk,
gasevic(a)yahoo.com, gaspari(a)cs.unibo.it, gcc(a)sys.uea.ac.uk,
gcvd(a)rau.ac.za, gdusserr(a)ensm-ales.fr, geffert(a)upjs.sk,
gehrmann(a)yhc.att.ne.jp, geist(a)iti.cs.uni-magdeburg.de,
gemma.bel(a)urv.net, geo(a)cuni.cz, georges(a)gardarin.org, georgev(a)aegean.gr,
gerald.schimak(a)arcs.ac.at, gerard(a)cs.uu.nl,
gerber(a)informatik.uni-leipzig.de, gerlee(a)maths.dundee.ac.uk,
ggoos(a)ipd.uni-karlsruhe.de, ggrimnes(a)csd.abdn.ac.uk, gil(a)isi.edu,
gimbel(a)ira.uka.de, gina(a)facom.ufu.br, Gines.Moreno(a)uclm.es,
giovanni(a)research.telcordia.com, girts.folkmanis(a)latnet.lv,
giuseppe.nunnari(a)dees.unict.it, gkollios(a)cs.bu.edu,
glorenne(a)insa-rennes.fr, gmoreno(a)info-ab.uclm.es, godo(a)iiia.csic.es,
goedicke(a)informatik.uni-essen.de, goerdt(a)informatik.tu-chemnitz.de,
goerke(a)informatik.uni-karlsruhe.de, goerz(a)informatik.uni-erlangen.de,
gogolla(a)informatik.uni-bremen.de, goldberg(a)microsoft.com,
golshani(a)asu.edu, golze(a)eis.cs.tu-bs.de, gomi(a)aai.ca,
gordan.jezic(a)fer.hr, gorecki(a)uksw.edu.pl,
gorny(a)informatik.uni-oldenburg.de, goto.j-fw(a)nhk.or.jp,
gottlob(a)dbai.tuwien.ac.at, gotzhein(a)informatik.uni-kl.de,
graf(a)inf.fu-berlin.de, grazyna(a)ii.uni.wroc.pl,
gri(a)informatik.uni-rostock.de, grigat(a)tu-harburg.de,
grilli(a)diei.unipg.it, grit.denker(a)sri.com, grjinh(a)korea.ac.kr,
gruhn(a)udo.informatik.uni-dortmund.de, gruska(a)danka.ii.fmph.uniba.sk,
gruska(a)fi.muni.cz, gtonti(a)deis.unibo.it, gtsek(a)orfeas.chemeng.ntua.gr,
gudukbay(a)cs.bilkent.edu.tr, guenter.rudolph(a)udo.edu,
guerra.francesco(a)unimo.it, guido(a)itee.uq.edu.au,
gumm(a)informatik.uni-marburg.de, gunter.schlageter(a)fernuni-hagen.de,
guo(a)informatik.uni-tuebingen.de, guo(a)minet.uni-jena.de,
gupta(a)utdallas.edu, gursky(a)upjs.sk, guru(a)lsrc.chonnam.ac.kr,
gusnard(a)npg.wustl.edu, gustaf.neumann(a)wu-wien.ac.at,
guy.bernard(a)int-evry.fr, guy(a)utia.cas.cz, gwy(a)hz.cn
Apologies if you receive multiple copies. Please, forward to your
colleagues.
------------------------------------------------------------------------
C A L L F O R P A R T I C I P A T I O N 2
------------------------------------------------------------------------
SOCIAL NETWORKS AND APPLICATION TOOLS (SoNet-08)
International Workshop
September 19-21, 2008, Skalica, Slovakia
http://sonet.webnode.cz/international-workshop-2008/http://sonet.webnode.cz/international-workshop-2008/more-information/http://www.sevs.sk/files/veda_vyskum/konferencie/2008/sonet_workshop.pdf
------------------------------------------------------------------------
Dear Colleagues,
The University of Central Europe and its SoNet Research Center, Skalica,
Slovakia (European Union), would like to invite you to a special
International
Workshop "Social Networks and Application Tools" devoted to practically
oriented lectures about applications of modern informatics methods and
software
tools to the very actual and multidisciplinary area "Social Networks".
1. GENERAL INFORMATION
======================
- DATE and PLACE: September 19-21, 2008, Skalica, Slovakia (EU)
(the University of Central Europe and its SoNet International Research
Center).
- REGISTRATION: <http://sonet.webnode.cz/registration-workshop/> or
<SoNet.RC(a)gmail.com <mailto:SoNet.RC@gmail.com>>.
- ACCOMMODATION: Via the registration form, the workshop organizers can book
a hotel room. Skalica is a small town with a limited number of hotels,
so the
interested people should register very quickly and explicitly express their
need to book a hotel room. Participants pay their own accommodation and
traveling.
- LANGUAGE: English.
*** IMPORTANT: no workshop fee for all registered participants.
*** INTERESTING: Skalica Days - an attractive Festival celebrating the town
promotion among Free Royal Towns in 1372, by Lewis I, king of Hungary:
<http://www.skalickedni.sk/>,
<http://www.skalica.sk/index.php?lang=en>,
<http://www.skalica.sk/mesto/historia.en.php>.
2. MAIN TOPICS
==============
* Computer Technologies of IBM
* Urban and Regional Problems
* Medical Applications
* Data Mining
* Natural Language Processing
3. CONTENTS
===========
Social networks are structures made of individuals or organizations tied
by specific types of interdependency. The real-world structures are usually
very complex, containing hidden, inapparent information and knowledge
waiting
for being revealed.
The workshop will provide lectures, survey presentations, research
results, and
practical demonstrations of software tools by prominent scientific and
research
experts as well as Ph.D. students from various social areas and leading
research
and educational institutions. The lectures will be available in the workshop
proceedings. Among our invited lecturers, there are experts from the Czech
Republic, Ireland, Israel, Italy, Mexico, Russia, Spain, and the United
Kingdom.
The workshop includes lectures and tutorials by leading developers from
the IBM Dublin Center for Advanced Studies.
The workshop topics cover areas interesting for scientists, students,
industrialists, businessmen, computer linguists, security-area specialists,
environmentalists, culture workers, people solving urban and regional
problems,
health care experts, and all researchers and executives in the area of
complex
relations among various entities.
4. CONTACTS and REFERENCES
==========================
Please, send your questions to <SoNet.RC(a)gmail.com
<mailto:SoNet.RC@gmail.com>>
Please, find the list of lecturers and their topics on the poster available
at these URLs:
<http://sonet.webnode.cz>, <http://www.sevs.sk>
About Skalica, see, please: <http://www.skalica.sk>
Skalica is located ca 80 km from Bratislava (Slovakia),
85 km from Brno (Czech Republic), 120 km from Vienna/Wien (Austria).
With the best regards,
Jan Zizka
(Program Committee Chair)
University of Central Europe
SoNet Research Center
Kralovska 386/11
909 01 Skalica
Slovakia (EU)
-------- Original-Nachricht --------
Betreff: Sicherheitsgerichtete Systeme – erfolgreich entwickeln, testen
und einsetzen
Datum: Tue, 9 Sep 2008 13:12:52 +0200 (CEST)
Von: gi-mitglieder-info(a)gi-ev.de
An: gustaf.neumann(a)wu-wien.ac.at
**************************************************************************
Sie erhalten die folgende E-Mail als Mitglied der Gesellschaft für
Informatik e.V. (GI), das der Zusendung von allgemeinen Informationen
zugestimmt hat. Die GI ist nicht verantwortlich für den Inhalt der E-Mail.
Wenn Sie in Zukunft keine allgemeinen Informationen mehr erhalten möchten,
können Sie dies im internen Mitgliederbereich unter "Meine Mitgliedschaft"
auf unserer Webseite http://www.gi-ev.de einstellen. Mehr Infos unter:
http://www.gi-ev.de/allgemein/impressum/
Bitte beachten Sie auch unsere Erklärungen zum Datenschutz unter
http://www.gi-ev.de/allgemein/datenschutzerklaerung/
***************************************************************************
Kongress Sicherheitsgerichtete Systeme 2008
Erfolgreich entwickeln, testen und einsetzen
20. - 22. Oktober 2008 in Stuttgart
Sicherheit und Zuverlässigkeit von Systemen nimmt einen immer höheren Stellenwert bereits bei der Entwicklung dieser Systeme ein. Hiermit wird eine gute Planung bzw. ein gutes Design und eine saubere Entwicklung immer wichtiger. Sicherheit im Nachhinein zu implementieren ist oft fast unmöglich oder nur unter sehr großem Aufwand realisierbar.
Auf unserem Kongress „Sicherheitsgerichtete Systeme“ erfahren Sie, wie Sie:
Architekturen für sicherheitsgerichtete Systeme entwickeln
Testszenarien für sicherheitsgerichtete Systeme aufsetzen
Wie Sie konsistente Safety Integrity Level (SIL) erreichen
Ein effektives Risikomanagement betreiben
Mit dem Thema Produkthaftung umgehen sollten
Profitieren Sie von Praxisberichten folgender Unternehmen:
Airbus, Endress+Hauser, Beckhoff Automation, Pepperl und Fuchs, Siemens, Honeywell, EADS und Siemens Healthcare.
Hochkarätige Fachbeiträge des Fraunhofer IESE, des TÜV Süd und der Uni Göttingen vervollständigen das Programm.
Weitere Informationen zum Kongress Sicherheitsgerichtete Systeme, Anmeldung und das aktuelle Programm unter www.sgs-kongress.de
-------- Original-Nachricht --------
Betreff: [isworld] CfP InSITE 2009 in Macon, Georiga (USA) June 12-15,
2009 Papers Due November Reviewers needed for December
Datum: Mon, 8 Sep 2008 14:54:47 -0700
Von: Eli Cohen <EliCohen(a)InformingScience.org>
Antwort an: Eli Cohen <EliCohen(a)InformingScience.org>
Organisation: Informing Science Institute
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
The International Conference InSITE 2009
(Informing Science& IT Education Conference)
held on the campus of
Macon State College, Macon, Georgia, USA
J u n e 12 - 15, 2 0 0 9
http://InSITE.nu
Submissions Due by *November 30, 2008*
hosted by Macon State
InSITE (Informing Science + IT Education) conference solicits papers in any
area that explores issues in effectively and efficiently informing clients
through IT (information technology) and papers on IT education.
Some of the areas that can be covered under the two proposed guidelines
are: Business Intelligence, Business Process Management, Communications,
Communicating Meaning, Community and Society, Computer Science, eCommerce,
Education, Government, Information Science, IT, Journalism, Justice and Law,
Mathematics, Philosophical Issues, Psychology, Sociology, Working Together.
It will be useful to review papers presented at previous conferences. They
can be found at http://proceedings.informingscience.org
Submission Deadline
November 30, 2008
Send questions to the organizers at: Organizer(a)InSITE.nu
Submission Instructions
The language of the conference is English. All papers will be double-blind
reviewed by six or more reviewers. At least one reviewer will be external to
the conference. All papers must be original, unpublished, and not currently
under review by any other publication or conference. By submitting the
manuscript for consideration, authors stipulate that they hold the copyright
to the manuscript and, upon acceptance, transfer it to the Informing Science
Institute. Authors also agree to assume all liability in case of copyright
dispute.
Highly rated papers will be fast-tracked for publication in an Informing
Science Institute journal. All other accepted papers will be published in
the conference proceedings.
Following are the specific requirements for each type of submission:
*Research Papers.* Research Papers should be submitted as complete papers
(8-25 pages). Include a description of the context of use, the clients
involved, the problem, and the proposed solution, if appropriate. Original
thinking is valued.
*Interactive Paper, Discussion Paper, and Practical Papers.* Shorter papers
(at least 8 pages) are also welcome. These let you share the ideas you have
developed to date and receive constructive feedback.
*Panel Discussions.* Include a detailed description of the topic and
identify four or more panelists who have agreed to attend the conference.
Format Instructions
1. See http://InSITE.nu/ for complete, detailed formatting details.
2. Strip from the submission the authors name(s), affiliations, and any
other information that identify the authors. This allows your manuscript to
be blind reviewed.
3. Manuscripts submissions are accepted only in RTF and Word .doc format via
the website http://submit.InSITE.nu
4. Each author may submit up to two papers as the only attending author.
5. For accepted paper to appear on the program and in print, at least one
author must pay the registration fee by March 15, 2009.
************** REVIEWERS NEEDED **************
Please volunteer your expertise as a paper reviewer for the Informing
Science + IT Education Conference.
Sign up at the following URL: http://volunteer.InSITE.nu
Thank you in advance for whatever assistance you can provide. Reviewers
receive a reduction in their conference registration fee.
Conference Chair: Alex Koohang
Local Affairs Director: Olivia Cook
Organizing Committee: Kevin Floyd, Liz Riley, Julie Santiago,
Richard Spiers, Terry Smith
Mentoring One Other: The Professionally Supportive Conference
InSITE 2009
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] CFP: Special issue of EJIS on Managing RFID Projects
in Organizations
Datum: Tue, 9 Sep 2008 11:06:43 +0800
Von: Teo Sian Hin, Thompson <bizteosh(a)nus.edu.sg>
Antwort an: Teo Sian Hin, Thompson <bizteosh(a)nus.edu.sg>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Call for Papers
European Journal of Information Systems (EJIS)
http://www.palgrave-journals.com/ejis/index.html
Special Issue on
Managing RFID Projects in Organizations
Radio frequency identification (RFID) allows automated
identification of products by embedding chips with wireless
antennas or objects and has been adopted in many application
areas ranging from inventory control in supply chain
management to customer relationship management in retailing.
The key advantage of RFID is that it leads to increased
visibility of items, pallets or people on the move and allows
for real time querying of the location of these entities. The increased data on movement of items has the potential to
enhance various activities related to organizational decision
making such as demand forecasting, shelf space management,
target marketing, prevention of stockouts, among others.
A new market research report from IDTechEx covering the
adoption and usage of RFID reveals some surprising new
trends. In 2005, 1.8 billion RFID tags were sold and it
is estimated that the market for RFID will increase to
$24.50 billion by 2015. Among RFID tags sold worldwide,
it is estimated that by 2010, 48% of the RFID tags will
be sold in East Asia, followed by 32% in North America
(IDTechEx, 2005). This optimistic report is in sharp
contrast to the finding that only 9% of retailers have
adopted RFID technologies and among them only 29% of
the retailers opened a RFID enabled pilot store by the
end of 2006 (Kilcourse, 2006). There is no denying that
in spite of the tremendous fanfare on RFID by the popular
press, organizations remain cautious and conservative
when it comes to the adoption of RFID technologies. Many
organizations set up pilot programs to test RFID
technology in their operations but withdraw later on due
to uncertainties related to return on investment or lack
of technical know-how.
The theme of the special issue will be to discover the
challenges faced by organizations in execution of RFID
projects. It will address every aspect of RFID project
management starting from requirements analysis, to
implementation, and maintenance. It will include papers
that examine either successful or unsuccessful RFID
projects and garner important lessons learnt from such
projects. This special issue will focus on advancing
research in RFID project management by publishing
forward-thinking, rigorous research that stimulates
future research in this area. The special issue will
encourage research that uses empirical, analytical,
or case study approaches and either strives to generate
insightful theoretical principles, provide validation
of existing theories in the context of management of
RFID projects, or compare and contrast RFID project
management with other enterprise system implementation
projects. Research from diverse academic disciplines
such as information systems, operations management,
computer science, operations research, marketing,
strategic management, and other related areas are
welcome for this special issue. We seek original
manuscripts that are previously unpublished and that
present an interdisciplinary approach in solving problems
related to the theme.
Topics of interest include, but are not limited to the
following:
Ć Protocols for RFID project management
Ć Requirements analysis for RFID projects
Ć Estimating return on investment for RFID projects
Ć Managing financial and human resources for RFID projects
Ć Automating RFID projects
Ć Knowledge management in RFID projects
Ć Evaluation of RFID projects
Ć Critical success/failure factors for RFID projects
Ć Outsourcing RFID projects
Ć Risk assessment for RFID projects
Ć Projects to integrate RFID technology with enterprise
systems
Ć Scheduling and time management in RFID projects
Ć Strategic and financial impacts of RFID projects
Ć Tradeoff analysis in RFID projects
Ć Benchmarking and standardizing RFID projects
Ć Addressing security and privacy in RFID projects
Ć Barriers and smart solutions for RFID project management
Ć Country and industry specific studies on RFID project
management
Guest editors for special issue:
Dr. Indranil Bose
The University of Hong Kong
bose(a)business.hku.hk
Dr. Eric Ngai
The Hong Kong Polytechnic University
mswtngai(a)inet.polyu.edu.hk
Dr Thompson S.H. Teo
National University of Singapore
bizteosh(a)nus.edu.sg
Dr. Sarah Spiekermann
Humboldt University
sspiek(a)wiwi.hu-berlin.de
Important dates:
1 November 2008: Due date for full paper submission for
special issue
1 December 2008: Outcome of initial screening sent to authors
1 March 2009: Outcome of first round review sent to
corresponding authors
1 May 2009: Due date for resubmission of paper with required
revisions
1 July 2009: Final decision
1 August 2009: Due date for authors to submit final version
of paper
End 2009: Target publication date of special issue
Submission instructions:
Please submit original manuscripts which observe the
EJIS published style preferences:
http://www.palgrave-journals.com/ejis/author_instructions.html
Contact the special issue editors for further submission instructions.
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: bizteosh(a)nus.edu.sg. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] ENASE 2009 Call for Papers (Milan/Italy, May 2009)
Datum: Sat, 6 Sep 2008 06:52:59 -0400
Von: Leszek A. Maciaszek <leszek(a)ics.mq.edu.au>
Antwort an: Leszek A. Maciaszek <leszek(a)ics.mq.edu.au>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
ENASE 2009 (6-10 May 2009, Milan, Italy)
4th International Conference on Evaluation of Novel Approaches to Software
Engineering
http://www.enase.org/
IMPORTANT DATES
Paper Submissions: November 28, 2008
Acceptance Notifications: January 26, 2009
Final Submissions and Registrations: February 9, 2009
The Conference Dates: May 6 - 10, 2009
MISSION AND MOTIVATION
The mission of the ENASE (Evaluation of Novel Approaches to Software
Engineering) conferences is to be a prime international forum to discuss
and publish research findings and IT industry experiences with relation to
evaluation of novel approaches to software engineering. By comparing novel
approaches with established traditional practices and by evaluating them
against software quality criteria, ENASE conferences advance knowledge and
research in software engineering, identify most hopeful trends and propose
new directions for consideration by researchers and practitioners involved
in large-scale software development and integration.
An innovative idea and important highlight of all ENASE conferences is the
Advocatus Diaboli Forum (ADF). The main agenda for ADF-s is defined as to
adversarially assess claims to novelty and utility for selected software
engineering approaches. For ADF at ENASE 2009 the SE approach on trial is
SOA (Service-Oriented Architecture).
PUBLICATION
All ENASE full, poster and demo papers will be published in time for the
conference in the proceedings, produced by INSTICC under an ISBN
reference, in paper and in CD-ROM form. After the conference, a book
containing all ENASE full papers (modified and extended) will be edited
and published as post-proceedings by Springer in the CCIS (Communications
in Computer and Information Science) series.
Kind regards
Leszek A. Maciaszek
ENASE 2009 Conference Co-Chair
http://www.comp.mq.edu.au/~leszek/
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] Call for Industry Papers - ICST 2009
Datum: Fri, 5 Sep 2008 10:26:46 +0100
Von: Jens Krinke <krinke(a)acm.org>
Antwort an: Jens Krinke <krinke(a)acm.org>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
CALL FOR INDUSTRY PAPERS
2nd IEEE International Conference on Software Testing,
Verification and Validation (ICST 2009)
April 1-4, 2009, Denver, Colorado
http://bitterroot.vancouver.wsu.edu/icst2009/calls.htm#part2
Submission of abstracts: 26 September, 2008
Submission of full papers: 3 October, 2008
ICST welcomes papers and experience reports from software
development and testing practitioners. We are looking for
papers that crisply address practical software testing and
quality improvement, presenting empirical results or
reporting on open problems. All industrial papers should
discuss broader implications and usage of the specific topic.
There are two paper formats: full length -- ten pages, and
short -- four pages. Full length papers should present a
significant experience report about industrial software testing,
verification, or validation. Papers with metrics that quantify
effects on time, cost, and quality are preferred. Short papers
should present a clear description of a problem, and either a
brief discussion of a solution, or an analysis of why existing
approaches do not work. All contributions will receive a full
program committee peer review. Accepted and presented
contributions will be part of the published conference
proceedings. The evaluation criteria for industry papers is based
less on the originality of the technical contribution, and more
on its relevance for practice, empirical results, and
implications for research.
The IEEE International Conference on Software Testing
Verification and Validation (ICST) is the premier conference
in all areas related to software quality and the success of
the first edition in 2008 demonstrated the growth of the
field: 214 submitted papers, 52 full length papers, and over
200 attendees.
The second edition will build on the success of ICST 2008
and leverage the many exciting advances in software testing
to create dynamic exchanges of new ideas and industrial
applications. The theme of ICST 2009 is comprehensive
testing, which means that we view testing in a holistic way
and encourage contributions on all facets of testing:
Topics
* Developer unit testing
* Integration testing
* End-to-end testing
* Validation and verification
* System testing
* Regression testing
* Model-based testing
* Usability testing
* Security testing
* Quality assurance
* Inspections
Techniques
* Test data generation
* Test oracles (new)
* Metrics
* Testing theory
* Empirical studies
Systems
* Embedded and real-time software
* Concurrent software
* Web applications
General Chair: Anneliese Andrews (andrews(a)cs.du.edu)
Program Chairs: Jeff Offutt (offutt(a)gmu.edu)
Per Runeson (per.runeson(a)cs.lth.se)
Workshop Chairs: Mark Harman (Mark.Harman(a)kcl.ac.uk)
Zheng Li (Zheng.Li(a)kcl.ac.uk)
Matthew Rutherford (mjr(a)cs.du.edu)
Industry Chair: Wolfgang Grieskamp
Important dates:
Submission of workshop proposals: 5 September, 2008
Submission of abstracts: 26 September, 2008
Submission of full papers: 3 October, 2008
Notification: 19 December, 2008
Camera-ready: 16 January, 2009
Dates of Conference: April 1 - April 4, 2009
For ICST 2009 submission guidelines and all additional up
to date information, please visit
http://bitterroot.vancouver.wsu.edu/icst2009/
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] CFP: The ADFSL 2009 Digital Forensics Conference
Datum: Fri, 5 Sep 2008 04:31:44 -0400
Von: Glenn Dardick <gdardick(a)dardick.net>
Antwort an: Glenn Dardick <gdardick(a)dardick.net>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
=======================================================================
ADFSL 2009 Conference on Digital Forensics, Security and Law
Venue: Champlain College, Burlington, Vermont, USA
Dates: 20-22 May 2009
Conference Website: http://www.digitalforensics-conference.org
=======================================================================
Dear colleagues:
The ADFSL 2009 Conference on Digital Forensics, Security and Law will be
hosted by Champlain College in Burlington, VT USA on 20-22 May 2009. The
conference committee is calling for papers and proposals in, or related
to, the following areas:
CURRICULUM
1) Digital forensics curriculum
2) Cyber law curriculum
3) Information assurance curriculum
4) Accounting digital forensics curriculum
TEACHING METHODS
5) Digital forensics teaching methods
6) Cyber law teaching methods
7) Information assurance teaching methods
8) Accounting digital forensics teaching methods
CASES
9) Digital forensics case studies
10) Cyber law case studies
11) Information assurance case studies
12) Accounting digital forensics case studies
INFORMATION TECHNOLOGY
13) Digital forensics and information technology
14) Cyber law and information technology
15) Information assurance and information technology
16) Accounting digital forensics information technology
NETWORKS AND THE INTERNET
17) Digital forensics and the Internet
18) Cyber law and the Internet
19) Information assurance and Internet
20) Digital forensics accounting and the Internet
ANTI-FORENSICS AND COUNTER ANTI-FORENSICS
21) Stegonography
22) Stylometrics and Author Attribution
23) Anonymity and Proxies
24) Encryption and Decryption
INTERNATIONAL ISSUES
25) International issues in digital forensics
26) International issues in cyber law
27) International issues in information assurance
28) International issues in accounting digital forensics
THEORY
29) Theory development in digital forensics
30) Theory development in information security
31) Methodologies for digital forensic research
32) Analysis techniques for digital forensic and security research
The deadline for submissions is midnight EST, 20 February 2009.
Submission Types
Short briefing papers: Such papers need not be extensive. A technology
or a management briefing on an aspect of digital forensics, information
assurance, and/or cyber law would be enough. Such papers will be
presented by the author in a round table discussion format at the
conference. Typical length would be around 1500-2000 words.
Research papers: Such papers need to be extensive. Usually a research
question or an argument is posed and subsequently conducted. Empirical
work (quantitative or qualitative) would be necessary. Research papers
will be presented by the authors in a regular conference session.
Typical length would be around 5000-6000 words. All research papers will
be considered for publication in the Journal of Digital Forensics,
Security and Law (JDFSL).
Case Studies: Case studies are typically descriptions of a given digital
forensics situation. Names of organizations/actors can be kept anonymous
to maintain confidentiality. Case studies will be presented by the
authors at the conference. Typical length would be around 5000-6000
words. All case studies will be considered for publication in the
Journal of Digital Forensics, Security and Law (JDFSL).
Panels: Panels and workshop proposals are welcome. These would typically
be around 1000 words long and cover a current technology or a
controversial issue.
The primary audience will include individuals who are interested in
developing curriculum and teaching methods as well as conducting
research related to the areas of digital forensics, security and law.
This conference will be of value to both academic and practitioner
audiences.
All submissions are double blind peer reviewed.
ADDITIONAL INFORMATION FOR THE CONFERENCE CAN BE FOUND AT:
http://www.digitalforensics-conference.org
REGISTRATION INFORMATION WILL BE POSTED AT:
http://www.digitalforensics-conference.org/registration.htm
The Program Committee Chair is Dr. Linda Volonino
(volonino(a)canisius.edu).
The Chair of the conference is Gary C. Kessler
(gary.kessler(a)champlain.edu).
Association for Digital Forensics, Security and Law
Website: http://www.adfsl.org
Journal of Digital Forensics, Security and Law
Website: http://www.jdfsl.org
========================================================================
==
Gary C. Kessler, Ed.S., CCE, CISSP
Associate Professor, Computer & Digital Forensics
Coordinator, Information Assurance Education & Research
Director, Champlain College Center for Digital Investigation
Champlain College
gary.kessler(a)champlain.edu
West Hall, Room 107 +1 802-865-6460
(office)
163 South Willard Street +1 802-238-8913
(mobile)
Burlington, VT 05401 gary.c.kessler
(Skype)
http://c3di.champlain.eduhttp://digitalforensics.champlain.edu
PGP Public Key:
http://digitalforensics.champlain.edu/gck/GaryKessler.asc
Information Security Project Director, Vermont Information Technology
Center
Adjunct Associate Professor, Edith Cowan University, Australia
========================================================================
==
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] Reminder Call for Papers: JITCAR Special Issue on
Technology-Enabled Social Networks
Datum: Fri, 5 Sep 2008 11:18:35 -0400
Von: Salvatore Parise <sparise(a)babson.edu>
Antwort an: Salvatore Parise <sparise(a)babson.edu>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Technology-Enabled Social Networks
Special Issue Announcement for Journal of Information Technology Case and
Application Research (JITCAR)
Submission deadline: October 1, 2008
Please contact the special issue editor Salvatore Parise,
sparise(a)babson.edu, with any questions.
Social networks are typically defined as the people-to-people connections
in organizations that depict the information flows used to get work
accomplished. Researchers in many fields including management and
information systems have increasingly used social network analysis as a
methodology to understand both the structure of the network as well as
people�s positions in the network. This analysis has been very helpful in
identifying and understanding silos due to geographic, organizational, and
cultural barriers, as well as the performance implications of employees in
various positions in the network, such as central, peripheral, and broker
positions.
Increasingly, social collaboration IT tools, commonly known as Web 2.0,
are being used by organizations to connect employees. A major benefit
from using collaborative IT tools, such as blogs, wikis, on-line
communities, and user tagging systems, is that it provides employees with
access to knowledge � through connections to both people and documents -
that they can then use in their individual work as well as on group
projects. There is evidence that these tools are increasingly being used
to build social connections, collaboration, affinity, and
friendships/relationships among employees.
In this JITCAR special issue
(http://faculty.babson.edu/gordon/jitcar/index.htm), we are looking to
explore the research question: What impacts are these social
collaboration IT tools having on the social network and ultimately
business results? We are interested in case and application research
articles that focus on (but are not limited to):
� The relationships between IT networks, social networks, and performance
impacts
� Qualitative and quantitative evidence of how these social IT tools are
impacting employee and group collaboration and affinity
� Case studies that describe IT networks and its impacts on innovation,
decision-making, and talent management
� The impacts that these IT networks are having on knowledge management,
including the awareness, creation, and exploitation of employee expertise
� A description of the types of social collaboration IT tools and
important design features that enable social networks
� Theoretical and methodological contributions related to understanding IT
networks, including defining meaningful constructs and ways of measuring
IT network structure and people�s positions in the IT network
This special issue on social IT networks is planned to be published in the
second quarter 2009 edition of JITCAR. The timetable for submitting
manuscripts for this special issue is as follows:
Submission deadline: October 1, 2008
Author notification: January 15, 2009
Final Revisions due: April 15, 2009
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.