-------- Original-Nachricht --------
Betreff: Informatics in Algarve (cfp): submit until 27 April
Datum: Thu, 2 Apr 2009 23:18:03 +0200 (SAST)
Von: Ana Sofia <ana.sofia(a)informatics-conf.org>
An: neumann(a)wu-wien.ac.at
Apologies for cross-postings. Please send to interested colleagues and
students
-- CALL FOR PAPERS - Deadline for submissions (2nd call): 27 April 2009 --
*IADIS INTERNATIONAL CONFERENCE INFORMATICS 2009*
Algarve, Portugal, 17 to 19 June 2009
(http://www.informatics-conf.org/
<http://images.images11.com/sendlink.asp?HitID=1238706845262&StID=1351&SID=0…>)
part of the IADIS Multi Conference on Computer Science and Information
Systems (MCCSIS 2009)
Algarve, Portugal, 17 to 23 June 2009
(http://www.mccsis.org/
<http://images.images11.com/sendlink.asp?HitID=1238706845262&StID=1351&SID=0…>)
** Keynote Speakers (confirmed):*
Gary Hayes, Director of Laboratory for Advanced Media Production (LAMP)
and Head of Virtual Worlds, Australia
Claude C. Chibelushi, Faculty of Computing, Engineering & Technology,
Staffordshire University, UK
** Conference background and goals*
The IADIS Informatics 2009 shall host fundamental topics on Informatics.
In addition, its scope is not just limited to fundamental theory, but it
should also cover the impact of Informatics on society and human life,
and it shall furthermore complement theory foundations with technical
considerations and practice.
** Format of the Conference*
The conference will comprise of invited talks and oral presentations.
The proceedings of the conference will be published in the form of a
book and CD-ROM with ISBN, and will be available also in the IADIS
Digital Library (accessible on-line).
** Best Papers
*Selected authors of best papers will be invited to submit extended
versions of their papers to selected journals (i.e. IADIS International
Journal on Computer Science and Information Systems - ISSN: 1646-3692)
including journals from INDERSCIENCE Publishers.
** Types of submissions
*Full and Short Papers, Reflection Papers, Posters/Demonstrations,
Tutorials, Panels and Doctoral Consortium.
All submissions are subject to a blind refereeing process.
** Topics related to Informatics are of interest.* These include, but
are not limited to the following areas:
- Theory Foundations (Main area)
- Algorithms
- Architectures
- Artificial intelligence
- Compilers
- Complex systems
- Data modeling
- Expert systems
- Graph theory
- Hybrid methods
- Interfaces
- Interpreters
- Natural language processing
- Numerical computation
- Object orientation
- Ontologies
- Programming languages
- Programming techniques
- Scientific computing
- Service-oriented architecture
- Theorems
- Human Respect (Main area)
- Accessibility
- Application design
- Bio-signal processing
- Computing for handicapped
- Computer science in practice Education and Informatics
- Ethics
- Freedom of information
- Geographic information
- Information retrieval
- Medical applications
- Multimedia
- Privacy
- Public digital libraries
- Public science archives
- Quality-of-service
- Security
- Ubiquitous tools
- Visualization
- Virtual reality
- Technical Aspects (Main area)
- Adaptive systems
- Computer aided design
- Computer aided manufacturing
- Computing practices
- Development processes
- Distribution processes
- Distributed systems
- Embedded systems
- Grid computing
- Industrial applications
- Interoperability
- Marketing
- Networking
- Parallel systems
- Performance issues
- Simulation
- Software development
- Software engineering
- System integration
- UML
** Important Dates:*
- Submission Deadline (2nd call): 27 April 2009
- Notification to Authors (2nd call): 15 May 2009
- Final Camera-Ready Submission and Early Registration (2nd call): Until
25 May 2009
- Late Registration (2nd call): After 25 May 2009
- Conference: Algarve, Portugal, 17 to 19 June 2009
** Conference Location*
The conference will be held in Algarve, Portugal.
** Secretariat
*IADIS Secretariat - IADIS INTERNATIONAL CONFERENCE INFORMATICS 2009
Rua Sao Sebastiao da Pedreira, 100, 3
1050-209 Lisbon, Portugal
E-mail: secretariat(a)informatics-conf.org
<mailto:secretariat@informatics-conf.org>
Web site: http://www.informatics-conf.org/
<http://images.images11.com/sendlink.asp?HitID=1238706845262&StID=1351&SID=0…>
** Program Committee
*Informatics 2009 Conference Program Chair
Hans Weghorn, BA-University of Cooperative Education, Germany
General MCCSIS Conference Co-Chairs:
Piet Kommers, University of Twente, The Netherlands
Pedro Isaías, Universidade Aberta (Portuguese Open University), Portugal
Nian-Shing Chen, National Sun Yat-sen University, Taiwan
*Committee Members:* *
* for committee list please refer to
http://www.informatics-conf.org/committees.asp
<http://images.images11.com/sendlink.asp?HitID=1238706845262&StID=1351&SID=0…>
powered by <http://images.images11.com/home/r.asp> subscribe
<http://images.images11.com/RWCode/subscribe.asp?SiteID=1351&SID=0&HitID=123…>
forward
<http://images.images11.com/forward.asp?SiteID=1351&SID=0&EmailID=1033291&Hi…>
unsubscribe
<http://images.images11.com/RWCode/subscribe.asp?SiteID=1351&SID=0&Email=neu…>
This mailing system may only be used for sending permission based email.
If you did not give permission to receive emails from this sender,
please notify us
<http://images.images11.com/reportabuse.aspx?stid=1351&hitid=1238706845262&s…>.
This email was sent to neumann(a)wu-wien.ac.at by
ana.sofia(a)informatics-conf.org | Print / PDF version
<http://images.images11.com/ExportNewsletterToPdf.aspx?SD=1351&SID=0&ND=3905…>
| Read our Privacy Policy
<http://images.images11.com/privacy.asp?stid=1351&hitid=1238706845262&sec=39…>.
-------- Original-Nachricht --------
Betreff: [isworld] CFP: International Journal of Grid Computing and
Multi Agent Systems
Datum: Thu, 2 Apr 2009 15:08:43 -0500
Von: Yasser Hachaichi <yasserhfr(a)gmail.com>
Antwort an: Yasser Hachaichi <yasserhfr(a)gmail.com>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Call for Papers
=======================================================================
International Journal of Grid Computing and Multi Agent Systems (GCMAS)
http://www.serialspublications.com/journals1.asp?jid=269&jtype=1
==============================================================================
The International Journal of Grid Computing and Multi Agent Systems
(IJGCMAS)
aims to provide a high quality forum for academicians, researchers and
engineers working
in the general field of distributed computing and applications with a
particular focus
on Distributed Processing, Grid Computing, Multi Agents Systems and Web
Services.
The journal publishes bi-annually peer reviewed research papers and
technical papers
of sound high quality.
It features original research papers, comprehensive and sound surveys
on the state-of-the-art and describing implementations of general
interest,
or applications and field works.
-------------------
Coverage
-------------------
Topics of interest to the journal include, but are not limited to:
o Grid and Multi Agent Systems (MAS) Integration Paradigms and Solutions
o Grid and MAS Development Languages and Frameworks
o Data grid management systems
o Grid Computing and MAS Based Web services
o Grid systems Software integration technologies
o Software engineering support for grid computing
o Grid monitoring, management and organization
o Integrated Development environment for grid computing
o Grid and MAS Security
o Grid objects metadata and schema
o Grid survivability
o Wireless enhanced grid systems
o Interconnects and protocols for the Grid
o Parallel and Distributed Computing on the Grid.
o Case studies of Grid, MAS and web service development and deployment
o Parallel and Distributed Processing Based on MAS Paradigms
o Web services and web security in grid computing
o Development and modelling frameworks for web services
o Service mediation systems and architectures
o Web services based E-Commerce applications
o Communication and Multimedia applications using web services
o Multimedia communications, systems, and applications on the Grid
o Internet-based computing models for the creation and management of
virtual enterprises
o Resource management, discovery, reservation, scheduling, and load
balancing on the Grid
o Performance evaluation and modelling of Grid applications and Systems
o Service oriented architectures design and applications
GCMAS is seeking papers, describing either original research contribution,
advancing the state of the art,
or providing critical reviews of published research results in the
recommended topics.
Only original unpublished research work will be considered. Authors should
follow the prescribed format of paper submission.
-----------------------------------
Manuscript Submission
-----------------------------------
All submissions must be done through the web site:
http://www.serialspublications.com/journals1.asp?jid=165&jtype=1
-----------------------------------
Editorial Board
---------------------
Maher Khemakhem,MIR@ACL, University of Sfax, Tunisia
Abdelfattah belghith, CRISTAL, University of Manouba
Adel Mnaouer, University of Trinidad and Tobago
Asma Aimeur, Montreal University, Canada
Mohamed Mosbah, LARBI, University of Bordeaux 1, France
Khalil Drira, LASS, University of toulouse, France
Clement jonquet,Stanford University, USA
Mohamed Jmaiel, REDCAD, University of Sfax, Tunisia
Abdelmajid Ben Hamadou, MIR@ACL, University of Sfax, Tunisia
Bechir El Ayeb, University of Sousse, Tunsia
Habib Youssef, University of Sousse, Tunsia
Rafik Braham, University of Sousse, Tunsia
Abdel-Elah Al-Ayyoub,Arab Open University, Saudi Arabia
Piero Castoldi, CNIT National Laboratory of Photonic Networks, Italy
Jean Paul Arcangeli, IRIT, University of Toulouse, France
Faiez Gargouri, MIR@ACL, University of Sfax, Tunisia
Hanene Ben Abdallah, MIR@ACL, University of Sfax, Tunisia
Ahmed Haj Kacem, REDCAD,University of Sfax, Tunisia
Rafik Bouaziz, MIR@ACL, University of Sfax, Tunisia
Mohamed Jemni, UTIC, University of Manouba
Stefano Cerri, LIRMM, University of Montpellier2, France
Jacques Fayolle, TELECOM Saint-Etienne, France.
---------------------------------------------------------
All inquiries should be directed to:
Dr. Maher Khemakhem
maher.khemakhem(a)fsegs.rnu.tn
or
Prof. Abdelfettah BELGHITH
abdelfattah.belghith(a)ensi.rnu.tn
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] Call for Contributions -- Modelling Social Trust
Workshop --Extension to 4/15
Datum: Thu, 2 Apr 2009 12:00:14 -0500
Von: Harrison McKnight <mcknight(a)bus.msu.edu>
Antwort an: Harrison McKnight <mcknight(a)bus.msu.edu>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Call For Papers/Expressions of Interest
The study of trust as a social phenomenon is both ancient and broad.
Recently, the introduction of computational systems and formal models to
the study has opened new ideas and tools to our methodologies and
understanding of the concept. As well, trust has become a tool in social
networking systems, e-Commerce, gaming platforms, and other technological
systems to help people using these systems to better ascertain the
potential future behaviors of those with whom they propose to work or
play. More often than not, these systems base their work on assumptions
that are central to our understanding, or otherwise, of the workings of
trust. This leads directly to questions at the heart of the social
sciences. These include:
Can we use trust as a tool for ascertaining reputation?
Can trust be formally modeled?
Can artificial systems ever be expected to �understand� and �use� trust?
Can formal models of �artificial� trust help in our understanding of
�human� trust?
What are the links between trust online and trust within human
relationships?
The area we call �Social Trust� embodies these questions and strives for
answers that marry our understanding of human trust with the artificial.
There is wide-reaching research ongoing that attempts to answer these
questions and more in both the social and the technical sciences.
The SocialTrust workshop, to be held at IFIPTM 2009, will bring together
these researchers in a stimulating environment, with productive and
challenging discussion, allied to a vibrant international conference that
uses trust and trust management as the very basis of formal and
implementable tools in fields as diverse as reputation, security, and
privacy.
The aim of the workshop is to bring social scientists, lawyers, management
scientists, and computational trust researchers together in one room to
address these and other questions. The outcome will be an immediate
presentation in the conference proper, work toward a journal article, and
a proposal, with further work, for an edited volume dedicated to the idea
of Social Trust as a Computational phenomenon. A dedicated wiki site
(http://socialtrust.wikidot.com) has been set up to help disseminate ideas
and grow the area. Finally, it is the intention of the workshop organizers
to bring the workshop into the main conference as a track in 2010.
Submissions are expected to be short papers or position statements (no
more than 6 pages in length) outlining one of the following and relating
it to the links between human and computational trust:
A piece of original work in progress
A significant insight into the link between social and computational trust
Ideas for experimentation and exploration
(For students) a proposal, for example a tentative or actual thesis
proposal
A position statement
We are particularly interested in obtaining a mix of expertise and ideas,
so will welcome submissions from students and experts in the fields. As
well, this workshop is dedicated to work in progress or proposed. Work in
its final stages should be submitted to the conference proper, which is
the proper venue for such.
The organizers will examine all submissions with the goal of producing a
workshop that accurately reflects the state of the art in Social Trust,
and will sufficiently challenge both workshop attendees and attendees at
the following IFIPTM conference which hosts the workshop.
Dates:
Submission of position statements, papers: April 15, 2009
Notification of acceptance: May 1st, 2009
Workshop: June 15th, 2009, Purdue University, USA
Selection Criteria
We will be selecting people based on their submissions. Submissions are
expected to be short papers (no more than 6 pages in length) outlining one
of the following and relating it to the context of the workshop, in
particular links between social and computational trust:
A piece of original work or work in progress
A significant insight into the link between social and computational trust
Ideas for experimentation and exploration
(For students) a proposal, for example a tentative or actual thesis
proposal
We are particularly interested in obtaining a mix of expertise and ideas,
so will welcome submissions from students and experts in the fields.
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
--
Univ.Prof. Dr. Gustaf Neumann
Institut of Information Systems and New Media
WU Vienna
Augasse 2-6, A-1090 Vienna, AUSTRIA
-------- Original-Nachricht --------
Betreff: [isworld] CFP: Exploiting Strutured Information on the Web
(ESIW 2009; deadline: 1 May)
Datum: Thu, 2 Apr 2009 13:56:16 +0200
Von: Dominik Flejter <d.flejter(a)kie.ae.poznan.pl>
Antwort an: Dominik Flejter <d.flejter(a)kie.ae.poznan.pl>
Organisation: Poznan University of Economics, Dept. Inf. Sys.,
Integror.Net
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
=======================================================================
CALL FOR PAPERS
=======================================================================
Workshop on Exploiting Structured Information on the Web (ESIW 2009)
in conjunction with
10th International Conference on Web Information Systems
Engineering (WISE 2009)
Poznań, Poland
October 5-7, 2009
http://integror.net/esiw2009/
=======================================================================
Submission deadline: May 1, 2009
=======================================================================
In recent years we observe growing availability of structured
information on the Web. While significant part of it is in a human
readable form, not adapted for automated processing (HTML, AJAX,
Flash, Deep Web, Web applications), more machine-processable
information enters the Web thanks to complementary top-down and
bottom-up tendencies.
Bottom-up tendencies are related to publication of structured
information in a machine-processable form (e.g. in XML, RDF, JSON). It
also covers annotation of unstructured content with meta-data (e.g.
microformats, RDFa, SIOC, MPEG-7). Top-down approaches are related to
algorithmically structuring unstructured information. They combine
different methods of Web mining, information extraction,
classification, categorization, automated linking and named entities
recognition. Moreover, phenomena combining these tendencies, such as
social annotation of resources, are widely present in today’s Web.
More structured information on the Web enables information integration
using shared vocabularies (linked data approach), data mashups
(domain-specific integration), and automated algorithmic information
integration (schemas matching, dataspaces, lexical techniques). In
parallel, popularization of mashup, data monitoring and social data
sharing techniques, enable easier information reuse and growing number
of intelligent services combing various dynamic information sources,
algorithms and explicit or implicit users input.
The ESIW 2009 workshop will adopt a multi-disciplinary approach to
current tendencies in exploiting structured information on the Web.
The workshop will provide an informal and vibrant forum for
researchers and industry practitioners to share their research results
and practical development experiences.
WORKSHOP TOPICS
The topics of the workshop will include, but will not be limited to:
* Federated and inter-organizational Web applications
* Models and query languages for Web data
* Hidden Web resource discovery, retrieval and integration
* Warehousing Web data
* Provenance of Web data
* Web wrappers
* Information extraction
* Managing uncertainty in Web-based data
* Methods for integrating and federating (Data) Web data
* Novel applications that exploit structured data sources on the Web
* Data integration and data cleaning
* Lessons learned from application of Microformats, JSON, RESTful
services
* Innovative approaches to data mashups
* Structured information flows on the Web and Web-based information
ecosystems
* Linked data
* Reasoning with incompletely specified structures
* Multimedia metadata / annotation schemes and methods
* Mining users and organizations profile from Web data
PUBLICATION
The proceedings of WISE 2009 workshops will be published by Springer
in its Lecture Notes in Computer Science series. Paper length is 8
pages.
For formatting guidelines and submission instructions please consult
the Paper Submission page:
http://wise2009.ue.poznan.pl/paper_submission.php
IMPORTANT DATES
* Paper Submission May 1, 2009
* Author Notification June 15, 2009
* Camera-ready Papers June 28, 2009
* Author registration June 28, 2009
* Workshop October 5-7, 2009
WORKSHOP ORGANIZERS
* Dominik Flejter, Department of Information Systems, Poznan
University of Economics, Poland
* Tomasz Kaczmarek, Department of Information Systems, Poznan
University of Economics, Poland
* Marek Kowalkiewicz, SAP Research Brisbane, Australia
--
Dominik Flejter < http://dominik.flejter.net/ >
Poznan University of Economics
Department of Information Systems < http://www.kie.ae.poznan.pl/ >
Integror group < http://integror.net/ >
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
--
Univ.Prof. Dr. Gustaf Neumann
Institut of Information Systems and New Media
WU Vienna
Augasse 2-6, A-1090 Vienna, AUSTRIA
-------- Original-Nachricht --------
Betreff: [isworld] Workshop on Information Security and Privacy in a
De-Perimeterised World (DISP09)
Datum: Thu, 2 Apr 2009 02:49:07 -0500
Von: Andre <a.vancleeff(a)ewi.utwente.nl>
Antwort an: Andre <a.vancleeff(a)ewi.utwente.nl>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
------- Apologies for multiple copies -------
--------- Please distribute further ---------
CALL FOR PAPERS
Workshop on Information Security and Privacy
in a De-Perimeterised World (DISP09)
(www.disp09.info)
Associated with the
2009 IEEE International Conference on
Information Privacy, Security, Risk and Trust
(PASSAT-09)
(http://cse.stfx.ca/~passat09/)
Vancouver, Canada, August 29, 2009
De-perimeterisation is the process in which the boundary around the
trusted environment inside organisations is disappearing due to joint
ventures and the use of distributed resources. Examples of such
developments include outsourcing, cloud computing, mobile workforce and
the effects of insider abuse. Instead of well-defined organisational and
system boundaries, in a de-perimeterised world organisations have to
protect their information in a situation of increased connectivity and
dependency. Similar developments take place with respect to information
about individuals, which is stored in social networking sites, personal
health records, etc. rather than in a clearly located system.
Organisations as well as individuals thus need to protect their
information without relying on security boundaries, which challenges
various aspects of information security and privacy. In the field of
security modelling and threat analysis, models will have to include the
mobility of data, people and systems typical of de-perimeterised settings.
In the field of security mechanisms, protection mechanisms have to be
developed that must function in a potentially hostile environment. And in
the field of security requirements engineering and policy specification,
methods have to be developed that do not assume well-defined boundaries
between systems and organisations.
The perspectives of requirements engineering, modelling and mechanisms are
interrelated. What is possible in modelling depends on the mechanisms
available for security, and the way security is modelled also influences
the degrees of freedom one has in the requirements engineering process.
These connections lead to the following major research goals:
- techniques for including the increased uncertainties due to
de-perimeterisation in both security models and security requirements
engineering;
- integrated combinations of de-perimeterised security policies that can
be described in security models and de-perimeterised security mechanisms
that can be implemented in practice;
- directions for research in security primitives based on new security
requirements induced by de-perimeterisation.
In this workshop, we bring together researchers from the mechanisms,
modelling and requirement engineering communities to study the security
and privacy problems induced by the process of de-perimeterisation, and to
discuss integrated solutions that transcend these disciplines.
Topics of interest include, but are not limited to:
- access control
- applied crypto and protocols for de-perimeterised security and privacy
- auditing de-perimeterised systems
- centralised vs. decentralised security architectures
- data-centric security and data classification
- de-perimeterised trust management
- economic, social and legal aspects of de-perimeterisation
- identity-centric security and identity management
- incident identification and management
- interaction between the physical, digital and social security domains
- risk analysis and risk management of de-perimeterised systems
- security and privacy in cloud computing
- security and privacy in outsourcing
- security and privacy in virtual worlds
- security and privacy in Web 2.0
- security modelling and threat analysis for de-perimeterised systems
- security requirements engineering for de-perimeterised systems
We especially encourage the submission of papers that connect two or more
of these topics. Papers should be PDF, 8 pages maximum, in IEEE conference
proceedings style, without author identification, and should be submitted
through the EasyChair website by May 15. Submission implies that, should
the paper be accepted, at least one author will attend the workshop and
present the paper. Papers will be selected based on blind review. Accepted
papers will be published by IEEE in the workshop section of the conference
proceedings.
IMPORTANT DATES:
Paper submission: May 15, 2009, 23:59 GMT (firm)
Notification: June 3, 2009
Final papers & registration: June 15, 2009
Workshop: August 29, 2009
ORGANISING COMMITTEE:
dr. Wolter Pieters
Prof.dr. Pieter Hartel (program chair)
Prof.dr. Roel Wieringa
University of Twente, Netherlands
Prof.dr. Sandro Etalle
Eindhoven University of Technology, Netherlands
Prof.dr. Bart Jacobs
Radboud University Nijmegen, Netherlands
Prof.dr. Sjouke Mauw
University of Luxembourg, Luxembourg
PROGRAM COMMITTEE:
Pieter Hartel, University of Twente, Netherlands (chair)
Yudis Asnar, University of Trento, Italy
Travis Breaux, North Carolina State University, USA
Ruth Breu, University of Innsbruck, Austria
Sandro Etalle, Eindhoven University of Technology, Netherlands
David Evans, University of Cambridge, UK
Paul de Hert, Free University Brussels, Belgium
Bart Jacobs, Radboud University Nijmegen, Netherlands
Ronald Leenes, University of Tilburg, Netherlands
Fabio Massacci, University of Trento, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Bashar Nuseibeh, Open University, UK
Wolter Pieters, University of Twente, Netherlands
Joachim Posegga, University of Passau, Germany
Geraint Price, Royal Holloway University of London, UK
Christian W. Probst, Technical University of Denmark, Denmark
Simon Rogerson, De Montfort University, UK
Eric Verheul, PWC & Radboud University Nijmegen, Netherlands
Roel Wieringa, University of Twente, Netherlands
Sheng Zhong, State University of New York at Buffalo, USA
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] CFP: ICADIWT 2009- IEEE Technically co-sponosred
Datum: Wed, 1 Apr 2009 15:56:37 -0500
Von: Saba Saras <bamasaba(a)gmail.com>
Antwort an: Saba Saras <bamasaba(a)gmail.com>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Call for Papers
Second International Conference on the Applications of Digital Information
and Web Technologies (ICADIWT 2009)
(August 4-6, 2009)
London Metropolitan University, London, UK
(http://www.dirf.org/diwt2009)
Technically co-sponsored by IEEE UK & RI Section
Proceedings will be published and indexed in IEEE Xplore
The Second International Conference on the Applications of Digital
Information and Web Technologies (ICADIWT 2009) is a forum for scientists,
engineers, and
practitioners to present their latest research results, ideas,
developments and applications in the areas of Computational Intelligence,
Artificial
Intelligence, Networking, Neural networks, Network security, Biometrics
Technologies and Applications, Pattern Recognition and Biometrics
Security,
Bioinformatics and IT Applications in the above themes.
This conference (ICADIWT 2009) will include presentations of contributed
papers and state-of-the-art lectures by invited keynote speakers.
This conference welcomes papers address on, but not limited to, the
following research topics:
Computational Intelligence
Biometrics Technologies
Forensics, Recognition Technologies and Applications
Biometrics and Ethics
Fuzzy and neural network systems
Signal processing, pattern recognition and applications
Digital image processing
Speech processing
Computational biology and bioinformatics
Parallel and distributed computing and networks
Information retrieval and internet applications
Software engineering
Biometrics and CSR
Artificial intelligence and applications
Databases and applications
Genetic algorithms
Data mining
Real time systems
Computer and network security
Multi-Agent systems
Papers submitted will be reviewed by a minimum of two reviewers and it is
expected that most of the accepted papers will undergo revision before
sending the
camera ready version.
Submissions at: http://www.dirf.org/diwt2009/submission.asp
Important Dates
Submission Date -May 1, 2009
Notification of acceptance -May 25, 2009
Camera Ready submission -June 20, 2009
Registration -June 12, 2009
Conference dates- August 4-6, 2009
General Chairs
Ezendu Ariwa, London Metropolitan University, United Kingdom.
Simon Berkovich, George Washington University, USA.
Program Chairs
Ajith Abraham, Norwegian University of Science and Technology, Norway.
Yan Yufik, Institute of Medical Cybernetics, USA.
Program co-chairs
Estevam Hruschka, Carnegie Mellon University, USA.
Hiroyuki Tarumi, Kagawa University, Japan.
Dusan Husek, Academy of Sciences of the Czech Republic, Czech Republic.
Proceedings chair
Pit Pichappan, AISB University, Saudi Arabia.
Publicity chair
Kang Lichun, National University of Singapore,Singapore.
Industrial chairs
Joanna Coleman, EDS Consulting Services, UK.
Soraya Mostefaoui, Open University, UK.
Modified versions of the Selected papers of the conference will be
published in the following peer reviewed journals
1. Journal of Digital Information Management (ISSN 0972 7272)
(http://www.dirf.org/jdim)
2. International Journal of Autonomic Computing (IJAC)
( http://www.inderscience.com/browse/index.php?journalID=110 )
3. Journal of Information Assurance and Security
(http://www.dynamicpublishers.com/JIAS/openconf.php)
4. Neural Network World
(http://www3.cs.cas.cz/nnw)
5. International Journal of Computer Scince and Software Technology
(http://www.atilim.edu.tr/~smisra/IJCSST/index.html)
6. Journal of Theoretical and Applied Electronic Commerce Research (JTAER)
( http://www.jtaer.com/ )
7. International Journal of Global Business
(http://gsmi-ijgb.com)
---------------------------------------------------------------------------------------------
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] CFP (extended deadline): 25th IEEE International
Conference on Software Maintenance
Datum: Wed, 1 Apr 2009 18:43:44 +0100
Von: Jens Krinke <dont_spam(a)gmx.net>
Antwort an: Jens Krinke <dont_spam(a)gmx.net>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
CALL FOR PAPERS - (the submission deadline has been extended until
April 10)
25th IEEE International Conference on Software Maintenance
ICSM 2009
Edmonton, Canada -- September 20-26, 2009
http://icsm2009.cs.ualberta.ca/
Sponsored by IEEE Computer Society
------------------------------------------------------------
DATES (*updated*)
April 3, 2009 Research abstracts due
April 10, 2009 Research papers due
April 1, 2009 All other track submissions due
May 29, 2009 Notifications sent to authors
------------------------------------------------------------
ICSM is the premier international event in the software
maintenance field for participants from academia,
government, and industry to share ideas and experiences for
solving critical software maintenance problems.
The 25th International Conference on Software Maintenance
(ICSM 2009) will be held in Edmonton, Alberta, Canada, one
of the most vibrant cities in Canada bordering the beautiful
Canadian Rockies.
We invite high-quality English-language submissions to all
conference tracks. Submissions must be PDF files following
the two-column IEEE CS proceedings style. Please check the
conference web sites for further information.
Please forward this call to anyone who may be interested.
http://icsm2009.cs.ualberta.ca/
------------------------------------------------------------
RESEARCH PAPERS
Research papers should describe original and significant
work in the research and practice of software maintenance
and evolution. Case studies, empirical research, and
experiments are particularly welcome. We also welcome
papers that present leading-edge ideas in maintenance.
Papers must not have been previously accepted for
publication nor concurrently submitted for review in
another journal, book, or conference.
Page limit: 10
Due: March 27, 2009 (Abstracts) -- April 3, 2009 (Papers)
Topics of interest include but are not limited to:
* Experience reports
* Techniques, methods and processes:
o to facilitate and support software maintenance
o to analyze and comprehend software systems
o to specify, design, implement and test evolvable systems
* Maintenance and evolution of multi-language, multi-platform,
and network-centric systems
* Model driven software maintenance and evolution
------------------------------------------------------------
WORKSHOPS AND PANELS
We invite proposals for workshops and panels on any topic
related to software maintenance. Workshop and panel sessions
are to be designed around a specific theme and be
interactive and discussion oriented.
Page limit: 2.
Due: April 24, 2009
------------------------------------------------------------
DOCTORAL SYMPOSIUM
We welcome submissions from young researchers who are
currently working on or who have delivered their Ph.D.
dissertation in the software maintenance and evolution area
within the last two years.
Page limit: 4.
Due: April 24, 2009
------------------------------------------------------------
INDUSTRY TRACK
This track invites proposals for presentations of industrial
applications and practices. These proposals can include
state-of-the-art descriptions, state-of-the-practice
reports, and survey papers from real-world projects and
industrial experiences.
Page limit: 4.
Due: April 24, 2009
------------------------------------------------------------
TOOL DEMONSTRATIONS
We invite proposals for tool demonstrations on any topic
related to software maintenance and evolution.
Demonstrations will be in an open session to allow
individual interaction with the participants.
Page limit: 2.
Due: April 24, 2009
------------------------------------------------------------
CO-LOCATED EVENTS
ICSM 2009 is co-located with:
SCAM 2009:
The 9th IEEE International Working Conference
on Source Code Analysis and Manipulation
September 20-21
http://www2009.ieee-scam.org/
WSE 2009:
The 11th IEEE International Symposium
on Web Systems Evolution
September 25-26
http://www.sei.buaa.edu.cn/wse09/
VISSOFT 2009:
The 5th IEEE International Workshop
on Visualizing Software for Understanding and Analysis
September 25-26
------------------------------------------------------------
GENERAL CHAIR
Eleni Stroulia, University of Alberta
PROGRAM CHAIRS
Kostas Kontogiannis, National Technical U Athens
Tao Xie, NC State University
http://icsm2009.cs.ualberta.ca/conf.php
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] Call for PAPERS: September Special Issue of the
International Journal of Business Intelligence Research (IJBIR)
Datum: Wed, 1 Apr 2009 11:59:15 -0500
Von: Richard Herschel <herschel(a)sju.edu>
Antwort an: Richard Herschel <herschel(a)sju.edu>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
Call for Papers
International Journal of Business Intelligence Research
(IJBIR)
Special Issue September 2009
�Industry/Academic Collaborations�
Guest Editors:
Virginia Miori, Saint Joseph�s University, USA
Ronal Klimberg, Saint Joseph�s University, USA
Official publication of the Information Resources Management Association
www.igi-global.com/ijbir
Call for Papers � Special Issue
The Editor-in-Chief of the International Journal of Business Intelligence
Research (IJBIR) would like to invite you to consider submitting a
manuscript for inclusion in a special issue of this scholarly journal. The
following describes the mission, the coverage, and directions for
submission to IJBIR.
Mission:
The mission of the journal is to advance research in the field of business
intelligence and analytics. The IJBIR is a peer-reviewed publication
dedicated to the exchange of the latest academic research on all aspects
of practicing and managing business intelligence in organizations. The
journal will publish original research and case studies by academic,
business, and government contributors on strategies, practices,
techniques, and technologies that advance the understanding and practice
of Business Intelligence. The focus of this journal is to identify
innovative Business Intelligence strategies and to assess the application
of theoretical concepts to real-world situations. IJBIR takes a
multidisciplinary approach to the examination of business intelligence.
Business Intelligence has been commonly defined in industry as the skills,
technologies, applications and practices used to support better business
decision making and help businesses better understand their commercial
context. BI applications provide historical, current, and predictive
views of business operations.
Academically, BI is defined as the collection of tools necessary to
perform business analyses (predictive analytics). These tools represent a
cross section of information systems, single and multivariate statistical
analysis, data mining, OLAP, supply chain, business process analysis, six
sigma and many other areas of business modeling.
The greatest value of business intelligence lies in collaborations between
industry and academics. This special issue of IJBIR will focus on these
collaborations.
High quality submissions are encouraged using qualitative or quantitative
research methodologies. Suggested topics include, but are not limited to:
� Theories that enlighten business intelligence & decision-making
� Examination of the use of analytics in support of business processes and
decision-making
� Applications of decision making tools in Business Intelligence
� Issues pertaining to analyst/decision-maker interactions
� Organizational culture and its impact on business intelligence
� The relationship between knowledge management and business intelligence
� Enablers and inhibitors for business intelligence
� Group practices in business intelligence
� Knowledge transfer and sharing behaviors in business intelligence
� Business intelligence technology utilization in organizations
� Development of business intelligence architectures
� Business intelligence education
� Case studies in business intelligence
� Metrics and their effectiveness in business intelligence analyses
� Business intelligence in small and medium enterprises
� Methodologies and processes for managing business intelligence
activities
� Critical success factors in business intelligence adoption and practice
� Global issues in business intelligence
� Analyses of business intelligence applications & analytics
� Data warehousing and data mining strategies for business intelligence
� Business intelligence training issues
� Critical assessments of business intelligence solutions
� Best practices in business intelligence (industry and academic)
� Using business intelligence for security analysis and fraud detection
� Business intelligence and CRM
� Business intelligence and market basket analysis
� Retail business intelligence and analytics
� Trends in business intelligence research
Submitting to IJBIR:
Prospective authors should note that only original and previously
unpublished articles will be considered. INTERESTED AUTHORS MUST CONSULT
THE JOURNAL�S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at
http://www.igi-global.com/development/author_info/guidelines
submission.pdf prior to submission. All article submissions will be
forwarded to at least 3 members of the Editorial Review Board of the
journal for double-blind, peer review. Final decision regarding
acceptance/revision/rejection will be based on the reviews received from
the reviewers. All submissions for the special edition must be forwarded
electronically to specialIJBIR(a)gmail.com All papers should actively
include Implications for Industry.
Publisher:
The International Journal of Business Intelligence Research (IJBIR) is
published by IGI Global (formerly Idea Group Inc.), publisher of the
�Information Science Reference� (formerly Idea Group Reference) and
�Medical Information Science Reference� imprints. For additional
information regarding the publisher, please visit www.igi-global.com.
Editor-in-Chief: Dr. Richard T. Herschel, Saint Joseph�s University, USA
Published: Quarterly (both in Print and Electronic form)
Submissions and inquiries should be directed to the attention of:
Dr. Virginia Miori
Guest Editor
Saint Joseph�s University
Email: specialIJBIR(a)gmail.com
Subject: IJBIR Special Issue on BI Collaborations
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
-------- Original-Nachricht --------
Betreff: [isworld] 2nd CfP WI/IAT'09 Wks on Explicit Knowledge Models
for Web Personalization and Adaptation
Datum: Wed, 1 Apr 2009 06:37:57 -0500
Von: Dietmar Jannach <dietmar.jannach(a)tu-dortmund.de>
Antwort an: Dietmar Jannach <dietmar.jannach(a)tu-dortmund.de>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
======================================================================
2nd CALL FOR PAPERS
WI/IAT'09 Workshop on Explicit Knowledge Models for
Web Personalization and Adaptation
September, 15, 2009 - Milano, Italy
http://ls13-www.cs.uni-dortmund.de/kmwp09/
Submission Deadline: April 30, 2009
======================================================================
In personalized web applications, different strategies for implementing
the desired adaptive behavior are possible. Personalization can either be
achieved by self-adaptation and learning based strategies, or through the
interpretation of explicit knowledge models (for instance personalization
rules or constraints).
Learning-based and collaborative approaches are most widely used,
especially in the Web context. However, in some domains the second
option is more appropriate, for instance when initially not enough
interaction data is available for learning, when the desired personalized
behavior is too complex to be learned or when the personalization
behaviour needs to be exhaustively validated.
In the past, several forms of describing (or modeling) knowledge required
for personalizing applications along the dimensions content, presentation,
and structure have been proposed. Common techniques include rule-based
systems, knowledge-based selection of predefined personalization
strategies, finite-state automata and dialogue grammars for modeling
interactive preference elicitation processes in recommender systems,
grammars for authoring adaptive Web applications or hybrids that aim to
extract rules from interaction logs, see for an example in the domain of
recommender systems. Up to now, however, no general-purpose mechanism or
agreement of how to acquire and represent such explicit personalization
knowledge has been found.
The proposed workshop should therefore bring together researchers working
on explicit knowledge models for personalized and adaptive Web
applications.
TOPICS OF INTEREST include, but are not limited to, the following:
======================================================================
Knowledge Acquisition
* Explicit modeling approaches, environments and tools
* Learning-based approaches
* Hybrid approaches, conflict resolution
* Personalization rules and knowledge mining
* Exploiting Web2.0 and the Semantic Web
Knowledge Representation Approaches
* Domain-specific and visual modeling languages
* Dialogue grammars
* Personalization rule languages
* Learning-based techniques
Software Engineering issues
* Integration with industrial software engineering practices and tools
* Web Engineering approaches
* Automated code generation
* Testing and debugging of explicit knowledge models
Applications / Case studies
* Decision Support Systems
* Recommender Systems
* e-Learning applications
* Other fielded systems and experimental evaluations.
PAPER SUBMISSION, PUBLICATION AND PARTICIPATION
======================================================================
Papers have to be submitted via the WI-IAT 2009 Cyberchair system,
http://www.wi-iat09.disco.unimib.it/WI09/submission.htm
All submitted papers will be reviewed on the basis of technical quality,
relevance, significance, and clarity by at least two reviewers.
The length of accepted papers should not exceed 4 pages in IEEE-CS format;
extra payment is only possible for one more extra page.
The workshop will be open to everyone interested in attending. There will
not be a separate workshop registration fee this year (i.e., WI/IAT
registration covers everything).
Accepted workshop papers will be published in the Proceedings of WI-IAT'09
Workshops, IEEE-CS Press.
IMPORTANT DATES
======================================================================
Submission of papers April 30, 2009
Acceptance notification June 11, 2009
Camera-ready version due June 27, 2009
Workshop day September 15, 2009
WORKSHOP ORGANIZERS / CONTACT
======================================================================
Dietmar Jannach, Technische Universität Dortmund, Germany
Markus Zanker, Universität Klagenfurt, Austria
Please send all enquiries via e-mail to workshop_wiiat(a)ifit.uni-klu.ac.at
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.
--
Univ.Prof. Dr. Gustaf Neumann
Institut of Information Systems and New Media
WU Vienna
Augasse 2-6, A-1090 Vienna, AUSTRIA
-------- Original-Nachricht --------
Betreff: [isworld] CfP EnviroInfo 2009 - Papers till 14th April 2009
Datum: Wed, 1 Apr 2009 04:04:29 -0500
Von: Jorge Marx Gómez <marx-gomez(a)wi-ol.de>
Antwort an: Jorge Marx Gómez <marx-gomez(a)wi-ol.de>
An: AISWORLD Information Systems World Network <isworld(a)lyris.isworld.org>
CALL FOR PAPERS
Environmental Informatics and Industrial Environmental Protection:
Concepts, Methods and Tools
Date: September 9th - 11th 2009
Conference Website: http://www.enviroinfo2009.org/
The EnviroInfo 2009 conference is a meeting place for experts and
practitioners on leading ICT technologies to make the world a better
place for living. It aims to report about state-of-the-art applications
of ICT as well as newest developing trends in the field of environmental
informatics. It will cover cross-cutting topics like applications of
geographical information systems, environmental modelling and
simulation, risk management, material and energy flow management,
climate change, tools and database applications and other aspects with
regard to the main topic ICT and the environment. The EnviroInfo 2009
conference will have a special focus on the topic �ICT for industrial
environmental protection� and thus will reflect on practical problems
and the need for an adequate IT-assistance for this application field. A
dedicated emphasis is also laid on the requirements of small and
medium-sized enterprises and their need for a proper and easy to use
IT-assistance.
Extended Abstracts and full papers are accepted till 14th April 2009.
Conference Organizer:
-----------------------------------
Prof. Dr. Volker Wohlgemuth
HTW Berlin
University of Applied Sciences
General Chair
Volker.Wohlgemuth(a)HTW-Berlin.de
Blankenburger Pflasterweg 102, 13129 Berlin
Tel: +49 (0) 30 / 5019-4393
Fax: +49 (0) 30 / 5019-484393
The AISWorld LISTSERV is a service of the Association for Information Systems (http://www.aisnet.org). To unsubscribe, redirect, or change subscription options please go to http://lyris.isworld.org/. You are subscribed to AISworld as: neumann(a)wu-wien.ac.at. Each Sender assumes responsibility that his or her message conforms to the AISWorld LISTSERV policy and conditions of use available at http://lyris.isworld.org/isworldlist.htm.