-------- Original-Nachricht --------
Betreff: [computational.science] ESORICS 2010 - call for participation
(program now available)
Datum: Wed, 07 Jul 2010 11:26:29 +0200
Von: sara.foresti(a)unimi.it
Antwort an: sara.foresti(a)unimi.it
Organisation: "ICCSA"
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
[Apologies if you receive multiple copies of this message]
CALL FOR PARTICIPATION
***********************************************************************
15th European Symposium on Research in Computer Security
Hotel AMARILIA, Vouliagmeni, Athens, Greece
20-22 September 2010
www.esorics2010.org
***********************************************************************
ABOUT THE CONFERENCE
ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.
Computer security is concerned with the protection of information in
environments where there is a possibility of intrusion or malicious
action. The aim of ESORICS is to further the progress of research in
computer security by establishing a European forum for bringing
together researchers in this area, by promoting the exchange of ideas
with system developers and by encouraging links with researchers in
related areas.
Progressively organized in a series of European countries, the
symposium is confirmed as the European research event in computer
security.
The Symposium is under the aegis of the Greek:
* Ministry of of Infrastructure, Transport and Networks
* Ministry of Economy and Finance:
General Secretariat for Information Systems
* Ministry of Interior, Decentralization and e-Government:
General Secretariat for Electronic Governance
REGISTRATION
Registration information is available at:
https://www.triaenatours.gr/esorics.php
PROGRAM
Sunday, 19 September 2010
-------------------------
18:30 - 20:00 Registration
______________________________________________________________________
Monday, 20 September 2010
-------------------------
09:00 - 10:00 Registration
10:00 - 10:30 Opening
* Welcome address
S. Katsikas, ESORICS-2010 General Chair
* Technical Program Overview
B. Preneel and D. Gritzalis, Program Committee Chairs
* Local arrangements
N. Kyrloglou and M. Theoharidou, Organizing Committee Chairs
10:30 - 11:00 Coffee/tea
11:00 - 13:00 Session 1: RFID and Privacy
* Deng R., Li Y., Yung M., Zhao Y.
"A New Framework for RFID Privacy"
* Nithyanand R., Tsudik G., Uzun E.,
"Readers Behaving Badly: Reader Revocation in PKI-Based
RFID Systems"
* Androulaki E., Vo B., Bellovin S.,
"Privacy-Preserving, Taxable Bank Accounts"
* Dahl M., Delaune S., Steel G.,
"Formal Analysis of Privacy for Vehicular Mix-Zones"
13:00 - 14:00 Lunch
14:00 - 16:00 Session 2: Software Security
* Zhang C., Wang T., Wei T., Chen Y., Zou W.,
"IntPatch: Automatically Fix Integer Overflow-to-Buffer-Overflow
Vulnerability at Compile-Time"
* Ligatti J., Reddy S.,
"A Theory of Runtime Enforcement, with Results"
* Hubert L., Jensen T., Monfort V., Pichardie D.,
"Enforcing Secure Object Initialization in Java"
* Mantel H., Sudbrock H.,
"Flexible Scheduler-Independent Security"
16:00 - 16:30 Coffee/tea
16:30 - 18:30 Session 3: Cryptographic Protocols
* Catrina O., de Hoogh S.,
"Secure Multiparty Linear Programming Using Fixed-Point Arithmetic"
* Almeida J.-B., Bangerter E., Barbosa M., Krenn S.,
Sadeghi A.-R., Schneider T.,
"A Certifying Compiler for Zero-Knowledge Proofs of
Knowledge based on S-Protocols"
* Liu J., Au M.-H., Susilo W., Zhou J.,
"Short Generic Transformation to Strongly Unforgeable
Signature in the Standard Model"
* Xu W., Ahn G.-J., Hu H., Zhang X., Seifert J.-P.,
"DR@FT: Efficient Remote Attestation Framework for Dynamics Systems"
20:00 - 22:00 Symposium Dinner
______________________________________________________________________
Tuesday, 21 September 2010
--------------------------
08:30 - 10:30 Session 4: Traffic Analysis
* Lu L., Chang E.-C., Chan M.-C.,
"Website Fingerprinting and Identification Using Ordered
Feature Sequences"
* Janc A., Olejnik L.,
"Web Browser History Detection as a Real-World Privacy Threat"
* Luo X., Zhang J., Perdisci R., Lee W.,
"On the Secrecy of Spread-Spectrum Flow Watermarks"
* Chakravarty S., Stavrou A., Keromytis A.,
"Traffic Analysis against Low-Latency Anonymity Networks
Using Available Bandwidth Estimation"
10:30 - 11:00 Coffee/tea
11:00 - 12:00 Invited talk
Chairperson: Gritzalis D., AUEB
* Helmbrecht U., ENISA,
"Cryptography and Privacy in Cloud Computing"
12:00 - 13:00 Session 5: End-User Security
* Xiang G., Pendleton B., Hong J., Rose C.,
"A Hierarchical Adaptive Probabilistic Approach
for Zero Hour Phish Detection"
* Bojinov H., Bursztein E., Boneh D., Boyen X.,
"Kamouflage: Loss-Resistant Password Management"
13:00 - 14:00 Lunch
14:00 - 16:00 Session 6: Formal Analysis
* Escobar S., Meadows C., Meseguer J., Santiago S.,
"Sequential Protocol Composition in Maude-NPA"
* Dinh T.-T.-A., Ryan M.,
"Verifying Security Property of Peer-to-Peer Systems Using CSP"
* Basin D., Cremers C.,
"Modeling and Analyzing Security in the Presence of
Compromising Adversaries"
* Yasuoka H., Terauchi T.,
"On Bounding Problems of Quantitative Information Flow"
16:00 - 16:30 Coffee/tea
16:30 - 18:30 Session 7: E-voting and Broadcast
* Heiberg S., Lipmaa H., van Laenen F.,
"On E-Vote Integrity in the Case of Malicious Voter Computers"
* Kremer S., Smyth B., Ryan M.,
"Election Verifiability in Electronic Voting Protocols"
* Heather J., Ryan P., Teague V.,
"Pretty Good Democracy for more expressive voting schemes"
* Blanton M., Frikken K.,
"Efficient Multi-Dimensional Key Management in Broadcast Services"
______________________________________________________________________
Wednesday, 22 September 2010
----------------------------
08:30 - 10:30 Session 8: Authentication, Access Control,
Authorization and Attestation
* Meier J., Gollmann D.,
"Caught in the Maze of Security Standards"
* Gofman M., Luo R., Yang P.,
"User-Role Reachability Analysis of Evolving Administrative
Role Based Access Control"
* Crampton J., Huth M.,
"An Authorization Framework Resilient to Policy Evaluation Failures"
* Kupcu A., Lysyanskaya A.,
"Optimistic Fair Exchange with Multiple Arbiters"
10:30 - 11:00 Coffee/tea
11:00 - 13:00 Session 9: Anonymity and Unlinkability
* Backes M., Doychev G., Duermuth M., Koepf B.,
"Speaker Recognition in Encrypted Voice Streams"
* Pashalidis A., Schiffner S.,
"Evaluating Adversarial Partitions"
* Ardagna C., Jajodia S., Samarati P., Stavrou A.,
"Providing Mobile Users' Anonymity in Hybrid Networks"
* Tiplea F.-L., Vamanu L., Varlan C.,
"Complexity of Anonymity for Security Protocols"
13:00 - 14:00 Lunch
14:00 - 16:00 Session 10: Network Security and Economics
* Wang L., Jajodia S., Singhal A., Noel S.,
"k-Zero Day Safety: Measuring the Security Risk of
Networks against Unknown Attacks"
* Johnson B., Grossklags J., Christin N., Chuang J.,
"Are Security Experts Useful? Bayesian Nash Equilibria for Network
Security Games with Limited Information"
* Backes M., Ciobotaru O., Krohmer A.,
"RatFish: A File Sharing Protocol Provably Secure
Against Rational Users"
* Kheir N., Cuppens-Boulahia N., Cuppens F., Debar H.,
"A Comprehensive Approach for Cost-Sensitive Intrusion Response"
16:00 - 16:30 Coffee/tea
16:00 - 18:00 Session 11: Secure Update, DOS and Intrusion Detection
* Perito D., Tsudik G.,
"Secure Code Update for Embedded Devices via Proofs of
Secure Erasure"
* Kapravelos A., Polakis I., Athanasopoulos E., Ioannidis S.,
Markatos E.,
"D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks"
* Karame G., Capkun S.,
"Low-Cost Client Puzzles based on Modular Exponentiation"
* Tokhtabayev A., Skormin V., Dolgikh A.,
"Expressive, Efficient and Obfuscation Resilient Behavior Based IDS"
18:00 Farewell
MORE INFORMATION
Additional information about the conference can be found at:
www.esorics2010.org
---------------------------------------------------------------------
To unsubscribe, e-mail: computational.science-unsubscribe(a)lists.iccsa.org
For additional commands, e-mail: computational.science-help(a)lists.iccsa.org
-------- Original-Nachricht --------
Betreff: [AISWorld] CFP e-government interoperability, enterprise
architecture and strategies
Datum: Wed, 7 Jul 2010 08:13:12 +0200
Von: Janssen, Marijn <M.F.W.H.A.Janssen(a)tudelft.nl>
An: <aisworld(a)lists.aisnet.org>
Special Issue on E-government interoperability, enterprise architecture
and strategies
Journal of Theoretical and Applied Electronic Commerce Research
Guest editors; Marijn Janssen, Yannis Charalabidis, George Kuk and Tony
Cresswell
In the digital era public organizations are changing their strategies
and structures and processes to fully benefit from the promises of ICT.
Departments and institutions collaborate and interoperate across
organizational boundaries. Whilst e-government was initially driven by
adopting e-commerce ideas. in the last decade, it has emerged as a new
genre of research. Similar to e-commerce, e-government requires
multi-agency collaboration and integration of their disparate business
processes and information systems. The unique characteristics of
e-governme nt including accountability, transparency and equal access
have played a major role and produced a different kind of e-commerce in
meeting the broader expectations of society.
A key prerequisite for collaboration is interoperability, which can be
defined as the ability of systems to work together seamlessly and are
able to adapt in time, achieving one-stop, automated service provision
for citizens and businesses. Therefore, the design and operation of
interoperable systems require a range of consideration including
governance, organizational, strategic, social and technical issues.
Interoperability not only presents organizations with technical
challenge but also requires a shift in strategies and change in
organizational structures and business models. Traditional bureaucratic
organizations governed by command and control mechanisms are replaced by
different kind of organizational structures, aiming to build horizontal
relationships and network governance.
All these e fforts need to be facilitated by a next generation
infrastructure (NGI) enabling interoperability and reuse by sharing
services. The basic digital government infrastructure has evolved over
time.The development towards the next generation of digital government
infrastructure (NGI) based on new technologies is under development.
Yet, the siloed and fragmented nature, the lack in insight among the
dependencies among organizational and technical aspects can hamper
progress. Government enterprise architectures (GEA) or information's
architectures are used as an instrument to facilitate these developments
by outlining the vision, providing models for technology inclusion and
integration supported by standards and principles. Whereas
infrastructure refers to the actual implementation, GEA has a conceptual
nature. Often there is no overarching framework helping to provide
guidance for ensuring interoperability, facilitating reuse and meeting
other objectives of open, inclusive and productive governance.
Interoperability, architecture and strategies are important to all types
of government activities, including policy making, services delivery,
law enforc ement, and crisis response within the pubic sector.
This special issue is aimed at contributing to the understanding
formulation and elaboration of the issues involved in e-government
interoperability, enterprise architectures, and solutions and strategies
for governments, based on a combination of sound theoretical basis and
empirical research.
Papers preferably combine theory and empirical research. The special
issue seeks scholarly manuscripts that explore the following topics in
relation to e-government interoperability, architecture and strategies:
Example and (best) practices of changing strategies and business models
underpinned by theories
Architecture for facilitating strategies and technologies
Public-private architectures frameworks, collaboration in networks
Governmen t 2.0
Government-to-citizens, government-to-business, government-to-government
Innovations, process redesign and technologies
Enterprise architecture standards, prin ciples and frameworks
Free and open source software development and utilization
Service-oriented architectures, web services, semantic web services,
service orchestration and composition
System, data- and process-based integration and transformation
Identity management, privacy, security, public values
Information reuse, information quality, ontologies and semantics
Process, data and semantic modeling
Next generation infrastructure, grid computing, cloud computing,
ICT-(shared) services, and scalability issues
Public values, evaluation of innovations
Software as service, utility computing, platform as service, service
providers
Infrastructure, interoperability and enterprise architecture planning,
and alignment
Evolution, impact analyses and cost/benefit analysis
Poli cies, strategies and governance
About JTAER
The Journal of Theoretical and Applied Electronic Commerce Research
(JTAER) has been created to allow researchers, acade micians and other
professionals an agile and flexible channel of communication in which to
share and debate new ideas and emerging technologies concerned with this
rapidly evolving field. The Journal of Theoretical and Applied
Electronic Commerce Research is published quarterly. The intended
audience includes academicians, researchers and professionals in
computer science, information management, telecommunications, business
administration, sociology, law, financial services, as well as
specialists in the field of electronic commerce. More info:
http://www.jtaer.com/
<https://netmail.tudelft.nl/exchweb/bin/redir.asp?URL=http://www.jtaer.com/>
IMPORTANT DATES
-Full Script Submission: 30 July 2010
-Author Notification: 30 September 2010
-Revisions due by: 15 November 2010
-Final acceptance notification 15 December 2010
-Camera ready version: 15 January 2011-Publication: 15 April 2011
SUBMISSION
We are soliciting for original works capturing aspect of business and
information technology, both theoretical and appli ed. Manuscript
capturing the e-government specific aspects and the edge of new
technology and organizations are preferred. Author guidelines can be
found at: http://www.jtaer.com/author_guidelines.doc
<https://netmail.tudelft.nl/exchweb/bin/redir.asp?URL=http://www.jtaer.com/a…>.
All submission will be refereed by at least three reviewers. Submissions
should be directed by email to m.f.w.h.a.janssen(a)tudelft.nl
<mailto:m.f.w.h.a.janssen@tudelft.nl>.
GUEST EDITORS
Dr. Marijn Janssen
Delft University of Technology
Faculty of Technology, Policy, and Management
Email: M.F.W.H.A.Janssen(a)tudelft.nl <mailto:M.F.W.H.A.Janssen@tudelft.nl>
Dr. Yannis Charalabidis
Information Systems Laboratory
University of the Aegean
Email: yannisx(a)aegean.gr <mailto:yannisx@aegean.gr>
Dr. George Kuk
Nottingham University Business School
E-mail: g.kuk(a)nottingham.ac.uk <mailto:g.kuk@nottingham.ac.uk>
Dr. Tony Cresswell
Center for Technology in Government (CTG)
University at Albany
E-Mail: tcresswell(a)ctg.albany.edu <mailto:tcresswell@ctg.albany.edu>
-------- Original-Nachricht --------
Betreff: [computational.science] extended deadline for ICMLA 2010 - 9th
Int. Conf. on Machine Learning and Applications - Washington DC - USA
12-14 Dec 2010
Datum: Tue, 6 Jul 2010 18:51:46 -0400 (EDT)
Von: Taghi Khoshgoftaar <khoshgof(a)fau.edu>
Organisation: "ICCSA"
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
The deadline for submitting papers to ICMLA10 has been extended to 15th July for the main conference and to 1st August for special sessions.
*********************************************************************
We apologize if you receive multiple copies of this CFP *********************************************************************
=====================================================================
CALL FOR PAPERS - ICMLA 2010
The 9th International Conference on
Machine Learning and Applications (ICMLA 2010)
Washington D.C. - USA, 12-14 December 2010 http://www.icmla-conference.org/icmla10/ (sponsored by IEEE SMCS)
===================================================================== Papers accepted to ICMLA 2010 will be considered, in an expanded form,
for possible inclusion in some special issues which will be published
in several reputed journals after the conference: Artificial Intelligence Review, Neurocomputing, Information Sciences, etc. Some special sessions will also publish extended papers as special issues
in some journals related to the special sessions topics. CALL FOR PAPERS
ICMLA 2010 aims to bring together researchers and practitioners to
present their latest achievements and innovations in the area of machine
learning (ML). The conference provides a leading international forum for
the dissemination of original research in ML, with emphasis on
applications, novel algorithms and systems. Following the success of
previous ICMLA conferences, it aims to attract researchers and
application developers from a wide range of ML related areas, such
as statistical, probabilistic, fuzzy, neural, evolutionary, inductive,
and other kinds of learning. The conference will cover both theoretical
as well as experimental research results. Submission of machine learning
papers describing machine learning applications in fields like medicine,
biology, industry, manufacturing, security, education, virtual
environments, game playing and problem solving is strongly encouraged.
Scope of the Conference:
o statistical learning
o neural network learning
o learning through fuzzy logic
o learning through evolution (evolutionary algorithms)
o reinforcement learning
o multi-strategy learning
o cooperative learning
o planning and learning
o multi-agent learning
o online and incremental learning
o scalability of learning algorithms
o inductive learning
o inductive logic programming
o Bayesian networks
o support vector machines
o case-based reasoning
o machine learning for bioinformatics and computational biology
o machine learning and natural language processing
o multi-lingual knowledge acquisition and representation
o grammatical inference
o knowledge acquisition and learning
o knowledge discovery in databases
o knowledge intensive learning
o knowledge representation and reasoning
o machine learning and information retrieval
o machine learning for web navigation and mining
o learning through mobile data mining
o text and multimedia mining through machine learning
o distributed and parallel learning algorithms and applications
o feature extraction and classification
o theories and models for plausible reasoning
o computational learning theory
o cognitive modeling
o hybrid learning algorithms
o machine learning in:
- game playing and problem solving
- intelligent virtual environments
- industrial and engineering applications
- homeland security applications
- medicine, bioinformatics and systems biology
- economics, business and forecasting applications, etc.
Contributions describing applications of machine learning (ML)
techniques to real-world problems, interdisciplinary research involving
machine learning, experimental and/or theoretical studies yielding new
insights into the design of ML systems, and papers describing
development of new analytical frameworks that advance practical machine
learning methods are especially encouraged.
The conference will include a number of interesting keynote plenary
talks, which will be announced on the conference web site as
arrangements are finalized. Previous invited speakers included numerous
fellows of IEEE, AMIA, AAAS, AAAI, etc.
Paper Submission
High quality papers in all Machine Learning areas are solicited. Papers
that present new directions will receive careful and supportive
reviews. Authors are expected to ensure that their final manuscripts
are original and are not appearing in other publications. Paper should
be limited to 6 pages and submitted in IEEE format (double column).
Papers will be reviewed by the Program Committee on the basis of
technical quality, originality, significance and clarity. All
submissions will be handled electronically. Accepted papers will be
published in the conference
proceedings, as a hardcopy. A selected number of accepted papers will
be invited for possible inclusion, in an expanded and revised form, in
some special issues of suitable journals.
ICMLA'10 Best Paper Award and ICMLA'10 Best Poster Award will be
conferred at the conference to th e authors of the best research paper
and best poster presentation, respectively, based on the reviewers and
Programme Committee recommendations. Detailed instructions for
submitting papers can be found at http://www.icmla-conference.org/icmla10/ CFP _PaperSubmission.html Important Dates
Special session/workshop proposals due: May 30, 2010
Tutorial proposals due: July 6, 2010
Paper Submission Deadline:
Main Conference: July 6, 2010
Special Sessions, Workshops& ICMLA Challenge: July 15, 2010
Notification of acceptance: September 7, 2010
Camera-ready papers& Pre-registration: October 1, 2010
The ICMLA Conference: December 12-14, 2010
All paper submissions will be handled electronically. Detailed
instructions for submitting the papers are provided on the conference
home page at http://www.icmla-conference.org/icmla10/ CFP _PaperSubmission.html For information contact:
Taghi Khoshgoftaar, Email taghi(a)cse.fau.edu Xingquan (Hill) Zhu, Email xzhu3(a)fau.edu Program Co-Chairs
Special session/workshop proposals or Tutorial proposals can be
submitted to:
Sorin Draghici, Email: sorin(a)wayne.edu Vasile Palade, Email: vasile.palade(a)comlab.ox.ac.uk Conference Co-Chairs
Deadline for special session/workshop proposals: May 30, 2010
Deadline for tutorial proposals: July 6, 2010
-------- Original-Nachricht --------
Betreff: [computational.science] IEEE IMSAA 2010 - Call for Papers
Datum: Tue, 6 Jul 2010 00:45:05 -0400
Von: IMSAA 2010 <imsaaconf(a)gmail.com>
Organisation: "ICCSA"
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
[Our apologies if you receive multiple copies of this CFP.]
********** DEADLINE IN TWO WEEKS, July 20, 2010 *********************
CALL FOR PAPERS
4th IEEE International Conference on Internet Multimedia Systems
Architecture and Application (IMSAA-10)
December 15-17, 2010
Bangalore, India
www.imsaa.org
Sponsored by IEEE ComSoc
While the convergence of data and communication networks and the
prevalence of wireless communications had sparked many new applications
and enabling architectures, there are still significant technical
challenges in the areas of next generation communication system and
multimedia services, including issues related to performance, security,
reliability, scalability, mobility, interoperability, and deployment.
IMSAA-10 is designated to tackle these challenges by bringing together
researchers, engineers and practitioners from academia and industry
working on Internet multimedia systems. The conference will include a
peer reviewed program of technical sessions, workshops, tutorials, and
demonstration sessions. For further information, please see the conference
website: www.imsaa.org
We welcome submissions for IMSAA's Technical Program in the following areas
of telecommunications services and converged networking and not limited to:
* Convergent Communications Services
- Content/Context-aware services
- Communication services and Web 2.0
- Social networking and communication services
- Virtual worlds
* Security& Privacy toward Next Generation Communications System
- Privacy and information sharing
- User data security and privacy
- End-to-end security
- Security and privacy in P2P networks
- Authentication, Authorization, and Access control
* Mobile Communications
- Mobile communication applications in 3G and 4G networks
- Mobile communication service architectures
* Service models, architectures, creation, and management
- Service creation environments
- Feature interaction handling
- Compositional Services and Model Checking.
- Management of Next Generation Communication Systems
- Cloud Computing
* IP Multimedia Subsystems (IMS)
- P2P and IMS (VoIP, Instant Messaging, Gaming)
- Integrating IMS and Web2.0 services (Mashups, Rich Internet
Applications)
- Architectures and Runtimes for IMS Elements
- IMS Core Services
- IMS Mobility
- Case Studies and Status of IMS Deployment
- IMS Clients and Devices
* Multimedia Streaming and Communications
- Multicast, Broadcast and IPTV
- Media Streaming
- Cross-layer Optimization for Multimedia Service Support
- Video Quality Assessment
* Trials and testbeds
- Service Test and Validation Platforms
- Open Source Initiatives
- Benchmarking IMS Services and Applications
* Next Generation Communication System (Wireless and Wired)
- Machine-type communication technologies (Internet of Things)
- User Equipment Technologies
- Traffic offloading techniques and performance
- IPv6 migration issues
- Qos for voice and video
- Green Systems (Smart Grid and Power Saving)
All paper submissions are handled through EDAS: http://edas.info/8901
The proceedings will be published in the IEEE Xplore digital library.
IMSAA is seeking original research work which is not yet published or
not submitted in any other conferences, journals or magazines. Proposals
for tutorials are also solicited.
IMPORTANT DATES:
Paper submission: 20th July 2010 (EST, USA)
Paper review notification: 15th September 2010 (EST, USA)
Paper camera ready: 5th October 2010 (EST, USA)
Demo proposal submission: 15th October 2010 (EST, USA)
ORGANIZING COMMITTEE:
General Co-chairs:
Ashutosh Dutta, Telcordia, USA
Sanjoy Paul, Infosys, India
TPC Co-chairs:
Sheshadri Mohan, University of Arkansas at Little Rock, USA
Yoshihiro Ohba, Toshiba, Japan
Xiaotao Wu, Avaya, USA
Publicity Co-chairs:
Christian Makaya, Telcordia, USA
Rafa Marin Lopez, University of Murcia, Spain
Shashidhara Dongre, L&T Infotech, India
Publication Chair:
Shweta Jain, Rutgers, USA
Service Provider Session Chair:
Sanyogita Shamsunder, Verizon, USA
Tutorials Chair:
Shantidev Mohanty, Intel, USA
Registration Chair:
Jayanta Mukherjee, HP, India
Panel Chair:
Yoshinori Kitatsuji, KDDI Labs, Japan
Finance Chair:
C. M. Abraham, IIITB, India
STEERING COMMITTEE:
Nirwan Ansari, New Jersey Institute of Technology, USA
Henning Schulzrinne, Columbia University, USA
Subir Saha, RiT, India
Debabrata Das, IIIT-Bangalore, India
Asok Chatterjee, Ericsson, USA
SPONSORS:
IEEE Communications Society (ComSoc) Bangalore Chapter
International Institute of Information Tecnology - Bangalore (IIIT-B)
TECHNICAL CO-SPONSORS:
IEEE Communications Society (ComSoc)
IEEE Bangalore Section
IEEE Princeton and Central Jersey Section
TECHNICAL COMMITTEES (TC) ENDORSEMENT:
Multimedia Communications (MMC)
Communications Software (CommSoft)
Cognitive Networks (TCCN)
-------- Original-Nachricht --------
Betreff: [AISWorld] ACIS 2010: Call for Workshops, Panels and Tutorials
Datum: Tue, 6 Jul 2010 10:41:21 +1000
Von: Jan Recker <j.recker(a)qut.edu.au>
An: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
*21st Australasian Conference on Information Systems (ACIS 2010):
Call for Workshops, Panels and Tutorials*
*
*Brisbane, Australia
1-3 December 2010
http://acis2010.org
*Important Dates:*
Deadline for workshop/panel/tutorial proposals: August 2, 2010
Notification of proposal acceptance: September 6, 2010
ACIS Conference: 1-3 December, 2010
The Australasian Conference on Information Systems (ACIS) is the premier
conference in Australasia for Information Systems academics and
professionals, covering technical, organisational, business and social
issues in the application of Information Technology. In 2010, the ACIS
Conference will be jointly organised by Queensland University of
Technology (QUT) and The University of Queensland (UQ). The event will
take place at the QUT Gardens Point Campus. The campus is located in the
Central Business District of Brisbane, the fastest growing city in
Australia. With 1.7 million people, Brisbane offers all the facilities
and infrastructure of a global hub for technology and tourism.
ACIS 2010 will be dedicated to the definition and establishment of
Information Systems as a discipline of high impact for the scientific
community and IS professionals. The focus will be on approaches that
facilitate the identification of research questions of significant
relevance that are studied by following sound research methodologies and
that lead to results of measurable impact. Thus, the theme for ACIS 2010
will be: *'Information Systems: Defining and Establishing a High Impact
Discipline*'.
We now invite submissions for *workshop*, *panel* and *tutorial*
proposals to be included in the ACIS 2010 Conference Program.
Workshops are meant to facilitate the focused exchange of ideas and
experiences between active researchers, and stimulate discussions on new
and emerging issues in line with the conference topics. Workshops may
concentrate in-depth on research topics, or may also be devoted to
issues such as applications, standardization, and curriculum
development. Proposals for one-day workshops are requested.
Tutorials and panel discussions will complement the core of the ACIS
2010 conference. Tutorials will provide the opportunity to introduce one
selected topic to the conference participants and to discuss related
trends and challenges. Panel discussions will allow for the open
conversation of topics related and relevant to the ACIS conference theme
among a group of experts. The conference organizers are able to
facilitate contacts to local industry representatives, if this is of
interest for the organizer of a panel.
Each proposal should include the following information:
- Workshop/Panel/tutorial title and acronym, where applicable
- Brief biography of each organizer and key invite speaker, where applicable
- An outline of the workshop/panel/tutorial theme, goals, planned
activities, and a brief discussion on intended audience, and expected
audience numbers
- The complete text of the envisioned call for papers, where applicable.
(To decide your workshop key dates, please note that the preliminary
workshop proceedings to be distributed at the workshop must be submitted
to the ACIS 2010 conference organizers before November 1, 2010.)
We especially encourage workshop proposals that explore new topics
and/or attract audience from outside the Australasian region.
All proposals should be directed to the ACIS 2010 Workshop, Panel and
Tutorial Chair in electronic form (plain text or PDF) by the deadline
indicated below.
*Organizing Committee*
ACIS 2010 Conference Co-Chairs
Peter Green, The University of Queensland
Michael Rosemann, Queensland University of Technology
ACIS 2010 Workshop, Panel and Tutorial Co-Chair
Jan Recker, Queensland University of Technology
Email: j.recker(a)qut.edu.au <mailto:j.recker@qut.edu.au>
Contact: info(a)acis2010.org
-------- Original-Nachricht --------
Betreff: [WI] PDC 2010
Datum: Mon, 5 Jul 2010 12:01:54 +0200
Von: Peter Mambrey <peter.mambrey(a)fit.fraunhofer.de>
An: <wi(a)aifb.uni-karlsruhe.de>
Dear all,
Enclosed you find the call for participation at the 11th PDC 2010 in
Sidney, Australia.
All the best
Peter
The 11th Participatory Design Conference. PDC 2010.
November 29 - December 3, 2010.
Sydney, Australia.
www.pdc2010.org <http://www.pdc2010.org>
August 13 is the final submission date for exploratory papers, industry
cases, the industry pitchfest, panels, posters, doctoral consortium and
applications to be a student workshops and tutorials.
Submission details are available from the conference website
www.pdc2010.org <http://www.pdc2010.org>. Submissions should follow the
PDC Submission template but only exploratory papers need to be anonymous
Exploratory papers: (short paper maximum 4 pages) Exploratory papers
should present ideas that could benefit from discussion with members of
the Participatory Design community. These papers may include
work-in-progress, experiences of reflective practitioners, and first
drafts of novel concepts and approaches. Each submitted paper will be
double blind reviewed by at least 3 reviewers. Please make sure
submissions are anonymous. If you have any questions, please contact
exploratory(a)pdc2010.org <mailto:exploratory@pdc2010.org>
Industry Day Presentations: (1-2 page proposals) There are two types of
submissions for this new, special one day Industry Day Track:
Industry Cases - that report on the use of participatory design (PD)
methods, tools, and/or practices within commercial, non-profit and
governmental organisations, and, PDC Pitch Fest Presentations where
representatives from not-for-profit and academic sectors pitch design
ideas in a short, lively format. This is an opportunity to present
participatory design research, concepts and ideas to a panel of industry
representatives.
Submissions for Industry Day do not require academic reviewing and will
be reviewed instead by an industry panel. If you have any questions,
please contact industry(a)pdc2010.org <mailto:industry@pdc2010.org>
Artefacts, posters, products, interactive demonstrations: (2 page
proposal) Works may include projects, techniques, and products developed
with a commitment to the principles and philosophy of Participatory
Design and they may incorporate any forms or genres of
information/communication technologies or digital media (e.g., sound,
still/moving images, touch, space, text, etc.). Successful proposals
will be presented during a session where participants can interact with
presenters and artefacts. The proposal should include title, goals,
technique, relevance to Participatory Design and a sketch or design, as
appropriate. Please describe your plan for audience participation. If
you have any questions, please contact pc(a)pdc2010.org
<mailto:pc@pdc2010.org>.
Doctoral consortium: (2 page proposal) Full day session. The doctoral
consortium is intended for PhD students working within the field of
Participatory Design. It will provide students with an opportunity to
present issues of concern to them in their doctoral studies and receive
extensive feedback from the session co-chairs and student participants.
Enrolment is limited and selection will been based on application
submissions. The proposal should give an overview of the PhD project,
including research question, method, how the PhD work is related to
Participatory Design, the status of current work, major findings and
plans for further research. Accepted applicants will be asked to provide
a revised and elaborated proposal a few months before the conference. If
you have any questions, please contact phd(a)pdc2010.org
<mailto:phd@pdc2010.org>.
Student volunteers: We are looking for a team of dedicated student
volunteers to make PDC function. In exchange for free registration you
are expected to work about 20 hours during the conference.
Sometimes this means you will be in sessions, sometimes you will not be.
If you are presenting you will of course we will work with your
schedule. We will soon have instructions for how to apply to be a
volunteer, in the meantime if you have any questions, please contact
vounteer(a)pdc2010.org <mailto:vounteer@pdc2010.org>.
Follow us on twitter @PDCSydney. And join us to celebrate the first PDC
to be held in the southern hemisphere!
Prof. Dr. Peter Mambrey
Fraunhofer - FIT Institut für Angewandte Informationstechnik, Schloss
Birlinghoven, D-53754 St. Augustin, Germany; Institut für
Politikwissenschaft, Universität Duisburg-Essen, Lotharstr. 65, D-47048
Duisburg
Phone: +49-2241-142710 FAX: +49-2241-142084
E-mail: peter.mambrey(a)uni-due.de
http://www.uni-due.de/politik/mambrey.php
-------- Original-Nachricht --------
Betreff: [AISWorld] OR Insight Special Issue Call for Papers:
Facilitating information and knowledge management through Information
Systems
Datum: Fri, 2 Jul 2010 13:59:41 +0100
Von: Papadopoulos A. <A.Papadopoulos(a)soton.ac.uk>
An: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
Dear Colleagues,
We would like to invite you to submit papers for the special issue of "OR Insight" (Palgrave Publishers) entitled: "Facilitating information and knowledge management through Information Systems and Operational Research: from theory to practice"
Guest Editors:
Dr Thanos Papadopoulos, School of Management, University of Southampton, UK
Dr. Panagiotis Kanellis, Executive Director, Advisory services, Greece
Teta Stamati, SingularLogic Integrator, Greece.
The management and sharing of information and knowledge is one of a small set of core competencies that has such a direct and profound effect on reaching and sustaining competitive advantage. We live in the "Information Society", where the amount of information and knowledge a firm possesses equals its ability to act on time, dealing thereby with constant changes in the external context in it is embedded. Hence, information and knowledge management bring various issues to the fore, such as how to retrieve the most relevant and trustworthy sources; how to use these sources so as to succeed in the achievement of a firm's strategic plans; how to use them for making decisions, providing individuals with the appropriate modelling techniques (e.g. cognitive mapping) and Information Systems (IS) (e.g. expert and knowledge management systems) for this; and how to use them for personal knowledge enhancement and improvement of one's role as "knowledge worker" in today's information society (Edwards et al., 2009).
The achievement of a firm's strategic plan and competitive advantage is dependent on its ability to respond to challenges occurring in both internal and external environment. In this vein, Operational Research (OR) comes to the fore, inter alia, as an agent and means of securing that 'intervention and change' - which is needed for the achievement of a firm's objectives- is effective and successful (Klein et al., 2007). Successful OR practice involves the successful management of information andknowledge through the design and implementation of various models and IS (e.g. knowledge management and expert systems, artificial intelligence). These models and systems enable, for instance, effective decision making; they bring changes in the knowledge of individuals and groups associated with the change; and they help them to understand highly complex change situations, as well as the interactions between
multiple stakeholders with often conflicting and competing views, who discuss, negotiate changes, and use modelling techniques to deal with the complexities of these different interpretations (Edwards et al., 2009). Thus, change and intervention, improved and effective decision making, the delivery of new products and services and the improvement of already existing ones are dependent on OR practice through the effective information and knowledge management, and technological capabilities as suggested by the use of IS and models. However, this poses challenges related to numerous factors (e.g. contextual, cultural) that need to be taken into consideration when designing, implementing, and managing effective models and IS. Research has
shown the influence of the aforementioned factors, but, clearly, further research is needed into these topics.
The motivation for this Special Issue stems from the unexplored issues regarding the development and implementation of OR based models, IS, and networking in managing information and knowledge in today's complex contexts. The focus is to stimulate discussion and debate on the processes and models for the management of information and knowledge. Submitted papers must be practical/real world cases which emphasise the role of IS (e.g. expert and knowledge management systems), and OR model development and implementation as mechanisms to e.g. store, retrieve, coordinate, share, and control the exchange of knowledge and information, and suggest managerial lessons to be learnt. Potential topics, but not restricted to, include:
§ IS implementation issues (Social, cultural, contextual, power, politics) for
information and knowledge management;
§ The creation of an enterprise knowledge-driven culture and learning organisation
and delivery of value based on customer knowledge;
§ The emergence of networks and social networking for information and knowledge
exchange and sharing;
§ The role of trust, solidarity, and power in knowledge sharing and exchange;
§ Knowledge management practices and IS enabled innovation, core competencies
and intellectual capital valuation;
§ The role of knowledge management systems with the form of artificial intelligence,
expert and knowledge management systems in avoiding or mitigating risk during
strategic planning and problem solving.
§ The role of knowledge management in modelling decision support and facilitating
group decisions by forms of knowledge modelling (e.g. causal maps or values'
hierarchies), so as to bring to light knowledge/opinions exchanged in the group,
ensure the underlying issues are analysed rigorously, and promote learning
(Edwards et al., 2009; Montibeller et al., 2006).
§ The development and implementation of specific OR- based models and algorithms
that underpin many systems and play important role in information and knowledge
management.
We welcome papers that bridge the gap in the overlapping fields of IS, knowledge management and OR-driven information and knowledge management. We also
welcome papers that are of particular relevance to practitioners and draw from different background theories and results of research on IS and OR driven information and knowledge management.
References:
Edwards, J.S., Ababneh, B., Hall, M., and Shaw, D. (2009). Knowledge management: a review of
the field and of OR's contribution. Journal of the Operational Research Society, 60, S114-S125.
Klein, J.H., Connell, N.A.D., and Meyer, E. (2007). Operational research practice as storytelling.
Journal of the Operational Research Society 58, 1535 -1542.
Montibeller, G., Shaw, D., and Westcombe, M. (2006). Using decision support systems to
facilitate the social process of knowledge management. Knowledge management research and
practice, 4, 125-137.
Key dates
Deadline for submission: 30th November 2010
Publication: mid-2011
Submission
Papers must be submitted to: a.papadopoulos(a)soton.ac.uk and accompanied by a cover
letter explicitly stating the contribution of the paper. They must also comply with the
OR Insight Instructions to Authors (http://www.palgravejournals.com/ori/author_instructions.html) -especially the requirement that author
names should not appear anywhere in the manuscript file that is submitted. Normal OR
Insight reviewing procedures and standards will apply.
The Guest Editors will be happy to answer any queries from potential authors.
Best Regards,
Thanos
========================================================
Dr Athanasios (Thanos) Papadopoulos, Dipl-Eng, MSc, PhD, FHEA
Lecturer in Knowledge and Information Systems Management
School of Management
University of Southampton
Room 4052, Building 2, Highfield
Southampton, UK
SO17 1BJ
Tel: +44 (0)23 8059 7716
Fax: +44 (0)23 8059 3844
Email: a.papadopoulos(a)soton.ac.uk
www.management.soton.ac.uk
========================================================
-
-
The SIGDSS LISTSERV is a service of the AIS Special Interest Group on Decision Support, Knowledge and Data Management Systems (SIG DSS) (http://sigs.aisnet.org/sigdss). To unsubscribe, redirect, or change subscription options please go to http://lists.asu.edu/cgi-bin/wa?SUBED1=sigdss&A=1. Each sender assumes responsibility that his or her message conforms to the SIGDSS LISTSERV policies and conditions. Please email Haluk.Demirkan(a)asu.edu if you have any questions. This listserv is supported, in part, by the Department of Information Systems in W.P. Carey School of Business, Arizona State University.
Sincerely,
Haluk Demirkan
Professor of Information Systems
W.P. Carey School of Business
Arizona State University
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original-Nachricht --------
Betreff: [AISWorld] IEEE Social Network Analysis Workshop: BASNA 2010
Datum: Sun, 4 Jul 2010 09:17:01 +0530 (IST)
Von: Jai Ganesh <jaiaiyar(a)yahoo.com>
An: aisworld <aisworld(a)lists.aisnet.org>
Dear Friends
Please consider participating as well as submitting your articles to the
upcoming IEEE International Workshop on Business Applications of Social
Network Analysis BASNA 2010 http://sites.google.com/site/basna2010/.
Call for papers is given below:
IEEE International workshop on Business Applications of Social Network
Analysis - BASNA 2010
December 15, 2010, Bangalore (India)
http://sites.google.com/site/basna2010/
The aim of this workshop is to encourage multidisciplinary discussions
related to novel ideas and application geared towards analyzing social
network data. By bringing together researchers in the fields of Social
Network Analysis (SNA), data mining, and management studies, the
workshop will focus on identifying the “grey” areas of collaboration
among their respective disciplines:
- The role of data mining techniques in identifying scalable methods for
the extraction and organization of social relations for management
research and business practice
- The role of management research in guiding data mining efforts and SNA
metrics development towards theoretically-grounded discoveries about
social network emergence.
- The role of Social Network Analysis in developing and applying metrics
and tools for the mapping, evaluation, visualization, and design of
social relations in organizations.
Topics:
The workshop's topics of interest include (but are not limited to the
following):
* Algorithms for data mining social networks, graphs, links
* Applications of social network data mining to address a real world
business scenario
* Anomaly detection in network based applications like intrusion
detection in telecommunication
* Fraud detection in telecommunication network
* Mobile social networks
* Community discovery in social networks
* Contextual applications for social networks
* Data mining applications for micro-blogging (real time mining)
* Data mining on large graphs
* Mining Wikipedia like graph/network structure
* Data mining applications for viral marketing
* Behavioral analysis in social networks
* Social semantic web
* Privacy issues in social networks
* Recommendations in social networks
Social Network Analysis (SNA) -based:
* Knowledge Management (identifying experts, fostering knowledge
exchange and integration, creating and developing communities of
practice)
* Marketing (identifying new customers, customer relationship
management)
* Innovation Support (enhancing innovation capacity, supporting new
product development teams)
* Change Management (managing change, post-merger integration,
identifying key enablers)
* Talent Management (hiring and career development)
* Leadership Development (decision-making, identifying leaders)
* Intra-Organizational Coordination (supporting coordination and
information flows among organizational members and units)
* Inter-Organizational Coordination (supporting collaboration in
consortia, industrial districts, inter-organizational alliances)
IMPORTANT DATES:
Paper submission: 19th September 2010 (EST, USA)
Paper review notification: 11th October 2010 (EST, USA)
Paper camera ready: 31th October 2010 (EST, USA)
Organizing Committee:
* Koustuv Dasgupta, IBM Research
* Roberto Dandi, Luiss Business School, Italy
* Avik Sarkar, Nokia Siemens Networks
Technical Program Committee:
* Alejandro (Alex) Jaimes, Yahoo Research, Spain
* Samit Paul, Samsung India Software Operations
* Ashish Tendulkar, IIT Madras
* Akshay Java, MSN, Microsoft, USA
Regards
Dr. Jai Ganesh
Principal Research Scientist
Future Web Research Lab
SETLabs
Infosys Technologies Ltd.
Bangalore, India
Telephone: +91-80-4105 9503 (Ext 59503)
Cell: +91-97422-01314
VOIP: 39134375
Blog: http://infosysblogs.com/web2/
Infosys *iP**ROWE*
Product for Web Accessibility Assessment & Remediation
<http://www.infosys.com/offerings/products-and-platforms/iprowe/Pages/index.…>
-------- Original-Nachricht --------
Betreff: [AISWorld] CFP-VCOBAM 2010: A Research Conference just a click
away and Absolutely Free
Datum: Sat, 3 Jul 2010 20:12:33 +0800
Von: Kamna Malik <kamna.malik(a)u21global.edu.sg>
An: <aisworld(a)lists.aisnet.org>
Dear Colleagues,
We invite original contributions for the Second Virtual Conference on
Business and Management (VCOBAM 2010) till July 15, 2010.
The Conference theme is "New Paradigms: Business and Management".
Related Tracks include (but not limited to) - E-learning, Emerging
business models, Emerging Practices in General Business and Management,
Knowledge Management, Service science and Social Responsibility*.*
*N**o** t**ravel** and** no conference fee** is** involved.** ** **
Deserving submissions will be considered for publication in
regular/special issue of international peer review journals.*
*For details, please visit* *_www.u21global.edu.sg/vcobam_*
<http://www.u21global.edu.sg/vcobam>
Look forward to receive your submission. Please forward this message to
your research students and other colleagues.
Best regards,
Kamna
-------- Original-Nachricht --------
Betreff: Congress on Software Engineering & Intelligent Systems (EI
Compendex/ISTP/IEEE Xplore)
Datum: Sun, 4 Jul 2010 16:51:14 +0800
Von: GCIS & WCSE 2010 CFP <GCIS2010CFP(a)whut.edu.cn>
An: <gustaf.neumann(a)wu-wien.ac.at>
In response to many requests, the submission deadline has been extended
to 15 July.
*2010 Second **World**** Congress on Software Engineering (WCSE**** **2010)*
http://world-research-institutes.org/conferences/WCSE/2010////
//19-20/// ///December 2010, Wuhan, China//
**2010 Second*** **Global Congress on Intelligent Systems* *(GCIS 2010)*
http://world-research-institutes.org/conferences/GCIS/2010////
/16-17 December 2010, Wuhan, China/
WCSE & GCIS 2010 intends to be a global forum for researchers and
engineers to present and discuss recent innovations and new techniques
in intelligent systems and software engineering.
WCSE & GCIS 2010 conference proceedings will be published by the CPS
which will include the conference proceedings in the IEEE Xplore and
submit the conference proceedings to Ei Compendex and ISTP for indexing
(WCSE & GCIS 2009 proceedings were already indexed in Ei Compendex). The
registration fee of US D 400 or RM B 2700 includes publication of 1
paper, lunches, dinners, and banquet.
Specific topics of interest include, but are not limited to:
GCIS: artificial intelligence, machine learning, intelligent control and
automation, computational intelligence, soft computing, nature-inspired
computation, bio-inspired algorithms, neuro-fuzzy techniques, genetic
and evolutionary algorithms, semantic web, etc..
WCSE: Software metrics; Software tools and development environments;
Software policy and ethics; Programming languages; Internet and
information systems development; Software requirements; Software
architecture and design; Software components and reuse; Software testing
and analysis; Human-Computer Interaction; Software processes and
workflows; Software dependability, safety, privacy and reliability;
Reverse engineering and maintenance; Program comprehension and
visualization, etc..
Wuhan is known as the "Homeland of White Clouds and Yellow Crane" and is
one of China´s largest cities. There are many scenic spots and
historical sites within and around Wuhan, for example, the Yellow Crane
Tower, the East Lake, many charming colonial style buildings along
Yanjiang Street and around Hongshan Square.
*Important Dates:*
Paper Submission Deadline (Extended): *15 July 2010*
Review Notification:
1 September 2010
Final Papers and Author Registration Deadline: 15 September 2010
In addition to research papers, the conference also encourages companies
and institutions to showcase their modern products and equipment in the
conference area.
Please email your inquiries to GCIS2010(a)whut.edu.cn
<mailto:GCIS2010@whut.edu.cn> (for GCIS 2010) or WCSE2010(a)whut.edu.cn
<mailto:WCSE2010@whut.edu.cn> (for WCSE 2010).
Please feel free to forward to others.
To unsubscribe, please reply with "unsubscribe
gustaf.neumann(a)wu-wien.ac.at " as your email subject.