-------- Original Message --------
Subject: [AISWorld] CFP: AMCIS 2012 Mini-Track:
Socio-Technical Aspects of Information Systems
Date: Mon, 13 Feb 2012 13:57:09 +0000
From: Laurence Brooks <Laurence.Brooks(a)brunel.ac.uk>
To: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>,
UKAIS-NOTICES(a)JISCMAIL.AC.UK <UKAIS-NOTICES(a)JISCMAIL.AC.UK>
CALL FOR PAPERS
18th Americas Conference on Information Systems
Seattle, Washington, August 9-12, 2012
TRACK: Philosophical Perspectives in IS
MINI-TRACK: Socio-Technical Aspects of Information Systems
Description:
The traditional view of information systems (IS) and their
development (ISD) has progressed significantly
since the early information systems developed under the
technology-centric view; the hardware and its 'user'.
There is growing acceptance that it is not solely the
technical issues which are the major factor in their
successful development and use, but the other relevant
(non-technical) human and social factors. These
combine with technologies to create the informated contexts
in which IS are developed and operate;
effectively or otherwise. Within the IS field the
'socio-technical' movement (Mumford, {1995, 2003}) can be
seen to provide insights into this complex relationship
between the technological artefact and the social
aspects in which they are situated (Avgerou et. al., 2004).
As such they may be understood independently of
the actors that produced them in the first place but
intimately situated within their contemporary contexts.
In doing so these technologies and their functionality may
be seen to combine with humans and their actions
to constitute informated 'socio-technical ensemble' (Bijker
and Law 1995) that exhibit a concerted agency.
How such ensembles may be effectively created, maintained
and changed -- locally and globally- incrementally
and radically - is the subject of this mini-track.
Suggested topics:
. Social informatics
. The application of social theory to information systems
(eg. Structuration Theory, Actor-Network Theory,
StructurANTion Theory)
. Human and organisational aspects of information systems
. Balancing of social and technical factors in information
systems development and information systems
. Critiques of the socio-technical approach
. Case studies of socio-technical analysis of information
systems
. Socio-materiality and its implications for our
understanding of information systems
. Comparative studies (ie. between sectors, countries,
cultures, etc.) of socio-technical analyses of information
systems
. Comparative analyses of socio-technical change and
information systems
. Global/local (or 'glocal') balance of information systems
within a socio-technical context
Mini-track chairs:
Laurence Brooks
Email: Laurence.Brooks(a)brunel.ac.uk
School of Information Systems Computing and Mathematics,
Brunel University, UK
Phone: +44 (0) 1895 266010
David Wainwright
Email: david.wainwright(a)northumbria.ac.uk
School of Computing, Engineering & Information Sciences,
Northumbria University, Newcastle upon Tyne, UK
Phone: +44 (0) 191 2437634
Submission Procedure:
Submit your manuscript using the manuscript central system
at - http://mc.manuscriptcentral.com/amcis2012
Important Dates
* January 3, 2012: Manuscript Central will start
accepting paper submissions
* March 1, 2012: (11:59 PM Pacific time zone): Deadline
for paper submissions
* April 2, 20012: Authors will be notified of acceptances
on or about this date
* April 20, 2012: (11:59 PM Pacific time zone): For
accepted papers, camera ready copy due
_______________________________________________________
Laurence Brooks
Past President, UK Academy for Information Systems (UKAIS)
President, UK Systems Society (UKSS)
Course Director, MSc Information Systems Management (ISM)
(http://www.brunel.ac.uk/siscm/disc/postgraduates/masters/information-system…)
Lecturer, Department of Information Systems and Computing
School of Information Systems, Computing and Mathematics
Brunel University Uxbridge, Middlesex, UB8 3PH, UK.
Tel: +44 (0)1895 266010 (direct)
Fax: +44 (0)1895 251686
Mobile: +44 (0)7866 726928
Email: laurence.brooks(a)brunel.ac.uk
<mailto:laurence.brooks@brunel.ac.uk>
Skype: laurencebrooks
Web: http://people.brunel.ac.uk/~csstllb/
<http://people.brunel.ac.uk/%7Ecsstllb/>
UKAIS: http://www.ukais.org
UKSS: http://www.ukss.org.uk
-------- Original Message --------
Subject: [AISWorld] CFP:7th Annual Symposium on Information
Assurance (ASIA ’12) & 5th Secure Knowledge Management (SKM
2012)
Date: Mon, 13 Feb 2012 15:41:06 -0500
From: Manish Gupta <mgupta3(a)buffalo.edu>
To: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
*CALL FOR PAPERS*
7th Annual Symposium on Information Assurance (ASIA ?12)&
5th Secure Knowledge Management (SKM 2012)
15th Annual New York State Cyber Security Conference
/http://www.albany.edu/iasymposium//
//https://www.easychair.org/conferences/?conf=asiaandskm201//2/
*SUBMISSION DEADLINE:***
*March 05**, 201**2*
Held on June 5-6, 2012at Empire State Plaza in Albany, NY
**
This is a call for papers for the 7^th Annual Symposium on
Information Assurance (ASIA ?12), which is being merged with
the 5^th Secure Knowledge Management Conference (SKM 2012)
this year. This event will be held in conjunction with the
15^th Annual New York State Cyber Security Conference
(NYSCSC). This two-day event is expected to attract over 900
participants including practitioners, researchers, and
vendors providing opportunities for business and
intellectual engagement among attendees. The symposium is
organized by the School of Business and the NYS Center for
Information Forensics and Assurance (CIFA) at the University
at Albany, State University of New York, as well as the NYS
Division of Homeland Security and Emergency Services Office
of Cyber Security (OCS). Through generous sponsorships, we
are able to have free registration for all selected
presenters, authors of accepted papers, and members of
government organizations. There is a modest fee of $50 for
not-for-profit attendees and $200 for private registrants.
All participants in ASIA & SKM will also be able to attend
other NYSCSC sessions that typically cover practical
applications of information security. Authors are invited to
submit papers in information assurance and secure knowledge
management for (but not limited to) topics listed below:
·Information Assurance
·Privacy &
·Information Security Education
·Risk Management
·Policy Design & Implementation
·Policy Compliance & Auditing
·Business Continuity
·Disaster Recovery
·Information Security Economics
·Cyber Warfare & Terrorism
·Internet-based Espionage
·Critical Infrastructure Security
·Smart Grid Security
·Network Data Collection & Analysis
·Intrusion Detection & Prevention
·Network Security
·Web Security
·Mobile Device Security
·Cloud Computing Security
·Cyber Crime Investigation
·Digital & Network Forensics
·Forensic Accounting & Fraud
·Self-Organization Based Models
·Cryptography / Quantum Computing
·Digital Rights Management
·Linguistic Analysis for Security
·Knowledge Management
·Content Management
·Security Languages
**
*SUBMISSION GUIDELINES*
1.Submitted papers must not have been previously published,
or currently under consideration for publication elsewhere,
or have substantial overlap with papers the author has
submitted elsewhere.
2.Submissions undergo a double-blind peer review process.
3.Papers selected for presentation will be published in
proceedings; however, we do not take the copyright away from
authors. Arrangements are also being made with journals to
publish extended versions of selected papers from the symposium.
4.Papers in the topic areas discussed are preferred,
although contributions outside those topics may also be of
interest. Please feel free at any time to contact the
symposium chair if you have questions regarding your submission.
5.Papers should be submitted via the conference submission
system at:
https://www.easychair.org/conferences/?conf=asiaandskm2012
6.The paper should conform to theIEEE format andmustinclude
the following:
a)Separate title page (in plain text) with Title, Name(s) of
authors, Organizational affiliation(s), telephone and fax
number(s), postal address(es), and email address(es), Author
to contact for correspondence about the paper.
b)Abstract (less than 250 words)
c)Paper including a brief biography of each author as
appropriate at the end of the paper
**
*SUBMISSION CATEGORIES*
Submissions can be made in a number of categories: Completed
research papers, research-in-progress papers, case studies,
and panel proposals/round table discussions. Please follow
the following guidelines in preparing your submission.
1.Completed Research Papers: Typically 5,000 words long
(excluding abstract and references).
2.Research in Progress Papers: Typically 2,500 words
(excluding abstract and references).
3.Panel Proposals: Typically a 1,000 word description,
identifying the panelists to be involve
*IMPORTANT DATES*
*Submission Deadlin**e*
03/05/12
*Reviewer Feedbac**k*
03/31/12
*Final Paper Submission***
04/15/12
*Symposium Dates*
06/05/12? 06/06/12
**
**
**
*
*
*ORGANIZING COMMITTEE ASIA ?12 & SKM 2012*
**
*GENERAL CHAIR*
*Sanjay Goel*
Director of Research, CIFA
Associate Professor, School of Business
University at Albany, SUNY
goel(a)albany.edu <mailto:goel@albany.edu>
**
*CONFERENCE CHAIR*
*Elisa Bertino*
Professor, Computer Science Department
Research Director, CERIAS
Interim Director, Cyber Center (Discovery Park)
Purdue University, West Lafayette, IN
bertino(a)cs.purdue.edu <mailto:bertino@cs.purdue.edu>
*PROGRAM CHAIR*
*Raj Sharman*
Associate Professor, School of Management
University at Buffalo, SUNY
rsharman(a)buffalo.edu <mailto:rsharman@buffalo.edu>
**
*ORGANIZATION CHAIR*
*Karen Sorady*
Assistant Deputy Director of Cyber Programs, OCS
ksorady(a)dhses.ny.gov <mailto:ksorady@dhses.ny.gov>
**
*SUBMISSIONS CHAIR*
*Damira Pon*
Senior Research Analyst, CIFA
University at Albany, SUNY
damira(a)gmail.com <mailto:damira@gmail.com>
*REVIEW CO-CHAIRS*
*Ravi Sen*
Associate Professor
Dept.of Information and Operations Mgt.
Mays Business School
Texas A&M University
rsen(a)mays.tamu.edu <mailto:rsen@mays.tamu.edu>
**
*Chandrasekar Subramaniam*
Associate Professor
Management Information Systems
University of North Carolina at Charlotte
csubrama(a)uncc.edu <mailto:csubrama@uncc.edu>
**
*ADVISORY COMMITTEE*
*Kevin A Kwiat*, /Air Force Research Lab/
*Nasir Memon,*/NYU Polytechnic/
*Hoang Pham*, /Rutgers University/
*H. Raghav Rao*, /University at Buffalo, SUNY/
*Bhavani Thuraisingham*, /UT Dallas/
*Shambhu Upadhyaya,*/Univ. at Buffalo, SUNY/
**
**
**
**
*PROGRAM COMMITTEE*
Alex Tuzhilin, /New York University/
Alvaro Ortigosa, /Autonoma Universidad de Madrid/
Anil B. Somayaji, /Carleton University, Canada/
Ben Shao, /Arizona State University/
Billy Rios, /Microsoft Corporation/
Boleslaw Szymanski,/RPI/
Bradley Malin, /Vanderbilt University/
Daniel Rice, Tech. /Solutions Experts, Inc./
Dipankar Dasgupta, /University of Memphis/
Farookh Salam, /UNC at Greensboro/
George Berg, /University at Albany, SUNY/
Gurpreet Dhillon, /VCU/
Hemantha Herath, /Brock University/
Hoang Pham, /Rutgers University/
Hong C. Li, /Intel Corporation/
Hui Xiong, /Rutgers University/
Jaideep Vaidya, /Rutgers University/
Jeffrey Carr, /GreyLogic/
Jim Cao,/Alcatel-Lucent, Bell Laboratories/
Jingguo Wang, /UT at Arlington/
Junjie Wu, /Beihang University/
M.P. Gupta, /Indian Institute of Tech., Delhi/
Manish Gupta, /M&T Bank/
Manish Parashar, /Rutgers University/
Marco Gruteser, /Rutgers University/
Martin Loeb, /University of Maryland/
Mohan Kankanhalli, /National U. of Singapore/
Murtuza Jadliwala, /EPFL, Lausanne/
Myon-K. Jeong, /Rutgers University/
Nan Zhang, /George Washington University/
Raghu Santanam, /Arizona State University/
Ronald Dodge, /United States Military Academy/
S. S. Ravi, /University at Albany, SUNY/
Shiu-Kai Chin, /Syracuse University/
Stelios Sidiroglou-Douskos, /MIT/
Stephen F. Bush, /GE Global Research Center/
Sumita Mishra,/RIT/
Tejaswani Herath, /Brock University/
Thu D. Nguyen, /Rutgers University/
Tin Kam Ho, /Alcatel-Lucent Bell Laboratories/
Tyrone Grandison, IBM /Almaden Research Lab/
Vidyaraman Sankaranarayanan,/Microsoft/
Vijay Atluri, /Rutgers University /
W. Art Chaovalitwongse, /Univ. of Washington/
Wade Trappe, /Rutgers University/
Yan Sun, /University of Rhode Island/
Yanyong Zhang, /Rutgers University/
Yucel Saygin, /Sabanci University/
Rahul Singh, /United Nations Global Compact
<http://www.unglobalcompact.org/>/
Olivia Sheng/, University of Utah/
Manish Gupta, /M&T Bank/
Ernst Bekkering, /Northeastern State University
<http://www.nsuok.edu/>/
Merrill Warkentin/, Mississippi State University/
Gaurav Bansal, /University of Wisconsin/
-------- Original Message --------
Subject: [AISWorld] CFP: ICTM-2012 Wroclaw, Poland
Date: Mon, 13 Feb 2012 15:34:32 -0500 (EST)
From: Narcyz Roztocki <roztockn(a)newpaltz.edu>
To: aisworld(a)lists.aisnet.org
CALL FOR PAPERS
ICT Management for Global Competitiveness and Economic
Growth in Emerging Economies
Wroclaw, Poland, September 17-18, 2012
Sponsored by AIS Special Interest Group on ICT and Global
Development
(SIG GlobDev)
CONFERENCE CO-CHAIRS
Jolanta Kowal, College of Management EDUKACJA, Wroclaw, Poland
Narcyz Roztocki, SUNY at New Paltz, U.S.A.
Conference website:
http://www.ictm2012.edukacja.wroc.pl/
Fast growing emerging economies, including transition
economies, are often considered the growth engine of the
global economy. Unfortunately, despite the fast growth of
emerging economies, the economic gap between emerging
economies and the mature, developed countries still exists.
It seems that in order to truly close this gap, new
management techniques, new business models, and new
regulatory policies, among other factors are needed.
Moreover, it could be expected that information and
communication technologies (ICTs) will play a vital role in
this process.
Thus, the objective of this conference is to provide a forum
for interested researchers and practitioners for exchanging
their creative ideas on these issues.
Possible contributions regarding the ICT management for
global competitiveness and economic growth in emerging
economies may include, but are not limited to, the following:
1. Social, political and legal frameworks and ICT Management
in emerging and transition economies
2. Unique ICT management techniques for emerging and
transition economies
3. Methods for measuring the benefits and costs of projects
involving the adoption of ICT
4. The role of human and social capital
5. Innovative ways for generating revenues creating
commercial knowledge products in emerging and transition
economies
6. Educational systems and ICT Management in emerging and
transition economies
7. ICT to support small and medium firms in emerging and
transition economies
8. ICT management in small businesses as a path to economic
growth
9. ICT productivity studies at the country, industry or firm
level, with specific reference to the social and business
conditions prevalent in emerging or transition economies
10. Global supply chain management and its contribution to
emerging and transition economies
11. Country specific case studies, with specific reference
to the social and business conditions prevalent in emerging
and transition economies
12. IT off-shoring / IT outsourcing into emerging and
transition economies
13. International ICT project management, with specific
reference to the social and business conditions in emerging
or transition economies
14. Digital divide in emerging and transition economies
15. E-commerce effect on emerging or transition economies
16. E-government in emerging or transition economies
CONFERENCE COMMITTEE
Mito Akiyoshi Senshu University Japan
Nabeel Al-Qirim United Arab Emirates University
United Arab Emirates
Francis Andoh-Baidoo The University of Texas-Pan American
USA
Anton Arapetyan Lviv Business School UCU Ukraine
David Bennett Chalmers University of Technology Sweden
Svein Bergum Lillehammer University College Norway
Edward Bernroider Vienna University of Economics and
Business Austria
Wojciech Bozejko Wroclaw University of Technology and
College of Management Edukacja Poland
Carsten Brockmann Universität Potsdam Germany
Sergey Butakov SolBridge International School of
Business South Korea
Narciso Cerpa Universidad de Talca Chile
Daniele Chauvel SKEMA Business School,
Sophia-Antipolis France
Alina Chircu Bentley University USA
Robert Davison City University of Hong Kong Hong Kong
Cesar Alexandre de Souza FEA-USP Brazil
Gert-Jan de Vreede University of Nebraska at Omaha USA
Radoslav Delina Technical University of Kosice Slovakia
Kathy Dhanda DePaul University USA
Antonio Diaz Andrade AUT University New Zeland
Tagelsir Gasmelseid King Faisal University Saudi Arabia
Walid Ghodbane University of Manouba Tunisia
Biswadip Ghosh Metropolitan State College of Denver USA
Ake Gronlund Orebro University Sweden
Angappa Gunasekaran University of Massachusetts Dartmouth
USA
G. Hari Harindranath Royal Holloway, University of
London UK
Marlene Holmner University of Pretoria South Africa
Laura Hosman Illinois Institute of Technology USA
Gordon Hunter The University of Lethbridge Canada
Zahir Irani Brunel University UK
Diana Ishmatova St.Petersburg State University Russia
Murray Jennex San Diego State University USA
Jerzy Jozefczyk Wroclaw University of Technology Poland
Kalinka Kaloyanova University of Sofia Bulgaria
Ranjan Kini Indiana University Northwest USA
Ned Kock Texas A&M International University USA
Gwendolyn L. Kolfschoten Delft University of
Technology The Netherlands
Przemyslaw Lech University of GdaÅ?sk Poland
Mieczyslaw K. Leniartek College of Management Edukacja
Poland
Lenka Lhotska Czech Technical University in Prague
Czech Republic
James Lockhart Massey University New Zeland
Xin (Robert) Luo The University of New Mexico USA
Maria Madlberger Webster University Vienna Austria
Dora Marinova Curtin University Australia
Janusz Martan Wroclaw University of Technology Poland
Philip Merry Philip Merry Consulting Group Pte Ltd
Singapore
Valter Moreno Faculdades Ibmec Brazil
Piotr Olesniewicz College of Management Edukacja Poland
Celina M. Olszak Uniwersytet Ekonomiczny w Katowicach
Poland
Margherita Pagani Bocconi University Italy
Jan Paralic Technical University of Kosice Slovakia
Krassie Petrova AUT University New Zeland
Shana Ponelis University of Wisconsinâ??Milwaukee USA
Alcina Maria Narciso Prata University of Lisbon Portugal
Andreja Pucihar University of Maribor Slovenia
Sajda Qureshi University of Nebraska at Omaha USA
Corina Raduescu University of Sydney Australia
Jose-Antonio Robles-Flores ESAN Peru
Ryszard Rohatynski College of Management Edukacja Poland
Gustavo Rossi Universidad Nacional de La Plata Argentina
Marcus Rothenberger University of Nevada, Las Vegas USA
Paulo Rupino Cunha University of Coimbra Portugal
Jerzy Sas Wroclaw University of Technology Poland
Ada Scupola Roskilde University Denmark
Stefan Seidel University of Liechtenstein Liechtenstein
Janice Sipior Villanova University USA
Piotr Soja Cracow University of Economics Poland
Frantisek Sudzina Aarhus University Denmark
Mohammad Talha King Fahd University of Petroleum &
Minerals Saudi Arabia
Margaret Tan Nanyang Technological University Singapore
Tommi Tapanainen Turku School of Economics, Turku Finland
Gurvirender Tejay Nova Southeastern University USA
Marinos Themistocleous University of Piraeus Greece
Tibor Voros Central European University Hungary
Richard Watson University of Georgia USA
Vishanth Weerakkody Brunel University UK
Eli Weintraub Derby University Israel
Roland Weistroffer Virginia Commonwealth University USA
Mieczyslaw Wodecki University of Wroclaw and College of
Management Edukacja Poland
Andrzej Zolnierek Wroclaw University of Technology Poland
Jozef M. Zurada University of Louisville USA
CONFERENCE CO-CHAIRS'CONTACT INFORMATION
Jolanta Kowal
Edukacja College of Management
ul. Krakowska 56-62
50-425 Wroclaw, Poland
Phone: +48 71 37 72 158
E-Mail: prorektor.nauka(a)edukacja.wroc.pl
Narcyz Roztocki
State University of New York at New Paltz
School of Business
75 S. Manheim Blvd.
New Paltz, NY 12561-2443, USA
Phone: +1 (845) 257-2935
Fax: +1 (845) 257-2947
E-Mail: roztockn(a)newpaltz.edu
CONFERENCE SECRETARY
Aleksandra Kwiatkowska
College of Management "Edukacja"
Krakowska 56-62 Street
50-425 Wroclaw, Poland
Phone: +48 71 37 72 152
email: ictm2012(a)edukacja.wroc.pl
CONFERENCE PROCEEDINGS
Paper presented at the conference will be published in the
conference proceedings.
The best papers submitted to the ICTM 2012 Conference will
be fast tracked to a special issue of the Electronic Journal
of Information Systems in Developing Countries (EJISDC -
ISSN 1681-4835). Information about the journal can be found
at http://www.ejisdc.org
IMPORTANT DATES
Paper/Panel Proposal Submission Deadline: April 1, 2012
Notification to Authors: June 1, 2012
Deadline for Final Papers and Deadline for Registration:
June 21, 2012
Conference Date: September 17-18, 2012
AUTHOR INSTRUCTIONS
Submitted papers should be approximately 5,000 words or
approximately 20 pages in length.
Please clearly indicate the category of your paper on the
title page:
Research Paper
Contribution to Practice Paper
Research-in-progress Paper
Student Paper
Panel Proposal
SUBMISSIONS
All papers submissions and panel should be sent to:
https://www.easychair.org/conferences/?conf=ictm20121
-------- Original-Nachricht --------
Betreff: [computational.science] computational.science(a)lists.iccsa.org
Datum: Tue, 14 Feb 2012 15:43:39 +0100
Von: SECRYPT 2012 <secrypt2012(a)unimi.it>
Organisation: "ICCSA"
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
[Apologies if you receive multiple copies of this message]
CALL FOR PAPERS
************************************************************************
9th International Conference on Security and Cryptography (SECRYPT 2012)
Rome, Italy, July 24-27, 2012
http://secrypt.icete.org
************************************************************************
SECRYPT is an annual international conference covering research in
information and communication security. The 9th International
Conference on Security and Cryptography (SECRYPT 2012) will be held in
Rome, Italy. The conference seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, security, and
cryptography. Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged. The conference topics include, but are not limited
to:
- Access Control
- Applied Cryptography
- Authentication
- Biometrics Security and Privacy
- Critical Infrastructure Protection
- Data Integrity
- Data Protection
- Database Security and Privacy
- Digital Forensics
- Digital Rights Management
- Ethical and Legal Implications of Security and Privacy
- Formal Methods for Security
- Human Factors and Human Behaviour Recognition Techniques
- Identification, Authentication and Non-repudiation
- Identity Management
- Information Hiding
- Information Systems Auditing
- Insider Threats and Countermeasures
- Intellectual Property Protection
- Intrusion Detection& Prevention
- Management of Computing Security
- Network Security
- Organizational Security Policies
- Peer-to-Peer Security
- Personal Data Protection for Information Systems
- Privacy
- Privacy Enhancing Technologies
- Reliability and Dependability
- Risk Assessment
- Secure Cloud Computing
- Secure Software Development Methodologies
- Security Protocols
- Security and Privacy in Mobile Systems
- Security and Privacy in Complex Systems
- Security and Privacy in IT Outsourcing
- Security and Privacy in Location-based Services
- Security and Privacy in Pervasive/Ubiquitous Computing
- Security and Privacy in Social Networks
- Security and Privacy in Web Services
- Security and Privacy Policies
- Security Area Control
- Security Deployment
- Security Engineering
- Security for Grid Computing
- Security in Distributed Systems
- Security Information Systems Architecture and Design and Security
Patterns
- Security Management
- Security Metrics and Measurement
- Security Requirements (Threats, Vulnerabilities, Risk, Formal
Methods, etc.)
- Security Verification and Validation
- Sensor and Mobile Ad Hoc Network Security
- Service and Systems Design and QoS Network Security
- Software Security
- Trust Management and Reputation Systems
- Ubiquitous Computing Security
- Wireless Network Security (WiFi, WiMAX, WiMedia and others)
PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the
submission web site at http://www.insticc.org/Primoris.
Two categories of papers can be submitted:
- Full Paper: A full paper presents a work where the research is
completed or almost finished. Authors of regular submitted papers
will indicate at the time of submission whether they would like
their paper to also be considered for publication as a position
paper.
- Position Paper: A position paper presents results that are
preliminary or that simply require few pages to describe. A position
paper may be a short report and discussion of ideas, facts,
situations, methods, procedures, or results of scientific research
(bibliographic, experimental, theoretical, or other) focused on one
of the conference topics. The acceptance of a position paper is
restricted to the categories of "short paper" or "poster".
Submitted papers must be formatted according to the SECRYPT format
(with the exception that authors should be blinded in the submission),
which is described at http://secrypt.icete.org/paper_formats.asp.
Submission page limit is 10 pages for full paper and 6 pages for
position papers.
Accepted papers will be subject to the limit of: 10 pages (for full
papers), 6
pages (for short papers), and 4 pages (for posters). Submitted papers
will be subject to a double-blind review process. All submissions
should be anonymized. All accepted papers/posters will be published in
the conference proceedings. A short list of presented papers will be
selected so that revised and extended versions of these papers will be
published by Springer-Verlag in a CCIS Series book. Authors of
accepted papers/posters must guarantee that their papers/posters will be
presented at the conference.
IMPORTANT DATES
Full Paper submission: March 5, 2012
Authors Notification (full papers): May 4, 2012
Final Full Paper Submission and Registration: May 14, 2012
CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.
PROGRAM CHAIR
Pierangela Samarati, Universita' degli Studi di Milano, Italy
PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University,
United States
Jianying Zhou, Institute For Infocomm Research, Singapore
PROGRAM COMMITTEE
Claudio Ardagna, Universita` degli Studi di Milano, Italy
Ken Barker, University of Calgary, Canada
Carlo Blundo, Università di Salerno,, Italy
David Chadwick, University of Kent ,United Kingdom
Aldar Chan, Institute for Infocomm Researc,h Singapore
Ee-chien Chang, National University of Singapore Singapore
Yingying Chen, Stevens Institute of Technology,, United States
Cheng-Kang Chu, Institute for Infocomm Research, Singapore
Marco Cova, University of Birmingham,, United Kingdom
Jorge Cuellar, Siemens AG,, Germany
Frédéric Cuppens, Ecole Nationale de Télécommunications de Bretagne,,
France
Reza Curtmola, New Jersey Institute of Tech,, United States
Ricardo Dahab, University of Campinas (UNICAMP) ,, Brazil
Sabrina De Capitani di Vimercati, Università degli Studi di Milano,
Italy
Roberto Di Pietro, Universita' di Roma Tre,, Italy
Tassos Dimitriou, Athens Information Technology,, Greece
Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, United States
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti, Universita' degli Studi di Milano, Italy
Keith Frikken, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Mark Gondree, Naval Postgraduate School, United States
Dimitris Gritzalis, AUEB, Greece
Yong Guan, Iowa State University, United States
Xinyi Huang, Fujian Normal University, China
Michael Huth, Imperial College London, United Kingdom
Cynthia Irvine, Naval Postgraduate School, United States
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, Technische Universität Darmstadt, Germany
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang Beijing, University of Aeronautics and Astronautics, China
Loukas Lazos, University of Arizona, United States
Adam J. Lee, University of Pittsburgh, United States
Patrick Lee, Chinese University of Hong Kong Hong Kong
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, United States
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Emil Lupu, Imperial College, United Kingdom
Luigi Mancini, University of Rome La Sapienza, Italy
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University Czech Republic
Carlos Maziero, UTFPR - Federal University of Technology - Paraná
state, Brazil
Chris Mitchell, Royal Holloway, University of London, United Kingdom
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
Marco Casassa-Mont, Hewlett-Packard Laboratories, United Kingdom
David Naccache, Ecole Normale Superieure, France
Guevara Noubir, Northeastern University, United States
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany
Raphael C.-w. Phan, Loughborough University, United Kingdom
Radha Poovendran, University of Washington, United States
Joachim Posegga, Institute of IT Security and Security Law, Germany
Kui Ren, Illinois Institute of Technology, United States
Jian Ren, Michigan State University, United States
Sushmita Ruj, University of Ottawa Canada
Gokay Saldamli Bogazici, University MIS department, Turkey
Martin Schläffer, Graz University of Technology, Austria
Miguel Soriano, UPC, Spain
Cosimo Stallo, University of Rome Tor Vergata, Italy
Neeraj Suri, Technische Universität Darmstadt, Germany
Willy Susilo, University of Wollongong, Australia
Chiu Tan, Temple University, United States
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Wen-guey Tzeng, National Chiao Tung University, Taiwan
Guilin Wang, University of Wollongong, Australia
Xinyuan (Frank) Wang, George Mason University , United States
Haining Wang, The College of William and Mary, United States
Lingyu Wang, Concordia University Canada
Osman Yagan, Carnegie Mellon University, United States
Danfeng Yao, Virginia Tech, United States
Alec Yasinsac, University of South Alabama, United States
Shucheng Yu, University of Arkansas at Little Rock, United States
Wensheng Zhang, Iowa State University, United States
Futai Zhang, Nanjing Normal University, China
Wen Tao Zhu, Graduate University of Chinese Academy of Sciences, China
This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/
For any questions, please contact the program chairs:
secrypt2012(a)unimi.it
-----------------------------------------------
SECRYPT 2012 is part of the International Joint Conference on e-
Business and
Telecommunications (ICETE 2012) that has 5 more conferences with very
strong synergies between them, namely:
- DCNET: Int'l Conference on Data Communication Networking (http://www.dcnet.icete.org
)
- ICE-B: Int'l Conference on e-Business (http://www.ice-b.icete.org)
- OPTICS: Int'l Conference on Optical Communication Systems (http://www.optics.icete.org
)
- SIGMAP: Int'l Conference on Signal Processing and Multimedia
Applications (http://www.sigmap.icete.org)
- WINSYS: Int'l Conference on Wireless Information Networks and
Systems (http://www.winsys.icete.org)
The conference program features a number of Keynote Lectures to be
delivered by
distinguished world-class researchers, namely:
- Venu Govindaraju, University at Buffalo, United States
- Sushil Jajodia, George Mason University Fairfax, United States
- Andreas Holzinger, Medical University Graz, Austria
(list not yet complete)
http://www.icete.org/KeynoteSpeakers.aspx
-----------------------------------------------
-------- Original-Nachricht --------
Betreff: CFP ICSOFT 2012 - 7th Int'l Conf. on Software Paradigm Trends
(Rome/Italy)
Datum: Tue, 14 Feb 2012 15:18:37 -0500
Von: ICSOFT Secretariat <postmaster13(a)303media.net>
Antwort an: icsoft.secretariat(a)insticc.org
<icsoft.secretariat(a)insticc.org>
An: gustaf.neumann(a)wu-wien.ac.at
CALL FOR PAPERS
7th International Conference on Software Paradigm Trends
ICSOFT website: http://www.icsoft.org/
24 - 27 July, 2012
Rome, Italy
Sponsored by: INSTICC
INSTICC is Member of: WfMC and OMG
IMPORTANT DATES:
Regular Paper Submission: March 6, 2012
Authors Notification (regular papers): April 23, 2012
Final Regular Paper Submission and Registration: May 4, 2012
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Dear Gustaf Neumann,
This is an invitation to participate in the 7th International Conference on Software Paradigm Trends (ICSOFT 2012 - http://www.icsoft.org/) and submit a paper reflecting your current work (deadline set for next March 6). The conference will take place this Summer in Rome, Italy, on July 24-27.
ICSOFT 2012 aims at bringing together researchers, engineers and practitioners interested on information technology and software development. This seventh edition will focus on the four main paradigms that have been intensively studied during the last decade for software and system design, namely: Models, Aspects, Services and Context.
These four paradigms will drive the design and development of future software systems encompassing a large number of research topics and applications: from programming issues to the more abstract theoretical aspects of software engineering; from models and services to the most complex management information systems; Distributed systems, ubiquity, data interoperability; context understanding and many other topics are included in the scope of ICSOFT.
The conference will feature four Keynote Lectures delivered by distinguished world-class researchers: Stephen Mellor (Freeter, U.K.), Daniela Nicklas (Carl von Ossietzky Universitaet Oldenburg, Germany), Fabio Casati (University of Trento, Italy) and Jan Dietz (Delft University of Technology, The Netherlands).
The Program Committee (check the website for a detailed list) includes internationally distinguished experts in the conference topic areas.
Last year's ICSOFT received 220 paper submissions, of which 12% were selected to be published and presented as full papers (10 pages / 30' oral presentation). Additionally, 28% were accepted as short papers (20' oral presentation) and 15% as posters. ICSOFT 2012 intends to reinforce this high level of quality.
Submitted papers will be subject to a double-blind review process. All accepted papers (full, short and posters) will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support. BXDY
A short list of presented papers will be selected for publication of extended and revised versions by Springer-Verlag in a CCIS Series book.
The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and Elsevier Index (EI).
All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). SciTePress is member of CrossRef (http://www.crossref.org/).
Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://www.icsoft.org/BestPaperAward.aspx).
Workshops, Special sessions, Tutorials and Demonstrations dedicated to other technical/scientific topics are also envisaged: companies and researchers interested in presenting their products/methodologies/results in a dedicated satellite event are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from several types of support, including logistics, secretariat and financial, to facilitate the development of a valid idea.
ICSOFT 2012 will be held in conjunction with ICETE (9th International Joint Conference on e-Business and Telecommunications - http://www.icete.org) and DATA (International Conference on Data Technologies and Applications - http://www.dataconference.org). Registration to ICSOFT will allow free access to both ICETE and DATA, as a non-speaker.
ICSOFT's website - http://www.icsoft.org/ - has all the details on the conference structure and its main topic areas.
As always, we are at your full disposal for any questions and ideas you may have.
Best regards,
Sergio Brissos
Av. D. Manuel I, 27A 2.Esq.
2910-595 Setubal, Portugal
Tel.: +351 265 520 185
Fax: +44 203 014 5433
e-mail: icsoft.secretariat(a)insticc.org
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
CONFERENCE CHAIR
Jose Cordeiro, Polytechnic Institute of Setubal / INSTICC, Portugal
PROGRAM CO-CHAIRS
Slimane Hammoudi, ESEO, France
Marten van Sinderen, University of Twente, The Netherlands
PROGRAM COMMITTEE
Please check the program committee members at http://www.icsoft.org/ProgramCommittee.aspx
CONFERENCE AREAS
AREA 1: MODELS
- Domain-Specific Languages
- Metamodeling
- Model Analysis and Checking
- Model Transformation
- Model Evolution
- Model Execution and Simulation
- Model Testing
- Model Composition
- Model Versioning
- Model Tools
- Modeling Languages
AREA 2: ASPECTS
- Aspect Analysis and Design
- Domain Engineering
- Modularity with Aspects
- Aspects Interference and Composition
- Aspects Testing and Verification
- Aspects Evaluation and Metrics
- Advice/Pointcut Specification
- Aspect Mining
AREA 3: SERVICES
- Service Technology and Infrastructure Issues
- Service Registration, Update, De-registration
- Service Discovery, Selection and Replacement
- Service Invocation, Interaction, Monitoring
- Service Choreography, Mediation, Orchestration
- Principles of SOC/SOA, Service Science
- Service Modelling Approaches
- Services Applications
- Service Interoperability, Matching and Compositi
AREA 4: CONTEXT
- Context-Aware Systems
- Context Identification
- Context Formalization
- Context Representation
- Context Analysis
- Context Design
- Context Sensitive Applications
- Context Aggregation and Inference
-----------------------------------------------------------------
To SUBSCRIBE:
http://internetmailmanager.com/s/reg.Asp?a=47F4KKLKPMTCR8LBNJNPR8F&b=FBLBMM…
-----------------------------------------------------------------
To FORWARD:
http://internetmailmanager.com/s/fwd.asp?a=47F4KKLKPMTCR8LBNJNPR8F&b=FBLBMM…
-----------------------------------------------------------------
To UNSUBSCRIBE:
http://internetmailmanager.com/s/us.asp?a=47F4KKLKPMTCR8LBNJNPR8F&b=FBLBMML…
---------------------------------------------------
-------- Original-Nachricht --------
Betreff: [AISWorld] DAIS 2012 Call for papers - Feb 27
Datum: Tue, 14 Feb 2012 16:04:27 +0100
Von: Karl M. Goeschka <Karl.Goeschka(a)tuwien.ac.at>
An: aisworld(a)lists.aisnet.org
===========================================================================
CALL FOR PAPERS
(Deadline: February 27, 2012 **EXTENDED**)
DAIS 2012
12th International IFIP Conference on
Distributed Applications and Interoperable Systems
Co-located with
International Conference on Coordination Models and Languages 2012
Formal Methods for Open Object-Based Distributed Systems 2012
Stockholm, Sweden - June 13-16, 2012
http://b00t.info/discotec/?q=node/1
===========================================================================
About the Conference
The DAIS conference series addresses all aspects of distributed
applications, including their architecture, design, implementation and
operation, the supporting middleware, appropriate software engineering
methodologies and tools, as well as experimental studies and practice reports.
DAIS'12 is the 12th event in a series of successful international
conferences started in 1997. It will provide a forum for researchers,
application and platform service vendors, and users, to discuss and learn
about new approaches, trends, concepts and experiences in the fields of
distributed computing.
Important Dates
* Abstract submission: February 20, 2012 (optional)
* Paper submission: February 27, 2012 (extended)
* Author notification: March 26, 2012
* Camera-ready version: April 9, 2012
* Conferences: June 13-15, 2012
* Workshops: June 16, 2012
Submission and Publication
DAIS'12 seeks:
* Full research papers in no more than 14 pages.
* Full experimental and evaluation studies, case studies, and practice
reports in no more than 14 pages.
* Work-in-progress papers, describing ongoing work and interim results, in
no more than 6 pages.
Papers will be published by Springer-Verlag in the LNCS series.
All papers must be original, unpublished, and not submitted for publication
elsewhere. Contributions should be submitted electronically as PDF, using
the SPRINGER LNCS style. Each paper will undergo a thorough process of
review. Proceedings will be made available at the conference. Submission
implies that at least one author will register and attend the conference if
the paper is accepted.
Topics of Interest
DAIS'12 solicits high quality papers reporting research results and/or
experience reports in the area of distributed applications and
interoperable systems. Submissions will be judged on their originality,
significance, clarity, relevance, and correctness. DAIS'12 conference
topics include, but are not limited to:
* Novel and innovative applications and systems: mobile and context-aware
applications, ubiquitous and pervasive computing, Internet of services,
Internet of things, service-oriented computing, autonomous and
self-adaptive systems, cloud computing, peer to peer systems, sensor and
ad-hoc networks, systems of systems, collaborative intelligent devices,
social networks, apps for smartphones and pad-computers.
* Architectures, architectural styles, middleware, platforms, distributed
computing infrastructures, application level protocols, and devices (e.g.,
smartphones) supporting distributed applications.
* Properties and design goals: Security, trust, privacy, dependability,
resilience, safety, performance, scalability, usability, efficiency,
sustainability, green computing, interoperability, autonomy, self-*
properties.
* Engineering and tools: modeling, model-driven architecture,
domain-specific languages, design, patterns, development, deployment,
validation, testing, benchmarking, operation, management, adaptation,
evolution.
* Challenges: change, evolution, complexity, large and ultra large scale,
dynamism, mobility, heterogeneity.
General Chair
- Jim Dowling, KTH, Stockholm, Sweden
Program Chairs
- Karl M. Göschka, Vienna University of Technology, Austria
- Seif Haridi, SICS/KTH, Sweden
Steering Committee
- Frank Eliassen, University of Oslo, Norway
- Pascal Felber, Université de Neuchâtel, Switzerland
- Kurt Geihs, University of Kassel, Germany
- Jadwiga Indulska, University of Queensland, Australia
- Rüdiger Kapitza, TU Braunschweig, Germany
- Lea Kutvonen (chair), University of Helsinki, Finland
- Elie Najm, Telecom-ParisTech, France
- Rui Oliveira, Universidade do Minho, Portugal
- Romain Rouvoy, University Lille 1, France
- Twittie Senivongse, Chulalongkorn University, Thailand
Program Committee
- Yolande Berbers, Katholieke Universiteit Leuven (Belgium)
- Antoine Beugnard, TELECOM Bretagne (France)
- Gordon Blair, Lancaster University (UK)
- António Casimiro, University of Lisbon (Portugal)
- Felicita Di Giandomenico, ISTI-CNR, Pisa (Italy)
- Ada Diaconescu, TELECOM ParisTech (France)
- Frank Eliassen, University of Oslo (Norway)
- Lorenz Froihofer, Telekom (Austria)
- Kurt Geihs, University of Kassel (Germany)
- Nikolaos Georgantas, INRIA (France)
- Svein Hallsteinsen, SINTEF (Norway)
- Peter Herrmann, NTNU Trondheim (Norway)
- Matti Hiltunen, AT&T Labs (USA)
- Jadwiga Indulska, University of Queensland (Australia)
- Hans-Arno Jacobsen, University of Toronto (Canada)
- Rüdiger Kapitza , University of Erlangen-Nürnberg (Germany)
- Lea Kutvonen, University of Helsinki (Finland)
- René Meier, Trinity College Dublin (Ireland)
- Alberto Montresor, University of Trento (Italy)
- Hausi A. Müller, University of Victoria (Canada)
- Elie Najm, TELECOM ParisTech (France)
- José Pereira, Universidade do Minho (Portugal)
- Guillaume Pierre, Vrije Universiteit Amsterdam (The Netherlands)
- Peter Pietzuch, Imperial College London (UK)
- Etienne Rivière, Université de Neuchâtel (Switzerland)
- Florian Rosenberg, IBM (USA)
- Giovanni Russello, Create-Net (Italy)
- Nicolas Schiper, Google Zurich (Switzerland)
- Douglas Schmidt, Vanderbilt University (USA)
- François Taïani, Lancaster University (UK)
- Sotirios Terzis, University of Strathclyde (UK)
- Eddy Truyen, Katholieke Universiteit Leuven (Belgium)
- Gaël Thomas, LIP6 (France)
- Vladimir Tosic, NICTA (Australia)
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original-Nachricht --------
Betreff: [WI] World Congress on Internet Security (WorldCIS-2012): Call
for Papers!
Datum: Tue, 14 Feb 2012 19:30:16 +0000 (GMT)
Von: Paul Kelly <p.kelly(a)worldcis.org>
Antwort an: Paul Kelly <p.kelly(a)worldcis.org>
Apologies for cross-postings.
Please send it to interested colleagues and students. Thanks!
CALL FOR PAPERS
****************************************************************************
World Congress on Internet Security (WorldCIS-2012)
Technically Co-Sponsored by IEEE UK/RI Computer Chapter and IEEE K/W
Section
June 10-12, 2012
Venue: University of Guelph, Ontario, Canada
www.worldcis.org
****************************************************************************
The World Congress on Internet Security (WorldCIS-2012)
is Technically Co-Sponsored by IEEE UK/RI Computer Chapter
and IEEE K/W Section. The WorldCIS-2012 is an international
forum dedicated to the advancement of the theory and practical
implementation of security on the Internet and Computer Networks.
The inability to properly secure the Internet, computer networks,
protecting the Internet against emerging threats and vulnerabilities,
and sustaining privacy and trust has been a key focus of research.
The WorldCIS aims to provide a highly professional and comparative
academic research forum that promotes collaborative excellence between
academia and industry.
On the ubiquitous networking environments, information is explosively
used for various kinds of purposes. From a service perspective, a number
of context or ambient aware services are envisaged for "ubiquitous
networking" but based on the context security remains an issue.
The objectives of the WorldCIS are to bridge the knowledge
gap between academia and industry, promote research esteem
and and to fostering discussions on information technologies,
information systems and globa security applications.
The WorldCIS-2012 invites speakers and researchers to submit
papers that encompass conceptual analysis, design implementation
and performance evaluation.
Original papers are invited on recent advances in Internet,
Computer Communications and Networking Security.
The topics in WorldCIS-2012 include but are not confined
to the following areas:
*Internet Security
*Security, trust and privacy
*Self-organizing networks
*Sensor nets and embedded systems
*Service overlays
*Switches and switching
*Topology characterization and inference
*Traffic measurement and analysis
*Traffic engineering and control
*Trust and Data Security
*Virtual and overlay networks
*Web services and performance
*Wireless mesh networks and protocols
*Ad hoc mobile networks Security
*Addressing and location management
*Broadband access technologies
*Blended Internet Security Methods
*Biometrics
*Boundary Issues of Internet Security
*Capacity planning
*Cellular and broadband wireless nets
*Congestion control
*Content distribution
*Cryptography
*Cross layer design and optimization
*Cyber-physical computing/networking
*Geographic information systems
*Privacy Protection and Forensic in Ubi-com
*Quality of Service Issues
*Regulations
*Secured Database Systems
*Security in Data Mining
*Security and Access Control
*Semantic Web and Ontology
*Data management for U-commerce
*Software Architectures
*Defence Systems
*Delay/disruption tolerant networks
*End Users
*Enabling technologies for the Internet
*Implementation and experimental testbeds
*Future Internet Design and Applications
*Middleware support for networking
*Mobility models and systems
*Multicast and anycast
*Multimedia protocols and networking
*Network applications and services
*Network architectures Network control
*Network management
*Network simulation and emulation
*Novel network architectures
*Network and Protocol Architectures
*Peer-to-peer communications
*Performance evaluation
*Power control and management
*Pricing and billing
*Protocols and Standards
*Resource allocation and management
*RFID
*Optical networks
*Routing protocols
*Scheduling and buffer management
*Virtual Reality
IMPORTANT DATES:
Full Paper Submission Date: March 01, 2012
Extended Abstract (Work in Progress) Submission Date: February 25, 2012
Proposal for Workshops and Tutorials: March 15, 2012
Notification of Workshop and Tutorial Acceptance: March 20, 2012
Proposal for Industrial Presentation: February 25, 2012
Notification of Extended Abstract Acceptance/Rejection: March 05, 2012
Notification of Industrial Presentation Acceptance: March 05, 2012
Notification of Paper Acceptance/Rejection: March 15, 2012
Camera Ready Extended Abstract Due: March 20, 2012
Camera Ready Paper Due: April 02, 2012
Early Registration Deadline: January 01 to March 30, 2012
Late Registration Deadline (Authors only): March 31, 2012 to May 31, 2012
Conference Dates: June 10-12, 2012
For further details, please visit conference website www.worldcis.org
-------- Original-Nachricht --------
Betreff: [WI] ICCBR 2012 Call for Papers (Paper submission deadline
April 9th, 2012)
Datum: Tue, 14 Feb 2012 10:47:08 +0100
Von: Belén Díaz <belend(a)sip.ucm.es>
Antwort an: Belén Díaz <belend(a)sip.ucm.es>
An: belend(a)sip.ucm.es
Call for Papers
The 20th International Conference on Case-Based Reasoning Lyon, France
3 - 6 September 2012
http://www.iccbr.org/iccbr12
The ICCBR 2012 Program Committee invites submissions of original theoretical research, applied research and deployed application papers on all aspects of Case-Based Reasoning for the main technical program. ICCBR is the leading international meeting on case-based reasoning (CBR).
In order to expand the frontiers of CBR as a scientific field, we would like to (1) emphasize the connections between CBR and related areas, and (2) explore new problems and industrial solutions. Another primary objective of ICCBR 2012 is to encourage new members to join the CBR community and regularly attend / participate in this premier CBR conference. Thus, the ICCBR 2012 program will include several new ideas along with the regular keynote addresses, technical program, applications track and workshop sessions. Details on these elements of the program can be found on the ICCBR 2012 web site.
ICCBR 2012 Program Highlights
Doctoral Consortium
ICCBR 2012 will hold the 4th CBR Doctoral Consortium (DC) with the following objectives: (1) To provide a supportive setting for feedback on students' current research and guidance on future research directions, (2) To offer each student comments and fresh perspectives on their work from faculty and students outside their own institution, and (3) To promote the development of a supportive community of scholars and a spirit of collaborative research. The DC gives early stage postgraduate students the important opportunity to discuss their research ideas and get very valuable feedback.
Computer Cooking Contest
The 5th Computer Cooking Contest (CCC) aims to attract new people to deal with AI technologies such as case-based reasoning, semantic technologies, search and information extraction. It is sponsored by Attensity and includes a travel bursary for its finalists. The CCC is an open competition. Any individual, student, research group and professional is invited to submit software that creates a recipe, such as for a single dish or even a three course menu, i.e., recipes for a starter, a main dish and a dessert. The input will be a database of basic recipes from which appropriate recipes must be selected, modified or even combined. The queries to the system consist of a number of desired ingredients and other requirements for the dish or menu.
Industry / Applications Track Presentations ICCBR 2012 invites submissions for a special presentation-only track of deployed applications on all aspects of Case-Based Reasoning. The applications track provides an opportunity for both industry and academic application developers to showcase their work in 20-30 minute high-quality presentations, without the need to write a paper. This event takes place on one day and is an excellent way for industry members to interact with students and academic researchers. Presenters can express interest with a short (one paragraph) description of their work. Opportunities are also available to sponsor ICCBR 2012 and have an official conference presence.
Workshops
ICCBR 2012 invites proposals for full day or half day workshops as part of the Workshop Program. ICCBR 2012 workshops provide an informal setting in which participants wll have the opportunity to meet and discuss topics with a selected CBR focus in an environment that encourages the exchange of ideas. Recent ICCBR workshops have included: WebCBR, health care, textual CBR, computer gaming, process-oriented CBR, context awareness, and human-centered and cognitive approaches to CBR, uncertainty, and knowledge discovery.
Main Technical Program Paper Submission
Important Dates:
• Submission deadline: 9 April 2012
• Notification of acceptance: 16 May 2012
• Camera ready copy due: 6 June 2012
• Conference dates: 3-6 September 2012
Submission Topics:
The ICCBR 2012 Program Committee invites submissions of original theoretical research, applied research and deployed application papers on all aspects of Case-Based Reasoning. Example submission areas include, but are not limited to:
• Foundations of Case Based Reasoning
• Analogical reasoning, cognitive models, and creative reasoning
• Lazy-learning, instance-based and case-based learning
• Similarity Metrics, indexing, retrieval, and adaptation
• Case authoring, knowledge modelling and visualization
• Explanations, confidence and uncertainty in CBR
• Data and text mining with case-based systems
• Experience-based knowledge management
• CBR architecture and development frameworks
• Agent based, Peer-to-Peer and Distributed CBR
• Applications of CBR (e.g. in health, law, education, government)
• CBR for planning, scheduling, design, diagnosis and classification
• Adaptive interfaces, user modelling and personalization in CBR
• Case-based recommender systems
• Textual CBR (including links with IR, NLP and text mining)
• CBR in the Semantic Web and developments in WebCBR
• AI and Games using CBR
• Fielded applications of CBR
Proceedings:
All accepted papers will appear in the conference proceedings published by Springer Verlag in the Lecture Notes in Artificial Intelligence series (www.springer.com/lncs).
Review Criteria:
Each submission must be identified as theoretical/methodological research, applied research, or deployed application paper and will be reviewed using criteria appropriate to its category.
The criteria are as follows:
Paper Category: Theoretical/Methodological research paper Review Criteria: Scientific significance; originality; technical quality; and clarity
Paper Category: Applied research paper
Review Criteria: Significance for scientific research or innovative commercial deployment; originality; technical quality; and clarity
Paper Category: Deployed application paper Review Criteria: Demonstrated practical, social, environmental or economic significance; originality; treatment of issues of engineering, management& user acceptance; and clarity.
Submission Procedure:
Authors must submit a full paper by the conference paper submission deadline. ICCBR 2012 is employing the EasyChair conference system, and submissions must be made via the ICCBR 2012 EasyChair Conference Site (http://www.easychair.org/conferences/?conf=iccbr2012). Detailed submission instructions will be made available on the ICCBR 2012 web site.
Submission Format:
Papers MUST be submitted in Springer LNCS format, which is the format required for the final camera ready copy, with a maximum of 15 pages. Authors' instructions along with LaTeX (preferred) and Word macro files are available on the web at Springer's Information for LNCS Authors page (http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). Authors of accepted papers are required to transfer their copyrights to Springer. All submissions are required to be in electronic format.
Multiple Submission Policy:
Papers submitted to other conferences or journals must state this fact. If a paper will appear in another conference or journal, it must be withdrawn from ICCBR 2012. This restriction does not apply to papers appearing in proceedings of specialized ICCBR workshops.
Author Registration Policy:
In order for a paper to appear in the proceedings, at least one of the authors MUST register for the conference by the camera-ready copy deadline.
--
Mailing-Liste: wi(a)aifb.uni-karlsruhe.de
Administrator: wi-admin(a)aifb.uni-karlsruhe.de
Konfiguration: https://www.lists.uni-karlsruhe.de/sympa/info/wi
-------- Original-Nachricht --------
Betreff: [AISWorld] CFP: Special Issue on Cloud Computing:
International Journal of Electronic Business Management
Datum: Tue, 14 Feb 2012 10:47:48 +0000
Von: Catarina Ferreira da Silva <cferr(a)dei.uc.pt>
An: aisworld(a)lists.aisnet.org
*A Special Issue on Cloud Computing*
*In*
*/International Journal of Electronic Business Management (IJEBM)/*
http://ijebm.ie.nthu.edu.tw <http://ijebm.ie.nthu.edu.tw/>
http://ijebm-ojs.ie.nthu.edu.tw/IJEBM_OJS/index.php/IJEBM/index
Special Issue Editors: Catarina Ferreira da Silva, Parisa Ghodous,
Mahmoud Barhamgi**
*_Aim and scope_*
Cloud Computing is an emerging paradigm shift in management of computing
resources for provisioning of services with enhanced capabilities. These
capabilities pertain to non-functional (such as elasticity, reliability,
availability and interoperability), economic (such as cost reduction,
pay per use and improved time to market) and technological (such as
virtualization, security, privacy, data management and resources
metering) aspects. The groundings of Cloud Computing include the
"as-a-Service" usage model, Service-Oriented Architecture (SOA) and
resources Virtualization. The goal of Cloud Computing is to reinforce
infrastructure, and share resources among the cloud stakeholders in the
cloud value chain. The NIST (USA National Institute of Standards and
Technology <http://www.nist.gov/itl/cloud/>) identifies cloud computing
as a model for enabling ubiquitous, convenient, on-demand network access
to a shared pool of configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or service
provider interaction. Relevant progress has already been made on both
the commercial and the academic side of cloud systems. However several
challenges persist and new ones arise in the design, implementation, and
deployment of virtualized clouds. These challenges include but are not
limited to automated service provisioning, service monitoring and
management, resource elasticity, cloud programming models and economic
models. The circumstances under which companies choose to build their
own value-producing private cloud computing networks are a related
opportunity for service science research. There will be significant
interest in conducting service science research on how cloud computing
affects relationships among stakeholders in specific industry contexts,
how the stakeholders will interact, and how their roles may shift, where
the extent of economic value produced should be unique.
Authors are invited to submit high quality papers. The submission of
papers describing novel research directions are encouraged, as well as
those by leading researchers and industry experts describing practical
experiences in these areas.
Recommended topics include, but are not limited to, the following:
* New applications in Cloud
* Case studies of application of Cloud in private and public sectors
* Cloud computing types, such as Infrastructure as a Service (IaaS),
Platform as a Service (PaaS) and Software as a Service (SaaS)
* Cloud usage types, such as private, public, hybrid and community
cloudsSemantic web services in Cloud
* Business and transactional models in Cloud
* Service level agreements
* Privacy, security, governance and legal issues in Cloud
* New architectures and design methods for developing cloud services
* Tools and techniques for developing and managing applications in cloud
* Legacy systems and interoperability with Cloud
* Data management
* How Services Science can provide theory, methods and techniques to
design, analyze, manage and market Cloud Computing
*_Paper Submission Instructions and Procedure_*
Full papers should not exceed 10 pages (including all figures, tables,
and references), and must adhere to the formattingrules
<http://ijebm-ojs.ie.nthu.edu.tw/IJEBM_OJS/index.php/IJEBM/information/autho…>(http://ijebm.ie.nthu.edu.tw/IJEBM_Web/IJEBM_static/00Intro/03InsForAuth.htm)
of the IJEBM.Researchers and practitioners are invited to submit by
January 31, 2012.Authors of papers will be notified by April 15, 2012
about the status of their submission. All submitted papers will be
reviewed on a double-blind review basis.
Template:
http://ijebm.ie.nthu.edu.tw/IJEBM_Web/IJEBM_static/02Sample/IJEBM_Sample3.d…
*_Important Dates_*
*March 31, 2012: Paper Submission Deadline*
*June 15, 2012: Notification of Acceptance/Rejection*
*August 31, 2012: Final Paper Submission
*
Inquiries and submissions can be forwarded electronically to
C. Ferreira da Silva (cferr(a)dei.uc.pt <mailto:cferr@dei.uc.pt>),
P. Ghodous (parisa.ghodous(a)runiv-lyon1.fr
<mailto:parisa.ghodous@runiv-lyon1.fr>),
M. Barhamgi (Mahmoud.barhamgi(a)liris.cnrs.fr
<mailto:Mahmoud.barhamgi@liris.cnrs.fr>)
-------- Original-Nachricht --------
Betreff: [WI] CFP iiWAS2012
Datum: Tue, 14 Feb 2012 11:50:03 +0100
Von: Christoph Pflügler <christoph.pfluegler(a)wiwi.uni-augsburg.de>
Antwort an: Christoph Pflügler <christoph.pfluegler(a)wiwi.uni-augsburg.de>
An: wi(a)aifb.uni-karlsruhe.de
********* Apologies if you receive multiple copies of this message
*********
C A L L F O R P A P E R S
The 14th International Conference on Information Integration and
Web-based Applications& Services
(iiWAS2012)
in Conjunction with
The 10th International Conference on Advances in Mobile Computing and
Multimedia
(MoMM2012)
3 - 5 December 2012
Bali, Indonesia
http://www.iiwas.org/conferences/iiwas2012/
email: iiwas2012(a)iiwas.org
**** Important Dates *****
15 July 2012: Full Papers (10 pages), Short papers, Demos and
work in progress (4 pages)
22 September 2012: Acceptance Notification
10 October 2012: Camera-Ready Papers and Authors Registration
03-05 December 2012: Conference Dates
***** Publication *****
ALL accepted iiWAS2012 papers will be published by ACM International
Conference Proceedings Series and the supplemental proceedings and
indexed appropriately in all major indexes. Selected high-quality papers
will be invited to be published, after revision and extension, in
special issues of international journals and in a book in the Book
Series: Atlantis Ambient and Pervasive Intelligence published by Springer.
**** Scope *****
WWW has been driving global information integration. In spite of the
many applications in all domains of our societies: e-business,
e-commerce, e-learning, e-science, and e-government, for instance, as
well as the tremendous advances by engineers and scientists, the
seamless integration of information and services remains a major
challenge. The current shared vision for the future is one of
semantically rich information and service oriented architectures for
global information systems. This vision is at the convergence of
progress in technologies such as XML, Web services, RDF, OWL, of
multimedia, multimodal, and multilingual information retrieval, and of
distributed, mobile and ubiquitous computing. iiWAS2012 is the 14th in
the series of the highly successful International Conference on
Information Integration and Web-based Applications& Systems. Recently,
iiWAS has been held in Ho Chi Minh City (2011), Paris (2010), Kuala
Lumpur (2009), and Linz (2008). This year Bali will host iiWAS2012. The
iiWAS conference series have provided opportunities to researchers,
graduate students, and industry practitioners to address recent research
results and current industry practices in the area of information
integration and web-based applications.
We invite two types of submissions: Full Technical Papers and Short
Position Papers. A Full Paper should provide solid conceptual and
theoretical foundation and substantial support for its results and
conclusions as a significant contribution to the field. A Position Paper
could be "demo" or ˜work in progress, i.e., it reports the latest
emerged ideas, approaches, methodologies, systems and application
scenarios but have not yet been fully implemented and/or undergone
extensive evaluation.
***** Topics *****
iiWAS2012 conference themes, grouped in four tracks, are the following
(but are not limited to):
1. Web Engineering and Web Services Track:
- Web Data Integration, Monitoring and Management
- Web Data Models, Metrics, Tools, Languages and Performance
- Web Agents, Intelligence and Mining
- Web Security and Trust Management
- Web Visualisation, Rich Web UI and Deep/Hidden Web
- Web-based Enterprise Systems and Business Processes
- Web-based Auction and Negotiation
- Federated and cross-organisational Web engineering
- Web Services Architectural styles
- Web Services performance
- Dependability, security and privacy of web services (blogs, RSS,
wikis, etc.)
- Orchestration, choreography and composition of web services
- Tools and technologies for Web Services development, deployment and
management
- The impact of Web Services on enterprise systems
- Impact of formal methods on Web Services
2. E-applications Track (e-Business, e-Commerce, e-Payment,
e-Government, e-Learning, e-science, e-communities):
- E-application design models and methods
- E-application development processes, standards and methodologies
- E-application usability, accessibility, reuse and integration
- E-application localisation and internalization
- E-applications case studies and best practices
- E-applications social and legal issues
- E-applications service architectures
- E-applications competition and collaborations
- E-applications data analytics and visualisation
- Digital libraries
- Innovative E-Frameworks& E-Applications
- Innovative E-applications in Web 2.0, AJAX, E4X and other new developments
- Model-driven E-application development
- Workflow and E-services
3. Web Data and Semantic Web Track:
- XML data and schema integration
- XML data models, query processing and data management
- XML data privacy and security
- Web databases and warehousing
- Web data mining, exploration, and visualisation
- Document Engineering and Integration
- Web Data Markup Languages, tools and methodologies for representing
and managing Semantic Web data
- Web Semantics content creation, annotation, and extraction
- Web Semantics brokering, integration and interoperability
- Web Semantics search, query, and visualisation
- Web Semantics middleware and services
- Web Semantics provenance, trust& security
- Ontology creation, searching, extraction, and evolution
- Ontology mapping, merging, and alignment
4. Information Integration in Ubiquitous Computing Track:
- Mobile and Ubiquitous Information and Service Integration
- Tools and techniques for designing, implementing,& evaluating
Ubiquitous Computing Systems
- Grid and P2P architectures for service and information integration
- Agent-based ubiquitous applications
- Location and context-aware applications and services
- Infrastructure support for mobility and pervasive Web
- Web proxies and content adaptation
- Service creation and management environments for pervasive web
- Low-cost web access devices and networking for emerging regions
- Privacy-enhancing technologies in pervasive web
- Social search and the use of "human computing" in web search
- Experience report on ubiquitous computing implementation
- Visionary scenario on ubiquitous computing
**** Submission Guidelines ****
Papers must be submitted electronically in PDF through the conference
website. Submitted papers must not substantially overlap with papers
that have been published or that are simultaneously submitted to a
journal or a conference with proceedings. Submitted papers will subject
to stringent peer review by at least three members of the international
program committee and carefully evaluated based on originality,
significance, technical soundness, and clarity of exposition. Accepted
papers will appear in the conference proceedings to be published by ACM.
Format requirements for submissions of papers are:
- Maximum 10 pages, including the abstract (no more than 150 words), all
figures and references for Full Technical papers.
- Maximum 4 pages, including the abstract (no more than 150 words), all
figures and references for Short Position Papers.
- All submissions should be formatted according to ACM guidelines
(http://www.acm.org/sigs/publications/proceedings-templates)
- Submissions must be entered into the Submission System
(https://www.easychair.org/account/signin.cgi?conf=iiwas2012)
**** Awards ****
iiWAS2012 best paper awards and student paper awards will be conferred
on the authors at the conference.
**** Past Conferences ****
http://www.iiwas.org/conferences.htm
ACM Digital library: http://portal.acm.org/event.cfm?id=RE544
DBLP: http://www.informatik.uni-trier.de/~ley/db/conf/iiwas/
**** PC Members *****
http://www.iiwas.org/conferences/iiwas2012/
*** Contact *****
David Taniar
iiWAS2012 Scientific Committee Chair
Monash University
Australia
Email: david(a)iiwas.org
****************************************************************************
--
*******************************************************
Christoph M. Pflügler
Inter-Organizational Systems Group
University of Augsburg
Universitätsstraße 16
86159 Augsburg
Germany
Phone: +49 (0) 821 598 4007
Fax: +49 (0) 821 598 4432
E-Mail: christoph.pfluegler(a)wiwi.uni-augsburg.de
*******************************************************
--
Mailing-Liste: wi(a)aifb.uni-karlsruhe.de
Administrator: wi-admin(a)aifb.uni-karlsruhe.de
Konfiguration: https://www.lists.uni-karlsruhe.de/sympa/info/wi