-------- Original-Nachricht --------
Betreff: [computational.science] Deadline Extended - 17th European
Symposium on Research in Computer Security (ESORICS 2012)
Datum: Tue, 27 Mar 2012 19:34:50 +0200
Von: ESORICS 2012 <esorics2012(a)unimi.it>
Organisation: "ICCSA"
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
[Apologies if you receive multiple copies of this message]
*** Deadline extended to April 10, 2012 ***
CALL FOR PAPERS
******************************************************************************
17th European Symposium on Research in Computer Security (ESORICS 2012)
Pisa, Italy -- September 10-12, 2012
http://www.iit.cnr.it/esorics2012/
******************************************************************************
ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the academic
and industrial communities. Papers offering novel research contributions
in computer security are solicited for submission to the Symposium.
The primary focus is on original, high quality, unpublished research
and implementation experiences. We encourage submissions of
papers discussing industrial research and development.
Topics of interest include, but are not limited to:
- access control
- accountability
- ad hoc networks
- anonymity
- applied cryptography
- authentication
- biometrics
- database security
- data protection
- digital content protection
- digital forensic
- distributed systems security
- electronic payments
- embedded systems security
- inference control
- information hiding
- identity management
- information flow control
- integrity
- intrusion detection
- formal security methods
- language-based security
- network security
- phishing and spam prevention
- privacy
- risk analysis and management
- secure electronic voting
- security architectures
- security economics
- security metrics
- security models
- security and privacy in cloud scenarios
- security and privacy in complex systems
- security and privacy in location services
- security and privacy for mobile code
- security and privacy in pervasive/ubiquitous computing
- security and privacy policies
- security and privacy in social networks
- security and privacy in web services
- security verification
- software security
- steganography
- systems security
- trust models and management
- trustworthy user devices
- web security
- wireless security
PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. The proceedings will be published by
Springer in the the Lecture Notes in Computer Science series.
All submissions should follow the LNCS template
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0)
from the time they are submitted. Submitted papers should be
at most 16 pages (using 10-point font), excluding the bibliography and
well-marked appendices, and at most 20 pages total. Committee members
are not required to read the appendices, so the paper should be
intelligible without them. All submissions must be written in English.
Submissions are to be made to the submission web site at
http://www.easychair.org/conferences/?conf=esorics2012.
Only pdf files will be accepted. Submissions not meeting these guidelines
risk rejection without consideration of their merits.
Papers must be received by the deadline of April 10, 2012 (11:59 p.m.
American Samoa time). Authors of accepted papers must guarantee that
their papers will be presented at the conference.
IMPORTANT DATES
Paper submission due: April 10, 2012 (11:59 p.m. American Samoa time)
[extended]
Notification to authors: June 10, 2012
Camera ready due: June 20, 2012
GENERAL CHAIR
Fabio Martinelli
National Research Council - CNR, Italy
PROGRAM CHAIRS
Sara Foresti
Universita` degli Studi di Milano, Italy
Moti Yung
Google Inc., USA
PUBLICITY CHAIR
Giovanni Livraga
Universita` degli Studi di Milano, Italy
PROGRAM COMMITTEE
Alessandro Armando, Universita` di Genova, Italy
Mikhail Atallah, Purdue University, USA
Michael Backes, Saarland University, Germany
David A. Basin, ETH Zurich, Switzerland
Kevin Bauer, University of Waterloo, Canada
Joachim Biskup, University of Dortmund, Germany
Marina Blanton, University of Notre Dame, USA
Carlo Blundo, Universita` degli Studi di Salerno, Italy
Srdjan Capkun, ETH Zurich, Switzerland
Liqun Chen, HP Labs, UK
Seung-Geol Choi, University of Maryland, USA
Veronique Cortier, LORIA, France
Jason Crampton, University of London, UK
Frederic Cuppens, Telecom Bretagne, France
Anupam Datta, Carnegie Mellon University, USA
Sabrina De Capitani di Vimercati, Univ. degli Studi di Milano, Italy
Claudia Diaz, K.U. Leuven, Belgium
Wenliang Du, Syracuse University, USA
Simon Foley, University College Cork, Ireland
Keith B. Frikken, Miami University, USA
Dieter Gollmann, TU Hamburg-Harburg, Germany
Dimitris Gritzalis, AUEB, Greece
Ryan Henry, University of Waterloo, Canada
Amir Herzberg, Bar-Ilan University, Israel
Sushil Jajodia, George Mason University, USA
Aaron Johnson, U.S. Naval Research Lab, USA
Stefan Katzenbeisser, TU Darmstadt, Germany
KwangJo Kim, KAIST, Korea
Markulf Kohlweiss, Microsoft Research, UK
Michiharu Kudo, IBM Tokyo Research Laboratory, Japan
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Adam J. Lee, Univeristy of Pittsburgh, USA
Wenke Lee, Georgia Institute of Technology, USA
Dongdai Lin, Chinese Academy of Sciences, China
Javier Lopez, University of Malaga, Spain
Wenjing Lou, Virginia Polytechnic Institute and State University, USA
John C. Mitchell, Stanford University, USA
Atsuko Miyaji, JAIST, Japan
David Naccache, ENS, France
Peng Ning, North Carolina State University, USA
Stefano Paraboschi, Universita` degli Studi di Bergamo, Italy
Guenther Pernul, University of Regensburg, Germany
Jean-Jacques Quisquater, UCL, Belgium
Indrakshi Ray, Colorado State University, USA
Kui Ren, Illinois Institute of Technology, USA
Peter Ryan, University of Luxembourg, Luxembourg
Ahmad-Reza Sadeghi, TU Darmstadt, Germany
Rei Safavi-Naini, University of Calgary, Canada
Kouichi Sakurai, Kyushu University, Japan
Pierangela Samarati, Universita` degli Studi di Milano, Italy
R. Sekar, Stony Brook University, USA
Elaine Shi, PARC/UC Berkley, USA
Einar Snekkenes, Gjovik University College, Norway
Abhinav Srivastava, AT&T Labs - Research, USA
Carmela Troncoso, K.U. Leuven, Belgium
Yevgeniy Vahlis, AT&T, USA
Jaideep Vaidya, Rutgers University, USA
Michael Waidner, TU Darmstadt, Germany
Shouhai Xu, University of Texas at San Antonio, USA
Ting Yu, North Carolina State University, USA
Jianying Zhou, Institute for Infocomm Research, Singapore
This call for papers and additional information about the conference
can be found at http://www.iit.cnr.it/esorics2012/
-------- Original-Nachricht --------
Betreff: [computational.science] MMM-ACNS-2010 and SA&PS4CS-2010 -
First Call for Papers
Datum: Tue, 27 Mar 2012 22:24:47 +0400
Von: Igor Kotenko <ivkote1(a)mail.ru>
Antwort an: Igor Kotenko <ivkote1(a)mail.ru>
Organisation: "ICCSA"
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
[Apologies if you receive multiple copies of this message]
Sixth International Conference
“Mathematical Methods, Models, and Architectures
for Computer Networks Security”
(MMM-ACNS-2012) and
Second International Workshop
“Scientific Analysis and Policy Support for Cyber Security”
(SA&PS4CS-2012)
October 17-20, 2012, St. Petersburg, Russia
http://comsec.spb.ru/mmm-acns12/http://www.comsec.spb.ru/saps4cs12/
Title and scope
The previous International Conferences "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2001 (http://space.iias.spb.su/mmm-acns01/), MMM-ACNS-2003 (http://space.iias.spb.su/mmm-acns03/), MMM-ACNS-2005 (http://space.iias.spb.su/mmm-acns05/), MMM-ACNS-2007 (http://www.comsec.spb.ru/mmm-acns07/ and MMM-ACNS-2010 (http://www.comsec.spb.ru/mmm-acns10/)) organized by St. Petersburg Institute for Informatics and Automation, Binghamton University (SUNY) and supported by the European Office of Aerospace Research and Development USAF, Office of Naval Research Global, and Russian Foundation for Basic Research were successful. These conferences demonstrated the high interest of the international scientific community to the theoretical and practical aspects of the computer network and information security.
The goals of MMM-ACNS-2012 Conference (http://www.comsec.spb.ru/mmm-acns12/) is to bring together leading researchers from academia and governmental organizations as well as practitioners to advance the states of the art and practice in the area of computer networks and information security with a focus on novel theoretical aspects of computer network security, facilitate personal interactions and discussions on various aspects of information technologies in conjunction with computer network and information security problems arising in large-scale computer networks.
The MMM-ACNS-2012 Conference will be carried out together with the Second International Workshop “Scientific Analysis and Policy Support for Cyber Security” (SA&PS4CS-2012) (http://www.comsec.spb.ru/saps4cs12/) dedicated to the methods of scientific analysis and policy support for response to cyber intrusions and attacks.
Topics of interest
Papers offering novel research contributions to the theoretical aspects of the computer network and information security are solicited for submission.
Papers may present theory, technique, and applications on topics including but not restricted to:
- Adaptive security
- Anti-malware techniques: detection, analysis, prevention
- Anti-phishing, anti-spam, anti-fraud, anti-botnet techniques
- Applied cryptography
- Authentication, authorization and access control
- Cloud Security
- Computer and network forensics
- Covert channels
- Critical infrastructure protection
- Data and application security
- Data mining, machine learning, and bio-inspired approaches for security
- Deception systems and honeypots
- Denial-of-service attacks and countermeasures
- Digital Rights Management
- eCommerce, eBusiness and eGovernment security
- Embedded system security
- Formal analysis of security properties
- Information warfare
- Internet and web security
- Intrusion prevention, detection, and response
- Language-based security
- Network survivability
- New ideas and paradigms for security
- Operating system security
- Reliability and dependability
- Risks metrics, risk analysis and risk management
- Security and privacy in pervasive and ubiquitous computing
- Security event and information management
- Security for large-scale systems and critical infrastructures
- Security in social networks
- Security of emerging technologies: sensor, wireless/mobile, peer-to-peer and overlay networks
- Security of autonomous agents and multi-agent systems
- Security modeling and simulation
- Security policies
- Security protocols
- Security verification
- Security visualization
- Self-protecting and healing
- Smartphone security
- Software protection
- Trusted computing
- Trust and reputation management
- Vulnerability assessment
The main topics of the SA&PS4CS-2012 are detection, discrimination, and attribution of various activities of malefactors and response to cyber intrusions and attacks including national level information operations as well as identifying emergent cyber technologies supporting social and political activity management and trans-national distributed computing management.
Objective of the MMM-ACNS-2012 Conference
The main objectives of the MMM-ACNS-2012 Conference are to discuss state-of-the-art in mathematical methods and models for computer networks and information security to promote a better understanding of recent achievements and trends in the computer network security, as well as making use of recent achievements in the area of advanced information technologies for computer network and information assurance.
Security assurance of resident information and computer networks’ software is one of the important problems of the modern computer science and information technology. The problem importance is confirmed by ever increasing multiplicity and diversity of threads and vulnerabilities of computer networks, permanently increasing significance and value of information itself, and by potentially devastating consequences of successful attacks on integrity, resource availability and information confidentiality. Unauthorized access to computer network facilities and network resources, especially in global networks participating in real-time control operations, may be truly disastrous.
There are several reasons for the complexity of the problem under study. The growing size of the network, its interconnectivity, large number of users, increasing number of vulnerable targets within the network (communication protocols, operating systems, servers, applications, etc.), and the appearance of effective and previously unknown types of attacks are among them.
An additional objective of the conference is to bring together researchers and developers from academia, industry and governmental organizations to exchange ideas in a broad range of topics among researchers, security system developers and users from research and commercial perspective.
Since the scope of the conference covers areas presenting specific interest for basic and applied research organizations, information about the conference will be distributed among the corresponding organizations in Russia and worldwide. So far preliminary agreement to participate in the conference is received from leading Russian Institutions doing basic and applied research in Computer Science, Telecommunication and Computer Security and from companies developing relevant industrial applications.
Objective of the SA&PS4CS-2012 Workshop
The Workshop is dedicated to the methods of scientific analysis and policy support for response to cyber intrusions and attacks. The main topics of the Workshop are detection, discrimination, and attribution of various activities of malefactors and response to cyber intrusions and attacks including national level information operations as well as identifying emergent cyber technologies supporting social and political activity management and trans-national distributed computing management.
The Workshop aims to bring together researchers and practitioners involved in multiple disciplines concerning scientific analysis and policy support for cyber security to exchange ideas and to learn the latest developments in this important field.
This Workshop could promote internationally shared understanding of the technically supportable indications and warnings for various types of intrusions and attacks, from the isolated to the highly coordinated, and from the forensic to strategic.
The Workshop is planned on the last day of MMM-ACNS-2012.
Submitting a paper
The MMM-ACNS-2012 welcomes original papers from academic, government, and industry contributors on mathematical approaches and models, state-of-the-art techniques, and novel applications in the above proposed areas. All submissions will be subjected to a thorough review by at least three reviewers.
Draft versions of original full papers up to 14 A4 pages (but not less than 6 pages) in English prepared according to the instructions provided by Springer (http://www.springer.com/comp/lncs/Authors.html), including abstract (up to 300 words) and keywords (5 to 8), should be submitted by
May 27, 2012
or sooner through the upload facilities at the MMM-ACNS-2012 web site http://www.comsec.spb.ru/mmm-acns12/ .
Only electronic submissions in PDF format will be considered.
Authors must also indicate the conference track to which the paper is submitted.
The Program Committee will make the final selection based on peer reviewers’ evaluation.
The primary focus is on high-quality original unpublished research, case studies and implementation experiences.
Notification of acceptance/rejection will be disseminated by June 29, 2012.
Camera-ready versions of accepted papers (see below) are due July 11, 2012.
The speakers of the SA&PS4CS-2012 Workshop will be personally invited. We intend to invite for participation in the session a number of worldwide recognized specialists in cyber security from the USA, Europe, China, Russia and other countries.
Proceedings
Program Committee plans to publish the MMM-ACNS-2012 Proceedings in Springer series "Lecture Notes in Computer Science" (LNCS). The final decision will be made by Springer after finalizing the reviewing process. Instructions for authors will be provided at the MMM-ACNS-2012 web site (http://www.comsec.spb.ru/mmm-acns12/).
Camera ready paper submission can be uploaded through the MMM-ACNS-2012 web site at http://www.comsec.spb.ru/mmm-acns12/.
The Proceeding of the SA&PS4CS-2012 Workshop also will be prepared.
Location of the Conference and Workshop
According to the preliminary agreement, the MMM-ACNS-2012 conference and the SA&PS4CS-2012 Workshop will take place in the historical building "Palace of Grand Prince Vladimir Romanov," now "House of Scientists," located in the heart of St. Petersburg, address: 26, Dvortsovaya emb., St.Petersburg, 191186, Russia.
This venue allows the conference organizers to arrange for the conference itself, as well as for the associated events (informal discussions, reception, breaks, etc.).
-------- Original-Nachricht --------
Betreff: [AISWorld] JOEUC
Datum: Tue, 27 Mar 2012 10:32:36 -0600
Von: Mahmood, M. Adam <mmahmood(a)utep.edu>
An: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
The contents of the latest issue of:
*Journal of Organizational and End User Computing (JOEUC)*
Official Publication of the Information Resources Management Association
Volume 24 Issue 2, April-June 2012
Published: Quarterly in Print and Electronically
ISSN: 1546-2234 EISSN: 1546-5012
Published by IGI Publishing, Hershey-New York, USA
www.igi-global.com/joeuc <http://www.igi-global.com/joeuc>
Editor-in-Chief: M. Adam Mahmood, University of Texas at El Paso, USA
*EDITORIAL NOTE*
An extended version of the abstracts for the aforementioned JOEUC issue
is provided below for your information and perusal. If you would like
to submit a manuscript to the journal for publication consideration,
please consult the manuscript submission guidelines provided at
http://www.igi-global.com/Files/AuthorEditor/guidelinessubmission.pdf.
After reviewing the guidelines, please send an electronic version of
your manuscript to us.
*PAPER ONE*
The Role of IT Governance Practices in Creating Business Value in SMEs
Carla L. Wilkin, Monash University, Australia
Much has been written about information technology governance (ITG) in
larger organizations, wherein control of information technology (IT) is
addressed with attention to three core elements, namely structures,
processes, and relational mechanisms. These elements focus on governing
the size of IT investment, the ubiquity of IT functionality to business
processes and the demonstrated value from IT investment. For
Small-to-Medium Enterprises (SMEs) it is less apparent how IT is or
should be governed, how these core elements may contribute to ITG, and
how this all contributes to the creation of business value. Through a
survey of small SMEs in the Australian tourist accommodation industry
regarding their use of and planning for IT investment to deliver
business value, this paper delivers new understanding about SME
practices related to governing IT. Findings revealed evidence of some
sound practices but the opportunity to achieve greater strategic
business value beyond the largely operational value already acquired.
The paper concludes by proposing a redefined framework of the core
elements of structures, processes, and relational mechanisms that is
tailored to an SME context.
To obtain a copy of the entire article, click on the link below.
http://www.igi-global.com/article/role-governance-practices-creating-busine…
To view a sample PDF of this article, click on the link below.
http://www.igi-global.com/viewtitlesample.aspx?id=65092
**
**
**
**
*PAPER TWO*
Does Technology Trust Substitute Interpersonal Trust? Examining
Technology Trust's Influence on Individual Decision-Making
Xin Li, University of South Florida St. Petersburg, USA
Guang Rong, Clemson University, USA
Jason B. Thatcher, Clemson University, USA
While an increasing number of trust studies examine technological
artifacts as trust recipients, there is still a lack of basic
understanding of how technology trust relates to traditional trust and
its role within the broader nomological net articulated in trust
research. This paper suggests that technology trust is distinct from
interpersonal trust (i.e., trust in humans) due to the different core
characteristics of the trustees. To examine these differences, the
authors first develop and validate a measure of technology trust
comprised of IT-specific belief sources. Then, they articulate a
research model that compares and contrasts technology trust and
interpersonal trust. This study provides evidence that technology trust
is associated with, yet distinct from, interpersonal trust. The authors
found technology trust plays a dual role in the nomological net tied to
individual intended behavior -- exerting a direct and an indirect
influence on a trust outcome. Rather than suggesting that technology
trust substitutes for interpersonal trust, the findings suggest that
technology trust complements interpersonal trust in affecting purchase
intention.
To obtain a copy of the entire article, click on the link below.
http://www.igi-global.com/article/does-technology-trust-substitute-interper…
To view a sample PDF of this article, click on the link below.
http://www.igi-global.com/viewtitlesample.aspx?id=65093
*PAPER THREE*
The Impact of Information Technology Internal Controls on Firm Performance
Lemuria Carter, North Carolina A&T State University, USA
Brandis Phillips, North Carolina A&T State University, USA
Porche Millington, North Carolina A&T State University, USA
Since the introduction of the Sarbanes-Oxley (SOX) Act in 2002,
companies have begun to place more emphasis on information technology
(IT) internal controls. IT internal controls are policies that provide
assurance that technical systems operate as intended, provide reliable
data, and comply with regulations. Research suggests that firms with
strong internal controls perform better than those with internal control
weaknesses. In this study, the authors evaluate the impact of IT
internal controls on firm performance. The sample includes 72 publicly
traded firms, 36 that reported IT internal control weaknesses and 36
that did not. The results of ordinary least squares (OLS) regression
indicate that substantive IT internal control weaknesses negatively
impact firm performance. Results and implications for research and
practice are discussed.
To obtain a copy of the entire article, click on the link below.
http://www.igi-global.com/article/impact-information-technology-internal-co…
To view a sample PDF of this article, click on the link below.
http://www.igi-global.com/viewtitlesample.aspx?id=65094
*PAPER FOUR*
Information Systems Service Quality, Zone of Tolerance, and User
Satisfaction
Narasimhaiah Gorla, American University of Sharjah, UAE
Information system service quality has been a very important theme in
both IS practice and research. User service expectations affect
perceived service quality and user satisfaction. The objectives of this
research are to i) to explore the relationship between perceived IS
service quality and user satisfaction across the three regions of zone
of tolerance (ZOT) and ii) to validate the associations between service
expectations (adequate service and desired service) and service
performance. The analysis of the data obtained from 193 IS users
revealed a positive and significant association between perceived
service quality and user satisfaction across the service zones and
service dimensions with stronger associations in the acceptable service
zone and weaker associations in the inadequate and superior service
zones. Thus, the results demonstrate that the relationship between IS
service quality and user satisfaction is affected by ZOT. It is found
that the desired service expectation measure is more strongly related to
service performance compared to the adequate service expectation
measure. It is also observed that irrespective of the ZOT, the service
dimension that contributes most to service performance is assurance.
Tangibles have the widest ZOT and assurance has the narrowest ZOT
compared to most other service dimensions. The author discusses the
implications of the present study for both research and practice.
To obtain a copy of the entire article, click on the link below.
http://www.igi-global.com/article/information-systems-service-quality-zone/…
To view a sample PDF of this article, click on the link below.
http://www.igi-global.com/viewtitlesample.aspx?id=65095
*****************************************************
For full copies of the above articles, check for this issue of the
*Journal of Organizational and End User Computing (JOEUC)* in your
institution's library. This journal is also included in the IGI Global
aggregated "*InfoSci-Journals*" database:
http://www.igi-global.com/EResources/InfoSciJournals.aspx.
*******************************************************
-------- Original-Nachricht --------
Betreff: [AISWorld] JSS special issue on Web 2.0 engineering: new
practices and emerging challenges EXTENDED DEADLINE
Datum: Tue, 27 Mar 2012 17:46:48 +0200
Von: Irene Garrigós <igarrigos(a)dlsi.ua.es>
An: aisworld(a)lists.aisnet.org
--------------------------------------------------------------------------------------------------------------------
Journal of Systems and Software (JSS) - Elsevier
SPECIAL ISSUE on Web 2.0 engineering: new practices and emerging challenges
**EXTENDED DEADLINE: APRIL 13th, 2012**
------------------------------------------------------------------------------------------------------------------
Listed at JCR 2010 with impact factor of 1,293
------------------------------------------------------------------------------
The number and complexity of Web applications and the amount of
information they offer has experienced a continuous growth in the last
years under the umbrella of Web 2.0 applications. Some new issues thus
need to be addressed when engineering social software, Rich Internet and
Service-Oriented Applications, Web mashups or Semantic Web applications.
In this special issue we welcome contributions on the following topics:
-Model-driven approaches in the context of Web 2.0 application development
-Integration of Web 2.0 characteristics into traditional Model-driven
Web Engineering (e.g., social computing, Rich Internet Applications,
Service-Oriented Architectures, cloud computing, collaborative design,
Semantic Web, etc.)
-Potential problems or limitations of model-driven software development
(MDSD) in the Web 2.0 domain
-Domain specific modeling languages, UML profiles and metamodels for Web
2.0 applications
-Design and architectural patterns for Web 2.0 applications
-Architectural Modeling, code generation and model interpretation for
Web 2.0 applications
-Model-to-model transformations, model-to-code transformations, and
interoperability models for Web 2.0 applications; quick prototyping and
early customer feedback
-Tools and frameworks for supporting model-driven Web 2.0 application
development
-Model-driven analysis of Web 2.0 applications, including quality,
performance or reliability analysis conducted using high-level models of
the application
-Maintenance, evolution, reengineering and management of Web 2.0 systems
-Benchmarks for obtaining empirical evaluations and comparisons of
Model-Driven Web 2.0 development
-Modeling of requirements, goals, and domains in the Web 2.0
-Prototyping and simulation in Web 2.0
-Alignment between business and Web requirements
-Social, cultural, and cognitive factors in Web requirements engineering
-User-centered analysis and design for Web 2.0 applications
-Modeling and evaluation of User experience (UX) in Web 2.0 applications
-Requirements engineering for RIAs
-Quality evaluation of the content created and shared by the users by
using Web 2.0 applications
-Adaptation of existing quality assessment methods (e.g., review
guidelines, quality models, quality checkers, Web usage analysis tools)
for their use with modern Web applications
-Practical recommendations and lessons learned about quality criteria in
the Web development context (e.g., Rich Internet Applications) that
could encourage and inspire practitioners to improve their evaluation
processes
-Results about quality evaluation method properties (e.g.,
effectiveness, ease of use)
-How to balance the competing demands of schedule, cost, scope, and
quality with the advent of the new Web 2.0 panorama.
Forms of submission
-------------------
There are two types of submission:
1. An open call targeted at researchers and practitioners alike working
on areas related to the topics of interest listed above.
2. Personal invitations targeted at the authors of the best papers
accepted at the following workshop held in conjunction with the
International Conference on Web Engineering (ICWE) 2011: the 2nd Web and
Requirements Engineering (WeRE 2011), 2nd International Workshop on
Quality in Web Engineering (QWE 2011), and the 7th Model-Driven Web
Engineering Workshop (MDWE 2011). In particular, authors will be invited
to submit extended versions of their papers for full re-review. The
extended version should be non-trivially extended from the version that
appears in the workshop (at a very minimum it should contain 30% new
material). Authors will be asked to write an accompanying letter
explaining how their workshop paper has been extended to meet this
requirement and how referees' comments and the discussion during the
workshop about their work have been addressed.
Important dates
---------------
Deadline for submission of papers: APRIL 13th, 2012
Authors to receive a 1st decision by: May 30th, 2012
Final notification of acceptance: July 30th, 2012
Publication: December 2012
Guest editors
--------------
Marco Brambrilla
Politecnico di Milano, Italy
Email: mbrambil(a)elet.polimi.it <mailto:mbrambil@elet.polimi.it>
Cristina Cachero
University of Alicante, Spain
Email: ccahero(a)dlsi.ua.es <mailto:ccahero@dlsi.ua.es>
Cinzia Cappiello
Politecnico di Milano, Italy
Email: cappiello(a)elet.polimi.it <mailto:cappiello@elet.polimi.it>
Irene Garrigós (contact person)
University of Alicante, Spain
Email: igarrigos(a)dlsi.ua.es <mailto:igarrigos@dlsi.ua.es>
Jose-Norberto Mazón
University of Alicante, Spain
Email: jnmazon(a)dlsi.ua.es <mailto:jnmazon@dlsi.ua.es>
Santiago Meliá
University of Alicante, Spain
Email: santi(a)ua.es <mailto:santi@ua.es>
_______________________________________________
ah mailing list
ah(a)listserver.tue.nl <mailto:ah@listserver.tue.nl>
http://listserver.tue.nl/mailman/listinfo/ah
-------- Original Message --------
Subject: [IEEE Xplore/ISI/Ei] Informatics Track Submission
Deadline 30 March, Chongqing, China
Date: Tue, 27 Mar 2012 10:10:35 +0800
From: BMEI CISP <cisp-bmei-cfp(a)cqupt.edu.cn>
To: <gustaf.neumann(a)wu-wien.ac.at>
Dear Colleague,
Topics of the BMEI 2012*Special Track on Informatics*
include (but are not limited to): *Communications and
Networking, Software Engineering, Data Engineering,
Intelligent Computing, Information Security, Automation and
Control, etc.. *
We cordially invite you to submit a paper to the upcoming
2012 5th International Conference on BioMedical Engineering
and Informatics (BMEI 2012) and 2012 5th International
Congress on Image and Signal Processing (CISP 2012), to be
jointly held from 16-18 October 2012, in Chongqing, China.
BMEI'12-CISP'12 is a premier international forum for
scientists and researchers to present the state of the art
of multimedia, signal processing, biomedical engineering and
informatics.BMEI’12-CISP’12 is technically co-sponsored by
the IEEE Engineering in Medicine and Biology Society.
*As with past CISP-BMEI conferences, all papers in
conference proceedings will be indexed by both EI Compendex
and ISTP, as well as included in the IEEE Xplore (IEEE
Conference Record Number for CISP'12: 20190; IEEE Conference
Record Number for BMEI'12: 20189). Substantially extended
versions of best papers will be considered for publication
in a CISP'12-BMEI'12 special issues of the /Multimedia Tools
and Applications/ and /China Communications/ journals (both
SCI-indexed).*
Renowned as the Mountain City, Chongqing is a magnet for
visitors from home and abroad for its cultural heritage and
numerous attractions. There are many karst caves, hot
springs, and gorges in the area. Major tourist spots in and
near Chongqing include Dazu Grottoes (rock carvings began in
the Tang Dynasty 650 A.D.), Three Gorges, Jinyun Mountain
Natural Reserve, Hongya Cave, Shibaozhai, Wulong Karst,
etc..The registration fee of US$430 includes proceedings,
lunches, dinners, banquet, coffee breaks, and all technical
sessions.
To promote international participation of researchers from
outside the country/region where the conference is held
(i.e., China’s mainland), researchers outside of China’s
mainland are encouraged to propose *invited sessions*. The
first author of each paper in an invited session must not be
affiliated with an organization in China’s mainland. All
papers in the invited sessions can be marked as "Invited
Paper". The organizer(s) for each invited session with at
least 6 registered papers will (jointly) enjoy an honorarium
of US*D 400. Invited session organizers will solicit
submissions, conduct reviews and recommend accept/reject
decisions on the submitted papers. Invited session
organizers will be able to set their own submission and
review schedules, as long as a list of recommended papers is
determined by 10 August 2012. Each invited session proposal
should include: (1) the name, bio, and contact information
of each organizer of the invited session; (2) the title and
a short synopsis of the invited session. Please send your
proposal to cisp-bmei(a)cqupt.edu.cn
For more information, visit the conference web page:
http://cisp-bmei.cqupt.edu.cn
If you have any questions after visiting the conference web
page, please email the secretariat at cisp-bmei(a)cqupt.edu.cn
Join us at this major event in beautiful Chongqing !!!
Organizing Committee
cisp-bmei(a)cqupt.edu.cn
P.S.: Kindly forward to your colleagues and students in your
school/department.
If you wish to unsubscribe, in which case we apologize,
please reply with " unsubscribe
gustaf.neumann(a)wu-wien.ac.at" in your email subject. Thanks.
-------- Original Message --------
Subject: [AISWorld] CFP - InfoSecCD 2012
Date: Mon, 26 Mar 2012 14:28:03 -0400 (EDT)
From: Dr. Mike Whitman <mwhitman(a)kennesaw.edu>
To: aisworld(a)lists.aisnet.org
*CALL FOR PAPERS*
*2012 INFORMATION SECURITY CURRICULUM DEVELOPMENT CONFERENCE
(InfoSecCD'12)
*
*October 12-13, 2012, Kennesaw State University, Georgia*
InfoSecCD aims to provide academics, researchers, and
practitioners an opportunity to share their perspectives
with others interested in the various aspects of Information
Security Curriculum Development. Papers offering novel
research contributions in any aspect of information security
education are solicited for submission to the 2012
Information Security Curriculum Development Conference.
The primary focus is on high-quality original unpublished
research, case studies, and implementation experiences.
Papers should have practical relevance to the design,
development, implementation and best-practices in
information security education or for best-practices in the
design, implementation and management of information
security or digital forensics.
Theoretical papers must make convincing argument for the
practical significance of the results. Theory must be
justified by compelling examples illustrating its
application. The primary criterion for appropriateness is
demonstrated practical relevance. The conference will
include three tracks: pedagogy, practice, and student. Note:
Work in Progress papers can be accepted if substantial
progress and expected completion by the conference date is
demonstrated.
All submissions go to the conference paper management site
(provided by Microsoft Research)
available at https://cmt.research.microsoft.com/INFOSECCD2012\
To submit a paper, go to the CMT Microsoft site, register as
an author and upload. Additional details are provided by the
system. Please note that */all/* submissions must use the
ACM approved format available in the template downloadable
from
http://infosec.kennesaw.edu/InfoSecCD/InfoSecCD_ACM_Template.docx.
**
*Important Dates*
·July 15, 2011 Submission of Papers and Presentation Proposals
·August 15, 2011 Reviews and acceptances to authors
·September 15, 2011 Camera-ready copies and ACM agreements
submitted
Authors for Accepted Papers must also register for the
conference by September 15.
**
*Pedagogy and Practice Tracks
*Contributions are solicited for InfoSec areas including,
but not limited to pedagogical issues and best practices in
the instruction of or practice of: foundations, risk
management, technology (firewalls, IDS, etc.), digital
forensics, access control, and biometrics cryptography. Also
included are general pedagogical issues in InfoSec
instruction, configuration of InfoSec labs, computer law and
ethics, and other related areas.
Papers should be at most 15 pages excluding the bibliography
and well-marked appendices (using 11-point font and
reasonable margins on letter-size paper). Reviewers are not
required to read the appendices, and so the paper should be
intelligible without them. Author names and affiliations
should only appear on the cover page.
*/Authors may only be a co-author on a maximum of 3 papers
submitted to the conference, and on only 2 accepted for
publication./*
**
*Student Track
*Graduate and undergraduate students are encouraged to
submit papers. Papers should be clearly marked as student
submissions. Students may author papers on various aspects
of learning or practicing information security.
Papers should be at most 10 pages excluding the bibliography
and well-marked appendices (using 11-point font and
reasonable margins on letter-size paper). Reviewers are not
required to read the appendices, and so the paper should be
intelligible without them. Author names and affiliations
should only appear on the cover page.
*/In order to be considered a student paper and thus
eligible for the student best paper recognition, the paper
must be written /exclusively/ by student authors./*
Note: All authors please use the Author Template
<http://infosec.kennesaw.edu/InfoSecCD/InfoSecCD_ACM_Pubform.doc>available
from http://infosec.kennesaw.edu/InfoSecCD/
Proceedings contents will be submitted to the ACM Digital
Library. Every author who submits will be expected to serve
as a reviewer for other submissions. At least one author
must register for the conference by August 15 for the paper
to be included in the proceedings and ACM Press publication.
If you have any questions or comments about submissions or
requirements please direct them to the program chair, Dr.
Humayun Zafar at
hzafar(a)kennesaw.edu<mailto:infosec@kennesaw.edu>
/This conference is in cooperation with the ACM and the ACM
SIGMIS/**
--
Michael E. Whitman, Ph.D., CISM, CISSP
Professor of Information Security;
Director, KSU Center for Information Security Education; &
Coordinator, BBA- and BS-Information Security & Assurance
Department of Information Systems
Michael J. Coles College of Business
Kennesaw State University - A National Center of Academic
Excellence in Information Assurance Education
1000 Chastain Rd. MS 1101
Kennesaw, GA 30144-5591
Ph: 770.499.3568
Fx: 770.423.6731
Clendenin Building (12) Rm #3061
This message (including any attachments) contains
confidential information intended for a specific individual
and purpose, and is protected by law. If you are not the
intended recipient, you should delete this message
immediately and are hereby notified that any disclosure,
copying or distribution of this message, or the taking of
any action based on it, is strictly prohibited.
Further, the contents of this email and any attachments it
may be associated with may be protected by the copyright
laws of the United States.
-------- Original Message --------
Subject: [AISWorld] [ExaCt 2012] Explanation-aware
Computing, ECAI 2012 workshop, Call for papers
Date: Mon, 26 Mar 2012 09:55:46 +0100
From: Thomas Roth-Berghofer <Thomas(a)Roth-Berghofer.de>
To: aisworld(a)lists.aisnet.org
** Apologies if you receive multiple copies of this announcement **
** Please forward to anyone who might be interested **
FIRST CALL FOR PAPERS
for the 7th International and
ECAI 2012 Workshop on
EXPLANATION-AWARE COMPUTING (ExaCt 2012)
One-Day Workshop, 27 or 28 August 2012, Montpellier, France
http://exact2012.workshop.hm
** Submission deadline: May 28, 2012 **
When knowledge-based systems are partners in interactive socio-
technical processes, with incomplete and changing problem descriptions,
effective communication between human and software system is vital.
Explanations exchanged between human agents and software agents may
play a key role in such mixed-initiative problem solving. For
example, explanations may increase the confidence of the user in
specific results or in the system as a whole, by providing evidence of
how the results were derived. AI research has also focused on
how computer systems can themselves use explanations, for example to
guide learning.
Explanation-awareness in computing system development aims at making
systems able to interact more effectively or naturally with their
users, or better able to understand and exploit knowledge about their
own processing. Systems intended to exhibit explanation-awareness must
be more than simple reactive systems. When the word 'awareness' is
used in conjunction with the word 'explanation' it implies some
consciousness about explanation and reasoning about explanations at
the knowledge level.
Thinking of the Web not only as a collection of web pages, but as
providing a Web of experiences exchanged by people on many platforms,
gives rise to new challenges and opportunities to leverage experiential
knowledge in explanation. For example, records of experiences on the
Web and interrelationships between experiences may provide provenance
and meta-data for explanations and can provide examples to help instil
confidence in computing systems. The interplay of provenance information
with areas such as trust and reputation, reasoning and meta-reasoning,
and explanation are known, but not yet well exploited.
Outside of artificial intelligence, disciplines such as cognitive
science, linguistics, philosophy of science, psychology, and education
have investigated explanation as well. They consider varying aspects,
making it clear that there are many different views of the nature of
explanation and facets of explanation to explore. Two relevant examples
of these are open learner models in education, and dialogue management
and planning in natural language generation.
The ExaCt workshop series aims to draw on the multiple perspectives on
explanation, to examine how explanation can be applied to further the
development of robust and dependable systems, and increase transparency,
user sense of control, trust, acceptance, and decision support.
GOALS AND AUDIENCE
The main goal of the workshop is to bring together researchers,
scientists from both industry and academia, and representatives from
different communities and areas such as those mentioned above, to study,
understand, and explore explanation in AI applications. In addition to
presentations and discussions of invited contributions and invited talks,
this workshop will offer organised and open spaces for targeted
discussions and creating an interdisciplinary community. Demonstration
sessions will provide the opportunity to showcase explanation-enabled/
-aware applications.
TOPICS OF INTEREST
Suggested topics for contributions (not restricted to IT views):
* Models and knowledge representations for explanations
* Integrating application and explanation knowledge
* Explanation-awareness in (designing) applications
* Methodologies for developing explanation-aware systems
* Explanations and learning
* Context-aware explanation vs. explanation-aware context
* Confidence and explanations
* Privacy, trust, and explanation
* Provenance and metareasoning
* Empirical studies of explanations
* Requirements and needs for explanations to support human understanding
* Explanation of complex, autonomous systems
* Co-operative explanation
* Visualising explanations
* Dialogue management and natural language generation
Submissions on additional topics are very welcome.
SUBMISSIONS AND STYLE
Workshop submissions will be electronic, in pdf format only, using
the EasyChair submission system linked from the workshop website.
Papers must be written in English and not exceed 5 pages in the
ECAI format. At least one author of each accepted paper must register
for the workshop and the ECAI conference and present the contribution
in order to be published in the workshop proceedings. The organising
committee is considering editing a special issue of an appropriate
international journal depending on the number and quality of the
submissions.
Those wishing to participate without a paper submission should
submit a brief synopsis of their relevant work or a brief statement
of interest.
The workshop proceedings will be published online on the ECAI website
and as CEUR workshop proceedings (http://ceur-ws.org).
If you have questions please contact the chairs using the following
email address: chairs(a)exact2012.workhop.hm.
IMPORTANT DATES
Submission deadline: May 28, 2012
Notification of acceptance: June 28, 2012
Camera-ready versions of papers: July 13, 2012
ExaCt Workshop: August 27/28, 2012
WORKSHOP SCHEDULE
The schedule will be made available on the workshop website. See the
workshop website for an agenda overview and links to past workshops.
CHAIRS
Thomas Roth-Berghofer, School of Computing and Technology,
University of West London, United Kingdom
thomas.roth-berghofer (at) uwl ac uk
David B. Leake, School of Informatics and Computing,
Indiana University, USA
leake (at) cs indiana edu
Jörg Cassens, Institute for Multimedia and Interactive
Systems (IMIS), University of Lübeck, Germany
cassens (at) imis uni-luebeck de
PROGRAMME COMMITTEE
Agnar Aamodt, Norwegian University of Science and Technology (NTNU)
David W. Aha, Navy Center for Applied Research in AI, Washington DC, USA
Martin Atzmüller, University of Kassel, Germany
Ivan Bratko, University of Ljubljana, Slovenia
Patrick Brézillon, LIP6, France
Ashok Goel, Georgia Tech University, Atlanta, GA, USA
Pierre Grenon, KMI, The Open University, UK
Anders Kofod-Petersen, SINTEF, Norway
Hector Muñoz-Avila, Lehigh University, USA
Miltos Petridis, University of Brighton, UK
Enric Plaza, IIIA-CSIC, Spain
Christophe Roche, University of Savoie, France
Olga Santos, Spanish National University for Distance Education
Gheorghe Tecuci, George Mason University, Fairfax, VA, USA
Douglas Walton, University of Windsor, Canada
THE YAHOO EXPLANATION GROUP
If you would like to participate in discussions on the topic of
explanation or like to receive further information about this workshop
you might consider joining the Yahoo!-group
http://groups.yahoo.com/group/explanation-research.
Information on explanation research is also collected here:
http://on-explanation.net.
-------- Original Message --------
Subject: Call for papers 2012 - ACSE
Date: Mon, 26 Mar 2012 09:18:12 +0000 (UTC)
From: Adv. in Computer Sci. & Eng. <arun(a)pphmj.org>
To: <neumann(a)wu-wien.ac.at>
To
Professor G. Neumann
Vienna University of Economics and Business Administration
Augasse 2-6, 1090 Vienna
Austria
Dear Professor Neumann,
The Pushpa Publishing House invites original research articles / critical survey articles for consideration of possible publication after peer review in the Volumes 2012 of the "Advances in Computer Science and Engineering?.
As per policy of our journals, we process the paper immediately on its receipt and try to arrive at a decision within a month. In case of a clear recommendation of a referee, the paper is included in an early issue of the journal. For the interest of authors, the Pushpa Publishing House offers 40% discount on the print charges (EUR 30 / USD 40) for all submitted articles in the ACSE received till June 31, 2012 . Thus, the per page charges is now EURO 18 / USD 24 with immediate effect. Twenty five reprints are provided to the corresponding author ex-gratis.
The purpose of this letter is to approach you to consider our request to contribute articles in our above mentioned journal for possible publication. You may encourage your fellow-workers and colleagues also to submit their papers for possible publication in the ACSE. Also, we shall highly appreciate your help and co-operation in promoting our journals by considering their subscriptions to your valued library and also for your personal use.
With kind regards,
Yours sincerely
Arun Azad
General Manager
Pushpa Publishing House
e-mail: arun(a)pphmj.com
http://www.pphmj.com
March 24, 2012
******************************************************************************************
Brief Introduction
Advances in Computer Science and Engineering
ISSN: 0973-6999
Available in print and online versions
http://www.pphmj.com/journals/acse.htm
******************************************************************************************
Aims& Scope: The Pushpa Publishing House invites original research papers and critical survey articles for consideration of possible publication after peer review in its journal named "Advances in Computer Science and Engineering". The ACSE is devoted to the every direction of application of Computer Science, both computational and experimental in nature and soft computing also. The areas of thrust include
theory of computation, algorithms and data structures, software engineering, validation,
programming methodology and languages, artificial intelligence, requirements,
computer elements and architecture, computer networking and communication,
database systems, parallel computation, evolutionary computing, neural networks,
molecular computing and quantum computing, operating systems, neural networks,
distributed computation, computer-human interaction, evolutionary computing, rough sets,
computer graphics, fuzzy logic, system administration and network management,
testing, maintenance, metrics and renovation of software; specification, design , coding,
implementation and evaluation of programming languages; human factors in software;
programming environments, development tools, visualisation and animation; verification,
management of the development process; software aspects of operating systems,
numerical and symbolic computation and more... .
The ACSE is published in two volumes annually each comprising of two issues. It is a quarterly journal appearing in February, May, August and November. The no. 1 of Vol. 8(2012) of the ACSE is in circulation.
Our Policy: Articles received are immediately processed adopting fastest method to arrive at the final decision regarding the publication of a paper normally within two months and in case duly recommended for publication by a referee, an effort is made to accommodate the paper in an issue to appear next. We understand that the policy of quick decision is in the interest of both the authors as well as the publishers. To ensure speedy publication articles which are sufficiently well presented as are judged by the Editors often get priority. Accepted papers get duly edited and typeset in the style of our journal by the publisher and the galley proofs are sent to the submitting authors, unless requested otherwise, without the original manuscript, for corrections. Abstracts of papers published are made available on our website http://pphmj.com/journals/fjec.htm along with other relevant details. Articles of interest can be purchased online.
Articles acceptation ratio: We receive approximately 60-75 articles in a year for consideration of publication in the ACSE. At the first step which is termed as the "screening" about 30% articles are returned as they might be poor in substance or presentation. The remaining articles are sent to two appropriate referees for their reports. The report is requested in a month or 6-8 weeks time and we are glad to mention that our referees/editors stick to stipulated time in normal conditions. The papers recommended for publication are normally 40% and those for revision are about 20%. Thus on the average about 20-25 articles out of submitted 60-75 per year get through the process for publication. The ratio desired comes out to be nearly 35%.
Print Charges: The Advances in Computer Science and Engineering is published by Pushpa Publishing House, a self supporting organization and does not receive funding from any institutional / government agency. Hence, the operation of the Journal is solely financed by the handling print charges received from authors. The print charges are required to meet maintenance of the journal. However, there are no submission charges. Authors are required to make payment only after their manuscript has been accepted for publication from Editorial Board. For defray the publication cost, authors in USA and Canada are requested to arrange print charges of their accepted papers at the rate of US$ 40 per page and authors in the rest of the world at the rate of EURO 30 per page from their institutions/research grants, if any. No extra charges for color figures. For the interest of authors, the Pushpa Publishing House offers 40% discount on the print charges (EUR 30 / USD 40) for all submitted articles in the ACSE received till June 31, 2012 . Thus, the per page charges is now EURO 18 / USD 24 with immediate effect. Twenty five reprints are provided to the corresponding author ex-gratis. Additional reprints may be ordered according to the fee schedule and instructions that will accompany the page proofs.
Submission Mode:
1. Online submission (.pdf and .doc files) through journals' homepage:
http://pphmj.com/journals/acse.htm
2. Electronic (.tex, .dvi, .pdf, .ps and .doc files) at the email address:
acse(a)pphmj.com and kkazad(a)pphmj.com
3. Hard copies: Papers in duplicate with a letter of submission at the following address:
The Editors, Advances in Computer Science and Engineering
Pushpa Publishing House
Vijaya Niwas, 198, Mumfordganj, Allahabad-211002, INDIA
OUR PUBLICATIONS
01. Advances and Applications in Discrete Mathematics (ISSN: 0974-1658)
02. Advances and Applications in Fluid Mechanics (ISSN: 0973-4686)
03. Advances and Applications in Statistics (ISSN: 0972-3617)
04. Advances in Computer Science and Engineering (ISSN 0973-6999)
05. Advances in Differential Equations and Control Processes (ISSN:0974-3243)
06. Advances in Fuzzy Sets and Systems (ISSN: 0973-421X)
07. Current Development in Oceanography (ISSN: 0976-6960)
08. Far East Journal of Applied Mathematics (ISSN: 0972-0960)
09. Far East Journal of Dynamical Systems (ISSN: 0972-1118)
10. Far East Journal of Electronics and Communications (ISSN:0973-7006)
11. Far East Journal of Mathematical Education (ISSN: 0973-5631)
12. Far East Journal of Mathematical Sciences (FJMS) (ISSN: 0972-0871)
13. Far East Journal of Theoretical Statistics (ISSN: 0972-0863)
14. JP Journal of Algebra, Number Theory& Applications (ISSN:0972-5555)
15. JP Journal of Biostatistics (ISSN: 0973-5143)
16. JP Journal of Fixed Point Theory and Applications (ISSN:0973-4228)
17. JP Journal of Geometry and Topology (ISSN: 0972-415X)
18. JP Journal of Heat and Mass Transfer (ISSN: 0973-5763)
19. JP Journal of Solids and Structures (ISSN: 0973-5615)
20. International Journal of Functional Analysis, Operator Theory and Applications (ISSN: 0975-2919)
21. International Journal of Information Science and Computer Mathematics (ISSN: 1829-4969)
22. International Journal of Materials Engineering and Technology (ISSN: 0975-0444)
23. International Journal of Numerical Methods and Applications (ISSN: 0975-0452)
24. Universal Journal of Mathematics and Mathematical Sciences (ISSN: 2277-1417)
25. Surveys in Mathematics and Mathematical Sciences (ISSN: 2277-551X)
-------- Original Message --------
Subject: [computational.science] Call for Papers: The 7th
International Conference on Frontier of Computer Science and
Technology (FCST-12)
Date: Sun, 25 Mar 2012 22:50:15 +0200
From: Gregorio Martinez <gregorio(a)um.es>
Organization: "ICCSA"
To: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
Call for Papers: The 7th International Conference on Frontier of Computer Science and Technology (FCST-12)
------------------------------------------------------------------------------
Organizers:
School of Information Science and Engineering, Central South University, China
School of Computer Science and Technology, Soochow University, China
Venue& Dates:
Suzhou, China, November 21-23, 2012
Technical Co-Sponsorship:
IEEE, IEEE Computer Society, and IEEE TCSC
Conference Website:
http://trust.csu.edu.cn/conference/FCST2012
Paper Submission:
http://www.easychair.org/conferences/?conf=fcst2012
Introduction
Welcome to participate in the 7th International Conference on Frontier of Computer Science and Technology (FCST-12), Suzhou, China, November 21-23, 2012!
In ancient China, Suzhou was the Capital of the Kingdom of Wu from the 12th to 4th centuries, B.C. As an old Chinese saying goes: "Heaven above,
Suzhou and Hangzhou below." Suzhou is well known in China and abroad for its wonderful landscapes, elegant gardens, and various stone bridges, as well
as its eminent historical and cultural values.
FCST-12 is intended to facilitate effective communications and exchanges all over the world. It will not only reflect the significant progresses that
are currently being made in computer science and technology, but also represent a powerful and unique forum for discussing innovative and cutting-edge
advances in all aspects of computer science and technology from researchers and practitioners in academia, government and corporate institutions
around the globe.
FCST-12 derives from the Japan-China Joint Workshop on Frontier of Computer Science and Technology. It follows the success of FCST 2011 in Changsha,
China; FCST 2010 in Changchun, China; FCST 2009 in Shanghai, China; FCST 2008 in Nagasaki, Japan; FCST 2007 in Wuhan, China; and FCST 2006 in
Aizu-Wakamatsu, Japan. The conference aims to bring together computer scientists, mathematicians, engineers and researchers to Suzhou, in order to
present, discuss and exchange ideas, results, work-in-progresses and experiences, in a variety of areas in computer science and technology.
Scope and Interests
FCST-12 is an international forum for presenting and discussing emerging ideas and trends in the frontier of computer science and technology from both
the research community as well as the industry. Topics of interest in this year focus on 5 popular areas in particular, but are not limited to:
(1) Parallel and Distributed Computing (PDC Track)
1. Parallel/Distributed Architectures
2. Heterogeneous and Multimedia Systems
3. Ubiquitous Computing Systems and Cloud/Grid Computing Systems
4. Real-Time Parallel and Distributed Systems
5. Multi-Core Programming and Software Tools
6. Agent Technologies
7. Parallel and Distributed Operating Systems and Middleware
8. Parallel Languages and Compilers
9. Parallel and Distributed Applications and Web Services
10. Analysis and Design of Parallel and Distributed Algorithms
11. Task Mapping and Job Scheduling
12. Distributed Data and Knowledge Based Systems
13. High-Performance Scientific Computing
14. Resource Allocation and Management
15. Network Routing and Communication Algorithms
16. Bioinformatics in Parallel Computing
17. Security in Parallel and Distributed Systems
18. Self-Healing, Self-Protecting, Reliability, and Fault-Tolerant Systems
(2) Trust, Security and Privacy (TSP Track)
1. Trust Semantics, Metrics, and Models
2. Trusted Computing Platform
3. Risk and Reputation Management
4. Reliability, Dependability, and Fault Tolerance
5. Authentication, Authorization, and Accountability
6. Security Policy, Model, and Architecture
7. Access Control, Intrusion Detection, Firewalls, and Packet Filters
8. Applied Cryptography
9. Embedded Systems Security
10. Distributed Denial of Service, Malware, and Botnets
11. Secure Routing, Naming/Addressing, and Network Management
12. Privacy and Anonymity
13. Information Hiding
14. Security& Privacy in Database Systems
15. Security& Privacy in Parallel and Distributed Systems
16. Security& Privacy in Web Applications
17. Security& Privacy in Electronic Payments
18. Security& Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, and Ad Hoc Networks
19. Trust, Security and Privacy in Cloud computing, Social Networks, and Internet of Things
(3) Multimedia Systems and Networks (Multimedia Track)
1. Multimedia Fusion
2. Multimedia Data Management Systems and Applications
3. 3D Representation/Recognition/Retrieval
4. Digital Signal Processing Techniques and Applications
5. Multi-Core and Many-Core Architectures in Multimedia Systems
6. Integration of Content, Meta Data, and Social Networks
7. Computer Graphics
8. Networked GPUs, Graphics, and Virtual Environments
9. Networked Games/Real-Time Immersive Systems
10. Multimedia Network Architectures and Protocols
11. Network Security and Safety
12. QoS Issues in Multimedia Services and Applications
13. Cloud-Based Multimedia Delivery
14. Biomedical Signal Processing and Systems
15. Social Media as Sensors
16. Multimedia Applications on Mobile Devices
17. Digital Home Technology and Services
18. Web 2.0 Systems and Social Networks
19. Audio and Video-On-Demand
(4) Embedded Computing and Systems (Embedded Track)
1. Embedded System Architectures
2. Embedded Networks and Communication Systems
3. Embedded and Ubiquitous Computing
4. Embedded Applications
5. Embedded Real-Time Systems
6. Embedded System Software
7. Embedded Software Engineering
8. Embedded Database and Multimedia Systems
9. Embedded Hardware Platforms and Technologies
10. Embedded Hardware/Software Co-Design
11. Embedded Circuit and Multi-Core Technologies
12. Embedded Systems Security and Reliability
13. Embedded Low-Power Systems
14. Embedded Systems QoS Management
15. Embedded Systems Modeling and Analysis
(5) Emerging Software Techniques (Software Track)
1. Software Architecture and Software Engineering Models
2. Requirement Engineering and Requirement Elicitation
3. Software Components and Reuse
4. New Software Development Platform and Ecological Construction
5. New Software Development Languages
6. Software Testing, Analysis, and Verification
7. Software Configuration Management and Deployment
8. Agile Software Development Methodologies and Practices
9. Software Projects and Software Quality Management
10. Software Products and Process Improvement
11. Software Measurement and Metrics
12. Engineering Safety and Security in Critical Software
13. Software Optimization, Formal Methods, and Tools
14. Software Evolution Techniques
15. Intelligent Software Systems Design
16. Software Techniques for Mobile, Ubiquitous, and Cloud Computing Systems
17. Empirical Software Engineering
18. Evidence-Based Software Engineering
Submission and Publication Information
Papers should be written in English conforming to the IEEE Conference Proceedings Format (8.5" x 11", Two-Column),
http://www.computer.org/portal/web/cscps/formatting. Papers should be submitted through the EasyChair paper submission system
(http://www.easychair.org/conferences/?conf=fcst2012). Each paper is limited to 12 pages (or 16 pages with the over length charge).
All accepted papers of the conference will first appear in U-disk proceedings (without ISBN number), and then all accepted papers will be published in
special issues of refereed international journals to be indexed by SCI and EI (10-15 special issues will be announced soon). The program committee
will select two winners for the Best Paper Awards for this conference. Submitting a paper to the conference means that, if the paper is accepted, at
least one author should pay the registration fee and present the paper at the conference.
Important Dates
(1) Paper submission due: June 30, 2012
(2) Pre-Notification (First Round): August 30, 2012
(3) Final-Notification (Second Round): October 15, 2012
(4) Camera-Ready Papers Due: November 15, 2012
Steering Co-Chairs
Minyi Guo, Shanghai Jiao Tong University, China
Hai Jin, Huazhong University of Science& Technology, China
General Co-Chairs
Albert Zomaya, University of Sydney, Australia
Fanzhang Li, Soochow University, China
Program Co-Chairs
Manish Parashar, Rutgers, The State University of New Jersey, USA
Guojun Wang, Central South University, China
Program Vice Co-Chairs
(1) Parallel and Distributed Computing (PDC Track)
Rajendra V. Boppana, UT San Antonio, USA
Xiaofei Liao, Huazhong University of Science and Technology, China
Raphael C.-W. Phan, Loughborough University, UK
(2) Trust, Security and Privacy (TSP Track)
Christian Callegari, University of Pisa, Italy
Georgios Kambourakis, University of the Aegean, Greece
Ryan K. L. Ko, Hewlett Packard Laboratories, Singapore
Jinshu Su, National University of Defense Technology, China
(3) Multimedia Systems and Networks (Multimedia Track)
Mohamed Hamdi, Communication Networks and Security Research Lab., Tunisia
Xingang Liu, University of Electronic Science and Technology of China, China
Yulei Wu, Chinese Academy of Sciences, China
Neal N. Xiong, Georgia State University, USA
(4) Embedded Computing and Systems (Embedded Track)
Qingxu Deng, Northeastern University, China
Jian Li, Shanghai Jiao Tong University, China
(5) Emerging Software Techniques (Software Track)
Xiaolin (Andy) Li, University of Florida, USA
Fang Qi, Central South University, China
Fangfang Zhou, Central South University, China
Organizing Co-Chairs
Jiwen Yang, Soochow University, China
Li Zhang, Soochow University, China
Organizing Committee
Xiaocheng Du, Soochow University, China
Yuchen Fu, Soochow University, China
Wenzhong Gu, Soochow University, China
Shuping He, Soochow University, China
Xupei Qian, Soochow University, China
Bangjun Wang, Soochow University, China
Genrong Wang, Soochow University, China
Wangshu Yao, Soochow University, China
Publicity Co-Chairs
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Gregorio Martinez, University of Murcia, Spain
Wenbin Jiang, Huazhong University of Science and Technology, China
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Publication Co-Chairs
Wang Yang, Central South University, China
Pin Liu, Central South University, China
Secretariats
Xiaofei Xing, Central South University, China
Xiaoxiao Zheng, Central South University, China
Webmasters
Linlin Shan, Central South University, China
Xiangyong Liu, Central South University, China
Contact
Please email inquiries concerning FCST 2012 to:
Prof. Guojun Wang: csgjwang AT gmail DOT com and the conference organizers:
FCST2012Suzhou AT gmail DOT com
------------------------------------------------------------------------------
--
Gregorio Martinez, PhD
University of Murcia, Spain
http://webs.um.es/gregorio/
-------- Original Message --------
Subject: [WI] EDOC 2012 - 2nd Call for Papers
Date: Sun, 25 Mar 2012 08:55:07 +0200
From: Christian Zirpins <zirpins(a)acm.org>
Reply-To: Christian Zirpins <zirpins(a)acm.org>
To: wi(a)aifb.uni-karlsruhe.de
We apologize if you receive this message more than once.
---
Second Call for Papers
The 16th IEEE International EDOC Conference (EDOC 2012)
"The Enterprise Computing Conference"
Main Theme: When Services in Cloud Meet Enterprises
Sponsored by IEEE Computer Society and IEEE Communications Society
September 10-14, 2012, Beijing, China
http://www.edocconference.org
Extended full paper submission: April 1, 2012
About the conference
The IEEE EDOC Conference is the key annual event in enterprise
computing. EDOC conferences address the full range of models,
methodologies, and engineering technologies contributing to intra- and
inter-enterprise distributed/cloud application systems. EDOC 2012 will
be the sixteenth event in the series of conferences. Since 1997, EDOC
has brought together leading computer science researchers, IT decision
makers, enterprise architects, solution designers and practitioners to
discuss enterprise computing challenges, models and solutions from the
perspectives of academia, industry and government. The IEEE EDOC
Conference emphasizes a holistic view of enterprise applications
engineering and management, fostering integrated approaches that can
address and relate processes, people and technology. Openness and
distributed computing, based on services, components and objects are
important themes. IEEE EDOC 2012 welcomes high quality scientific
submissions as well as papers on enterprise computing industry
experiences. This year, the main theme will be on the impacts of
services and cloud to enterprise architecture. Expert panel
discussions and keynotes will address hot topics and issues in the
domain.
Topics
The IEEE EDOC conference seeks high-quality contributions addressing
the domains, the life-cycle issues and the realization technologies
involved in building, deploying and operating enterprise computing
systems. Suggested areas include, but are not limited to:
- Enterprise Architecture and Enterprise Application Architecture
- Model based approaches
- Service-oriented architectures (SOA) and enterprise service
architectures (ESA)
- Service oriented architecture governance
- Business process management (BPM)
- Business analytics
- Business rules
- Information integration and interoperability
- Networked Enterprise Solutions
- Enterprise applications deployment and governance
- State of the art in distributed enterprise applications
- Enterprise Computing Infrastructures
Submission guidelines
Two types of paper submissions will be accepted a) scientific research
papers, and b) industry experience reports or case studies. Scientific
research papers should describe original results that have not been
accepted or submitted for publication elsewhere. These papers will be
evaluated for scientific or technical contribution, originality,
appropriateness and significance. Experience reports should describe
new insights gained from case studies or the application of enterprise
computing technology in practice, contribute important feedback about
the state of practice and how current research is applied, and pose
challenges for researchers. These papers will be evaluated based on
their appropriateness, significance and clarity. Submissions should be
made electronically in PDF format via the electronic submission system
of the EDOC Conference Management system (hosted at
http://www.easychair.org/conferences/?conf=edoc2012, which will be
available later). All papers will be refereed by at least 3 members of
the international program committee. The conference proceedings will
be published by the IEEE Computer Society Press and will be accessible
through IEEE Xplore and the IEEE Computer Society Digital Library.
Post conference publication
The authors of a set of selected papers will be invited to prepare a
substantially revised and extended version of their papers for
publication in a special journal issue. In previous years, selected
papers from EDOC have been published in Springer's Information Systems
Frontiers (ISF), Enterprise Information Systems (EIS), and
International Journal of Cooperative Information Systems (IJCIS).
Important dates:
Full paper submission due: April 1, 2012 (extended)
Workshop paper submissions: April 1, 2012 (extended)
Conference paper acceptance notifications: May 14, 2012
Workshops paper acceptance notifications: May 28, 2012
All camera-ready papers due: June 15, 2012
For further information, please contact chihungchi(a)gmail.com
--
Mailing-Liste: wi(a)aifb.uni-karlsruhe.de
Administrator: wi-admin(a)aifb.uni-karlsruhe.de
Konfiguration: https://www.lists.uni-karlsruhe.de/sympa/info/wi