-------- Original-Nachricht --------
Betreff: [computational.science] Call for Papers - 9th European
Symposium on Research in Computer Security (ESORICS 2014)
Datum: Thu, 13 Mar 2014 18:55:23 +0100
Von: Giovanni Livraga <giovanni.livraga(a)unimi.it>
Organisation: "ICCSA"
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
[Apologies if you receive multiple copies of this message]
CALL FOR PAPERS
******************************************************************************
19th European Symposium on Research in Computer Security (ESORICS 2014)
Wroclaw, Poland -- September 7-11, 2014
http://esorics2014.pwr.wroc.pl/index.html
******************************************************************************
ESORICS (European Symposium on Research in Computer Security) is the
premier European research conference in computer security. ESORICS started
in 1990 and has been held in several European countries, attracting an
international audience from both the academic and industrial communities.
ESORICS 2014, the 19th symposium in the series, will be held in Poland at
the Institute of Mathematics and Computer Science, Wroclaw University of
Technology.
Papers offering novel research contributions in all aspects of computer
security are solicited for submission to ESORICS 2014. The primary focus
is on original, high quality, unpublished research, but submissions
describing implementation experiences and industrial research and
development are also encouraged. All topics related to security,
privacy and trust in computer systems and networks are of interest and
in scope. Purely theoretical papers, e.g. in cryptography, must be explicit
about the relevance of the theory to the security of IT systems.
For the second time at ESORICS, there will be awards for outstanding papers
and outstanding student papers. A student paper is defined to be one in
which at least one of the authors is a student who does not have a PhD
at the time of submission. To be considered for the student paper award,
the paper must be accompanied by a cover letter signed by all co-authors
explicitly attesting to the central role and contributions of the student(s),
and the paper must be presented by the student at ESORICS 2014. The cover
letter should be in pdf format and uploaded at the same time as the paper.
Paper Submission
----------------
Authors must adhere to the following guidelines.
* Submissions must not be anonymised.
* Submitted papers must not substantially overlap with papers that have been
(a) published in a journal or the proceedings of another conference
(b) submitted to a journal or (c) submitted to another conference with
proceedings.
* Submitted papers must adhere to the LNCS template and should be at most 16
pages in this format, excluding the bibliography and well-marked appendices.
Submitted papers must be no longer than 20 pages.
* Committee members are not required to read the appendices, so the paper
should be intelligible without them.
* Submissions must be written in English and must be in pdf format.
* Papers must be submitted via the EasyChair conference system at
https://www.easychair.org/conferences/?conf=esorics2014.
Submissions not meeting these guidelines risk rejection without consideration
of their merits.
Accepted papers will be published by Springer in the LNCS series. Note that
authors of accepted papers must guarantee that one of the authors will register
and present the paper at the conference.
Important Dates
---------------
* Paper submission due: 2 April 2014 (23:59 American Samoa time)
* Notification to authors: 10 June 2014
* Camera-ready copy due: 21 June 2014
* Conference: 7-11 September 2014
General Chair
-------------
Jacek Cichon, Wroclaw University of Technology
Program Committee Co-chairs
---------------------------
Miroslaw Kutylowski, Wroclaw University of Technology
Jaideep Vaidya, Rutgers University
Publicity Chair
---------------
Giovanni Livraga, Universita' degli Studi di Milano
Program Committee
-----------------
Masayuki Abe, NTT Secure Platform Laboratories, Japan
Gail-Joon Ahn, Arizona State University, USA
Mikhail Atallah, Purdue University, USA
Vijay Atluri, Rutgers University, USA
Kun Bai, IBM TJ Watson Research Center, USA
Giampaolo Bella, Università di Catania, Italy
Marina Blanton, University of Notre Dame, USA
Kevin Butler, University of Oregon, USA
Zhenfu Cao, Shanghai Jiao Tong University, P.R.C.
Srdjan Capkun, ETH Zurich, Switzerland
Liqun Chen, Hewlett-Packard Laboratories, UK
Xiaofeng Chen, Xidian University, P.R.C.
Sherman S. M. Chow, Chinese University of Hong Kong
Veronique Cortier, CNRS, LORIA, France
Marco Cova, University of Birmingham, UK
Laszlo Csirmaz, Central European University, Budapest, Hungary
Frederic Cuppens, TELECOM Bretagne, France
Nora Cuppens-Boulahia, TELECOM Bretagne, France
Reza Curtmola, New Jersey Institute of Technology, USA
Ozgur Dagdelen, Technische Universitaet Darmstadt, Germany
Sabrina De Capitani Di Vimercati, Università degli Studi di Milano, Italy
Roberto Di Pietro, Università di Roma Tre, Italy
Claudia Diaz, KU Leuven, Belgium
Josep Domingo-Ferrer, Università Rovira i Virgili, Catalonia
Wenliang Du, Syracuse University, USA
Simon Foley, University College Cork, Ireland
Philip W. L. Fong, University of Calgary, Canada
Sara Foresti, Università degli Studi di Milano, Italy
Keith Frikken, Miami University, Ohio, USA
Dieter Gollmann, Hamburg University of Technology, Germany
Dimitris Gritzalis, Athens University of Economics and Business, Greece
Ehud Gudes, Ben-Gurion University, Israel
Thorsten Holz, Ruhr-University Bochum, Germany
Yuan Hong, University at Albany, SUNY, USA
Xinyi Huang, Fujian Normal University, P.R.C.
Sushil Jajodia, George Mason University, USA
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, Technische Universitaet Darmstadt, Germany
Florian Kerschbaum, SAP, Germany
Kwangjo Kim, KAIST, Korea
Marek Klonowski, Wroclaw University of Technology, Poland
Wenke Lee, Georgia Institute of Technology, USA
Adam J. Lee, University of Pittsburgh, USA
Helger Lipmaa, University of Tartu, Estonia
Peng Liu, The Pennsylvania State University, USA
Javier Lopez, University of Malaga, Spain
Haibing Lu, Santa Clara University, USA
Emil Lupu, Imperial College, UK
Mark Manulis, University of Surrey, UK
Krystian Matusiewicz, Intel Technology, Poland
Christoph Meinel, Hasso-Plattner-Institut, Germany
Refik Molva, EURECOM, France
David Naccache, Ecole Normale Suprieure, France
Stefano Paraboschi, Università di Bergamo, Italy
Gunther Pernul, Universitaet Regensburg, Germany
Indrakshi Ray, Colorado State University, USA
Christian Rechberger, Technical University of Denmark
Kui Ren, University of Buffalo, SUNY, USA
Ahmad-Reza Sadeghi, Technische Universitaet Darmstadt, Germany
Rei Safavi-Naini, University of Calgary, Canada
Pierangela Samarati, Università degli Studi di Milano, Italy
Andreas Schaad, SAP, Germany
Basit Shafiq, Lahore University of Management Sciences, Pakistan
Radu Sion, Stony Brook University, USA
Shamik Sural, IIT, Kharagpur, India
Willy Susilo, University of Wollongong, Australia
Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Mahesh Tripunitara, The University of Waterloo, Canada
Michael Waidner, Fraunhofer SIT, Germany
Lingyu Wang, Concordia University, Canada
Felix Wu, University of California, Davis, USA
Yang Xiang, Deakin University, Australia
Xun Yi, Victoria University, Australia
Ting Yu, Qatar Computing Research Institute, Qatar
Meng Yu, Virginia Commonwealth University, USA
Rui Zhang, Chinese Academy of Sciences, P.R.C.
Jianying Zhou, Institute for Infocomm Research, Singapore
-------- Original-Nachricht --------
Betreff: [AISWorld] BMSD'14 Call for POSITION Papers
Datum: Thu, 13 Mar 2014 10:03:21 -0700
Von: Boris Shishkov <b.b.shishkov(a)iicrest.org>
Antwort an: b.b.shishkov(a)iicrest.org
An: <aisworld(a)lists.aisnet.org>
*Dear Colleague,*
There is an open Call for POSITION Papers concerning BMSD 2014 (Fourth
International Symposium on Business Modeling and Software Design) - you
may have a look at the website: http://www.is-bmsd.org
You are very welcome to make a POSITION PAPER SUBMISSION by *17 MARCH
2014*.
The BMSD'14 Call for Position Papers follows below.
A PDF version of the Call is ATTACHED to the current message.
I look forward to meeting you in Luxembourg for an inspiring symposium!
Kindest Regards,
Dr. /Boris Shishkov/
Chair of BMSD 2014
*Call for POSITION Papers*
*BMSD 2014 - FOURTH INTERNATIONAL SYMPOSIUM ON BUSINESS MODELING AND
SOFTWARE DESIGN*
/24-26 June, 2014/
/Luxembourg, Grand Duchy of Luxembourg/
*Chair:*
*Dr. /Boris Shishkov/, IICREST, Bulgaria*
*Keynote Lecturers:*
*Prof. Dr. /Erik Proper/, CRP Henri Tudor, Luxembourg* (Title: Exploring
the Challenges of Modeling Landscapes)
*Prof. Dr. /Roel Wieringa/, University of Twente, The Netherlands*
(Title: The Structure of Goal Models in Requirements Engineering)
Symposium Theme: *Generic Business Modeling Patterns and Software Re-Use*
The symposium is organized by the international institute *IICREST* in
collaboration with *CRP Henri Tudor*.
Cooperating organizations are: *AUTH* - Aristotle University of
Thessaloniki, *SIKS* - the Nederlands Research School for Information
and Knowledge Systems, *CTIT* - the U-Twente Centre for Telematics and
Information Technology, and *AMAKOTA Ltd*.
BMSD is a leading international discussion and knowledge dissemination
forum that brings together Researchers and Practitioners interested in:
(i) Modeling in general and in particular - Conceptual Modeling, Goal
Modeling, Value Modeling, Business/Enterprise Modeling, Process
Modeling, Model-Driven Engineering; (ii) Enterprise Engineering and its
relation to Software Generation; (iii) Information Systems Architectures
and Design.
In 2014, BMSD will be held in Luxembourg, Grand Duchy of Luxembourg,
following previous events in The Netherlands (Noordwijkerhout, 2013),
Switzerland (Geneva, 2012), and Bulgaria (Sofia, 2011).
We welcome position paper submissions from but not limited to the
following areas and topics:
*1. BUSINESS MODELS AND REQUIREMENTS*
Business Analysis - Value Models and Process Models
Essential Business Models
Re-Usable Business Models
Relating Business Goals to Requirements
Business Process Coordination
Business Entities and Business Roles
Business Data and Semantics
Business Processes and Business Rules
Behavior Modeling and Pragmatics
Identification and Elicitation of Requirements
Domain-Imposed and User-Defined Requirements
Requirements Analysis
*2. BUSINESS MODELS AND SERVICES*
Business Modeling and Service Science
Relating Business Goals to the Identification of Services
Service Modeling - Technology-Independent & Platform-Specific
Business Rules and Service Composition
Autonomic Service Behavior
Context-Aware Service Behavior
Re-Usable Service Models
*3. BUSINESS MODELS AND SOFTWARE*
Business Modeling -Driven Derivation of Software
Business Innovation and Software Evolution
Business-IT Alignment and Traceability
Re-Usable Business Models and Software Components
Business Rules and Software Specification
Business Goals and Software Integration
Autonomic and Context-Aware Business/Software Systems
Affective Computing and User-Aware Software Systems
*4. INFORMATION SYSTEMS ARCHITECTURES*
Enterprise Architectures
Service-Oriented Architectures
Architectural Styles
Architectural Viewpoints
Crosscutting Concerns
*Key dates*
Position Paper submission deadline: /17 March 2014/
Regular Paper submission deadline: /12 March 2014/(expired)
Notification of acceptance: /31 March 2014/
Final paper submission: /15 April 2014/
*Types of contributions*
/Regular Papers/ - presenting research that is completed or almost finished
/Position Papers/ - presenting an arguable opinion about and issue
/Invited Papers/ - submitted by best paper authors and BMSD
former/future Keynotes
*Paper formats*
/Full Papers/ - 10-page limit in the symposium proceedings (oral
presentation)
/Short Papers/ - 6-page limit in the symposium proceedings (oral
presentation)
/Posters/ - 4 page limit in the symposium proceedings (poster presentation)
*How to submit a Position Paper (6 steps)*
1. View the technical scope
2. Prepare a contribution of no less than 3 and no more than 8 pages
3. Do paper formatting, using the provided templates
(http://www.is-bmsd.org)
4. Remove your names and the names of your co-authors (and also your
affiliations) from the title and references sections
5. Save the file as PDF
6. e-Mail the file to: secretariat(a)iicrest.org by the 17th of March,
putting in the Subject: 'BMSD 2014, Position Paper'.
*Publication*
Accepted papers will be presented at BMSD 2014 and included in the
symposium proceedings, published by /SciTePress/. All presented papers
will also be included in the SciTePress Digital Library
(http://www.scitepress.org/DigitalLibrary) and DBLP-indexed. Finally,
the authors of selected best papers will be invited to submit revised
and extended versions of their papers in a /Springer LNBIP Revised
Selected Papers/ book.
*Proceedings of the previous editions*
2013: http://www.is-bmsd.org/Documents/ProceedingsOfThirdBMSD.pdf
2012: http://www.is-bmsd.org/Documents/ProceedingsOfSecondBMSD.pdf
2011: http://www.is-bmsd.org/Documents/ProceedingsOfFirstBMSD.pdf
*Some photos:*
2013: http://www.is-bmsd.org/GalleryThirdBMSD.htm
2012: http://www.is-bmsd.org/GallerySecondBMSD.htm
2011: http://www.is-bmsd.org/GalleryFirstBMSD.htm
*Venue*
The BMSD sessions will be held at the Chambre des Metiers that is not
only in very close proximity to both the University of Luxembourg and
the CRP Henri Tudor but is also conveniently reachable by bus (for
around 20 minutes) from both the city center and the airport. Luxembourg
is the capital of the Grand Duchy, one of the founder states of the
European Union, where about 43 per cent of the half million inhabitants
are foreign. This multicultural ambience of day-to-day contact with
people from the four corners of the Earth gives the small state an
astonishingly cosmopolitan outlook - not least thanks to the European
institutions and the financial center. It is however far easier to get
around the capital (100 000 inhabitants) than it is in Berlin or Paris.
The distances are short. There is a lively nightlife scene around the
fashionable bars of Hollerich, the Grund, and Clausen. Furthermore,
there are plenty of sports, leisure activities as well as events:
cinemas and climbing parks, mountain bike trails and an enormous
cultural range - from Jazz in the medieval city, contemporary art at
MUDAM, theatre in every language or classical music in one of the most
beautiful new buildings in Luxembourg, the Philharmonie. All this is set
against the romantic backdrop of the medieval city (a UNESCO world
heritage site since 1994), the castle in the richy-forested north and
the vineyards - along the Mosel.
*For more information*
w: http://www.is-bmsd.org
t: +359 888 534435
e: secretariat(a)iicrest.org
-------- Original-Nachricht --------
Betreff: [AISWorld] ISWC 2014 - Call for Workshops ***DEADLINE RAPIDLY
APPROACHING***
Datum: Thu, 13 Mar 2014 16:19:27 +0000
Von: Mauro Dragoni <dragoni(a)fbk.eu>
An: semantic-web(a)w3.org <semantic-web(a)w3.org>, public-lod(a)w3.org
<public-lod(a)w3.org>, public-ontolex(a)w3.org <public-ontolex(a)w3.org>,
SIGSAND-L(a)CLIFFY.UCS.MUN.CA <SIGSAND-L(a)CLIFFY.UCS.MUN.CA>,
CHI-ANNOUNCEMENTS(a)LISTSERV.ACM.ORG <CHI-ANNOUNCEMENTS(a)LISTSERV.ACM.ORG>,
confs-submit(a)hri.org <confs-submit(a)hri.org>, hellas(a)lists.psu.edu
<hellas(a)lists.psu.edu>, aisworld(a)lists.aisnet.org
<aisworld(a)lists.aisnet.org>, planetkr(a)kr.org <planetkr(a)kr.org>,
Community(a)sti2.org <Community(a)sti2.org>, semanticweb(a)yahoogroups.com
<semanticweb(a)yahoogroups.com>, events_calendar(a)acm.org
<events_calendar(a)acm.org>, linguist(a)linguistlist.org
<linguist(a)linguistlist.org>, ML-news(a)googlegroups.com
<ML-news(a)googlegroups.com>
Call for Workshops ***DEADLINE RAPIDLY APPROACHING***
==================================================================
The 13th International Semantic Web Conference
http://iswc2014.semanticweb.org/
19-23 October 2014, Riva del Garda, Trento, Italy
==================================================================
ISWC is the primary conference on the use of semantic web technologies and linked data, constantly attracting many high quality submissions and participants from academia and industry alike. It brings together researchers from different areas of computer science, such as artificial intelligence, databases, natural language processing, and information retrieval who aim at the development and use of novel technologies for accessing, interpreting and using information on the web in a more effective way.
Besides the main technical programme, ISWC will host a number of workshops on topics related to the general theme of the conference. The role of the workshops is to provide a context for a focused and intensive scientific exchange among researchers interested in a particular topic. As such, workshops are the primary venues for theexploration of emerging ideas.
We invite you to submit a proposal for a co-located workshop on a topic of interest to ISWC attendees.
TOPICS OF INTEREST
-------------------
The decision on acceptance or rejection of a workshop proposals will be made on the basis of the overall quality of the proposal and its appeal to a reasonable fraction of the Semantic Web community.
In particular, workshops should address topics which satisfy each of the following criteria:
1. the topic falls in the general scope of ISWC 2014
2. there is a clear focus on a specific technology, problem or application
3. there is a sufficiently large community interested in the topic
We especially encourage the submission of workshop proposals on:
1. principal problems of the Semantic Web / Linked Data, including the quality of data or schemas, their heterogeneity, size, and distributed nature as well as temporal or geographical aspects of knowledge representation
2. interdisciplinary topics and synergies of Semantic Web technologies with methods or methodologies from other fields of research (e.g. NLP, data mining)
3. applications of Semantic Web Technologies in specific domains such as Health Care, eGovernment, IT Management, Digital Libraries, or the Automotive Industry.
4. emerging trends or Semantic Web related problems that have received limited attention to date such as privacy or non-standard reasoning tasks
SUBMISSION
-----------
Workshop proposals should be submitted via EasyChair as a single PDF file containing the following sections:
1. Title
2. Abstract: 200 word summary of the workshop purpose
3. Motivation: Why is the topic timely and of particular interest to ISWC participants? (one to three paragraphs)
4. Topics: What topics of interest will be covered by the workshop? (bulleted list, no longer than half a page)
5. Workshop Format: The intended mix of events, such as paper presentations, invited talks, panels, demos and general discussion (either a tabular schedule or a one paragraph summary)
6. Audience: Who and how many people are likely to attend? (one paragraph)
7. Chair(s): Name, affiliation, email address, homepage and short (one paragraph) biography of each chair, explaining the chair's expertise for the workshop
8. Program Committee: Names and affiliations of potential PC members (at least half of these should be confirmed at the time of the proposal)
9. Length: Half-day or full-day?
10. Related Workshops and Conferences: Is this the continuation of a workshop series or a new workshop to address an emerging issue? Please provide information about past editions of this workshop as well as about other related workshops (including URLs and submission / acceptance counts, if available).
Additionally,
1. We strongly advise having more than one chair, preferably from different institutions, bringing different perspectives to the workshop topic.
2. We welcome workshops with an innovative structure and a diverse programme which attracts various types of contributions and ensures rich interactions.
Proposers of accepted workshops will be required to prepare a workshop web page containing their call for papers and detailed information about the workshop organization and timelines.
While the ISWC workshop-track and local chairs will assist with the local organization of the workshop, the workshop organizers will be responsible for conducting their own reviewing process, for publicity of their workshop, and for publishing electronic proceedings.
The chairs of the accepted workshops will receive one free registration for their workshop. Workshop attendees must pay the ISWC 2014 workshop registration fee as well as the conference registration fee. Submissions can be made at: https://www.easychair.org/conferences/?conf=iswc2014workshops
IMPORTANT DATES
----------------
* Workshop proposals due: March 19, 2014
* Notification of accepted proposals: April 16, 2014
*** Timeline for Workshops ***
* The workshop web site and the call for workshop papers must be published no later than April 30, 2014.
* The latest (extended) deadline for paper submissions must end before July 16, 2014.
* By July 30, 2014, all notifications of accepted papers must have been sent to the authors.
* The camera-ready proceedings of each workshop are due by August 20, 2014.
* Workshops will be held on October 19-20, 2014.
All deadlines are Hawaii time.
Please note that these are strict deadlines necessary to comply with the overall conference organization. Later dates can cause severe problems by making it impossible for potential workshop participants to get their Visa on time.
WORKSHOPS CHAIR
-------------------
Lora Aroyo, VU University Amsterdam, The Netherlands
Johanna Völker, University of Mannheim, Germany
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original-Nachricht --------
Betreff: [computational.science] Call for Papers - 11th International
Conference on Security and Cryptography (SECRYPT 2014)
Datum: Mon, 10 Mar 2014 18:30:39 +0100
Von: SECRYPT 2014 <secrypt2014(a)unimi.it>
Organisation: "ICCSA"
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
[Apologies if you receive multiple copies of this message]
CALL FOR PAPERS
************************************************************************
11th International Conference on Security and Cryptography (SECRYPT 2014)
Vienna, Austria, August 28-30, 2014
http://secrypt.icete.org
************************************************************************
SECRYPT is an annual international conference covering research in
information and communication security. The 11th International
Conference on Security and Cryptography (SECRYPT 2014) will be held in
Vienna, Austria on 28-30 August 2014. The conference seeks submissions
from academia, industry, and government presenting novel research on
all theoretical and practical aspects of data protection, privacy,
security, and cryptography. Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged. The conference topics include, but are not limited to:
Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Ethical and Legal Implications of Security and Privacy
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Hiding
Information Systems Auditing
Insider Threats and Countermeasures
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy
Privacy Enhancing Technologies
Reliability and Dependability
Risk Assessment
Secure Software Development Methodologies
Security and privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security
PAPER SUBMISSIONS
Submitted papers must be in English and must not substantially overlap
with papers that have been published or that are simultaneously submitted
to a journal or a conference with proceedings. Submissions are to be
made to the submission web site at http://www.insticc.org/Primoris.
Papers can be submitted as REGULAR or POSITION papers.
- REGULAR Paper: Regular papers present work where research is completed.
They can be up to 12 pages.
Authors of regular submitted papers will indicate at the time of
submission whether they would like their paper to also be considered for
publication as a position paper.
- POSITION Paper: A position paper presents results that are preliminary
or that simply require fewer pages to describe. A position paper may be
a short report and discussion of ideas, facts, situations, methods,
procedures or results of scientific research (theoretical or experimental)
on one of the conference topics. The acceptance of a position paper is
restricted to the categories of "short paper"
Submitted papers must be formatted according to the SECRYPT format,
which is described at http://secrypt.icete.org/GuidelinesTemplates.aspx.
Submission page limit is 12 pages for regular papers and 8 pages for
position papers. Accepted papers will be subject to the limit of: 12 pages
for full papers, 8 pages for short papers with oral presentation, and 6
pages for short paper with poster presentation. Authors of accepted papers
must guarantee that their papers will be presented at the conference. All
papers presented at the conference will be published in the conference
proceedings and in the digital library. A short list of presented papers
will be selected so that revised and extended versions of these papers
will be published by Springer-Verlag in a CCIS Series book.
IMPORTANT DATES
Regular and Position Papers
- Paper Submission: April 15, 2014
- Authors Notification: June 16, 2014
- Camera Ready and Registration: June 30, 2014
Second call for Position Papers only:
- Paper Submission: May 23, 2014
- Authors Notification: June 27, 2014
- Camera Ready and Registration: July 9, 2014
PROGRAM CHAIR
Pierangela Samarati, Universita' degli Studi di Milano, Italy
PROGRAM COMMITTEE
Alessandro Armando, FBK, Italy
Prithvi Bisht, University of Illinois at Chicago, Unites States
Carlo Blundo, Università di Salerno, Italy
Andrey Bogdanov, Technical University of Denmark, Denmark
Frederic Cuppens, TELECOM Bretagne, France
Nora Cuppens-Boulahia, TELECOM, France
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre, Italy
Tassos Dimitriou, Athens Information Technology, Greece
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Ruggero Donida Labati, Università degli Studi di Milano, Italy
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
William Fitzgerald, EMC Information Systems International, Ireland
Sara Foresti, Universita' degli Studi di Milano, Italy
Steven Furnell, Plymouth University, United Kingdom
Joaquin Garcia-Alfaro, Institut Mines-Telecom, TELECOM SudParis, France
Mark Gondree, Naval Postgraduate School, United States
Dimitris Gritzalis, AUEB, Greece
Stefanos Gritzalis, University of the Aegean , Greece
Sokratis Katsikas, University of Piraeus, Greece
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Yong Guan, Iowa State University, United States
Kostas Lambrinoudakis, University of Piraeus, Greece
Bo Lang, Beijing University of Aeronautics and Astronautics, China
Patrick P. C. Lee , Chinese University of Hong Kong, Hong Kong
Adam J. Lee , University of Pittsburgh, United States
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, United States
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Haibing Lu, Santa Clara University, United States
Emil Lupu, Imperial College, United Kingdom
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University, Czech Republic
Carlos Maziero, UTFPR - Federal University of Technology - Paraná state, Brazil
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
David Naccache, Ecole Normale Superieure, France
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Joon Park, Syracuse University, United States
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany
Joachim Posegga, University of Passau, Germany
Silvio Ranise, Fondazione Bruno Kessler, Italy
Kui Ren, State University of New York at Buffalo, United States
Nicolas Sklavos, Technological Educational Institute of Patras, Greece
Alessandro Sorniotti, IBM Research, Switzerland
Willy Susilo, University of Wollongong, Australia
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Vicenc Torra, IIIA-CSIC, Spain
Jaideep Vaidya, Rutgers Business School, United States
Luca Viganò, King’s College London, United Kingdom
Xinyuan (Frank) Wang, George Mason University , United States
Haining Wang, The College of William and Mary, United States
Ping Wang, Symantec Corporation, United States
Cong Wang, City University of Hong Kong, Hong Kong
Lingyu Wang, Concordia University, Canada
Edgar Weippl, Vienna University of Technology, Austria
Alec Yasinsac, University of South Alabama, United States
Meng Yu, Virginia Commonwealth University, United States
Lei Zhang, Thomson Reuters, United States
This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/
For any questions, please contact the program chair:
secrypt2014(a)unimi.it
-------- Original-Nachricht --------
Betreff: [SCLIT 2014] Call for Papers
Datum: Mon, 10 Mar 2014 23:14:35 +0100
Von: SCLIT <sclit(a)dmi.uns.ac.rs>
An: <sclit(a)dmi.uns.ac.rs>
Dear potential participant,
this year we are organizing 4th SCLIT symposium which will take place at
Rhodes Island, Greece, 22 - 28 September 2014.
We hope that you will seriously consider submitting your results to
SCLIT 2014.
We are sending you the call for papers, apologizing for cross-posting
and asking you to forward it to all interested persons.
Best regards,
SCLIT team
===========================================================================
**
*CALL FOR PAPERS*
*SCLIT 2014*
The “4^th Symposium on Computer Languages, Implementation and Tools”
September 22-28, 2014
Rhodes Island, Greece
http://perun.dmi.rs/sclit
ORGANIZED WITHIN
ICNAAM 2014 (International Conference of Numerical Analysis and Applied
Mathematics, http://www.icnaam.org <http://www.icnaam.org/>). While
organizational decision will be taken by organizers of ICNAAM, the
symposium keeps its academic autonomy.
INTERNATINAL PROGRAM COMMITTEE
Please visit Program Committee page at SCLIT web site
_http://perun.dmi.rs/sclit/_
SCOPE
The aim of the symposium is to provide a forum for the dissemination of
research accomplishments in areas that include all aspects of computer
languages, their implementations, and related tools.
The list of topics includes, but is not limited to the following:
• Languages: theoretical aspects, programming languages of all
paradigms, script languages, modelling languages, domain specific
languages, graphical languages, mark-up languages, specification
languages, transformation languages, agent-oriented languages, formal
languages …
• Implementations: theoretical aspects, compilers, interpreters,
transformation systems, intermediate representations …
• Tools: theoretical aspects, software metric, static analyzers…
PUBLISHING
Symposium accepts short papers (up to 4 pages) that will pass the
reviewing procedure. Accepted papers will be published in the in a
Special Volume of the AIP Conference Proceedings
<http://proceedings.aip.org/>.
Extended versions of the selected short papers (i.e., full papers) will
be additionally reviewed after the conference. Accepted papers will be
published in the ComSIS <http://www.comsis.org/> ("Computer science and
information systems") journal. ComSIS is an international journal that
is currently on SCI list of journals with two-year impact factor of 0.549.
SUBMISSIONS
Please check the conference site for more details on submission procedure.
IMPORTANT DATES
- April 10, 2014 - submission deadline for short papers - max. 4 pages.
- April 20, 2014 - early registration ends.
- May 20, 2014- notification of acceptance of short papers.
- June 10, 2014- camera ready source files of short papers received.
- June 20, 2014 - normal registration ends.
- July 31, 2014 - late registration ends.
- September 22 - 28, 2014 - conference
- December 20, 2014 - submission deadline for selected full papers to be
published in ComSIS journal.
ORGANIZING COMMITTEE
Zoran Budimac, Chair (zjb(a)dmi.rs)
Mirjana Ivanović, Co-chair (mira(a)dmi.rs)
Gordana Rakić, Co-chair (goca(a)dmi.rs)
PLEASE USE CONFERENCE E-MAIL AS YOUR PRIMARY CHOICE TO CONTACT US:
sclit(a)dmi.uns.ac.rs <mailto:sclit@dmi.uns.ac.rs>
Phones
+381 21 458 888
+381 21 485 2852
Fax
+381 21 6350 458
Address
Department of Mathematics and Informatics
Faculty of Science
University of Novi Sad
Trg Dositeja Obradovica 4
21000 Novi Sad
Serbia
-------- Original-Nachricht --------
Betreff: [AISWorld] Call for papers -- IT/IS Security
Datum: Wed, 12 Mar 2014 08:06:06 +1100
Von: San Murugesan <san(a)computer.org>
An: <aisworld(a)lists.aisnet.org>
Dear All,
FYI -- Call for papers for the special issue of */IT Professional
<http://www.computer.org/itpro>/* magazine onIT/IS Security*.*
Regards
San
San Murugesan
Editor in Chief, IEEE /IT Professional <http://www.computer.org/itpro>
/.....................................................................
*http://www.computer.org/plugins/images/digitalLibrary/magazines/itpro.gif*
<http://www.computer.org/itpro>**
www.computer.org/itpro <http://www.computer.org/itpro>
*IT Security*
*Submission deadline: 1 June 2014**
**Publication: January/February 2015*
This special issue of /IT Professional/seeks to provide readers with an
overview of current issues and advances in information and computer
security. We seek high quality contributions from industry, government,
business, and academia that present recent developments in IT security,
showcase successfully deployed security solutions, or discuss
challenging security issues that deserve further study. Topics of
interest include, but are not limited to, the following:
·Authentication and access control
·Biometrics
·"Bring your own device" security
·Cybersecurity challenges
·Cloud and distributed system security
·Computer forensics
·The security of cyberphysical systems
·Privacy issues in data mining and data analytics
·Intrusion detection systems
·The security of the Internet of Things
·Malware detection
·Mobile app security
·Mobile device security
·Network security
·The legalities and ethics associated with security and privacy policies
·The protection of personal information
·Security architectures
·Usability issues in security
·Wearable device security
·Web application security
·The security of online transactions
*Submissions*
Feature articles should be no longer than 4,200 words and have no more
than 20 references (with tables and figures counting as 300 words).
Illustrations are welcome. For author guidelines, including sample
articles, see *www.computer.org/portal/web/peerreviewmagazines/acitpro*
<http://www.computer.org/portal/web/peerreviewmagazines/acitpro>.
Submit your article at *https://mc.manuscriptcentral.com/itpro-cs*.
*Questions?*
For more information, please contact the Guest Editors:
·Morris Chang, Iowa State University, *morris(a)iastate.edu*
<mailto:morris@iastate.edu>
·Rick Kuhn, NIST, *kuhn(a)nist.gov* <mailto:kuhn@nist.gov>
-------- Original-Nachricht --------
Betreff: [AISWorld] Call for Papers: IEEE International Workshop on
Dependable and Secure Services (DSS 2014)
Datum: Wed, 12 Mar 2014 18:50:54 +0000
Von: Nuno Laranjeiro <cnl(a)dei.uc.pt>
An: aisworld(a)lists.aisnet.org
Dear All, please consider submitting your work to the following event.
::::::::::::::::::::::::::::: CALL FOR PAPERS :::::::::::::::::::::::::::::
IEEE International Workshop on Dependable and Secure Services (DSS 2014)
===========================================================================
http://dss2014.dei.uc.pt
One day between June 27 and July 2, 2014, at Hilton Anchorage, Alaska, USA, within IEEE SERVICES 2014
Description
DSS 2014 will focus on dependability and security of software and services. This is a challenging theme, especially when considering that information systems are more and more based on complex, heterogeneous, dynamic software and services, which are characterized by demanding quality attributes. Interoperability in presence of dependability and security guarantees, as well as techniques and tools to assess the impact of accidental and malicious threats, are among the crucial aspects to be addressed.
List of topics
Topics of interest of DSS 2014 include, but are not limited to:
- Architecture, design, implementation, and management of dependable and secure software and services
- Dependable Service-Oriented Architecture (SOA)
- Implementation and deployment of dependable cloud-based services
- Dependable and secure big data services
- Specification and design methodologies, e.g., model-based, component-based, refinement-based approaches
- Metrics for quantifying services dependability and security
- Dependability and security benchmarking
- Verification and validation for dependability and security evaluation of services
- Formal verification, testing, analytical and experimental evaluation of services
- Off-line versus on-line dependability and security services assessment
- Case studies illustrating challenges and solutions in designing dependable and secure software and services
- Design and use of supporting tools for creating dependable and secure services
Important dates
===============
(Workshop chairs will grant individual extensions under special circumstances provided that the hard deadline for the camera-ready version is respected.)
* Submission deadline: April 10, 2014
* Notification: April 24, 2014
* Camera-Ready Copy Due Date & Pre-registration Due: May 1, 2014
Paper Submission
All papers accepted by the workshop will be included in the Proceedings of the IEEE 10th World Congress on Services (SERVICES 2014), which will be published by IEEE Computer Society. Selected papers will be invited for extension and inclusion in a special issue of a related journal.
We invite high-quality English-language submissions of four types:
a) Research papers (8 pages)
b) Experience reports (8 pages)
c) Short papers (2 pages)
d) Tool demos (2 pages)
Submissions should follow the IEEE CS proceedings style as per IEEE 8.5 x 11 manuscript guidelines. At least one author of each accepted paper is required to attend the workshop and present the paper. All papers must be submitted via the confhub submission system. First time users need to register with the system. Please refer to the DSS 2014 website (http://dss2014.dei.uc.pt) for details on the submission procedure.
Workshop Chairs
---------------
Nuno Laranjeiro, University of Coimbra, Portugal
Marco Vieira, University of Coimbra, Portugal
Pedro Furtado, University of Coimbra, Portugal
Publicity Chair
---------------
Naghmeh Ivaki, University of Coimbra, Portugal
Program committee (under construction)
-----------------
- António Casimiro, University of Lisbon, Portugal
- Anatoliy Gorbenko, National Aerospace University 'KhAI', Ukraine
- Domenico Cotroneo, University of Naples, Italy
- Elena Troubitsyna, Åbo Akademi University, Finland
- Ilir Gashi, City University, United Kingdom
- István Majzik, Budapest University of Technology and Economics, Hungary
- Paolo Lollini, University of Florence, Italy
- Simin Nadjm-Tehrani, Linköping University, Sweden
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original-Nachricht --------
Betreff: INFORMATIK 2014 - Call for Papers
Datum: Thu, 13 Mar 2014 11:33:31 +0100 (CET)
Von: gi-mitglieder-info(a)gi-ev.de
An: gustaf.neumann(a)wu-wien.ac.at
==========================
Call for Workshop Papers
INFORMATIK 2014 - Big Data: Komplexität meistern
44. Jahrestagung der Gesellschaft für Informatik
http://www.informatik2014.de
22. bis 26. September 2014
Universität Stuttgart
==========================
INFORMATIK 2014 -- Deutschlands größte Informatik-Konferenz -- findet im
September in Stuttgart statt. Vom 22. bis 26 September werden Workshops,
Tutorials, wissenschaftliche und angewandte Sitzungen, sowie
angegliederte Konferenzen den Campus der Universität Stuttgart zu einem
Treffpunkt für führende deutsche und internationale Vertreter von
Wissenschaft, Politik und Industrie machen. Es werden aktuelle
Ergebnisse aus Forschung und Entwicklung aus der Informatik mit dem
Schwerpunkt Big Data präsentiert.
In den Workshops der INFORMATIK 2014 treffen sich Praktiker und
Wissenschaftler zu Diskussionen über relevante Themen aus verschiedenen
Fachgebieten der Informatik. Unser Workshop-Komitee hat 42 Workshops zu
unterschiedlichen Themengebieten ausgesucht, die nun zur Einreichung von
Beiträgen aufrufen.
Die meisten Workshops erwarten eine Einreichung bis
22. April 2014,
aber einzelne Workshops können davon abweichen. Bitte prüfen Sie die
einzelnen Call for Papers. Alle Beiträge werden in einem LNI-Band
(http://www.gi.de/service/publikationen/autorenrichtlinien.html)
veröffentlicht.
Wir freuen uns auf Ihren Beitrag und darauf Sie in Stuttgart begrüßen zu
dürfen!
Stefan Wagner
Workshop Chair
====================================================
Privacy/Recht/Datenschutz/Gesellschaft/Open Source
====================================================
* Risikokommunikation im Kontext von IT-Sicherheit und Safety (RiskKom)
http://fg-secmgt.gi.de/riskkom2014
* Informationssysteme mit Open Source (ISOS 2014)
http://isos.fh-luebeck.de/
* Privatheit in der E-Society
http://www.integrata-kongress.de/kongress-2014/ <http://isos.fh-luebeck.de/>
* Recht und Technik: Datenschutz und Informationsmanagement im Diskurs
(Webseite ist im entstehen)
* Modeling and Optimization of high-Complex systems (MOC 2014)
http://www.constraint-programming.de/MOC-2014/
<http://http://www.constraint-programming.de/MOC-2014/>
* Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik
http://www.uni-koblenz-landau.de/koblenz/fb4/iwvi/aggrimm/events_folder/git…
====================================================
Business Processes/IT-Governance
====================================================
* Management komplexer IT-Systeme und Anwendungen
http://wwwvs.cs.hs-rm.de/MITA/
* IT-Governance und Strategisches Informationsmanagement (ITG-SIM)
http://www.itg-sim.de/ <http://http://www.itg-sim.de/>
* BPM im Öffentlichen Sektor
http://www.wirtschaft.bfh.ch/de/ueber_uns/news/newsdetails/article/call-for…
* Strategisches Informationsmanagement und IT-Governance im öffentlichen
Sektor
http://www.wirtschaft.bfh.ch/de/ueber_uns/news/newsdetails/article/call-for…
* Dynamik und Compliance in IT-gestützten Geschäftsprozessen
(Webseite ist im entstehen)
====================================================
Safety/Security
====================================================
* IT-Unterstützung in Emergency Management & Response
http://www.cik.uni-paderborn.de/workshop-it-rettung/
* Langzeitbewahrung und Sicherheit in (Langfrist-)Infrastrukturen ---
Die Krux mit der Krypto
http://digitale-bewahrung.de/informatik2014/
* Second European STAMP Workshop
http://www.iste.uni-stuttgart.de/se/esw2014.html
* Krypto-Party
(Webseite ist im entstehen)
====================================================
Lehre/Hochschulen/Festkolloquien
====================================================
* SAG WAS - Studentische AusbildunG und berufliche Weiterbildung in
Angewandter Softwarequalitätssicherung
http://www.vosseberg.net/sagwas2014
* Didaktik und Grundlagen der Informatik, Festveranstaltung zum 70.
Geburtstag von Volker Claus
(Webseite ist im entstehen)
* Hochschule 2020
(Webseite ist im entstehen)
* Humor in der Informatik
(Webseite ist im entstehen)
====================================================
Robotics/Agenten/Automotive/Gamification
====================================================
* Gamification und Virtuelle Welten
http://ikmserver.ikm.tu-berlin.de/informatik2014/
* Human-Aware Planning (HAP)
http://hap2014.dai-labor.de/
* Self-Explaining Agents (SEA)
http://sea.dai-labor.de/
* Roboterkontrollarchitekturen
http://agrosy.informatik.uni-kl.de/informatik2014/
* Automotive Software Engineering (ASE)
http://www.iese.fraunhofer.de/ase2014
====================================================
Data/Big Data/Cloud/Data Mining/Semantic Web/Data Visualization
====================================================
* Beyond Data: Mastering Management of Complex Research Data and
Processing Environments
http://beyonddata2014.wordpress.com/
* Data Management in the Cloud
http://dmc.fim.uni-passau.de/
* Simulation Technology: Systems for Data Intensive Simulations (SimTech@GI)
http://www.iaas.uni-stuttgart.de/STGI/index.html
* Big Data in Mobility and Logistics -- BDMobiLog 2014
http://www.fzi.de/en/aktuelles/bdmobilog_2014/
* CloudCycle14: Bereitstellung und Verwaltung von portablen und sicheren
Cloud-Diensten
http://www.cloudcycle.org/workshop/
* Datenschutz und Management von Informationssicherheit im Kontext von
Big Data
http://fg-pet.gi.de/workshop-2014.html
* Big Data und Gesellschaft: interdisziplinäre Analysen (BD&G)
http://www.mcts.tum.de/cvl-a/philwiss/workshop-big-data/
* FoRESEE: Future Search Engines --- Big Data und semantische
Technologien in Backend und Frontend von Suchmaschinen
(Webseite ist im entstehen)
* Cyber-Physical Systems meet Big Data - Big Data Technologien zur
Analyse und Steuerung komplexer cyber-physischer Systeme
(Webseite ist im entstehen)
* Enterprise Architekturen mit Big Data & Cloud
(Webseite ist im entstehen)
* Datenmanagement und Management elektronischer Ressourcen in
Bibliotheken (DERM2014)
http://aksw.org/Events/2014/DERM2014.html
* NISH 2014: Needles In a Stream of Hay
http://www-ai.cs.uni-dortmund.de/nish.html
* System Software Support for Big Data (BigSys)
(Webseite ist im entstehen)
* Applications of Semantic Technologies (AST 2014)
(Webseite ist im entstehen)
* Big Data Visual Computing -- quantitative Perspektiven für die
graphische Datenverarbeitung
http://www.vis.uni-konstanz.de/bdvc14/
====================================================
Energie/Elektromobilität/Umwelt
====================================================
* Smart Grids
https://fg-wi-eins.gi.de/workshop-smart-grids.html
* IT-gestützte Dienstleistungen für die Elektromobilität
http://service.ercis.org/informatik2014emob
* Umweltinformatik zwischen Nachhaltigkeit und Wandel (UINW)
http://www.enviroinfo.eu/
Gesellschaft für Informatik e.V. (GI)
Wissenschaftszentrum
Ahrstraße 45
53175 Bonn
Tel +49-(0)228-302 145
Fax +49-(0)228-302 167
E-Mail info(a)gi.de
Web www.gi.de
-------- Original-Nachricht --------
Betreff: [computational.science] Special Issue on "Underwater Sensor
Networks" in (JSAN)
Datum: Thu, 6 Mar 2014 09:36:31 +0100
Von: Jaime Lloret Mauri<jlloret(a)dcom.upv.es>
Organisation: "ICCSA"
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
Journal of Sensor and Actuator Networks (JSAN)
Special Issue "Underwater Sensor Networks"
http://www.mdpi.com/journal/jsan/special_issues/usn
Deadline for manuscript submissions: 31 March 2014
----------------------------------------------------
=== SPECIAL ISSUE ===
New advances in information technologies, circuits, systems and communication protocols have made possible the deployment of underwater sensor networks. These issues have lead researchers to propose new underwater sensor nodes, sensor node placement, protocols for their communication, architectures, and study new ways to communicate with higher bandwidth at higher distances. Moreover, the range of underwater applications is growing fast because of the last research in oceanography, marine science and aquiculture, so there is a need of underwater sensor networks in order to support these disciplines.
This special Issue is tries to collect unpublished works on theory and practice on underwater sensor networks, with special interest on real implementations and deployments. We also seek new proposals on wireless communication technologies.
=== KEYWORDS ===
The Special Issue "Underwater Sensor Networks" topics include (but are not limited to) the following:
- Underwater sensor nodes
- Underwater sensor node placement
- Routing protocols for underwater sensor networks
- Underwater communications
- Underwater architectures
- Underwater wireless communications
- Underwater sensor network deployments
=== SUBMISSION ===
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form (http://www.mdpi.com/user/manuscripts/upload/?journal=jsan). Manuscripts can be submitted until the deadline. Papers will be published continuously (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are refereed through a peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Journal of Sensor and Actuator Networks is an international peer-reviewed Open Access quarterly journal published by MDPI.
Please visit the Instructions for Authors page (http://www.mdpi.com/journal/jsan/instructions) before submitting a manuscript. For the first couple of issues the Article Processing Charge (APC) will be waived for well-prepared manuscripts. English correction and/or formatting fees of 250 CHF (Swiss Francs) will be charged in certain cases for those articles accepted for publication that require extensive additional formatting and/or English corrections.
=== SPECIAL ISSUE EDITORS ===
Guest Editors
Prof. Dr. Jaime Lloret Mauri (jlloret(a)dcom.upv.es)
Integrated Management Coastal Research Institute, Polytechnic University of Valencia, Camino de Vera 46022, Valencia, Spain
Dr. Sandra Sendra (sansenco(a)posgrado.upv.es)
Integrated Management Coastal Research Institute, Polytechnic University of Valencia, Camino de Vera 46022, Valencia, Spain
===================================================
-------- Original-Nachricht --------
Betreff: [WI] CfP: Data Preparation for Data Mining Track at IDEAS 2014
Datum: Wed, 12 Mar 2014 08:59:26 +0000
Von: Markus Helfert <markus.helfert(a)computing.dcu.ie>
An: wi(a)aifb.uni-karlsruhe.de
——————————————————————————————————————
*Data Preparation for Data Mining Track *of the
18th International Database Engineering & Applications Symposium (IDEAS
2014)
July 7-9, 2014, Porto, Portugal
http://confsys.encs.concordia.ca/IDEAS/ideas14/dataprepmine.php
(*accepted papers will be included in the IDEAS14 proceedings and
published by ACM*)
*-----Call for Papers ---------*
Current technological developments allow the collection of huge amounts
of data that can be used to support decision-making processes. However,
this is only possible if data can be transformed into knowledge.
Various kind of data mining algorithms are used to extract data
patterns. Tasks for pattern extraction include classification (rules or
trees), regression, clustering, association, sequence modeling,
dependency, and so forth. However, much work in the field of data mining
was built on the existence of data with quality, and real-world data is
often incomplete, noisy, or inconsistent, representing an obstacle for
efficient data analysis/mining. Other challenges include big data
(number of features/examples, efficiency, parallel processing), curse of
dimensionality, or the use of domain knowledge. Although most mining
algorithms have some procedures for dealing with dirty data, they lack
for robustness. Furthermore, low-quality data will lead to low-quality
data analysis/mining results (Garbage in, garbage out). Data preparation
techniques, when applied before mining, can substantially improve the
overall quality of the data and consequently improve the mining results
and/or the time required for the actual mining process. Thus, the
development of data preparation techniques is both a challenging and a
critical task. This special session on Data Preparation for Data Mining
will address practical techniques and methodologies of data preparation
for data-mining applications.
*Topics of Interest*:
--------------------------
- Data collecting
- Data integration
- Data reduction
- Data cleaning
- Detection of outliers
- Data/Information quality
- Data profiling
- Data enrichment
- Feature selection and transformation
- Data summarization
- Data discretization
- Data encoding
- Sampling
- Data preparation on regression/classification
- Data preparation on segmentation/clustering
- Data preparation on association rules
- Data preparation on text mining
- Data preparation on web mining
- Data preparation on visual data mining
- Data preparation on temporal and spatial data mining
- Data preparation on multimedia mining (audio/video)
*Important Dates*:
--------------------------
- March 24, 2014: Papers submission deadline
- May 19, 2014: Notification of acceptance
- June 9, 2014: Camera-ready deadline
*Track Organizing Committee:*
--------------------------
- Pedro Henriques, University of Minho, Portugal
- Fátima Rodrigues, Institute of Engineering - Polytechnic of Porto,
Portugal
- Paulo Oliveira, Institute of Engineering - Polytechnic of Porto,
Portugal
- Alberto Freitas, Faculty of Medicine- University of Porto, Portugal
--
----------------------------------------------------
Dr. Markus Helfert
School of Computing
Dublin City University
Glasnevin
Dublin 9, Ireland
Director Business Informatics Research Group
http://www.computing.dcu.ie/big/
Research Affiliate at:
The Open Government Institute (TOGI)
Zeppelin Universität, Germany
Phone: +49 - 7541 6009 1476
http://www.zu.de
IVI Research Fellow
http://www.ivi.ie/
Lecturer and Researcher in Information Systems
Phone: +353-1-700-8727
Phone: +49 -7541 6009 1476
Fax: +353-1-700-5442
Office: L2.26
Email:markus.helfert@computing.dcu.ie
http://www.computing.dcu.ie
----------------------------------------------------
Email Disclaimer
"This e-mail and any files transmitted with it are confidential and are intended solely for use by the addressee. Any unauthorised dissemination, distribution or copying of this message and any attachments is strictly prohibited. If you have received this e-mail in error, please notify the sender and delete the message. Any views or opinions presented in this e-mail may solely be the views of the author and cannot be relied upon as being those of Dublin City University. E-mail communications such as this cannot be guaranteed to be virus-free, timely, secure or error-free and Dublin City University does not accept liability for any such matters or their consequences. Please consider the environment before printing this e-mail."
Séanadh Ríomhphoist
"Tá an ríomhphost seo agus aon chomhad a sheoltar leis faoi rún agus is lena úsáid ag an seolaí agus sin amháin é. Tá cosc iomlán ar scaipeadh, dháileadh nó chóipeáil neamhúdaraithe ar an teachtaireacht seo agus ar aon cheangaltán atá ag dul leis. Má tá an ríomhphost seo faighte agat trí dhearmad cuir sin in iúl le do thoil don seoltóir agus scrios an teachtaireacht. D’fhéadfadh sé gurb iad tuairimí an údair agus sin amháin atá in aon tuairimí no dearcthaí atá curtha i láthair sa ríomhphost seo agus níor chóir glacadh leo mar thuairimí nó dhearcthaí Ollscoil Chathair Bhaile Átha Cliath. Ní ghlactar leis go bhfuil cumarsáid ríomhphoist den sórt seo saor ó víreas, in am, slán, nó saor ó earráid agus ní ghlacann Ollscoil Chathair Bhaile Átha Cliath le dliteanas in aon chás den sórt sin ná as aon iarmhairt a d’eascródh astu. Cuimhnigh ar an timpeallacht le do thoil sula gcuireann tú an ríomhphost seo i gcló."