-------- Original-Nachricht --------
Betreff: [AISWorld] IEEE DCOSS 2014 Call for Posters and Demos. May
25-27, Marina Del Rey, California
Datum: Tue, 8 Apr 2014 11:09:45 +0200 (CEST)
Von: Animesh Pathak <animesh.pathak(a)inria.fr>
An: aisworld(a)lists.aisnet.org
-------------------------------------------------------------------------------
Call for Posters and Demos
The 10th IEEE International Conference on
Distributed Computing in Sensor Systems (IEEE DCOSS)
http://www.dcoss.org/
Marina Del Rey, California
May 25 - 27, 2014
-------------------------------------------------------------------------------
IMPORTANT DATES
===============
Submission deadline: April 11, 2014
Notification of acceptance: April 18, 2014
Camera ready abstracts due: April 25, 2014
OVERVIEW of DCOSS 2014 POSTER SESSION
=====================================
http://dcoss.org/poster.php
IEEE DCOSS 2014 will feature a poster session that provides a forum for
distributed computing and sensor network researchers and developers from
academia, industry, and government to interact with and explore the latest
research results. Towards this goal, IEEE DCOSS 2014 solicits posters presenting
recent original results or ongoing research in the general area of sensor
networks. Authors are invited to submit interesting results on all aspects of
sensor networks, including algorithms, protocols, systems and applications.
Poster presentations will provide authors with early feedback on their research
work and enable them to exchange ideas with IEEE DCOSS participants.
Poster papers will be included in the Proceedings of the Conference and in the
IEEE Xplore.
Each poster presenter will have the opportunity to present a one-minute rapid
oral presentation of their work to attendees. This oral presentation will help
generate interest in the topic of the poster, to encourage attendees to learn
more. The poster presentation space available is 3ft wide x 4ft high, or 36in w
x 48 in h (0.92m wide x 1.22m high).
All posters will be reviewed and judged based on their originality, technical
contribution and, particularly, their potential to generate interesting and
interactive exchanges of ideas.
POSTER PAPERS SUBMISSION:
Poster submission will be through EDAS at
http://www.edas.info/newPaper.php?c=17893&track=58897
Poster papers are limited to 2 pages in standard IEEE Transactions format (
template at
http://www.ieee.org/conferences_events/conferences/publishing/templates.html )
and can also use the sample template for Microsoft Word: A4, US letter. Authors
should highlight the leading ideas of the on-going research and its expected
outcome and impact. Poster papers should present a summary of the research work
and ideas that will be presented during the session. Accepted posters must be
presented at the Conference, and at least one author must be registered for the
conference.
Topics of interest include but are not limited to:
* Computation and programming models
* Energy models, minimization, awareness
* Distributed collaborative information processing
* Detection and tracking
* Theoretical performance analysis:complexity, correctness, scalability
* Abstractions for modular design
* Fault tolerance and security
* Languages, operating systems
* Task allocation, reprogramming and reconfiguration
* Dynamic resource management
* Scalable, heterogeneous architectures (node and system-level)
* Middleware interfaces, communication and processing primitives
* Design, simulation and optimization tools for deployment and operation
* Design automation and application synthesis techniques
* Closed-loop control for sensing and actuation
* Case studies: lessons from real world deployments
* Network coding and compression
* Location, time and network-based services
* Mobile, participatory, and social sensing
* Network/System monitoring and management
OVERVIEW of DCOSS 2014 DEMO SESSION
===================================
http://dcoss.org/demo.php
IEEE DCOSS 2014 will feature a demo session that provides a forum for
distributed computing and sensor network researchers and developers from
academia, industry, and government to interact with and explore the latest
research results. Towards this goal, IEEE DCOSS 2014 solicits demonstrations
presenting recent original results or ongoing research in the general area of
sensor networks. Authors are invited to submit interesting results on all
aspects of sensor networks, including algorithms, protocols, systems and
applications.
Demonstrations provide a venue for hands-on experience for conference attendees
and a means for researchers and attendees to interact with new research
prototypes and testbeds. In special cases, video-based demonstrations will also
be accepted.
Each demonstration presenter will have the opportunity to present a one-minute
rapid oral presentation of their work to attendees. This oral presentation will
help generate interest in the topic of the demonstration, to encourage attendees
to learn more. Moreover, the authors will also be allowed to display one A1 (594
x 841 mm) vertically oriented poster explaining the demonstration.
All demonstrations will be reviewed and judged based on their originality,
technical contribution and, particularly, their potential to generate
interesting and interactive exchanges of ideas.
ABSTRACTS:
Demonstration abstracts are limited to 2 pages in standard IEEE Transactions
format
(http://www.ieee.org/web/publications/authors/transjnl/index.html#template) and
should highlight the leading ideas of the on-going research and its expected
outcome and impact. All accepted abstracts will appear in hardcopy.
Demonstration abstracts should describe the demonstration activity, and in
particular, describe special requirements for space and dedicated frequency
channels, if any. Accepted demonstrations must be presented at the workshop, and
at least one author must be registered for the conference.
SUBMISSION INSTRUCTIONS:
Demo submission will be through EDAS at
http://www.edas.info/newPaper.php?c=17893&track=58901
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original-Nachricht --------
Betreff: [AISWorld] Call for Papers: MCIS Track: Enterprise Engineering
Datum: Mon, 7 Apr 2014 13:29:32 +0200
Von: Wolfgang Molnar <wolfgang.molnar(a)gmail.com>
An: SIKSleden(a)cs.uu.nl, dbworld(a)cs.wisc.edu, Ifip-wg81(a)idi.ntnu.no,
AISWorld(a)lists.aisnet.org, members(a)ciaonetwork.org,
ee-team-nl(a)arthur.tudor.lu, ee-team-lu(a)arthur.tudor.lu, seworld(a)sigsoft.org
*Call for Papers*
8th Mediterranean Conference on Information Systems
http://www.mcis2014.it/
*Track: Enterprise Engineering*
September 3rd-5th, 2014, Verona, Italy
Deadline for paper submissions: May 11th, 2014
*Track description*
Enterprise engineering is the general term for an engineering based
approach to architect, transform or develop gradually enterprises.
Enterprise engineering is based on rationales of how an enterprise wants
to use its organizational socio-technical systems, such as business
processes and information systems.
This track is looking for contributions that describe appropriate
approaches and methodologies to
* Align business and IT,
* Support enterprise architecture design,
* Help in governance and evolution of an enterprise,
* Implement methods and other instruments for enterprises.
* Assess the maturity and quality of an enterprise.
Submitted research papers (full or research in progress) should present
practical and theoretical insight of how an adequate coordination
through enterprise engineering may be conducted. Research context may
give an understanding of how enterprises need to negotiate many
challenges, such as changes in the economic climate, mergers,
acquisitions, innovation, novel technologies, et cetera. Within this
context, research contributions may involve the development of new,
appropriate theories, models, methods, and other instruments for the
analysis, design, implementation, evolution and governance of
enterprises by combining (relevant aspects of) management and
organization science and information systems science.
Therefore, the Enterprise Engineering track may involve the presentation
of a wide range of issues that involve organization science and
information systems science. We encourage both, researchers and
practitioners to share their insight in following topics:
*Topics to be included*
* Theories about enterprise engineering
* Models of enterprise engineering
* Frameworks, methods and other instruments of enterprise engineering
analysis
* Design and architecture of enterprise engineering
* Emergent techniques in enterprise engineering
* Evaluation of enterprise engineering aspects (e.g. Business / IT
alignment)
* Outsourcing of business and/or IT processes
* Implementation of methods and other instruments during enterprise
engineering
* Social and organisational aspects of enterprise engineering
* Technical aspects of enterprise engineering
* Evolution of enterprises through engineering
* Change management in enterprises
* Governance and compliance aspects of enterprise engineering
* Maturity, measurement and quality of enterprise engineering
* Open standards and technologies in enterprise engineering
*Types of contributions*
Full research papers, research in progress
*Submission*
http://www.mcis2014.it/submission.html
*Track chairs*
Wolfgang Molnar
Public Research Centre Henri Tudor, Luxembourg
Khaled Gaaloul
Public Research Centre Henri Tudor, Luxembourg
Jose Tribolet
Instituto Superior Tecnico, Lisboa, Portugal
-------- Original-Nachricht --------
Betreff: [AISWorld] Journal of Information Privacy and Security (JIPS)
| Call For Papers & Latest Issue Content - Vol. 10, Issue 1, 2014
Datum: Mon, 7 Apr 2014 16:25:49 +0000
Von: Arslan, Faruk <farslan(a)utep.edu>
An: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
Journal of Information Privacy and Security (JIPS)will be published
henceforth by the Taylor and Francis group.We are looking for
experienced reviewers and Associate Editors for our journal.
A.Call For Paper:
Journal of Information Privacy and Security (JIPS) http://jips.utep.edu
<http://jips.utep.edu>
Mission
The mission of the Journal of Information Privacy and Security (JIPS) is
to serve both academics and practitioners as a reliable source on issues
of information privacy and security. The Journal is a high quality
refereed journal that seeks support from academicians, industry experts
and specific government agencies. The JIPS focuses on publishing
articles that address the paradoxical nature of privacy versus security
amidst current global conditions. It is increasingly important that
various constituents of information begin to understand their role in
finding solutions to achieve a delicate balance between security and
privacy.
The JIPS will facilitate understanding of the information assurance
technical framework as it pertains to government agencies, companies and
individuals. The topics may include the information privacy and security
issues pertaining to initiatives on counter-terrorism efforts around the
world, the impact of U.S. federal regulation and compliance issues
facing global corporations, the impact of privacy and security
initiatives within small and medium enterprises (SMEs), and e-gambling.
Article submissions are encouraged from both academics and
practitioners. Each issue will include high quality articles from
academics and practitioners, case studies, book reviews, and industry
interviews. The Journal addresses issues of privacy and security from a
global perspective and will consider articles with a cross-functional
focus. The Journal will include articles in the following areas:
- Information Assurance frameworks
- Network security and impact on corporate infrastructure
- Privacy laws and impact on information compliance issues
- The duality of privacy and security and impact on corporate operations
- Governmental regulations and changes on information security requirements
- Data transfer issues across nations, states, and corporations
- Privacy and security requirements in B2B and B2C information flows
- Cross-functional aspects of information assurance and requirements
faced by various business functions within companies
- Web sites, portals and the issue of trust
- Information privacy and security as it relates to end-users
- Applications and case studies in privacy and security issues facing
business organizations, government agencies and individuals
- Emerging topics such as biometrics, software utilities, and IT
obligations and how they change the business environment
We also welcome suggestions on special issue covering a relevant topic.
Review Process
Each article will be blind-reviewed by three members of the editorial
review board. Reviewer recommendation will be considered by the
Editor-in-Chief or an Associate Editor. For a revision and rewrite, a
revised paper will be sent to one of the Editors for final approval. The
final decision will be made by the Editor-in-Chief.
Interested authors should consult the journal's manuscript submission
guidelines at http://jips.utep.edu
All inquiries and submissions should be sent to:
Editor-in-Chief: Dr. Kallol Bagchi, kbagchi(a)utep.edu
<mailto:kbagchi@utep.edu>
B.Content of Journal of Privacy and Security (JIPS), Vol. 10, Issue 1,
2014.
Editorial. By the Editor-in-chief
Paper 1. A Brief Review of Software Security History with an Emphasis on
Efforts Focused at Early Stages of the Software Lifecycle By Spyros T.
Halkidis, Alexander Chatzigeorgiou and George Stephanides
Abstract. It was not until 2006 that it was discovered by Gary McGraw
that "Design flaws account for 50 percent of security problems, and
architectural risk analysis plays an essential role in any solid
security program". In this article, we have qualitatively analyzed the
security patterns presented until 2004 by the OpenGroup Security Forum,
and quantitatively evaluated software systems based on their design,
using fuzzy risk analysis, based on the security patterns they contain
and the STRIDE model of attacks by Howard and LeBlanc proposed in 2001.
Additionally, it has been noted by Hoglund and McGraw in 2004 that
attacks to software start with the reverse engineering phase of the
code, using a decompiler or a disassembler. A possible solution to this
problem is code obfuscation whose use was proposed in the late 90's, for
example by Collberg et al. in 1997. However, it was not until 2010, when
this technique started to gain attention because of the book by Collberg
and Nagra. We conclude with this method, which we think is a starting
point for future research. This paper tries to provide a brief review of
Software Security history putting an emphasis on our efforts to embed
security at early stages of the software lifecycle.
Paper 2. Information Security In Higher Education: A Neo-Institutional
Perspective By Hwee-Joo Kam and Pairin Katerattanakul
Abstract. External pressures could be a compelling force that drives
higher education institutions to attain information security. Drawing on
the Neo-Institutional Theory, this study examined how three external
expectations: regulative, normative, and cognitive expectations drive
the higher education of the United States to attain information
security. The research findings suggest that, through regulatory and
social normative pressure, cognitive expectation indirectly promotes
information security in higher education. That is, cognitive expectation
or stakeholder's perception of higher education determines information
security in higher education by harnessing the coercive force of
regulatory pressure and leveraging the pressure of meeting social
normative expectation.
Paper 3. Privacy Preserving Interest Group Formation in Online Social
Networks (OSNs) using Fully Homomorphic Encryption By Mohammed Kaosar
and Quazi Mamun
Abstract. In Online Social Networks (OSNs), interest groups are becoming
increasingly popular due to the growth of social networking sites and
these groups can serve various purposes and interests including
political, professional and religious etc. aspects. These interest group
formation procedures involve the disclosure of identities and interests
of the users which can be considered as the violation of privacy. So
far no significant and effective research has been done to address this
issue so that the OSN users could form groups securely. In this paper,
we propose a cryptography based privacy preserving solution that will
allow users form groups by disclosing neither their identities nor their
interests. Even, users within the group will enjoy the privacy
preserving communication if they want. We also have shown that, this
fully homomorphic encryption based proposed solution is secure against
some possible attacks.
Book Review. In the Book Review section, the book, "Information
Technology Control and Audit", Fourth Edition by Sandra Senft, Frederick
Gallegos, and Aleksandra Davis (CRC Press, ISBN: 978-1-4398-9320-3) is
reviewed by Adolfo S. Coronado, Indiana University -- Purdue University
Fort Wayne. Dr Coronado observes that this book provides a complete
review of IT governance, controls, auditing applications, systems
development, and operations. The book examines a comprehensive list of
topics in IT security and auditing and could be a valuable resource for
those preparing for the Certified Information Systems Auditor (CISA) and
Certified in the Governance of Enterprise IT (CGEIT) certification exams.
*Faruk Arslan*
Department of Accounting and Information Systems | College of Business |
The University of Texas at El Paso
/Mobile/*:*00 1 915 227 4889|
http://business.utep.edu/faculty/profiles/arslan/|www.linkedin.com/pub/faruk-arslan/6/1a1/913
<http://www.linkedin.com/pub/faruk-arslan/6/1a1/913>
-------- Original-Nachricht --------
Betreff: Cognition and Exploratory Learning in Digital Age 2014 in
Porto, Portugal: submit until 28 April
Datum: Mon, 7 Apr 2014 10:34:42 -0400 (EDT)
Von: Andreia Cruz <andreia.cruz(a)celda-conf.org>
An: neumann(a)wu-wien.ac.at
* Apologies for cross-postings. Please send to interested colleagues and
students.*
CALL FOR PAPERS CELDA 2014 - Deadline for submissions: 28 April 2014
*11^th International Conference on Cognition and Exploratory Learning in
Digital Age (CELDA 2014)*
October 25 - 27, 2014- *Porto**, Portugal*
(http://www.celda-conf.org/)
Endorsed by the Japanese Society of Information and Systems in Education
** Conference Scope*
The CELDA 2014 conference aims to address the main issues concerned with
evolving learning processes and supporting pedagogies and applications
in the digital age. There have been advances in both cognitive
psychology and computing that have affected the educational arena. The
convergence of these two disciplines is increasing at a fast pace and
affecting academia and professional practice in many ways. Paradigms
such as just-in-time learning, constructivism, student-centered learning
and collaborative approaches have emerged and are being supported by
technological advancements such as simulations, virtual reality and
multi-agents systems. These developments have created both opportunities
and areas of serious concerns. This conference aims to cover both
technological as well as pedagogical issues related to these
developments. Main tracks have been identified please check
http://www.celda-conf.org/call-for-papers
<http://is.ss20.lmpimages.net/sendlink.asp?HitID=1396881238213&StID=1351&SID…>
** Paper Submission*
This is a blind peer-reviewed conference. Authors are invited to submit
their papers in English through the conference submission system by
April 28, 2014. Submissions must be original and should not have been
published previously.
** Important Dates:*
- Submission Deadline: 28 April 2014
- Notification to Authors: 30 May 2014
- Final Camera-Ready Submission and Early Registration: Until 23 June 2014
- Late Registration: After 23 June 2014
** Paper Publication*
The papers will be published in book and electronic format with ISBN,
will be made available through the Digital Library available at
http://www.iadisportal.org/digital-library/showsearch
<http://is.ss20.lmpimages.net/sendlink.asp?HitID=1396881238213&StID=1351&SID…>.
Authors of the best published papers in the CELDA 2014 proceedings will
be invited to publish extended versions of their papers in a special
issue of the international journal “Technology, Knowledge and Learning”
and/or in a book.
The conference proceedings will be submitted for indexing to INSPEC, EI
Compendex, Thomson ISI, ISTP and other indexing services.
** Conference Contact:*
E-mail: secretariat(a)celda-conf.org
Web site: http://www.celda-conf.org/
** Organized by:* International Association for Development of the
Information Society
powered by <http://is.ss20.lmpimages.net//home/r.asp?SID=0&G=2>
subscribe
<http://is.ss20.lmpimages.net/RWCode/subscribe.asp?SiteID=1351&SID=0&HitID=1…>
forward forward
<http://is.ss20.lmpimages.net/forward.asp?SiteID=1351&SID=0&EmailID=1033291&…>
unsubscribe
<http://is.ss20.lmpimages.net/RWCode/subscribe.asp?SiteID=1351&SID=0&Email=n…>
I did not give my permission to this sender, click here
<http://is.ss20.lmpimages.net/reportabuse.aspx?stid=1351&hitid=1396881238213…>
to report.
This email was sent to neumann(a)wu-wien.ac.at by
andreia.cruz(a)celda-conf.org | Print PDF
<http://is.ss20.lmpimages.net/ExportNewsletterToPdf.aspx?SD=1351&SID=0&ND=11…>
| Privacy Policy
<http://is.ss20.lmpimages.net/privacy.asp?stid=1351&hitid=1396881238213&sec=…>.
-------- Original-Nachricht --------
Betreff: [WI] CFP: The 6th International ACM Conference on Management
of Emergent Digital EcoSystems
Datum: Mon, 7 Apr 2014 15:09:29 +0200 (CEST)
Von: Youakim Badr <youakim.badr(a)insa-lyon.fr>
An: medes(a)acm.org
* Please distribute widely and accept our apologies for cross-posting *
***************
CALL FOR PAPERS
***************
The 6th International ACM Conference on Management of Emergent Digital EcoSystems (MEDES 2014)
In-Cooperation with ACM, ACM SIGAPP and IFIP WG 2.6
http://sigappfr.acm.org/MEDES/14/
September 15-17, 2014
Buraidah-Al Qassim, Saudi Arabi
Description and Objectives
---------------------------
In the world of the Internet, the rapid growth and exponential use of digital medias leads to the emergence of virtual environments namely digital ecosystems composed of multiple and independent entities such as individuals, organizations, services, software and applications sharing one or several missions and focusing on the interactions and inter-relationships among them. The digital ecosystem exhibits self-organizing environments, thanks to the re-combination and evolution of its "digital components", in which resources provided by each entity are properly conserved, managed and used. The underlying resources mainly comprehend data management, innovative services, computational intelligence and self-organizing platforms. Due to the multi-disciplinary nature of digital ecosystems and their characteristics, they are highly complex to study and design. This also leads to a poor understanding as to how managing resources will empower digital ecosystems to be innovative and value-creating. The application of Information Technologies has the potential to enable the understanding of how entities request resources and ultimately interact to create benefits and added-values, impacting business practices and knowledge. These technologies can be improved through novel techniques, models and methodologies for fields such as data management, web technologies, networking, security, human-computer interactions, artificial intelligence, e-services and self-organizing systems to support the establishment of digital ecosystems and manage their resources.
The International ACM Conference on Management of Emergent Digital EcoSystems (MEDES) aims to develop and bring together a diverse community from academia, research laboratories and industry interested in exploring the manifold challenges and issues related to resource management of Digital Ecosystems and how current approaches and technologies can be evolved and adapted to this end. The conference seeks related original research papers, industrial papers and proposals for demonstrations.
Topics
-------
MEDES 2014 seeks contributions in the following 10 areas:
1. Digital Ecosystem Infrastructure
2. Cloud computing
3. Emergent Intelligence
4. Service systems and Engineering
5. Trust, Security & Privacy
6. Data & Knowledge Management
7. Intelligent Web
8. Human-Computer Interaction
9. Networks and Protocols
10. Open Source
Paper Submission
----------------
Submissions must be in an electronic form as PDF format and should be uploaded using the conference website. The submitted paper should be at most 8 ACM single-space printed pages. Papers that fail to comply with length limit will be rejected.
Submissions will be peer-reviewed by at least 3 peer reviewers. After the preliminary notification date, authors rebut by evidence and arguments all reviewer inquiries and their comments. Based on the rebuttal feedback, reviewers notify authors with the final decision. Selection criteria will include: relevance, significance, impact, originality, technical soundness, and quality of presentation. Preference will be given to submissions that take strong or challenging positions on important emergent topics related to Digital Ecosystems. At least one author should attend the conference to present the paper.
The conference Proceedings will be published by ACM and indexed by the ACM Digital Library and DBLP.
Important Dates
----------------
Submission Deadline: 12 May 2014
Notification of Acceptance: 25 June 2014
Camera Ready: 20 July 2014
Conference Dates: 15-17 September 2014
Special Tracks:
----------------
Big Data Processing and Management
Computational Intelligence
Special issues and Journal Publication
---------------------------------------
Extended versions of selected papers will be published in several peer reviewed journals. The list of journals will be announced later.
General Chair
--------------
Obaid Al Motairy, Qassim University, KSA
Richard Chbeir, UPPA University, France
Mohammed Alodib, Qassim University, KSA
Lamri Laouamer, Qassim University, KSA
Program Chair
--------------
Morad Benyoucef, University of Ottawa, Canada
Saad Harous, United Arab Emirates University, UAE
International Advisory Board Members
------------------------------------
Asanee Kawtrakul, NECTEC, Thailand
Janusz Kacprzyk, Polish Academy of Sciences, Poland
Philippe De Wilde, Heriot-Watt University, Scotland
Yasuo Matsuyama, Waseda University, Japan
Albert Zomaya, The University of Sydney, Australia
Steering Committee Members
--------------------------
Youakim Badr, INSA de Lyon, France
Fernando Ferri, IRPPS-CNR, Italy
Frederic Andres, National Institute of Informatics, Japan
Richard Chbeir, University of Bourgogne, France
Hiroshi Ishikawa, Shizuoka University, Japan
Asanee Kawtrakul, NECTEC, Thailand
Dominique Laurent, University of Cergy-Pontoise, France
Epaminondas Kapetanios, University of Westminster, UK
Keynote Speakers
----------------
Fabien Gandon, INRIA, France
Ton Kalker, DTS Incorporation, USA
Kwei-Jay Lin, University of California, Irvine, USA
Azer Bestavros, Boston University, USA
Roger Lee, Central Michigan University, USA
International Program Committee:
--------------------------------
(Please check the web site for the full list)
--
Mailing-Liste: wi(a)aifb.uni-karlsruhe.de
Administrator: wi-request(a)lists.uni-karlsruhe.de
Konfiguration: https://www.lists.uni-karlsruhe.de/sympa/info/wi
-------- Original-Nachricht --------
Betreff: [WI] IDA 2014: Frontier Prize
Datum: Mon, 07 Apr 2014 11:10:26 +0200
Von: "F. Höppner" <f.hoeppner(a)ostfalia.de>
An: wi(a)lists.uni-karlsruhe.de
[We apologize if you received multiple copies]
* * * * * * * * * * * * * * * * * * * * * * * * * * * *
CALL FOR PAPERS
The Thirteenth International Symposium on
Intelligent Data Analysis (IDA 2014)
October 30 - November 1, 2014, Leuven, Belgium
Paper submission deadline: 23 May 2014
www.ida2014.org
* * * * * * * * * * * * * * * * * * * * * * * * * * * *
--- FOCUS ---
The traditional focus of the IDA symposium series is on end-to-end
intelligent
support for data analysis. In 2010, the series re-focused to support papers
that go beyond established technology and offer genuinely novel and "game-
changing" ideas, whilst not always being as fully realized as papers
submitted
to other conferences.
IDA 2014 continues this approach and explicitly seeks "first look"
papers that
might elsewhere be considered preliminary but contain potentially high
impact
research. To emphasize this, IDA 2014 will include a new track -- see
below for
the details. The IDA symposium, which is A-ranked according to ERA, is
open to
all kinds of modeling and analysis methods, irrespective of discipline.
It is
expected to be an interdisciplinary meeting that seeks abstractions that
cut
across domains.
--- FRONTIER PRIZE ---
The IDA Frontier Prize will be awarded to the most visionary contribution.
Submissions considered for this award must present novel and surprising
approaches to data analysis. Last years' winners can be found on the IDA
2014
website. The award consists of a plaque and a prize of 1000 euros.
--- KEYNOTE SPEAKERS ---
Along with the regular presentations, the symposium schedule will feature
three exciting keynote talks by renowned researchers:
- Chris Lintott (University of Oxford)
"Lessons from the crowd: Citizen Science and Big Data"
- Arnoldo Frigessi (University of Oslo)
"Bayesian Inference for Ranks"
- Jan Van den Bussche (Universiteit Hasselt)
"The DNA query language DNAQL"
Read more about the speakers and talks on our website:
http://www.ida2014.org/invited-speakers/
--- CALL FOR PAPERS ---
IDA solicits papers on all aspects of intelligent data analysis, including
papers on intelligent techniques to modeling and analyzing data from
complex,
dynamical systems. IDA 2014 particularly encourages papers about:
- Novel applications of IDA techniques to complex systems
- Novel modes of data acquisition and integration
- Novel approaches that demonstrate how users can add to the analysis
process
- Robustness and scalability issues of intelligent data analysis
techniques
- Visualization and dissemination of results
Intelligent support for data analysis goes beyond the usual algorithmic
offerings in the literature. Papers about established technology should
offer
novel ways to analyzing and/or modeling complex systems to get accepted.
The
conventional reviewing process has a tendency to favor incremental but
solid
contributions over novel but exploratory ones. This can discourage the
kind of
papers that IDA hopes to publish. For this reason, IDA 2014 will have
two paper
tracks, both of which address this issue:
A] Proceedings Track
This is the regular IDA paper track, which will be continued unchanged.
Submitted papers will be reviewed and, if accepted, published in the
proceedings. Submitted papers should consist of at most 11 pages in LNCS
format.
Papers may be accepted for either oral or poster presentation.
To ensure that the papers sought by IDA get accepted, referees will
evaluate
papers against the stated goals of the symposium, and if at least one
program
chair advisor writes an informed, thoughtful, positive review for a
paper, this
may outweigh the criticism of other reviewers.
Following IDA's tradition, the proceedings of IDA 2014 will be published
as a
volume in Springers Lecture Notes in Computer Science (LNCS).
B] First Look Track
New this year is the First Look Track, which allows you to present your
groundbreaking research at the symposium if it is not yet mature enough for
the Proceedings Track. You may have a great idea that needs to be
investigated
in more detail, or you may have a long-term vision that you would like
to share.
In these cases, it may be impossible or undesirable to publish a
preliminary
version of your paper in the proceedings, but presenting and discussing
it at
IDA may be of interest to both you and the community.
For the First Look Track we solicit short papers, up to 8 pages in LNCS
format,
that will be reviewed in a setup similar to that of the Proceedings
Track. Also,
submissions can be accepted for either oral or poster presentation, but
they
will not be published in the proceedings. Note that only a limited
number of
papers can be accepted for this track; if your paper is ready for
publication
we recommend submitting to the regular Proceedings Track.
Note that papers accepted to both tracks are eligible to win the
Frontier Prize.
--- IMPORTANT DATES ---
Paper submission deadline: 23 May 2014
Author notification: 18 July 2014
Symposium: 30 October - 1 November 2014
--- FOLLOW US ---
Follow us to stay up-to-date of the latest news:
Web: www.ida2014.org
Facebook: facebook.com/IDAsymposia
Twitter: @ida_news
--- ORGANIZATION ---
- General Chair -
Hendrik Blockeel, KU Leuven, Belgium
- Program Chairs -
Matthijs van Leeuwen, KU Leuven, Belgium
Veronica Vinciotti, Brunel University, UK
- Poster & Video Chair -
Elisa Fromont, Jean Monnet University, France
- Local Chair -
Tias Guns, KU Leuven, Belgium
- Publicity Chair -
Márcia Oliveira, University of Porto, Portugal
- Sponsorship Chair -
David Martens, Universiteit Antwerpen, Belgium
- Frontier Prize Chairs -
Arno Siebes, University of Utrecht, The Netherlands
Allan Tucker, Brunel University, UK
- Advisory Chairs -
Jaakko Hollmén, Aalto University, Finland
Frank Höppner, Ostfalia University of Applied Sciences, Germany
--
Mailing-Liste: wi(a)aifb.uni-karlsruhe.de
Administrator: wi-request(a)lists.uni-karlsruhe.de
Konfiguration: https://www.lists.uni-karlsruhe.de/sympa/info/wi
-------- Original-Nachricht --------
Betreff: BPMS2'2014 (BPM and Social Software) - Call for papers
Datum: Sun, 06 Apr 2014 22:26:10 +0200
Von: Selmin Nurcan <nurcan(a)univ-paris1.fr>
An: Selmin Nurcan <Selmin.Nurcan(a)univ-paris1.fr>
Dear BPMS2 author,
We will be grateful to you for submitting your work to and also for
advertising the 7th International Workshop on BPM and Social Software
(BPMS2'2014) in conjunction with the International Conference on
Business Process Management and for inviting your colleagues and/or
research students to submit their work.
The goal of the workshop is to promote the integration of business
process management with social software and to enlarge the community
pursuing the theme.
The Call for Papers can be downloaded from the BPMS2'2014 Web site :
http://www.bpms2.org/
All BPM'2014 conference "workshop papers" will be published in Springer
LNBIP post-proceedings.
Best regards,
Rainer Schmidt, Selmin Nurcan
BPMS2'2014 organisers
-------------8<-------------------8<-------------------8<-------------------8<-------------------8<-------------------8<---
BPMS2 2014
CALL FOR PAPERS
7th International Workshop on Business Process Management and Social
Software (BPMS2)
in conjunction with BPM 2014
September 8th, 2014, Haifa, Israel
Papers submission deadline: June 1st, 2014
http://www.bpms2.org/
Organizers:
Rainer Schmidt – Munich University of Applied Sciences, Germany
Selmin Nurcan – University Paris 1 Panthéon Sorbonne, France
------
SCOPE
------
Social software is a new paradigm that is spreading quickly in society,
organizations and economics. More and more enterprises use social
software to improve their business processes and create new business
models. Social software provides new interaction patterns that allow to
integrate more stakeholders in a broader way and to design business
processes in a completely new way. These four patterns are:
• Weak ties
Weak-ties are spontaneously established contacts between individuals
that create new views and allow combining competencies. Social software
supports the creation of weak ties by supporting to create contacts in
impulse between non-predetermined individuals.
• Social Production
Social Production is the creation of artefacts, by combining the input
from independent contributors without predetermining the way to do this.
By this means it is possible to integrate new and innovative
contributions not identified or planned in advance.
• Egalitarianism
Egalitarianism is the equal handling of all contributors of a business
process. This is done with the intention to encourage a maximum of
contributors and to get the best solution fusioning a high number of
contributions, thus enabling the wisdom of the crowds.
• Value co-creation
Social software is based on the idea, that value-creation is a mutual
process. Thus both service producer and consumer (or better prosumer)
cooperate in order co-create value.
Applying these four patterns to business processes creates huge chances
for the design, implementation and operation of business processes.
Social software is used to communicate with the customer increasingly in
a bi-directional manner. Companies integrate customers into product
development using social software to capture ideas for new products and
features. Mass production is more and more replaced by the
individualized provisioning of services and products. Thus social
software establishes learning relationships with customers and
stakeholders. Inside companies, hierarchical structures are more and
more dissolved and replaced by a culture of trust. The exchange of
knowledge and information is improved. Innovations and decisions are
created socially and not by single experts and managers.
Combining social software and business process management benefits a lot
from the recent advances of data processing, subsumed as Big Data. Today
large amounts of semi-structured and unstructured data as created by
social software can be processed. Based on the analysis of this data,
social software is able to influence business process (management)
significantly.
-----------------
WORKSHOP GOALS
-----------------
The workshop has the goal to investigate the relationship of social
software and business process management in three areas.
1. Interaction of social software with business process management
2. Use of social software in business processes.
3. Leverage social software in business process management and business
processes using Big Data.
-------------------
WORKSHOP THEMES
-------------------
The workshop are organized according to the three areas.
1. Interaction of social software with business process management
- How interact weak ties, social production, egalitarianism and value
co-creation with business process management?
- Which phases of the BPM lifecycle (Design, Deployment, Operation, and
Evaluation) can profit the most from social software?
- Do we need new BPM methods and/or paradigms to cope with social software?
- How are trust and reputation established in business processes using
social software?
- How does social software interact with WFMS or other business process
support systems?
2. Use of social software in business processes
- Are there business processes which require sociality, especially when
they are not predictable (as production workflows) but collaborative or
ad hoc?
- How can we use Wikis, Blogs etc. to support business processes?
- Which types of social software can be used in which phases of the BPM
lifecycle?
- What new kinds of business knowledge representation are offered by
social production?
3. Leverage social software in business process management using Big Data.
- Which data created with social software can be used to support
business processes?
- Which categories of business processes can profit from big data ?
- Are there any similarities or relationships with process mining
techniques and also with workflow control and role patterns?
-----------
SUBMISSION
-----------
Prospective authors are invited to submit papers for presentation in any
of the areas listed above. Only papers in English will be accepted.
Length of full papers must not exceed 12 pages (There is no possibility
to buy additional pages). Position papers and tool reports should be no
longer than 6 pages. Papers should be submitted in the new LNBIP format
(http://www.springer.com/computer/lncs?SGWID=0-164-7-487211-0). Papers
have to present original research contributions not concurrently
submitted elsewhere. The title page must contain a short abstract, a
classification of the topics covered, preferably using the list of
topics above, and an indication of the submission category (regular
paper/position paper/tool report).
Please use Easychair for submitting your paper:
http://www.easychair.org/conferences/?conf=bpms214
The paper selection will be based upon the relevance of a paper to the
main topics, as well as upon its quality and potential to generate
relevant discussion. All the workshop papers will be published by
Springer as a post-proceeding volume (to be sent around 4 months after
the workshop) in their Lecture Notes in Business Information Processing
(LNBIP) series.
-----------------
EXPECTED RESULTS
-----------------
All papers will be published on workshop wiki (www.bpms2.org) before the
workshop, so that everybody can learn about the problems that are
important for other participants. A blog will be used to encourage and
support discussions. The workshop will consist of long and short paper
presentations, brainstorming sessions and discussions. The workshop
report will be created collaboratively using a wiki. A special issue
over all workshops will be published in a journal (decision in progress).
The two papers collaboratively written by the BPMS2’08 and BPMS2’09
workshop authors (see below) have been accepted for publication in the
Journal of Software Maintenance and Evolution: Research and Practice
(including Software Process: Improvement and Practice):
S. Erol, M. Granitzer, S. Happ, S. Jantunen, B. Jennings, A. Koschmider,
S. Nurcan, D. Rossi, R. Schmidt, P. Johannesson. Combining BPM and
Social Software : Contradiction or Chance ? Special issue of the
Software Process: Improvement and Practice Journal on "BPM 2008 selected
workshop papers", Volume 2, Issue 6-7, pp. 449-476, October-November 2010.
http://onlinelibrary.wiley.com/doi/10.1002/smr.460/abstract
G. Bruno, F. Dengler, B. Jennings, R. Khalaf, S. Nurcan, M. Prilla, M.
Sarini, R. Schmidt, R. Silva. Key challenges for enabling Agile BPM with
Social Software. Journal of Software Maintenance and Evolution: Research
and Practice, incorporating Software Process: Improvement and Practice,
Special Issue on BPM'09 selected workshop papers, Volume 23, Issue 4,
pp. 297-326, June 2011.
http://onlinelibrary.wiley.com/doi/10.1002/smr.v23.4/issuetoc
----------------
IMPORTANT DATES
----------------
Paper submission: June 1, 2014
Author notification: July 1, 2014
Camera-ready: July 23, 2014
------------------
PROGRAM COMMITTEE
------------------
Ofer Arazy - Haifa University, Israel
Ilia Bider - IbisSoft, Sweden
Jan Bosch - Intuit, Mountain View, California, USA
Marco Brambilla - Politecnico di Milano, Italy
Pietro Fraternali - Politecnico di Milano, Italy
Chihab Hanachi - Toulouse 1 University, France
Ralf-Christian Härting, Hochschule Aalen, Germany
Monique Janneck - Luebeck University of Applied Sciences, Germany
Rania Khalaf, IBM TJ Watson Research Center, USA
Ralf Klamma - Informatik 5, RWTH Aachen, Germany
Sai Peck Lee - University of Malaya, Kuala Lumpur, Malaysia
Myriam Lewkowicz - Universite de Technologie de Troyes, France
Renata Mendes de Araujo - Federal University of the State of Rio de
Janeiro, Brasil
Bela Mutschler, University of Applied Sciences Ravensburg-Weingarten,
Germany
Gustaf Neumann - Vienna University of Economics and Business
Administration, Austria
Selmin Nurcan - University Paris 1 Pantheon Sorbonne, France
Andreas Oberweis - Karlsruhe Institute of Technology, Germany
Erik Proper - Public Research Centre - Henri Tudor, The Netherlands
Sebastian Richly, TU Dresden, Germany
Rainer Schmidt - Munich University of Applied Sciences, Germany
Miguel-Ángel Sicilia - University of Alcalá, Madrid, Spain
Pnina Soffer - University of Haifa, Israel
Karsten Wendland - University of Applied Sciences, Germany
Christian Zirpins - Seeburger AG, Germany
--
----------------------------------------------------------------
Selmin NURCAN
Maître de Conférences HDR / Associate Professor
----------------------------------------------------------------
The University Paris 1 Panthéon-Sorbonne has been running for the
last 16 years, a highly successful Masters programme (SIC -
apprenticeship) that is open for the 5th year to Foreign students
http://www.iksem.orghttp://mastersic.univ-paris1.fr/http://www.meilleurs-masters.com/master-management-des-systemes-dinformatio…
----------------------------------------------------------------
The 15th edition on Business Process Modeling, Development and Support
(BPMDS'2014) in conjunction with CAISE'2014
*BPMDS is a WORKING CONFERENCE in conjunction with CAISE*.
June 16-20, 2014, Thessaloniki, Greece
http://bpmds.org/
Previous Springer LNBIP proceedings:
http://www.springerlink.com/content/978-3-642-38483-7/http://www.springerlink.com/content/978-3-642-31071-3/http://www.springerlink.com/content/978-3-642-21758-6/http://www.springerlink.com/content/978-3-642-13050-2/http://www.springerlink.com/content/978-3-642-01861-9/
----------------------------------------------------------------
*Surface mail*
Université Paris 1 - Panthéon - Sorbonne
Ecole de Management de la Sorbonne
Centre Broca
21, rue Broca 75240 Paris cedex 05 FRANCE
Tel : 33 - 1 53 55 27 13 (répondeur) Fax : 33 - 1 53 55 27 01
----------------------------------------------------------------
Université Paris 1 - Panthéon - Sorbonne
Centre de Recherche en Informatique
90, rue de Tolbiac 75634 Paris cedex 13 FRANCE
http://crinfo.univ-paris1.fr/users/nurcan/
Tel : 33 - 1 44 07 86 34 Fax : 33 - 1 44 07 89 54
mailto:nurcan@univ-paris1.fr
----------------------------------------------------------------
To handle yourself, use your head.
To handle others, use your heart.
----------------------------------------------------------------
--
Ce message a ete verifie par MailScanner
pour des virus ou des polluriels et rien de
suspect n'a ete trouve.
--
----------------------------------------------------------------
Selmin NURCAN
Maître de Conférences HDR / Associate Professor
----------------------------------------------------------------
The University Paris 1 Panthéon-Sorbonne has been running for the
last 16 years, a highly successful Masters programme (SIC -
apprenticeship) that is open for the 5th year to Foreign students
http://www.iksem.orghttp://mastersic.univ-paris1.fr/http://www.meilleurs-masters.com/master-management-des-systemes-dinformatio…
----------------------------------------------------------------
The 15th edition on Business Process Modeling, Development and Support
(BPMDS'2014) in conjunction with CAISE'2014
*BPMDS is a WORKING CONFERENCE in conjunction with CAISE*.
June 16-20, 2014, Thessaloniki, Greece
http://bpmds.org/
Previous Springer LNBIP proceedings:
http://www.springerlink.com/content/978-3-642-38483-7/http://www.springerlink.com/content/978-3-642-31071-3/http://www.springerlink.com/content/978-3-642-21758-6/http://www.springerlink.com/content/978-3-642-13050-2/http://www.springerlink.com/content/978-3-642-01861-9/
----------------------------------------------------------------
*Surface mail*
Université Paris 1 - Panthéon - Sorbonne
Ecole de Management de la Sorbonne
Centre Broca
21, rue Broca 75240 Paris cedex 05 FRANCE
Tel : 33 - 1 53 55 27 13 (répondeur) Fax : 33 - 1 53 55 27 01
----------------------------------------------------------------
Université Paris 1 - Panthéon - Sorbonne
Centre de Recherche en Informatique
90, rue de Tolbiac 75634 Paris cedex 13 FRANCE
http://crinfo.univ-paris1.fr/users/nurcan/
Tel : 33 - 1 44 07 86 34 Fax : 33 - 1 44 07 89 54
mailto:nurcan@univ-paris1.fr
----------------------------------------------------------------
To handle yourself, use your head.
To handle others, use your heart.
----------------------------------------------------------------
-------- Original-Nachricht --------
Betreff: [AISWorld] Last CFP: 1st Workshop on Digital Currencies -
papers due on April 15
Datum: Sun, 6 Apr 2014 19:25:25 +0300
Von: George M Giaglis <giaglis(a)aueb.gr>
An: aisworld(a)lists.aisnet.org
===========================================================================
CALL FOR PAPERS
===========================================================================
1st Workshop on Digital Currencies (DC 2014)
in conjunction with
17th International Conference on Business Information Systems (BIS
2014)
Larnaca, Cyprus
May 22, 2014
http://bis.kie.ue.poznan.pl/16th_bis/wscfp.php?ws=dc2014
===========================================================================
Deadline for submissions: Apr 15, 2014
===========================================================================
During the last few years, the growing interest and popularity in
crypto currencies have fostered developments in research and practices
in relevant fields. Academics and practitioners, alike, are facing
challenges related to the ever increasing required infrastructure for
mining crypro-currencies, the operational aspects of exchanges, the
regulatory frameworks that are required for the new form of payment
instruments without hindering the growth of the new economy and the
relation between crypto-currencies and official payment methods.
Nowadays, addressing such challenges becomes essential for developing
new services and possibly business models that contain the prospect of
restructuring financial systems.
This workshop invites researchers and business experts to share
knowledge and competencies for organizational and practical apsects of
crypto-currency systems. We expect participants to present research
papers, comment on business cases, hold tutorial sessions or
demonstrate systems, tools and other related issues needed to:
(a) manage crypto-currencies
(b) optimize operational aspects of crypto-currency exchanges and
(c) assess and make informed decisions related to digital currencies.
TOPICS OF INTEREST
* Types of Digital Payment Systems and Properties
* Crypto-currencies and Security
* Mining Crypto-ocurrencies
* P2P Decentralized Architectures and Platforms
* Crypto-currency Exchange Markets
* Risk Analysis of Exchanges for Digital Currency
* Assessing Emerging Regulatory Frameworks
* Mobile Information Systems and Services in Crypto-currencies
* Digital Currency as a Service
* Digital Currency and the Banking Sector
* Investing and Crypto-currencies
* Regulatory Frameworks in Digital Monetary Systems
* Digital Currency Transactions and Privacy
* Policy and Ethics
* Case Studies and Best Practices
IMPORTANT DATES
* Apr 15, 2014 - submission deadline for papers
* Apr 25, 2014 - notification of acceptance/rejection
* May 18, 2014 - submission of final papers
* May 22, 2014 - the workshop
CHAIRS
* George M. Giaglis, Athens University of Economics and Business
* Angelika Kokkinaki, University of Nicosia, Cyprus