-------- Weitergeleitete Nachricht --------
Betreff: [computational.science] 2nd CFP SI on Knowledge-based Software
Engineering - Science of Computer Programming
Datum: Tue, 13 Jan 2015 09:55:56 +0100
Von: Rafael Valencia Garcia <valencia(a)um.es>
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
2nd Call for Papers
********************************************
The reception of contributions is now open
********************************************
Special Issue on Knowledge-based Software Engineering in Science of
Computer Programming Journal, Elsevier (5-Year impact factor 0.810
according to Thomson Scientific 2013 Journal Citations Report)
Special issue publication date: March 2016
http://www.journals.elsevier.com/science-of-computer-programming/call-for-p…
Objective
Knowledge-based technologies provide a consistent and reliable basis
to face the challenges for organization, manipulation and
visualization of the data and knowledge, playing a crucial role as the
technological basis of the development of a large number of
information systems. On the other hand, software engineering comprises
different processes and techniques that support the specification,
development, and maintenance of software. Knowledge-based software
engineering is focused in automating the software engineering life
cycle, software engineering resources which are shifting towards
knowledge acquisition and the automated reuse of expert knowledge for
developing software artifacts. Knowledge in software applications is
becoming more significant because the domains of many software
applications are inherently knowledge-intensive and this knowledge is
often not explicitly dealt with in software development. This impedes
maintenance and reuse. Moreover, it is generally known that developing
software requires expertise and experience, which are currently also
implicit and could be made more tangible and reusable using
knowledge-based or related techniques. Examples of approaches that are
directly related to this tendency are knowledge engineering,
ontologies, conceptual modeling, domain analysis and domain
engineering, business rules, workflow management, to mention but a
few.
Nowadays, enterprises handle different types of knowledge that are
often inter-related, and which must be managed in a consistent way.
For instance, software engineering involves the integration of various
knowledge sources that are in constant change. Therefore, tools and
techniques are necessary to capture and process knowledge in order to
facilitate subsequent development efforts, especially in the domain of
software engineering. With the use of new proposals on how using the
knowledge in a multitude of ways and in all phases of software
development can be advantageous.
This special issue aims at exploring the recent advances in the
application of knowledge-based technologies in Software Engineering
area soliciting original scientific contributions in the form of
theoretical foundations, case studies, techniques, tools, and
applications of knowledge-based software engineering theory and
practice.
The topics of this special issue include but are not limited to:
• Knowledge Representation in Software Engineering
• Knowledge Acquisition in Software Engineering
• Knowledge driven Software Engineering
• Case-based reasoning in Software Engineering
• Ontology Engineering in Software Engineering
• Semantic Interoperability
• Semantic Data Models
• Semantic Service Oriented Architectures
• Natural Language Processing applied to Software Engineering
• Applications and Case-studies
• Decision support methods for software engineering
• Development processes for knowledge-based applications
• Empirical/evaluation studies for knowledge-based applications
• Knowledge engineering for process management and project management
• Knowledge management for business processes, workflows and enterprise modeling
• Knowledge technologies for service-oriented systems, Internet of
services and Internet of things Knowledge-based methods and tools for
software engineering education
• Knowledge-based methods and tools for testing, verification and
validation, maintenance and evolution in software engineering
• Knowledge-based methods for software metrics
• Knowledge-based requirements engineering, domain analysis and modeling
• Methodology and tools for knowledge discovery and data mining
Instructions for authors
Papers submitted must have not been published previously or under
consideration for publication, though they may represent significant
extensions of prior work. Manuscripts should be submitted online at
http://ees.elsevier.com/scico/ (see the EES User Guide for Authors).
Authors should select "SI on KB Soft. Eng." in the EES platform when
they will be asked for type of submission. All submissions will be
peer-reviewed following the double-blind review process. The objective
is to apply very high standards of acceptance while ensuring fair,
timely and efficient review cycles.
Important Dates
Manuscript Submission Deadline: March 15, 2015
Notification of review: July 15, 2015
Revision due: October 15, 2015
Notification of Final Acceptance: December 15, 2016
Camera-ready paper submission deadline: January 15, 2016
Expected publication: March 2016
Guest Editors
Rafael Valencia-García, Universidad de Murcia, Spain (valencia(a)um.es)
Giner Alor-Hernández, Instituto Tecnológico de Orizaba, México
(galor(a)itorizaba.edu.mx)
---------------------------------------------------------------------
Computational Science Mailing List hosting provided by:
Sardina Systems -- The OpenStack Data Center Automation Company
http://www.sardinasystems.com
---------------------------------------------------------------------
To unsubscribe, e-mail: computational.science-unsubscribe(a)lists.iccsa.org
For additional commands, e-mail: computational.science-help(a)lists.iccsa.org
-------- Weitergeleitete Nachricht --------
Betreff: [AISWorld] Call for Papers: International Conference on Global
Software Engineering (ICGSE) 2015
Datum: Thu, 15 Jan 2015 12:48:20 +0000
Von: Marco Kuhrmann <kuhrmann(a)mmmi.sdu.dk>
An: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
10th International Conference on Global Software Engineering
July 13-16th, 2015
http://www.icgse.org
---------------------------------------------------------------------------------------
Conference Research Themes
---------------------------------------------------------------------------------------
Effectively engineering software in a global context is a key competitive advantage in today’s IT and software industry. However, the increased globalization of software development creates
challenges due to the impact of time zones, diversity of culture and communication, or distance. This requires novel and effective techniques and practices to achieve intended
productivity and quality targets.
The 10th International Conference on Global Software Engineering (ICGSE) brings together researchers and practitioners interested in solving the challenges of continentally distributed
software engineering. The ICGSE 2015 organizing committee invites academic and industrial communities to contribute to the expertise of the international global software engineering community.
---------------------------------------------------------------------------------------
Important Dates
---------------------------------------------------------------------------------------
Paper abstract submissions Sunday Feb 8, 2015
Paper submissions Sunday Feb 22, 2015
other dates:
Workshop proposals Sunday Feb 1, 2015
Tutorial proposals Sunday Mar 1, 2015
Doctoral symposium submissions Sunday Mar 8, 2015
Notification to all authors Friday Mar 27, 2015
Camera-ready papers due Thursday Apr 30, 2015
Industry abstract submissions Friday May 1, 2015
Pre-conference: Workshops & Tutorials Monday July 13, 2015
Conference July 14-16, 2015
---------------------------------------------------------------------------------------
ORGANIZING COMMITTEE
---------------------------------------------------------------------------------------
General Chair
Aurora Vizcaíno, University of Castilla-La Mancha, Spain
Program Chairs
Martin Nordio ETH Zurich, Switzerland
Ban Al-Ani, Automatic Data Processing (ADP), USA
Program Committee
Nazareno Aguirre, National University of Río Cuarto, Argentina
Ban Al-Ani, University of California Irvine, USA
Muhammad Ali Babar, IT University of Copenhagen, Denmark
Alberto Avritzer, Siemens, USA
Sarah Beechman, Lero Research, Ireland
Christian Bird, Microsoft Research, USA
Yuanfang Cai, Drexel University, USA
Fabio Calefato, University of Bari, Italy
Marcelo Cataldo, Carnegie Mellon University, USA
Tony Clear, Auckland University of Technology, Australia
Ivica Crnkovic, Märlardalen University, Sweden
Daniela Damian, University of Victoria, Canada
Cleidson De Souza, Vale Institute of Technology and UFPA, Brazil
Elisabetta Di Nitto, Politecnico Di Milano, Italy
Oscar Dieste, Polytechnic University of Madrid, Spain
Christof Ebert, Vector Consulting, Germany
Stuart Faulk, University of Oregon, USA
Carlos A. Furia, ETH Zurich, Switzerland
Marco Kuhrmann, University of South Denmark, Denmark
Filippo Lanubile, University of Bari, Italy
Casper Lassenius, Aalto University, Finland
Christian Lescher, Siemens AG, Germany
Sabrina Marczak, PUCRS, Brazil
Raffaela Mirandola, Polytechnic University of Milan, Italy
Nils Brede Moe, SINTEF ICT, Norway
Juergen Muench, University of Helsinki, Finland
Martin Naedele, ABB Corporate Research, Sweden
Nachiappan Nagappan, Microsoft Research, USA
Martin Nordio, ETH Zurich, Switzerland
Maria Paasivaara, Helsinki University of Technology, Finland
Rafael Prikladnicki, PUCRS, Brazil
Narayan Ramasubbu, University of Pittsburgh, USA
David Redmiles, Donald Bren School of information and Computer Sciences, USA
Ita Richardson, Lero Research, Ireland
Anita Sarma, University of Nebraska-Lincoln, USA
Hina Shah, Georgia Institute of Technology, USA
Darja Smite, Blekinge Institute of Technology, Sweden
Rini Van Solingen, Delft University of Technology, Netherlands
Michal Young, University of Oregon, USA
Steering Committee Chair
Christof Ebert, Vector Consulting Services, Germany
Doctoral Symposium Chairs
Tony Clear, Auckland University of Technology, NZ
Sarah Beecham, LERO, Ireland
Workshop Chairs
Fabio Calefato, University of Bari, Italy
Marco Kuhrmann, University of Southern DK, Denmark
Tutorials Chairs
Casper Lassenius, Aalto University, Finland
Juho Mäkiö, University of Applied Sciences Emden/Leer, Germany
Industrial Liaison
Alberto Avritzer, Siemens, USA
Carlos Rebate, Indra, Spain
Publicity
Coral Calero, University of Castilla-La Mancha, Spain
Xin Peng, Fundan University, China
Raghu Sangwan, Pennsylvania State University, USA
Ramón Palacio Instituto Tecnológico de Sonora, México
Finance Chair
Moisés Rodríguez, Alarcos Quality Center S.L., Spain
Proceedings Chair
Ignacio García, University of Castilla-La Mancha, Spain
Local Organizing Chair
Félix O. García, University of Castilla-La Mancha, Spain
Webmaster
Jesús Cárdenas, University of Castilla-La Mancha, Spain
---------------------------------------------------------------------------------------
Venue
---------------------------------------------------------------------------------------
ICGSE 2015 (14-16 July) will be held in Escuela Superior de Informática, the Computer Science Faculty of University of Castilla-La Mancha, in Ciudad Real.
Ciudad Real (which means ‘Royal City’ in Spanish) is a city located in the Southern Central part of Spain, in the region of Castilla-La Mancha, which is the “Don Quixote” region. It is not easy to categorize Castilla-La Mancha, for it is a region of great variety and complexity. On the one hand, there is the ruddy red earth, the windmills, and simple whitewashed villages of the province of Ciudad Real (which encompasses most of the area commonly called La Mancha). But there are also the strangely sculpted cliffs of Cuenca and Albacete, the hilly woodlands of Guadalajara and the dark mystery and ancient cultures of Toledo.It is perfectly located for transport connections, as it is only 1 hour away from the main cities of Spain: Madrid (1 hr by high speed train), Barcelona (less than 1 hour by plane), Toledo (1 hr by car), Córdoba (70 minutes by high speed train) and Sevilla (2 hr by high speed train).
It is a modern city, one of the very few in Spain where you can forget your problems and have time to enjoy yourself. Ciudad Real’s citizens love the outdoors, enjoying the weather and people. Their hospitality and open mindedness make visiting this city an experience that nobody should miss.
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Weitergeleitete Nachricht --------
Betreff: [AISWorld] [Computers&Security] CFP for the Special Issue on
Secure Information Systems engineering
Datum: Mon, 19 Jan 2015 16:34:21 +0000
Von: DAVID GARCIA ROSADO <David.GRosado(a)uclm.es>
An: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
******************************
*COSE – Computers & Security* <http://www.jucs.org/>
***********************************************************************
*Call for Papers for the Special Issue on Secure Information Systems
Engineering*
************************************************************************
_http://www.journals.elsevier.com/computers-and-security/call-for-papers/sp…
*Call for Papers*
*-------------------------------------------------------------------------------------*
*Date submission due: 28 February 2015
Acceptance deadline: 15 December 2015*
*Guest Editors*
*-----------------------------------------------------------------------------------------*
David G. Rosado
University of Castilla-La Mancha, Spain
_David.GRosado(a)uclm.es_ <mailto:David.GRosado@uclm.es>
Jan Jurjens
Technical University of Dortmund, Germany
_jan.jurjens(a)cs.tu-dortmund.de_ <mailto:jan.jurjens@cs.tu-dortmund.de>
*Scope*
*------------------------------------------------------------------------------------------*
Security is a widespread and growing concern that covers all areas of
society: business, domestic, financial, government, and so on. In fact,
the so-called information society is increasingly dependent on a wide
range of information systems whose mission is critical, such as air
traffic control systems, financial systems, or public health systems.
The potential losses that are faced by businesses and organizations that
rely on all these systems, both hardware and software, therefore signify
that it is crucial for information systems to be properly secured from
the outset.
This Special Issue of the Computers & Security Journal aims to serve as
a forum in which to unite academics, researchers, practitioners and
students in the field of security engineering and security software
engineering.
*Topics*
*------------------------------------------------------------------------------------------*
We welcome submissions presenting technical, experimental,
methodological and/or applicative contributions, addressing -though not
limited to- the following topics:
* Security and privacy methods and models (requirements, analysis,
design, testing)
* Security in software development (agile, architecture, design,
deployment, aspect-oriented, model-driven, threat-driven)
* Component-based, Aspect-oriented, Agent-based, Pattern-based
Information system Security methods
* Security Engineering for specific Information Systems (e-Services,
databases, mobile, internet, social networks)
* Security Management and Assessment
* Security in Cloud Computing
* Security in Big Data, Databases and Data Warehouses
* Security for Mobile Computing, sensors networks, multimedia systems
* Security ontology/taxonomy design
* Semantic Web Technologies applied to Security
* Security in Software Product Lines
* Distributed and Network Security
* Security & Trust Models
* Security Requirements Engineering
* Analysis and management of risks
* Case studies and experiences of secure software engineering
*Instructions for authors*
*------------------------------------------------------------------------------------------*
Authors should prepare their manuscript according to the Guide for
Authors available from the online submission page of the Computers &
Security at _http://www.journals.elsevier.com/computers-and-security/_.
Authors should select “*SI: Security Engineering*” when they reach the
“Article Type” step in the submission process.
-------- Weitergeleitete Nachricht --------
Betreff: [AISWorld] CFP: General Theories of Software Engineering (due
30 Jan)
Datum: Thu, 22 Jan 2015 13:41:35 +1300
Von: Paul Ralph <paulralph(a)gmail.com>
An: aisworld(a)lists.aisnet.org
The 4th ICSE Workshop on General Theories of Software Engineering (GTSE
2015)
http://semat.org/?page_id=1364
Monday, May 18, 2015, Florence, ItalyÂ
In conjunction with the International Conference on Software Engineering
(ICSE 2015)
(http://2015.icse-conferences.org/)
Key Dates
Paper submission deadline: ***Extended to  January 30, 2015****Â
Paper acceptance notification: Â February 18, 2015
Camera-ready accepted paper deadline: Â February 27, 2015Â
Workshop: Â May 18, 2015
Workshop Overview
Most academic disciplines emphasize the importance of their core,
central or general theories. Examples of general theories include Big
Bang Theory, Maxwellâs equations, The Theory of the Cell, The Theory
of Evolution, Supply and Demand, Structuration Theory, The General
Theory of Crime, Pure Theory of Law and The Theory of Marriage. Software
engineering meanwhile, has not produced widely-accepted general
theories. Lack of theory undermines the perceived scientific legitimacy
of the field, curtails education and impedes development of a cumulative
body of knowledge. GTSE consequently supports attempts to propose,
synthesize, clarify and test core, central and general theories in the
software engineering domain. GTSE especially promotes attempts to answer
fundamental questions, integrate ideas from diverse sources and propose
revolutionary, contrarian and generally ambitious new theories.Â
Keynote by Professor Barry Boehm
Developing and Evolving a Value-Based Theory of Software Engineering
The development of a value-based theory of software engineering began in
the 1980s with attempts to find a theory of project management that was
simple, general, and specific, for use in teaching software engineering
and managing software projects at TRW. After trying to tailor various
management heroes such as Theories X, Y, and Z, the stakeholder win-win
Theory W emerged in 1988-89. It then evolved over software management
experiences at TRW and DARPA and participation in the value-based
software engineering community into a more fully-articulated theory
presented in the 2005 book, Value-Based Software Engineering.Â
Subsequent application, evolution, and student PhD dissertations led to
its current form, along with associated processes, tools, and
generalization to systems engineering. This presentation includes a
discussion and set of criteria for a good theory, elaboration of the
theory and process and its application to a representative project, and
a summary of its !
evaluation with respect to the criteria for a good theory.
Topics of interest include (but are not limited to):
New theories in software engineering
Groundbreaking extensions to existing theories
Groundbreaking synthesis of existing theories
Novel applications of theories from reference disciplines (e.g.
sociology) to software engineering
Grounded theory, ethnography and qualitative approaches to theory building
Systematic literature review and thematic synthesis, leading to new theory
Empirical evaluation of general theories
Software engineering process theories
Research methodologies for general theory evaluation
Addressing core questions for a general theory:
How can a general theory of software engineering be of practical use?
What core phenomena should it explain?
What questions should it address?
What should its main concepts be?
How are they related?
How should it be expressed?
How can it be tested?
How can it gain acceptance throughout both the academic community and
industry?
Contrarian perspectives on software engineering theory
Possible Contributions include (but are not limited to):
Theory proposals with conceptual evaluations
Theory building empirical field studies including grounded theory, case
studies and ethnography
Theory building, explorative lab studies, experiments and simulations
Empirical evaluations of general, central or core theories (any research
approach welcome)
Systematic literature reviews and thematic analyses
Conceptual contributions related to research methodology
Position papers on general theory topics
Submissions
We welcome full papers (up to 12 pages) and short papers (up to 4 pages)
to allow submissions of not only developed research but also early ideas
and position papers. The papers must follow ICSE technical papers
formatting guidelines:Â
http://2015.icse-conferences.org/submission-guidelines and they should
be submitted to the workshop's EasyChair site:Â
https://easychair.org/conferences/?conf=gtse2015. All papers will be
published in the ACM and IEEE Digital Libraries.
Organizing Committee
Paul Ralph, University of Auckland, New Zealand
Ivar Jacobson, Ivar Jacobson International, Switzerland
Gregor Engels, University of Paderborn, Germany
Michael Goedicke, paluno, University of Duisburg-Essen, Germany
Contact information
To contact the organizers, please email:Â gtse2015(a)easychair.org
<mailto:gtse2015@easychair.org>
-------- Weitergeleitete Nachricht --------
Betreff: [AISWorld] CFP Fifth International Workshop on Information
Systems Security Engineering - WISSE'15
Datum: Wed, 28 Jan 2015 09:31:37 +0000
Von: DAVID GARCIA ROSADO <David.GRosado(a)uclm.es>
An: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
Apologies for multiple posting. Please forward it to interested candidates
----------------------------------------------------------------------------
CALL FOR PAPERS
***************
Fifth International Workshop on Information Systems Security Engineering
- WISSE'15
http://gsya.esi.uclm.es/WISSE2015/index.htm
In conjunction with the 27th International Conference on Advanced
Information Systems Engineering (CAiSE'15)
Stockholm, Sweden, 8 - 12 June 2015
http://caise2015.dsv.su.se/
Important Dates
**************
Regular Research and Experience Paper Submission: February 15, 2015
Demo/poster papers: March 1, 2015
Authors Notification: March 13, 2015
Camera Ready Submission: March 21, 2015
Workshop Date: June 8, 2015
Workshop Description
*******************
Information systems security problems are currently a widespread and
growing concern that covers most of the areas of society, such as
business, domestic, financial, government, healthcare, and so on. The
scientific community has realized the importance of aligning information
systems engineering and security engineering in order to develop more
secure information systems. Nevertheless, there is lack of an
appropriate event that will promote information systems security within
the context of information systems engineering. The proposed workshop
fulfils this gap.
The workshop aims to provide a forum for researchers and practitioners
to present, discuss and debate on one hand the latest research work on
methods, models, practices and tools for secure information systems
engineering, and on the other hand relevant industrial applications,
recurring challenges, problems and industrial led solutions at the area
of secure information systems engineering.
Topics of particular interest include (but are not limited to)
* Security and privacy analysis methods and models
* Security and privacy design methods and models
* Security and privacy testing methods and models
* Security and privacy modelling Support Tools
* Integrating functional, security and privacy requirements
* Threat-driven and Model-driven security
* Secure IS interoperability modelling
* Security and process modelling
* Modelling Security and Trust
* Managing Secure Software development
* Security in Agile Software Development Methods
* Methodologies and models for evaluating IS security and privacy aspects
* Formal methods for modelling security
* Models and approaches for the verification of security and privacy
properties
* Approaches for managing security changes in IS
* Component-based, Aspect-oriented, Agent-based, Pattern-based,
agile-based Information system Security development and evolution methods
* Methods, models and tools for workflow and Business Process Security
* Case studies in modelling secure IS
* Security Architectures and Patterns for Information Systems
* Semantic Web Technologies applied to Security
* Ontologies for IS security
* Security Engineering for specific Information Systems (e-Services,
databases, mobile, internet, social networks, cloud, etc.)
* Security Engineering for SOA Systems
* Methods for security reengineering
* Software Security Knowledge
* Enterprise Software Security
* Cloud Forensics Requirements and Tools
* Methods, models and techniques for data anonymization
* Open Data and security
* Security and product lines
* Security of externalized IS
Submission
**********
Prospective authors are invited to submit papers in any of the topics of
the workshop. The results described must be unpublished and must not be
under review elsewhere. Only papers in English will be accepted.
Manuscripts must comply with the Springer LNCS formatting rules. Prepare
your manuscript as a PDF file and submit it to the workshop organizers
via the EasyChair system.
We accept three types of submissions: Regular Research Papers,
Experience Papers and Demo/Poster Papers.
**Regular Research Papers describe original solutions (theoretical,
methodological or conceptual) in the field of secure information systems
engineering. A regular research paper should describe the context of the
work, the problem tackled, the relevant state of the art, the position
or solution suggested and the benefits of the contribution. The length
of regular research papers should not exceed 12 pages (including all
text, figures, references and appendices.). Three to five keywords
characterising the paper should be indicated at the end of the abstract.
**Experience papers present application of work to case studies and
industrial practice. Such papers should provide a detail description of
the application setting, describe lessons learned, and discuss best
practice. Experience papers should not exceed 12 pages (including all
text, figures, references and appendices.). Three to five keywords
characterising the paper should be indicated at the end of the abstract.
**Demo/Poster papers should briefly discuss academic and/or industrial
efforts on software tools and systems for secure information systems
engineering. Demo/Poster papers should not exceed 1 page and they should
provide a brief description of the research and software/system to be
demonstrated. Poster papers are also ideal to explain a new idea and get
feedback from the community. It is expected that accepted papers will be
presented in the form of a live demonstration or a poster.
Submissions not conforming to the LNCS format and the above page
limitations or being obviously out of the scope of the workshop will be
rejected without review.
Registration
**********
For each accepted submission, at least one author is expected to
register for the workshop and attend the workshop in order to present
the paper. Registration is through the CAiSEÃ15 web site.
Workshop Structure
****************
The workshop will combine paper presentations, poster/demonstration
session, and a keynote. Moreover, accepted papers apart from
presentation time, will be assigned with one or two discussants with
responsibility to initiate the discussion on the paper. We are confident
that such structure will support a workshop environment that will be
based on discussion, debate and will therefore provide an important
contribution to the relevant research community.
List of PC members
****************
Antonio MaÃa. University of Malaga. Spain
Akram Idani. University of Grenoble. France
Benjamin Nguyen. SMIS, INRIA-Rocquencourt, France
Brajendra Panda. University of Arkansas. USA
Bruno Defude. TÃlÃcom SudParis, France
Carlos Blanco. University of Cantabria. Spain
Christos Kalloniatis. University of the Aegean, Greece
Csilla Farkas. University of South Carolina. USA
Daniel Mellado. Spanish Tax Agency. Spain
Djamel Benslimane. University of Lyon 1, France
Eduardo B. Fern·ndez. Florida Atlantic University. USA
Eduardo Fern·ndez-Medina. University of Castilla-La Mancha. Spain
El-Bay Bourennane. University of Bourgogne, Dijon, France
Eric Dubois. CRP Henri Tudor. Luxembourg
Ernesto Damiani. Universitâ¡ degli Studi di Milano. Italy
FrÃdÃric Cuppens. Telecom Bretagne. France
Günther Pernul. University of Regensburg. Germany
Guttorm Sindre. NTNU, Norway
Hanifa Boucheneb. Ecole polytechnique de MontrÃal, Quebec, Canada
Isabelle Comyn-Wattiau. CNAM. Paris, France
Jacky Akoka. CNAM. France
Jan Jürjens. Technical University of Dortmund, Germany
Javier López. University of M·laga. Spain
Ludovic Apvrille. Telecom ParisTech, France
Luis Enrique S·nchez. University of Castilla-La Mancha. Spain
Marc Frappier. University of Sherbrooke. QuÃbec. Canada
Marc Chaumont. University of Montpellier, France
Matt Bishop. University of California. USA
Mohammad Zulkernine. Queen's University. Canada
Oliver Popov. Stockholm University, Sweden
Paolo Giorgini. University of Trento. Italy
RÃgine Laleau. Università Paris-Est CrÃteil. France
Sabrina De Capitani di Vimercati. Universitâ¡ degli Studi di Milano. Italy
Shareeful Islam, University of East London, UK.
Stefanos Gritzalis, University of the Aegean, Greece
Steven Furnell. Plymouth University. UK
Tristan Allard. University of Montpellier 2, France
Vincent Nicomette. INSA de Toulouse, France
Yves Ledru. University of Grenoble. France
Workshop organization
*******************
General Chair:
Dr Nadira Lammari
CEDRIC-CNAM. 292 Rue Saint Martin
75141 Paris Cedex 03, France
lammari(a)cnam.fr <mailto:lammari@cnam.fr>
Programme Chairs:
Dr David G. Rosado
University of Castilla-La Mancha. Paseo de la Universidad, 4
13071 Ciudad Real, Spain
David.GRosado(a)uclm.es <mailto:David.GRosado@uclm.es>
Dr Christos Kalloniatis
University of the Aegean
Department of Cultural Technology and Communication
University Hill, Mytilene
Gr 81100, Lesvos, Greece
chkallon(a)aegean.gr <mailto:chkallon@aegean.gr>
Steering Committee
Dr Nadira Lammari
CEDRIC-CNAM. 292 Rue Saint Martin
75141 Paris Cedex 03, France
lammari(a)cnam.fr <mailto:lammari@cnam.fr>
Dr Jan J¸rjens
TU Dortmund & Fraunhofer ISST
Otto-Hahn-Str. 12 44221 Dortmund, Germany
jan.jurjens(a)cs.tu-dortmund.de <mailto:jan.jurjens@cs.tu-dortmund.de>
Dr Haris Mouratidis
School of Computing, Engineering and Mathematics,
University of Brighton,â Brighton, BN2 4GJ, UK
H.Mouratidis(a)brighton.ac.uk <mailto:H.Mouratidis@brighton.ac.uk>
Dr David G. Rosado
University of Castilla-La Mancha. Paseo de la Universidad, 4
13071 Ciudad Real, Spain
David.GRosado(a)uclm.es <mailto:David.GRosado@uclm.es>
Dr Carlos Blanco
Department of Mathematics, Statistical and Computation.
Facultad de Ciencias. University of Cantabria.
Av. De los Castros, s/n ó 39071, Santander, Spain
carlos.blanco(a)unican.es <mailto:carlos.blanco@unican.es>
Dr Christos Kalloniatis
University of the Aegean
Department of Cultural Technology and Communication
University Hill, Mytilene
Gr 81100, Lesvos, Greece
chkallon(a)aegean.gr <mailto:chkallon@aegean.gr>
Publicity chairs:
Dr Shareeful Islam
School of Architecture, Computing and Engineering.
University of East London. Docklands Campus.
4/6 University Way, E16 2RD, London
shareeful(a)uel.ac.uk <mailto:shareeful@uel.ac.uk>
Dr Luis Enrique S·nchez
University of Armed Forces, Ecuador
LuisEnrique(a)SanchezCrespo.org <mailto:LuisEnrique@SanchezCrespo.org>
Dr Akram Idani
LIG, University of Grenoble
681 rue de la Passerelle, 38402 Saint Martin d'HÃres Cedex
Akram.Idani(a)imag.fr <mailto:Akram.Idani@imag.fr>
-------- Weitergeleitete Nachricht --------
Betreff: [computational.science] Call for Papers - 20th European
Symposium on Research in Computer Security (ESORICS 2015)
Datum: Thu, 22 Jan 2015 18:47:42 +0100
Von: Giovanni Livraga <giovanni.livraga(a)unimi.it>
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
CALL FOR PAPERS
******************************************************************************
20th European Symposium on Research in Computer Security (ESORICS 2015)
Vienna, Austria -- September 23-25, 2015
http://www.esorics2015.sba-research.org
******************************************************************************
ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the academic
and industrial communities. Papers offering novel research contributions
in computer security are solicited for submission to the Symposium.
The primary focus is on original, high quality, unpublished research
and implementation experiences. We encourage submissions of
papers discussing industrial research and development.
Topics of interest include, but are not limited to:
- access control
- accountability
- ad hoc networks
- anonymity
- applied cryptography
- authentication
- biometrics
- database security
- data protection
- digital content protection
- digital forensic
- distributed systems security
- electronic payments
- embedded systems security
- inference control
- information hiding
- identity management
- information flow control
- integrity
- intrusion detection
- formal security methods
- language-based security
- network security
- phishing and spam prevention
- privacy
- risk analysis and management
- secure electronic voting
- security architectures
- security economics
- security metrics
- security models
- security and privacy in cloud scenarios
- security and privacy in complex systems
- security and privacy in location services
- security and privacy for mobile code
- security and privacy in pervasive/ubiquitous computing
- security and privacy policies
- security and privacy in social networks
- security and privacy in web services
- security verification
- software security
- steganography
- systems security
- trust models and management
- trustworthy user devices
- web security
- wireless security
PAPER SUBMISSIONS
--------------------------
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. The proceedings will be published by
Springer in the the Lecture Notes in Computer Science series.
All submissions should follow the LNCS template
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0)
from the time they are submitted. Submitted papers should be
at most 16 pages (using 10-point font), excluding the bibliography and
well-marked appendices, and at most 20 pages total. Committee members
are not required to read the appendices, so the paper should be
intelligible without them. All submissions must be written in English.
Purely theoretical papers, e.g. in cryptography, must be explicit about
the relevance of the theory to the security of IT systems.
Submissions are to be made to the submission web site at
http://www.easychair.org/conferences/?conf=esorics2015.
Only pdf files will be accepted. Submissions not meeting these guidelines
risk rejection without consideration of their merits.
Papers must be received by the deadline of April 4, 2015.
Authors of accepted papers must guarantee that their papers will be
presented at the conference.
IMPORTANT DATES
--------------------------
Paper submission due: April 4, 2015
Notification to authors: June 15, 2015
Camera ready due: June 29, 2015
OFFICERS
--------------------------
GENERAL CHAIR
Guenther Pernul
University of Regensburg, Germany
PROGRAM CHAIRS
Peter Y A Ryan
University of Luxembourg, Luxembourg
Edgar Weippl
SBA Research & Vienna University of Technology, Austria
WORKSHOP CHAIR
Javier Lopez
University of Malaga, Spain
PROGRAM COMMITTTE
--------------------------
David A. Basin, ETH Zurich, Switzerland
Alessandro Armando, Universita` di Genova, Italy
Vijay Atluri, Rutgers University, USA
Michael Backes, Saarland University, Germany
Feng Bao, Security and Privacy Lab, Huawei, China
Giampaolo Bella, Universit‡ di Catania, Italy
Carlo Blundo, Universita` degli Studi di Salerno, Italy
John C. Mitchell, Stanford University, USA
Ran Canetti, Tel Aviv University, Israel
Liqun Chen, HP Labs, UK
Michael Clarkson, Cornell University, USA
Jason Crampton, University of London, UK
Cas Cremers, University of Oxford, UK
Frederic Cuppens, Telecom Bretagne, France
Nora Cuppens-Boulahia, Telecom Bretagne, France
Sabrina De Capitani di Vimercati, Universita` degli Studi di Milano, Italy
Wenliang Du, Syracuse University, USA
Dimitris E. Simos, SBA Research, Austria
Hannes Federrath, University of Hamburg, Germany
Simon Foley, University College Cork, Ireland
Sara Foresti, Universita` degli Studi di Milano, Italy
Michael Goldsmith, University of Oxford, UK
Dieter Gollmann, TU Hamburg-Harburg, Germany
Dimitris Gritzalis, AUEB, Greece
Joshua Guttman, MTIRE Corp and Worcester Polytechnic, USA
Feng Hao, Newcastle University, UK
Amir Herzberg, Bar-Ilan University, Israel
Xinyi Huang, Fujian Normal University, China
Michael Huth, Imperial College, UK
Sotiris Ioannidis, FORTH, Crete
Adam J. Lee, University of Pittsburgh, USA
Sushil Jajodia, George Mason University, USA
Markus Jakobsson, Qualcomm, USA
Sokratis K. Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, TU Darmstadt, Germany
Florian Kerschbaum, SAP, Germany
Steve Kremer, INRIA Nancy and LORIA, France
Wenke Lee, Georgia Institute of Technology, USA
Yingjiu Li, Singapore Management University, Singapore
Peng Liu, Pennsylvania State University, USA
Javier Lopez, University of Malaga, Spain
Wenjing Lou, Virginia Polytechnic Institute and State University, USA
Haibing Lu, Santa Clara University, USA
Roy Maxion, Carnegie Mellon University, USA
Catherine Meadows, Naval Research Laboratory, USA
Carroll Morgan, University of New South Wales, Australia
David Naccache, ENS, France
Rolf Oppliger, eSecurity Technologies, Switzerland
Stefano Paraboschi, Universita` degli Studi di Bergamo, Italy
Olivier Pereira, UCL Crypto Group, Belgium
Guenther Pernul, University of Regensburg, Germany
Bart Preneel, Katholieke Universiteit Leuven , Belgium
Jean-Jacques Quisquater, UCL, Belgium
Kui Ren, State University of New York, Buffalo, USA
Mark Ryan, University of Birmingham, UK
Ahmad-Reza Sadeghi, TU Darmstadt, Germany
Pierangela Samarati, Universita` degli Studi di Milano, Italy
Nitesh Saxena, University of Alabama at Birmingham, USA
Andreas Schaad, SAP, Germany
Steve Schneider, University of Surrey, UK
Basit Shafiq, Lahore University of Management Sciences, Pakistan
Einar Snekkenes, Gjovik University College, Norway
Philip Stark, University of California, Berkeley, USA
Vanessa Teague, University of Melbourne, Australia
Jaideep Vaidya, Rutgers University, USA
Paulo Verissimo, University of Luxembourg, Luxembourg
Luca Vigano, Kingís College London, UK
Michael Waidner, TU Darmstadt, Germany
Cong Wang, City University of Hong Kong, China
Lingyu Wang, University of Concordia, Canada
Ting Yu, North Carolina State University, USA
Meng Yu, Virginia Commonwealth University, USA
Moti Yung, Google, USA
Jianying Zhou, Institute for Infocomm Research, Singapore
Sencun Zhu, Pennsylvania State University, USA
This call for papers and additional information about the conference
can be found at http://www.esorics2015.sba-research.org
---------------------------------------------------------------------
Computational Science Mailing List hosting provided by:
Sardina Systems -- The OpenStack Data Center Automation Company
http://www.sardinasystems.com
---------------------------------------------------------------------
To unsubscribe, e-mail: computational.science-unsubscribe(a)lists.iccsa.org
For additional commands, e-mail: computational.science-help(a)lists.iccsa.org
-------- Weitergeleitete Nachricht --------
Betreff: [AISWorld] Call for Papers: Co-located IEEE
CLOUD/ICWS/SCC/MS/SERVICES/BigDataCongress 2015
Datum: Mon, 26 Jan 2015 03:32:48 -0200
Von: Marcelo Fantinato <m.fantinato(a)usp.br>
An: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
Apologies for cross-postings. Please send it to interested colleagues
and students. Thanks!
::::::::Co-located IEEE CLOUD/ICWS/SCC/MS/SERVICES/BigDataCongress 2015
CALL FOR PAPERS:::::::::::::::::::::::::::::
The 8th IEEE International Conference on Cloud Computing (CLOUD 2015)
The 22th IEEE International Conference on Web Services (ICWS 2015)
The 12th IEEE International Conference on Services Computing (SCC 2015)
The 4th IEEE International Congress on Big Data (BigDataCongress 2015)
The 4th IEEE International Conference on Mobile Services (MS 2015)
The 11th IEEE World Congress on Services (SERVICES 2015)
June 27-July 2, 2015
Millennium Broadway Hotel (New York City Time Square)
http://www.thecloudcomputing.org/2015/ (2014 acceptance rate: 18%)
http://icws.org (2014 acceptance rate: 18%)
http://conferences.computer.org/scc/2015/ (2014 acceptance rate: 20%)
http://www.themobileservices.org/2015/http://www.ieeebigdata.org/2015/
===========================================================================
Sponsored by IEEE Computer Society's Technical Committee on Services
Computing (TC-SVC), the co-located conferences will explore everything
as a service from different perspectives:
-CLOUD 2015: XaaS in cloud;
-ICWS 2015: Web-based services;
-SCC 2015: Service innovation lifecycle;
-MS 2015: Internet of Things and Wearable services;
-BigDataCongress 2015: Big Data-based services
Each conference will contain a Research track, an Application track, and
a Short Paper track. The Congress will comprise keynotes, panels,
tutorials, Visionary Tracks, Ph.D symposium, SERVICES Cup contest,
Industry summit, and other events like job fair and exhibitions.
Important Dates for Research Track Papers:
--------------------------------------------------------
Paper Submission Due Dates:
ICWS/CLOUD 2015: 2/20/2015 (Decision: 4/15/2015) [extended]
SCC 2015: 2/15/2015 (Decision: 4/15/2015)
BigDataCongress/MS/SERVICES 2015: 3/1/2015(Decision: 4/25/2015)
---------------------------------------------------------
Accepted papers will appear in the corresponding conference proceedings
(ICWS/CLOUD/SCC/MS/BigDataCongress/SERVICES).
Extended versions of selected papers will be invited to submit to the
Special Issues at the IEEE Transactions on Services Computing (TSC,
SCI&EI), International Journal of Web Services Research (JWSR, SCI&EI),
International Journal of Business Process Integration and Management
(IJBPIM), International Journal of Services Computing (IJSC),
International Journal of Cloud Computing (IJCC), and Internaitonal
Journal of Big Data (IJBD).
A Best Paper Award and a Best Student Paper Award will be presented by
ICWS/CLOUD/SCC/MS/BigDataCongress 2015, respectively. The first author
of the best student paper must be a full-time student.
==========================================================
Publicity Chairs:
=================
Zaiwen Feng, University of Wuhan, China
Marcelo Fantinato, University of São Paulo, Brazil
Carsten Binnig, DHBW Mannheim, Germany
Please join us at IEEE Services Computing Community
(http://services.oc.ieee.org/). Press the "Register" button to apply for
a FREE IEEE Web Account. As a member, you will be permitted to login and
participate in the community. This invitation allows you to join a
community designed to facilitate collaboration among a group while
minimizing e-mails to your inbox. As a registered member of the Services
Computing Community, you can also access the IEEE Body of Knowledge on
Services Computing (http://www.servicescomputing.tv).
-------- Weitergeleitete Nachricht --------
Betreff: [AISWorld] BPM 2015 - 2nd Call for Research Papers
Datum: Mon, 26 Jan 2015 10:04:18 +0100
Von: Henrik Leopold <henrik.leopold(a)wu.ac.at>
An: wi(a)aifb.uni-karlsruhe.de, aisworld(a)lists.aisnet.org,
eii-associate(a)lists.eii.edu.au
***********************************************************************
Call for Research Papers
BPM 2015
13th International Conference on Business Process Management
31 August – 3 September 2015, Innsbruck, Austria
http://bpm2015.q-e.at/http://twitter.com/BPMConf
***********************************************************************
The annual BPM conference is the leading forum for researchers, practitioners, developers and users in the field of Business Process Management (BPM) to explore and exchange knowledge on BPM. The conference covers all aspects of BPM research and practice, including theory, applications, management and technology of BPM, and engages the most renowned representatives of the BPM community worldwide in talks, tutorials, and scientific discussions.
BPM as a research field and as an industry practice has significantly matured and increased its span, but is also facing new and unprecedented challenges such as a need to foster true innovation rather than improvement, to make use of big data opportunities and to account for processes that are increasingly adaptive, flexible and generative rather than structured, formalized and stable.
These new topics add to existing areas of interest and relevance to BPM research and industry. They also attest to an increasingly interdisciplinary nature of BPM research, which puts the conference in close connection to disciplines such as Information Systems, Management and Organizational Science, Data and Knowledge Management, Theory of Processes, Operations Management, Service-Oriented Computing, Social Computing, Cloud Computing, Big Data, and many more.
BPM 2015 will take place in Innsbruck, Austria, in the midst of Tyrol’s breathtaking scenery and stunning mountains. A university town, with a strong record of academic excellence and a vibrant student scene, Innsbruck combines tradition and splendour with modern facilities and attractions. We hope you will join us in this international conference and Olympic city to help shape the BPM methods and technologies of the future. BPM 2015 will feature an industry track, a varied set of BPM-related workshops and co-located events. For the first time, BPM 2015 will also look to host tutorials dedicated to research methods relevant to BPM.
############################
Topics
############################
In line with the emergent opportunities and challenges, BPM 2015 explicitly encourages papers that report on research in emerging BPM areas and novel applications of BPM concepts, as well as interdisciplinary BPM research that connects to Operations Research, Management Science, Artificial Intelligence, Cloud Computing, Sensor Technologies and others. To foster such submissions, BPM 2015 will include two new thematic areas, “BPM in a broader context” and “Emerging areas of BPM”. As in previous editions, the BPM conference continues to welcome research papers on traditional BPM topics such as modelling, analysis, improvement, and execution.
Besides regular research papers, authors may submit industry papers, clearly marked as such. All authors of an industry paper submission *must be* from industry or industrial research labs (none of authors can be from an academic institute or a university). An industry paper reports on work within the broad topics of interests to BPM conference but is focused on practice, typically studying requirements imposed by current practice, reporting new problems, or experience on the deployment of methods, solutions, tools or systems in practice. Similar to research papers, industry submissions will be reviewed by multiple PC members including representatives from industry and industrial research labs, and are required to meet the same high quality standards for novelty, technical quality, clarity of the contribution and presentation, and relevance to the topics of interest in BPM community.
Thematic areas in which contributions are sought include, but are not limited to, those listed below. Submissions may fit more than one category, however, corresponding authors will be asked to nominate one primary category for submission. As previously, each major topic is championed by senior PC members, who will promote the topic and lead the review processes taking into consideration specific characteristics of the particular thematic area.
* BPM in a broader context: the intersection of BPM and other disciplines
Topic champions: Avigdor Gal, Roel Wieringa, Mathias Weske
* Decision management and BPM
* Event handling and BPM
* BPM and enterprise architecture
* BPM and auditing
* Automated planning in BPM
* Sensor technologies and BPM
* Scientific workflows and BPM
* Software process management
* Security and Risk Management in business process execution
* Operations research for business processes
* BPM in healthcare and the medical context
* Emerging areas of BPM
Topic champions: Florian Daniel, Akhil Kumar, Farouk Toumani
* BPM in and for the Cloud
* BPM with and for the Crowd
* Social BPM
* User-centric aspects of BPM
* Human-centric processes and knowledge-intensive processes
* Processes in the Internet of Things and Wearable Devices
* Mobile processes
* Collective adaptive processes
* Management and applications of BPM
Topic champions: Jan vom Brocke, Hajo Reijers, Michael Rosemann
* Business process lifecycle management
* Relationship between business strategy and business processes
* Business process transformation and change management
* Success factors and measures in BPM
* BPM governance and compliance management
* BPM maturity
* Adoption and Practice of BPM
* Customer process management
* Design-led process innovation
* Process execution and data management
Topic champions: Boudewijn van Dongen, Marlon Dumas, Michael zur Muehlen, Stefanie Rinderle-Ma
* Process-oriented and service-oriented software architectures
* Business process management systems
* Resource management in business process execution
* Managing process execution data
* Process monitoring and performance measurement
* Adaptive and context-aware process execution
* Process mining
* Analytics and visualization of big process data
* Process data warehousing
* (Adaptive) Case management
* Data and event streams in business processes
* Data integration and data quality in business processes
* Fundamentals and theory of processes
Topic champions: Jörg Desel, Marcello La Rosa, Pnina Soffer, Jianwen Su
* Foundations of business processes and process models
* Process description and analysis methods and formalisms
* Algorithms for the analysis of processes
* Reference process models
* Foundation of process design and synthesis
* Artefact-centric processes
* Process architectures
* Variability and configuration of processes
* Managing process collections and repositories
############################
Submission Instructions
############################
Papers should be formatted according to Springer's LNCS formatting guidelines (for instructions and style sheets see http://www.springer.de/comp/lncs/authors.html). Submissions must be in English and not exceed 16 pages of length. The title page must contain a short abstract clarifying the relation of the paper with the topics above. The paper must clearly state the problem being addressed, the goal of the work, the results achieved, and the relation to other work. Student papers must be clearly marked as such. Concerning length and formatting, student papers must follow the same guidelines as research papers.
Papers should be submitted electronically in PDF format via the BPM 2015 EasyChair submission site:
https://www.easychair.org/conferences/?conf=bpm2015
Submissions must be original contributions that have not been published previously, nor already submitted to other conferences or journals in parallel with this conference. Empirical papers should where possible build on novel datasets previously unpublished. Research on existing datasets must clearly explain the novelty of the applied analysis.
All accepted papers will be included in the conference proceedings published by Springer in the Lecture Notes in Computer Science (LNCS) series. For each accepted paper, at least one author must register for the conference and present the paper. Authors of selected papers will be invited to submit a paper for a special issue of Information Systems (Elsevier).
This year, first-time submitters to BPM may ask to be considered for a pre-submission shepherding program in which a BPM PC member gives advise on the presentation and positioning of a paper. Interested candidates are encouraged to contact the PC-Chairs (bpm2015(a)easychair.org) by 6th of February, 2015.
############################
Key Dates
############################
* Abstract submission: 08.03.2015
* Full papers submission: 15.03.2015
* Notifications: 15.05.2015
* Camera ready papers: 15.06.2015
############################
Conference Committee
############################
General Chair
* Barbara Weber, University of Innsbruck
Program Chairs
* Hamid Motahari, IBM Research – San Jose
* Jan Recker, Queensland University of Technology
* Matthias Weidlich, Imperial College London
Industry Chairs
* Jan Mendling, WU Vienna
* Jan vom Brocke, University of Liechtenstein
Workshop Chairs
* Manfred Reichert, University of Ulm
* Hajo Reijers, TU Eindhoven
Demo Chairs
* Florian Daniel, University of Trento
* Stefan Zugal, University of Innsbruck
Tutorial and Panel Chairs
* Pnina Soffer, University of Haifa
* Jakob Pinggera, University of Innsbruck
Doctoral Consortium Chairs
* Mathias Weske, University of Potsdam
* Stefanie Rinderle-Ma, University of Vienna
Local Organization Chair
* Ilona Zaremba, University of Innsbruck
* Cornelia Haisjackl, University of Innsbruck
Web and Social Media Chairs
* Cornelia Haisjackl, University of Innsbruck
* Jakob Pinggera, University of Innsbruck
* Stefan Zugal, University of Innsbruck
Publicity Chairs
* Henrik Leopold, WU Vienna (Europe)
* Michael zur Muehlen, Stevens Institute of Technology (North America)
* Lucinea Thom, Universidade Federal do Rio Grande do Sul (South America)
* Lijie Wen, Tshingua University (Asia)
* Amin Beheshti, University of New South Wales (Australia)
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Weitergeleitete Nachricht --------
Betreff: Call for Games for Third International Competition on
Educational Games at the European Conference on Game-Based Learning (ECGBL)
Datum: Mon, 26 Jan 2015 15:50:33 +0000
Von: Lists <Lists(a)academic-conferences.org>
An: Gustaf.Neumann(a)wu-wien.ac.at <Gustaf.Neumann(a)wu-wien.ac.at>
Dear Gustaf
We are pleased to be holding the Third International Competition on
Educational Games at the European Conference on Game-Based Learning
(ECGBL), which is being held in Steinkjer, Norway on 8 -9 October this
year. The aims of this competition are:
*· To provide an opportunity for educational game designers and creators
to participate in the conference and demonstrate their game design and
development skills in an international competition. *
**
*· To provide an opportunity for GBL creators to peer-assess and
peer-evaluate their games. *
**
*· To provide ECGBL 2015 attendees with engaging and best-practice games
that showcase exemplary applications of GBL. *
Games submitted to the competition are expected to accomplish an
educational goal. We welcome contributions relevant to all levels of
learning (primary, secondary, tertiary or professional. Both digital and
non-digital games are encouraged. Competitors should be prepared to
explain their design and evaluation process, why it is innovative (the
game itself or its educational setting) and how they achieved (will
achieve) the impact they seek. The game should be in a development state
that engages the player for at least 10 minutes. The closing date for
submissions is the *16^th of June*.
For further details see:
http://academic-conferences.org/ecgbl/ecgbl2015/ecgbl15-call-papers.htm
In the first instance authors should submit details of the game using
the online abstract submission form
http://academic-conferences.org/ecgbl/ecgbl2015/ecgbl15-call-games.htm
Kind regards
Sue Nugus
Conferences Director
ACPIL
Tel +44 118 972 4148
Fax +44 118 972 4691
www.academic-conferences.org <http://www.academic-conferences.org>
IMPORTANT NOTICE
****************
You are receiving this email because you are on the conference mailing
list. If you no longer wish to receive notifications about this
conference, please reply to this email with REMOVE in the subject line
of the email.
________________________________________________________________________
This e-mail has been scanned for all viruses by Claranet. The
service is powered by MessageLabs. For more information on a proactive
anti-virus service working around the clock, around the globe, visit:
http://www.claranet.co.uk
________________________________________________________________________
-------- Weitergeleitete Nachricht --------
Betreff: [AISWorld] Open Journal of Databases (OJDB): Call for Papers
Datum: Tue, 27 Jan 2015 08:44:41 +0100
Von: OJDB Editorial Office <ojdb(a)ronpub.com>
An: IRList(a)lists.shef.ac.uk, performance(a)merlot.usc.edu,
mmkm(a)jiscmail.ac.uk, aisworld(a)lists.aisnet.org
*******************************
Open Journal of Databases (OJDB) (http://www.ronpub.com/journals/ojdb)
*********************************
========= Call for Papers ========
** About OJDB
Open Journal of Databases (OJDB), an open access online journal,
publishes original and creative research results on databases. OJDB
distributes its articles under the open access model. All articles of
OJDB are fully open access and online available to readers free of
charge. Accepted manuscripts are published online immediately.
OJDB aims to provide a forum for sharing and exchanging ideas,
experiences and research results among scientists and practitioners of
databases. OJDB publishes regular research papers, short communications,
reviews and visionary papers in all aspects of databases. There is no
restriction on the length of the papers.
** Scope
OJDB welcomes scientific papers in all the traditional and emerging
areas of database research.
** Special Issues
=> Upcoming special issues
(http://www.ronpub.com/index.php/journals/ojdb/special-issues/upcoming-speci…):
"Emerging Hardware Technologies for Databases (EHTD-2015)"
=> Call-for-Special-Issues
(http://www.ronpub.com/index.php/journals/ojdb/special-issues/call-for-speci…):
We always welcome special issue proposals at any time.
** Editor-in-Chief:
Prof. Dr. Fabio Grandi, University of Bologna, Italy
** Editorial Board:
Prof. Mírian Halfeld Ferrari Alves, Université d'Orléans, France
Prof. Jorge Bernardino, CISUC-Polytechnic Institute of Coimbra, Portugal
Prof. Eliseo Clementini, University of L’Aquila, Italy
Prof. Jérôme Darmont, Université de Lyon, France
Prof. Dr. Bipin C. Desai, Concordia University, Canada
Dr. rer. nat. habil. Sven Groppe, University of Lübeck, Germany
Prof. Giovanna Guerrini, Universita' di Genova, Italy
Prof. Dr. Le Gruenwald, University of Oklahoma, USA
Prof. Abdessamad Imine, Lorraine University, France
Prof. Peiquan Jin, University of Science and Technology of China, China
Prof. Carsten Kleiner, University of Applied Sciences and Arts Hanover,
Germany
Prof. Josep L. Larriba-Pey, DAMA-UPC, Barcelona, Spain
Prof. Daniel Lemire, Université du Québec, Canada
Dr. Jan Lindström, SkySQL
Prof. Chuan-Ming Liu, National Taipei University of Technology, Taiwan
Prof. Pericles Loucopoulos, Loughborough University, United Kingdom
Dr. Cédric du Mouza, Conservatoire National des Arts et Métiers, France
Dr. Eric Pardede, La Trobe University, Australia
Dr. Elaheh Pourabbas, National Research Council, Italy
Dr. Ismael Sanz, Universitat Jaume I, Spain
Prof. Dr. Klaus-Dieter Schewe, Software Competence Center Hagenberg
(SCCH), Austria
Dr. Theodoros Tzouramanis, University of the Aegean, Greece
Dr. Marco Vieira, University of Coimbra, Portugal
Dr. John (Junhu) Wang, Griffith University, Australia
** Submission
OJDB welcomes submissions at any time. The preparation and submission of
manuscripts should follow the author guidelines
http://www.ronpub.com/index.php/journals/ojdb/author-guidelines.
** Open-access publishing fees:
All articles of OJDB are fully open access and online available to
readers free of charge. In order to support open access, OJDB has to
charge a one-time publication fee for each accepted article. Please
visit the journal webpage for more information
(www.ronpub.com/index.php/journals/ojdb/publication-fees).
** Recent published research papers:
"Deriving Bounds on the Size of Spatial Areas"
(http://www.ronpub.com/publications/OJDB-2015v2i1n01_Buchmann.pdf)
Erik Buchmann, Patrick Erik Bradley, Klemens Böhm
"Designing a Benchmark for the Assessment of Schema Matching Tools"
(http://www.ronpub.com/publications/OJDB-v1i1n02_Duchateau.pdf)
Fabien Duchateau, Zohra Bellahsene
Using Business Intelligence to Improve DBA Productivity
(http://www.ronpub.com/publications/OJDB-v1i2n01_Mortensen.pdf)
Eric A. Mortensen, En Cheng
"Eventual Consistent Databases: State of the Art"
(http://www.ronpub.com/publications/OJDB-v1i1n03_Elbushra.pdf)
Mawahib Musa Elbushra, Jan Lindström
"Which NoSQL Database? A Performance Overview"
(http://www.ronpub.com/publications/OJDB-v1i2n02_Abramova.pdf)
Veronika Abramova, Jorge Bernardino, Pedro Furtado
For more content, please visit
http://www.ronpub.com/index.php/journals/ojdb/issues.
************************************************
OJDB Editorial Office
RonPub UG (haftungsbeschränkt), Lübeck, Germany
Web: http://www.ronpub.com/journals/ojdb
Email: ojdb(a)ronpub.com
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org